Welcome!
Bio
Highly driven cybersecurity enthusiast with an intense curiosity, a passion for problem-solving, and a commitment to lifelong learning. Earned a SANS Cyber Academy scholarship after two years of dedicated self-study. Known for integrity, adaptability, and approaching challenges with insight, patience, and a growth mindset while continuously sharpening skills through home labs, courses, training platforms, and involvement in the cyber community.
Education
SANS Technology Institute, Cyber Immersion Academy (May 2025)
Academy of Art University, Bachelor of Fine Arts, 3D Character Animation (June 2019)
Certifications
Skills Overview
⚙️ Technical Skills and 🛠️ Tools:
Skills | Tools |
---|---|
🖥️ Operating Systems | Linux, Windows |
📈 SIEMs & Log Analysis | Elastic Stack (ELK), Splunk |
🌐 Network Security | Wireshark, Tcpdump |
🛡️ IDS/IPS | Snort, Zeek |
🧠 Threat Intelligence | VirusTotal, MITRE ATT&CK |
🔬 Digital Forensics | Autopsy, Volatility |
🧰 Pentesting | Nmap, Metasploit |
🗝️ Passwords/Cryptography | GPG, John, Hashcat, Hydra |
🔒 Endpoint Security | Firewalls, Permissions |
📜 Scripting Languages | Python, PowerShell, SQL, Bash |
🌟 Soft Skills:
Tenacity, Growth Mindset, Adaptability, Diplomacy, Empathy, Critical Thinking, Attention to Detail, Patience, Communication.
Home Labs
Cybersecurity Home Lab.
Designed and implemented a comprehensive cybersecurity lab, featuring a network diagram, multi-interface pfSense firewall, Active Directory environment, Security Onion for traffic analysis and IDS, and a pentesting VM for testing and exploitation.
Windows Forensics Home Lab.
Built and configured a forensic workstation to simulate attacks, analyze memory dumps and disk images with tools like KAPE and FTK Imager, and investigate registry, file systems, and memory forensics using Zimmerman Tools, RegRipper, and Volatility3.
Writeups
OverTheWire:
TryHackMe:
- Boogeyman 1. Follow attacker’s TTPs via email, endpoint, and network analysis.
- Tardigrade. Find all backdoors on the machine and remediate them.
- Friday Overtime. CTI analysis on malware samples using VirusTotal and MITRE ATT&CK.
- Mr. Robot. Exploit a vulnerability in web app to gain access to and root machine.
- New Hire Old Artifacts. Log analysis with Splunk to find old IoCs on an endpoint.
- Summit. Simple room that involves investigations through each tier of the Pyramid of Pain.
Posts
- Thoughts on Zero-Click Exploits.
- Cybersecurity Lessons From Jurassic Park.
- Network Attacks & Analogies.