Logan Garth Goodwin

Somersworth, New Hampshire · MS Cybersecurity in Progress

Cybersecurity graduate student and IT infrastructure specialist focused on reliable, secure systems.

I like solving user, network, and system issues in a way that keeps environments stable and supportable. I am currently pursuing an MS in Cybersecurity at SNHU with a 4.0 GPA, and I focus on the space where enterprise infrastructure, defense in depth, and practical troubleshooting meet. This portfolio highlights network design, access control, operations planning, incident analysis, and documentation that translate well to IT support, infrastructure support, network support, and junior security roles.

About

Technical foundation with a strong troubleshooting mindset.

My background blends hands-on troubleshooting, home lab experimentation, network design, customer-facing field work, security-focused coursework, and team leadership. I like turning technical detail into fixes that are practical, documented, and easier for other people to support.

I think my strongest value is connecting infrastructure decisions to everyday user impact. That means reducing repeat issues, making escalation clearer, and improving stability without losing sight of security. My current graduate work in cybersecurity strengthens that approach by adding more depth in defense in depth, risk reduction, and architectural hardening.

Core strengths

  • Network and systems support
  • Incident response and documentation
  • Security best practices
  • Troubleshooting and root-cause analysis

Target roles

IT Support Specialist, Infrastructure Support Technician, Network Support Technician, Junior Cybersecurity Analyst

I think the strongest evidence on this site is the mix of troubleshooting-minded architecture, access control planning, incident analysis, secure network segmentation, and operations documentation. That combination translates well to support teams that value uptime, clear escalation, security-aware user support, and employees who can bridge technical work with leadership communication.

IT support capabilities

Built to support users, systems, and reliable day-to-day operations.

User and access support

  • User access management and least-privilege thinking
  • Account changes, access reviews, and removal workflows
  • Permission troubleshooting and escalation awareness
  • Security-aware handling of regulated data

Network troubleshooting

  • Connectivity troubleshooting across VLANs, routing, and ACLs
  • Wireshark fundamentals and packet-level thinking
  • Switching and segmentation concepts that reduce support guesswork
  • Support-friendly design for faster isolation of issues

Operations and documentation

  • Incident documentation and root-cause analysis
  • Clear handoff notes and implementation planning
  • Ticket-minded communication and repeatable workflows
  • Change planning that protects uptime and user productivity

Infrastructure awareness

  • Windows and Linux support fundamentals
  • Hardware troubleshooting and repair
  • Virtualization and home lab administration
  • Security controls that support stable operations

Professional snapshot

How I describe my work in one clear paragraph.

Bridging the gap between complex network infrastructure and secure enterprise solutions. I am currently pursuing my MS in Cybersecurity at Southern New Hampshire University with a 4.0 GPA, with a focus on defense in depth and architectural hardening. From leading teams at Amazon to building secure campus networks in Cisco Packet Tracer, I thrive where leadership meets technical problem-solving.

Defense in DepthEnterprise InfrastructureLeadershipTechnical Problem-Solving

Why this matters

Clearer positioning for recruiters and hiring managers.

I think this framing makes the site stronger because it shows both where I am now and where I am headed. It connects support work, infrastructure thinking, graduate study, and security in a way that is easy to scan quickly.

Tech stack

Quick scan of tools, platforms, and technologies.

Systems

WindowsLinuxActive DirectoryHardware RepairVirtualization

Networking

VLANsRoutingSwitchingACLsWiresharkPacket Tracer

Security

Least PrivilegeFirewall ConceptsDMZRisk AnalysisIncident Analysis

Documentation

Root-Cause NotesImplementation PlanningPolicy WritingEscalation WorkflowsProject Documentation

Certifications

Credentials that reinforce my support and infrastructure background.

View Credly →

CompTIA

A+Network+Security+Project+ (In Progress)

EC-Council

DFEEHENDE

TestOut

PC ProNetwork ProIT Fundamentals Pro

Profile

Linked badges on Credly provide quick verification for recruiters and hiring managers.

Featured work

Projects that show how I troubleshoot, design, document, and support systems.

See all project pages →
Campus network segmentation and support project art

Secure Enterprise Campus Infrastructure

Designed a segmented enterprise campus network to improve security, reduce outage blast radius, and simplify troubleshooting across users, devices, and services.

Cisco IOSASA FirewallACLs
Open project
Multi-site support and architecture project art

Enterprise Network Analysis and SD-WAN Architecture

Analyzed a multi-site enterprise network to identify reliability, visibility, and supportability issues affecting users across locations. Produced an SD-WAN-focused architecture recommendation that improves network resilience and simplifies troubleshooting.

SD-WANNGFWDR Planning
Open project
Information assurance and operational support project art

Information Assurance Plan (Graduate)

Developed an information assurance plan that translated governance and security requirements into practical operational controls. Defined access management, logging, monitoring, and escalation processes that strengthen accountability and support incident handling.

