About Me
Results-driven cybersecurity and IT professional with a background in threat detection, risk analysis, and open-source intelligence. Former U.S. Army Intelligence Analyst currently pursuing a Bachelor's Degree in Information Systems with a focus in Cybersecurity. I am currently seeking entry-level help desk or SOC analyst positions where I can apply my technical skills and security mindset to protect organizational assets.
Projects
Full-Stack Password Security Lab — SecureVault™
- Built a full-stack authentication system demonstrating password security vulnerabilities and ethical password cracking techniques for educational purposes in a controlled environment.
- Developed a React frontend with custom animations and glassmorphic UI design, connected to a Node.js/Express REST API backend, deployed on Vercel and Render with PostgreSQL database.
- Implemented bcrypt password hashing (salt rounds: 10) with environment variable configuration for secure deployment across development and production environments.
- Created an admin panel to export password hashes for penetration testing with John the Ripper and Hashcat, demonstrating dictionary attacks and brute-force resistance of modern hashing algorithms.
- Showcases purple team methodology: understanding both offensive (password cracking) and defensive (secure authentication) techniques to improve overall security posture.
Honeypot Submission Portal — "Bug in My Eye"
- Designed and developed a honeypot submission portal hosted at Bug Eyed Technologies, built to safely collect and analyze suspicious user submissions for security assessment.
- Implemented secure form handling using Formspree for backend processing without storing sensitive data client-side, ensuring privacy and data integrity within a static GitHub Pages environment.
- Created a platform allowing individuals and organizations to report potential security issues or anomalies for personalized IT consulting and threat analysis.
- Demonstrates understanding of honeypot concepts and secure data collection practices for cybersecurity intelligence gathering.
Consent-Based Phishing Awareness Campaign
GoPhish, Kali Linux, Social Engineering | Personal Project
- Conducted an ethical, consent-based phishing simulation using GoPhish to evaluate user awareness and response to potential phishing threats in a controlled environment.
- Designed realistic phishing email templates mimicking common attack vectors including credential harvesting, malicious attachments, and urgency-based social engineering tactics.
- Analyzed campaign metrics including open rates, click-through rates, and data submission rates to identify vulnerability patterns and training opportunities.
- Delivered actionable insights and recommendations to improve cybersecurity awareness training and organizational defensive posture through data-driven analysis.
Virtual Machine Lab Environment Setup
VirtualBox, Kali Linux, Cisco CSR1000v | CIAT Coursework
- Configured a multi-VM lab environment using VirtualBox, including DEVASC-LAB and Cisco CSR1000v virtual router for hands-on networking and security practice.
- Implemented network connectivity between virtual machines using internal networking and host-only adapters, verifying communication through ICMP ping tests and route configuration.
- Optimized VM performance through resource allocation (RAM, CPU cores) and storage configuration to support concurrent operation of multiple network devices.
- Demonstrates proficiency in virtualization technologies, network configuration, and building isolated lab environments for security testing and development.
Linux Boot Process Modification and Single-User Mode Access
GRUB, Linux System Administration, Bash | Personal Project
- Modified GRUB bootloader configuration by editing /etc/default/grub to extend boot timeout, providing enhanced control over system startup process.
- Gained hands-on experience with single-user mode access for system recovery and administrative tasks, demonstrating knowledge of Linux runlevels and boot parameters.
- Applied security concepts by understanding boot-level access controls and the importance of physical security in preventing unauthorized system modifications.
- Showcases Linux system administration skills including bootloader configuration, system recovery techniques, and understanding of the Linux initialization process.
Kali Linux Live Boot with Persistence
Kali Linux, Rufus, Partition Management | Personal Project
- Created a portable Kali Linux penetration testing environment on USB drive using Rufus with persistent storage configuration to retain data and tools across reboots.
- Configured partition layout including bootable system partition and encrypted persistence partition for secure storage of reconnaissance data and custom tools.
- Modified bootloader configuration and persistence files to enable automatic mounting of persistent storage on system startup.
- Demonstrates expertise in Linux system administration, partition management, and creating portable security testing platforms for field work and training scenarios.
Work Experience
Delivery Driver
Romito's Pizza | November 2024 - Present
- Supported kitchen operations by effectively preparing ingredients, contributing to smooth meal production and time management under pressure.
- Ensured accurate and timely deliveries, consistently meeting customer expectations for speed and reliability while maintaining attention to detail.
