01 Summary
Aspiring cybersecurity professional with a solid foundation in cybersecurity, information technology, and computer science. Capable of collaborating with cross-functional teams, delivering actionable security solutions, and demonstrating a commitment to continuous learning and professional development.
02 Certifications
-
✓
CompTIA Security+ ce
-
✓
Splunk Core Certified User
-
→
AWS Solutions Architect Associate (SAA-C03) — In Progress
03 Education
B.S. Computer Science — Oregon State University
Expected June 2026
B.S. Biology — Hampton University
2018
04 Technical Skills
Cloud
AWS S3
IAM
CloudFront
Lambda
DynamoDB
CloudTrail
KMS
CloudFormation
Languages
Python
C
PowerShell
NodeJS
Security Tools
Splunk
Wireshark
Volatility
Autopsy
KAPE
FTK Imager
PhishTool
Network
IDS/IPS
Firewalls
Network Security
05 Experience
- Conducted proactive surveillance and security audits to identify potential vulnerabilities in physical and digital security protocols.
- Assisted in documenting and escalating security incidents, ensuring proper reporting and mitigation strategies aligned with cybersecurity best practices.
- Managed and enforced security policies for restricted areas and sensitive data access, aligning with zero-trust principles.
- Utilized security monitoring tools to support situational awareness, aiding in real-time decision-making for threat mitigation.
06 Projects
- Designing and deploying a serverless resume platform on AWS (S3, CloudFront, Lambda, DynamoDB, API Gateway) secured with least-privilege IAM policies, KMS encryption, and CloudTrail audit logging.
- Implementing full CloudFormation Infrastructure as Code and GitHub Actions CI/CD pipeline.
- Authored two merged pull requests to an active open source cybersecurity OSINT tool (59 GitHub stars).
- PR #41: Wrote parametrized Python unit tests for
normalize_username() covering 6 edge cases — whitespace, mixed-case, unicode, 10k-char input, empty string, and None handling.
- PR #47: Implemented Dockerfile and docker-compose.yml, resolved a Tkinter slim-image dependency bug, and documented Docker usage in the README.
- Mapped attacker activities across all 7 Cyber Kill Chain phases using Splunk searches to facilitate faster detection and response.
- Deconstructed a website defacement incident through log correlation and anomaly detection across wineventlog, winRegistry, and fortigate_utm sources.
- Conducted in-depth memory forensics to extract critical artifacts and support incident response efforts.
- Pinpointed and documented key memory artifacts, improving incident preparedness and cybersecurity posture.
- Dissected network traffic to identify anomalies and uncover hidden vulnerabilities, producing actionable security reports.
- Engineered a Data Acquisition Lab using KAPE, FTK Imager, and ProcDump to preserve and prepare digital evidence for forensic analysis.