NISTGovernanceRisk
Open project
Healthcare incident analysis and support project art

Healthcare Cyber Incident Report: Trinity Health

Performed a cybersecurity incident analysis of the Trinity Health breach to assess how monitoring gaps, access handling failures, and delayed escalation increased organizational risk in a regulated healthcare environment.

HIPAAIncident analysisCompliance
Open project
Network infrastructure proposal project art

Network Infrastructure Proposal: Fayetteville Office

Built an end-to-end office network infrastructure proposal covering topology, ISP selection, core hardware, BitLocker encryption, VPN access, and future growth requirements.

Star TopologyBitLockerVPN
Open project
Executive communication and security risk presentation project art

Security Awareness Executive Summary

Created an executive-level security awareness presentation that translated technical risk findings into clear business terms for leadership review and rollout planning.

Open project
Healthcare risk management plan project art

Risk Management Plan: Health Network, Inc.

Developed a healthcare risk management plan addressing cyber threats, physical security concerns, business impact analysis, incident response readiness, and HIPAA-related operational risk.

HIPAABIAIncident Response
Open project

Support workflow proof

Escalation should be clear, documented, and predictable.

I think support teams work best when triage, ownership, documentation, and escalation are easy to follow. This workflow diagram helps translate my project work into the kind of operational thinking that matters in real IT support environments.

  • Tier 1 handles quick fixes and common user issues
  • Tier 2 focuses on deeper troubleshooting across systems and networks
  • Tier 3 owns specialist issues, engineering review, and final resolution
  • Documentation and user communication stay active through every handoff
Diagram showing an IT support escalation workflow from Tier 1 help desk to Tier 3 specialist resolution

Education

Southern New Hampshire University

M.S. in Cybersecurity (In Progress)

  • Current GPA: 4.0

B.S. in Information Technologies · Cybersecurity Concentration

  • Graduated May 2025
  • Summa Cum Laude
  • Cumulative GPA: 3.986
  • 159 total credits completed

Relevant coursework

Security, networking, systems, and governance

Cyber Defense Network Security Computer Systems Security Legal and Human Factors of Cyber Telecommunications / Networking Risk Management / Mitigation Systems Requirements / Implementation Planning Computing as a Service

Capabilities

Built around practical infrastructure and security work.

Networking

  • Routing and switching
  • Subnetting, VLANs, and inter-VLAN routing
  • ACLs, DHCP, and NAT fundamentals
  • Wireshark packet analysis
  • Cisco Packet Tracer and topology validation

Security

  • ACL design and least privilege
  • Firewall, DMZ, and defense-in-depth concepts
  • Risk assessment and control mapping
  • Policy development and security awareness planning
  • Incident response and compliance fundamentals

Systems

  • Windows and Linux support
  • Virtualization and home lab administration
  • Hardware troubleshooting and repair
  • Documentation, requirements, and implementation planning
  • Cloud and IT service planning

Certifications

  • CompTIA A+
  • CompTIA Network+
  • CompTIA Security+
  • EC-Council DFE / EHE / NDE
  • TestOut PC Pro / Network Pro / IT Fundamentals Pro

Experience

Hands-on technical support and field operations.

Technical Support Specialist

Independent / Private Employment · Manchester, NH · 2006–2020

  • Delivered Tier 1 and Tier 2 support for residential and small business users
  • Diagnosed hardware, software, and network issues and documented working fixes
  • Handled troubleshooting in a way that balanced user needs, uptime, and security awareness

Lead Associate

Amazon · Nashua, NH · 2021–2023

  • Coordinated work in a high-volume environment with constant triage and issue resolution
  • Supported fast operational transitions and process consistency across teams
  • Used communication and escalation judgment to keep work moving during disruptions

Maintenance Technician

Walmart · Manchester, NH · 2020–2021

  • Performed preventive maintenance and diagnostics across building and support systems
  • Documented corrective actions and safety work with consistent follow-through
  • Balanced troubleshooting speed with compliance and reliability requirements

Service Technician

One Source Security & Automation, Inc. · Bedford, NH · 1996–2006

  • Installed and serviced surveillance, alarm, access control, and automation systems
  • Trained customers on operation, configuration, and basic troubleshooting
  • Worked across field support, customer communication, and system reliability tasks

What I'd handle in an IT support role

Work I am ready to contribute to right away.

  • Troubleshooting user connectivity and access issues
  • Supporting network-dependent applications and services
  • Managing access controls and resolving permission problems
  • Documenting issues, resolutions, and escalation steps clearly
  • Supporting security best practices without disrupting users

Current focus

Seeking entry-level IT support, infrastructure, or junior security opportunities and infrastructure support roles.

I'm looking for opportunities where I can contribute to reliable systems, clear documentation, thoughtful troubleshooting, and security-aware user support. I am comfortable working tickets, resolving technical issues, and escalating effectively when deeper investigation is needed.

Contact

Let’s connect.

I think the easiest way to reach me is through email or LinkedIn. I like keeping contact simple, answering quickly, and pointing employers to practical project evidence right away. My portfolio and LinkedIn are aligned so hiring teams can quickly see my projects, credentials, and current graduate study focus.

Contact form

Send a quick message

View résumé