- Delivered exceptional customer service, fostering positive client interactions and repeat business through professional communication.
AT&T Marketing Salesman
AT&T | August 2024 - September 2024
- Technical Skills: System navigation, troubleshooting mobile devices, understanding network architecture, and explaining mobile security features to customers.
- Security Experience: Fraud prevention, identity verification, PII protection, and detecting social engineering attacks during customer interactions.
- Transferable Competencies: Provided user training on device security, managed access controls for account modifications, documented incidents, and ensured compliance with company policies.
- Soft Skills: Communicated complex technical concepts to non-technical users, resolved problems efficiently under time constraints, and maintained composure during high-pressure situations.
Produce Delivery Driver
Cleveland Fish and Seafood | May 2022 - November 2022
- Safely transported seafood products to customers while maintaining proper handling procedures and accurate delivery documentation.
- Protected sensitive business and customer information by following data privacy and security best practices during transactions and recordkeeping.
- Communicated clearly with dispatchers, customers, and team members to resolve delivery issues promptly and professionally.
Contact Tracer
Maxim Health Services | January 2021 - March 2022
- Monitored health incidents using epidemiological tools and maintained HIPAA-compliant documentation of sensitive medical information.
- Conducted confidential interviews with exposed individuals, assessed exposure risk levels, and escalated high-priority cases for rapid response coordination.
- Leveraged data entry systems and real-time reporting platforms to assist with outbreak containment strategy for Cuyahoga County Health Department.
- Demonstrated ability to handle sensitive information securely while working under pressure during public health emergencies.
Security Guard
MGM Northfield Park | May 2021 - August 2021
- Conducted regular patrols of casino property to detect suspicious activity and unauthorized access, with focus on identifying security vulnerabilities and potential breaches.
- Ensured access control at entrances and employee areas, verifying credentials and screening individuals for potential threats, applying principles of identity and access management.
- Assisted in enforcement of security policies including credential verification, monitoring surveillance systems, and responding to security incidents.
- Recognized and reported social engineering attempts and security vulnerabilities to management, demonstrating security awareness and threat detection capabilities.
Amazon Delivery Driver
Lance Global Logistics | August 2020 - January 2021
- Documented delivery incidents, delays, and customer feedback following internal reporting guidelines with attention to accuracy and detail.
- Followed security protocols to protect sensitive customer information stored on delivery devices and within Amazon's logistics system.
- Troubleshot mobile devices and delivery applications to ensure accurate package tracking and route optimization for efficient operations.
- Identified and reported security risks or unusual activities during deliveries, including potential fraud or suspicious customer interactions.
All-Source Intelligence Analyst
U.S. Army | January 2019 - August 2020
- Monitored multiple secure enterprise networks (JWICS/SIPR) to identify anomalous activity, adversary indicators, and potential cyber or electronic threats in real time.
- Conducted structured analysis of multi-source data (OSINT, SIGINT, HUMINT) to correlate indicators, reduce false positives, and assess risk severity.
- Identified indicators of compromise (IOCs) and emerging threat patterns, escalating findings to senior leadership for decision-making.
- Produced concise written intelligence products (INTSUMs / GRINTSUMs) comparable to incident reports and executive security briefings.
- Supported operational risk assessments by analyzing adversary cyber capabilities, infrastructure, and tactics, techniques, and procedures (TTPs).
- Collaborated with cross-functional teams under time-sensitive conditions to maintain situational awareness and operational readiness.
- Maintained strict operational security (OPSEC) and compliance with classified data handling procedures in high-availability environments.
Education
Bachelor of Science in Information Systems
California Institutes of Applied Science | 2022 - 2026
Focus on Cybersecurity and Networking | Expected Graduation: April 2026
Associate's of Science in Information Technology
California Institutes of Applied Technology | 2022 - 2024
View Degree
Military All-source Intelligence
Cochise College | 2019 - 2020
Completed coursework towards an Associate's degree
Technical Skills
Security & Analysis
- Vulnerability Assessment
- Network Security
- Threat Intelligence
- Password Cracking
- Social Engineering
Programming & Scripting
- Python
- JavaScript
- Bash Scripting
- C/C++
- SQL
Web Development
- React.js
- Node.js & Express
- HTML/CSS
- REST APIs
- PostgreSQL/NoSQL
Tools & Platforms
- Kali Linux
- Wireshark
- John the Ripper
- GoPhish
- VirtualBox
- Git/GitHub
- Vercel/Render