Lattice

About#


Summary#

  • Aspiring Cybersecurity professional with a strong focus on penetration testing supported by a growing portfolio of real-world lab simulations and red/blue team exercises.

  • Certified by industry-recognized organizations including CompTIA, Hack The Box, TCM Security, and INE, demonstrating a commitment to continuous growth and technical excellence.

  • Skilled at identifying vulnerabilities across enterprise networks. Capable of communicating findings through clear, actionable reports that support both technical teams and business decision-makers.

  • Hands-on experience in simulating attacks, analyzing threats, building custom labs, and documenting engagements with professional standards.

  • Driven passion for security research, eager to embrace challenges and contribute to security operations with precision and integrity.

Certifications#

  • CompTIA Security+
  • AWS Certified Cloud Practitioner (CCP)
  • HTB Certified Penetration Testing Specialist (CPTS)
  • TCM Practical Junior Penetration Tester (PJPT)
  • INE eJPTv2 (Junior Penetration Tester)

Education#

SNHU

  • Bachelor of Science in Cybersecurity
  • Expected Graduation: 2027

Security Tools & Skillset#

Network Security

  • Performed vulnerability scans and traffic analysis using Nmap, Suricata, Wireshark, and the ELK Stack.
  • Designed IDS/IPS simulations and monitored threat behavior in custom lab environments.

Active Directory Security

  • Simulated attacks and privilege escalations in enterprise-like environments during HTB Pro Labs.
  • Practiced enumeration, lateral movement, and domain persistence techniques.
  • Configured and hardened personal labs to understand both offensive and defensive techniques.

Defensive Operations

  • Investigated simulated incidents with Splunk, Security Onion, Sigma, and YARA.
  • Developed detection rules and IR playbooks for common attack techniques.

Programming & Scripting

  • Comfortable writing automation scripts and tools in Python, PowerShell, Bash, and C++.

Projects/Accomplishments#

Threat Detection Home Lab

  • Built a hybrid offensive/defensive lab using Kali Linux, Security Onion, Kibana, and VirtualBox.
  • Captured adversarial activity and conducted detailed analysis of attack vectors and network anomalies.

AWS Honeypot with T-Pot

  • Created a cloud-based honeypot in AWS EC2, attracting real-world attacks.
  • Logged and visualized data to gain insight into threat actor behavior and improve detection capabilities.

Offensive Security Tool Development

  • Created custom payloads and using C++, simulating adversarial behavior.
  • Studied Windows API calls, process injection, and anti-analysis techniques.
  • Focused on detection evasion and OPSEC considerations, reinforcing red team methodologies in a controlled lab environment.

HTB Defensive Security Analyst (CDSA) Path

  • Completed a defensive security path focused on log analysis, threat detection, and response techniques.
  • Leveraged SIEM tools and custom rulesets to detect anomalies and document findings.

HTB Pro Labs: Dante, Zephyr, Offshore

  • Engaged with realistic enterprise network environments for red team training.
  • Executed full penetration testing cycles, from enumeration to privilege escalation and reporting.