Key Metrics
- Rank: 989 out of 7,865 competitors (Top 12.5%)
- Total Score: 1,535 / 3,000
- Accuracy: 57.6%
- Completion: 60.7%
- Competition: National Cyber League (NCL) – Fall 2025 Individual Game
Executive Summary
The National Cyber League (NCL) Individual Game evaluates each competitor’s independent capability to solve complex cybersecurity challenges under timed, high-pressure conditions.
During the Fall 2025 Individual Game, I placed 989th out of 7,865 competitors, ranking within the top 12.5% nationally. The competition tested a broad range of applied cybersecurity disciplines—from OSINT and Cryptography to Forensics, Network Traffic Analysis, and Web Exploitation—and simulated real-world workflows in digital forensics, network defense, and incident response analysis.
My results demonstrate strong investigative and analytical performance across both defensive and offensive categories, highlighting practical readiness for SOC operations, incident response, and CTF-style threat analysis environments oai_citation:0‡Score Breakdown - NCL Fall 2025 Individual Game | Cyber Skyline.pdf.
Individual Game – Performance Overview
Total Score: 1,535 / 3,000
Accuracy: 57.6%
Completion: 60.7%
Module Highlights
| Module | Accuracy | Completion | Points |
|---|---|---|---|
| Open Source Intelligence | 53.7% | 78.6% | 270 / 385 |
| Cryptography | 78.6% | 55% | 160 / 355 |
| Password Cracking | 89.5% | 73.9% | 260 / 360 |
| Log Analysis | 64.7% | 78.6% | 200 / 300 |
| Network Traffic Analysis | 41.7% | 71.4% | 175 / 300 |
| Forensics | 25% | 46.7% | 100 / 300 |
| Scanning & Reconnaissance | 87.5% | 46.7% | 110 / 300 |
| Web Application Exploitation | 66.7% | 16.7% | 100 / 300 |
| Enumeration & Exploitation | 100% | 37.5% | 60 / 300 |
| Survey | 100% | 100% | 100 / 100 |
Skills Demonstrated
The NCL’s Individual Game isolates each competitor’s ability to problem-solve and think critically across multiple domains of cybersecurity. My results emphasize independent technical proficiency and situational adaptability.
Analytical Skills
- Evidence correlation and pattern recognition across logs and captures.
- Forensic triage under strict time constraints.
- Root-cause analysis of security incidents using fragmented data.
Technical Skills
- Password cracking and hash analysis (rule-based, hybrid).
- Network traffic dissection and C2 behavior identification.
- OSINT data collection and validation.
- Cryptographic problem-solving and decryption.
- Log parsing for authentication and privilege escalation events.
- Web exploitation and enumeration of common vulnerabilities.
Operational Skills
- Self-directed time management across parallel categories.
- Documentation of findings under timed submission windows.
- Adaptive strategy—balancing easy wins with deeper, high-value problems.
Competency Overview
| Category | Strength |
|---|---|
| Password Cracking | █████████ 9/10 |
| OSINT | ████████ 8/10 |
| Log Analysis | ███████ 7/10 |
| Cryptography | ████████ 8/10 |
| Web Exploitation | ██████ 6/10 |
| Network Analysis | █████ 5/10 |
| Forensics | █████ 5/10 |
| Scanning & Recon | ███████ 7/10 |
MITRE ATT&CK Mapping
| NCL Category | ATT&CK Technique(s) |
|---|---|
| Password Cracking | Credential Access (T1110) |
| OSINT | Reconnaissance (T1591, T1592, T1596) |
| Log Analysis | Discovery (T1087, T1083), Defense Evasion (T1070) |
| Forensics | Collection (T1005), Artifact Analysis |
| Web Exploitation | Initial Access (T1190), Exploitation for Privilege Escalation |
| Network Traffic Analysis | Command & Control (T1071), Exfiltration (T1041) |
Impact & Relevance
This performance reflects strong capability across the full incident response lifecycle—from reconnaissance and triage to exploitation and containment analysis.
Key takeaways include:
- Reinforced independence and accuracy under constrained conditions.
- Strengthened cross-disciplinary analytical capability.
- Applied methodologies relevant to SOC, Threat Hunting, and Forensic Analysis roles.
These metrics validate my ability to operate effectively within real-world, time-sensitive cyber defense environments.
About the National Cyber League
The National Cyber League (NCL) is a hands-on cybersecurity competition hosted by Cyber Skyline, challenging participants to demonstrate applied proficiency in threat analysis, digital forensics, network defense, and penetration testing.
Learn more: https://cyberskyline.com
Download Score Report
- Individual Game Score Report
Download PDF
Technologies & Tools Utilized
- Linux and command-line workflows
- OSINT investigation frameworks
- Hashcat and rule-based password cracking
- PCAP inspection and network traffic correlation
- Log parsing and regex-based event detection
- Web enumeration utilities and exploit pattern recognition
- Forensic evidence extraction utilities
Conclusion
My top 12.5% ranking in the NCL Fall 2025 Individual Game demonstrates independent problem-solving, technical breadth, and investigative rigor across critical domains.
This performance establishes a solid foundation for advanced participation in national CTF competitions and highlights the professional readiness expected in real-world incident response, SOC analysis, and cyber threat intelligence operations.