About
Summary
Aspiring Cybersecurity professional with a strong focus on penetration testing supported by a growing portfolio of real-world lab simulations and red/blue team exercises.
Certified by industry-recognized organizations including CompTIA, Hack The Box, TCM Security, and INE, demonstrating a commitment to continuous growth and technical excellence.
Skilled at identifying vulnerabilities across enterprise networks. Capable of communicating findings through clear, actionable reports that support both technical teams and business decision-makers.
Hands-on experience in simulating attacks, analyzing threats, building custom labs, and documenting engagements with professional standards.
Driven passion for security research, eager to embrace challenges and contribute to security operations with precision and integrity.
Certifications
- CompTIA Security+
- AWS Certified Cloud Practitioner (CCP)
- HTB Certified Penetration Testing Specialist (CPTS)
- TCM Practical Junior Penetration Tester (PJPT)
- INE eJPTv2 (Junior Penetration Tester)
Education
SNHU
- Bachelor of Science in Cybersecurity
- Expected Graduation: 2027
Security Tools & Skillset
Network Security
- Performed vulnerability scans and traffic analysis using Nmap, Suricata, Wireshark, and the ELK Stack.
- Designed IDS/IPS simulations and monitored threat behavior in custom lab environments.
Active Directory Security
- Simulated attacks and privilege escalations in enterprise-like environments during HTB Pro Labs.
- Practiced enumeration, lateral movement, and domain persistence techniques.
- Configured and hardened personal labs to understand both offensive and defensive techniques.
Defensive Operations
- Investigated simulated incidents with Splunk, Security Onion, Sigma, and YARA.
- Developed detection rules and IR playbooks for common attack techniques.
Programming & Scripting
- Comfortable writing automation scripts and tools in Python, PowerShell, Bash, and C++.
Projects/Accomplishments
- Built a hybrid offensive/defensive lab using Kali Linux, Security Onion, Kibana, and VirtualBox.
- Captured adversarial activity and conducted detailed analysis of attack vectors and network anomalies.
- Created a cloud-based honeypot in AWS EC2, attracting real-world attacks.
- Logged and visualized data to gain insight into threat actor behavior and improve detection capabilities.
Offensive Security Tool Development
- Created custom payloads and using C++, simulating adversarial behavior.
- Studied Windows API calls, process injection, and anti-analysis techniques.
- Focused on detection evasion and OPSEC considerations, reinforcing red team methodologies in a controlled lab environment.
HTB Defensive Security Analyst (CDSA) Path
- Completed a defensive security path focused on log analysis, threat detection, and response techniques.
- Leveraged SIEM tools and custom rulesets to detect anomalies and document findings.
HTB Pro Labs: Dante, Zephyr, Offshore
- Engaged with realistic enterprise network environments for red team training.
- Executed full penetration testing cycles, from enumeration to privilege escalation and reporting.