Education
East Tennessee State University - Johnson City, TN
- BS Computing
- Minor in Military Science
- Cadet in Army National Guard/ROTC
- Expected December 2025 Graduation
- GPA: 3.8 / 4.0
- Dean’s List: Spring 2022 - Spring 2024
Internships and Relevant Work
IT Service Help Desk Technician, East Tennessee State University - Dec 24-Present
- Provide technical support and troubleshoot hardware, software, and network issues for students, faculty, and staff.
- Assist with account management, including password resets and access troubleshooting.
- Ensure timely and effective resolution of IT-related inquiries via phone, email, and in-person support.
- Document and escalate complex issues to specialized teams when needed.
- Guide users in following best practices for cybersecurity and data privacy.
- Maintain a high level of customer service, enhancing user experience and satisfaction.
Library Lab IT Assistant, East Tennessee State University - Aug-Nov 24
- Supported library patrons with computer and printer usage, software installations, and troubleshooting basic technical issues.
- Provided guidance on navigating library resources, online databases, and educational software.
- Maintained computer lab equipment, ensuring systems were operational and up to date.
- Assisted with logging and reporting technical incidents for prompt resolution.
- Educated users on digital literacy and responsible use of technology in a library setting.
- Fostered a positive and supportive environment to enhance user experience and accessibility to library resources.
ARCYBER ROTC Internship, U.S. Army Cyber Command - Aug 24
- Contributed to a wide range of cyber activities with a high level of adaptability, and a solution-oriented mindset.
- Delivered a final capstone as an essay on the topic of Artificial Intelligence, and Quantum Computing and how they are relevant in Cyber Warfare today and in the future.
Info Security Intern, Alpha Metallurgical Resources - May 23-Jun 24 (Intermittent with School Schedule)
- Utilized vulnerability managers to identify and secure vulnerable systems across multiple sites, leading to confirmed removal of vulnerabilities.
- Aided in managing phishing simulation campaigns, resulting in decreased employee "click rate" and improved security awareness.
- Documented and standardized security team practices, creating an SOP to streamline future employee on-boarding.
Competitions
Department of Energy Cyberforce Competition - Nov 24
- Coordinated practices and assignments for our team of six, focusing on hardening Windows and Linux environments throughout the competition to enhance defense against cyberattacks.
- Implemented security best practices, including system configuration, patch management, and access control measures, to secure critical infrastructure components in both Windows and Linux systems.
- Led efforts in continuous monitoring, establishing protocols for detecting and responding to breaches, ensuring rapid containment and mitigation of any attempted intrusions.
- Resolved anomalies in areas like forensics, phishing classification, and reverse engineering, applying these insights to fortify our defensive posture.
- Promoted strong collaboration and adaptability within the team, enabling cohesive and effective responses to evolving threats in a high-stakes, real-world simulation of critical infrastructure defense.
Collegiate Penetration Testing Competition - Nov 24
- Coordinated practices and assignments for a team of six, guiding our approach with the MITRE ATT&CK framework to systematically execute and document attack vectors in the simulated enterprise environment.
- Directed team efforts in identifying, exploiting, and documenting vulnerabilities across various systems, aligning findings with industry standards to create actionable security insights.
- Organized responses to competition injects, including technical reports, risk assessments, and presentations, ensuring our team delivered timely and accurate information to meet scenario requirements.
- Utilized CVSS scoring in reporting to prioritize vulnerabilities, providing a structured risk assessment and recommending effective remediation strategies.
- Fostered collaboration and communication within the team, enabling cohesive, well-coordinated actions that maximized effectiveness and adaptability in a high-stakes environment.
Hivestorm - Oct 24
- Led a team of four, coordinating strategy, assigning roles, and managing communications under strict time constraints to optimize task efficiency.
- Focused on securing an Advanced Windows Server (Domain Controller) along with other Windows Servers by troubleshooting services, mitigating vulnerabilities, and maintaining up time for critical systems.
- Conducted password updates, audited administrative privileges, and applied essential group policy configurations to strengthen security and ensure compliance.
- Achieved 30th place out of 413 teams, ranking within the top 7% for exceptional performance and system resilience.
Technet Capture-The-Flag
- Competed in CTF solving challenges across digital forensics, reverse engineering, cryptography, and network security to simulate real-world cybersecurity threats.
- Focused efforts on Reverse Engineering, Network Traffic Analysis, and Exploitation, applying advanced analytical skills to uncover vulnerabilities and solve complex tasks.
- Collaborated effectively with team members, developing and executing strategies under time pressure to maximize scoring potential in each challenge area.
National Cyber League Team Competition, CyberBucs Club - Mar 24
- Competed in a Capture-The-Flag style competition in a team of 3 with topics such as digital forensics, web-app exploitation, cryptography, network traffic analysis, log analysis, and more.
- Primarily assigned on Open-Source Intelligence, Network Traffic Analysis, and Enumeration/Exploitation.
- Achieved 323rd place out of 4199 teams, placing us in the top 7 percent and placed 1st nationwide for Open-Source Intelligence, 96th percentile for enumeration/exploitation and 97th percentile Network Traffic Analysis.
SECCDC Regional Qualifiers, CyberBucs Club - Feb 24
- Tasked with defending the Domain Controller and maintaining operational SSH during the competition, while securing all user accounts linked to Active Directory.
- Conducted password changes for AD Accounts, audited for Administrator rights, and implemented recommended group policy configurations.
- Achieved 14th place out of 38 teams, domain controller remained secure and SSH for my machine remained operational.
Personal Projects
SSH Honeypot
- Developed a secure SSH honeypot to capture and log brute force attempts, providing real-time data on unauthorized access attempts for further analysis.
- Analyzed honeypot data to gain insights into attack patterns, login behaviors, and common threat actor techniques, contributing to a deeper understanding of cyber threats.
- Planned version 2 update with the following updates:
- Plan to implement enhanced data handling for faster load times, improving user experience and responsiveness of live data displays.
- Plan to integrate a threat map with shaded regions indicating areas of frequent unauthorized login attempts, with darker shades representing higher concentrations of attack origins.
- Plan to introduce a fake terminal to observe attackers’ tactics, techniques, and procedures (TTPs) post-login, logging actions for insight into real-world threat behaviors.
SIEM Implementation Project
- Built a dedicated lab environment emulating an Active Directory setup, allowing for the testing and simulation of real-world penetration testing techniques.
- Deployed Wazuh as an open-source SIEM within the lab to monitor security events, detect anomalies, and log pentesting activities for comprehensive analysis.
- Configured Active Directory with common misconfigurations to simulate vulnerabilities, creating a controlled setting to test enumeration, privilege escalation, and lateral movement techniques.