I am a cybersecurity professional with over 7 years of experience in research, development, and national security projects. I specialize in threat detection, vulnerability assessment, and system security, having contributed to cutting-edge solutions at Sandia National Laboratories while supporting academic initiatives. My expertise spans technical roles and collaborative efforts, driving innovations in secure systems and cybersecurity defense.
2020-06 — 2023-10
Led innovative research and development in cybersecurity, focusing on threat detection, vulnerability assessments, and system security for critical infrastructure. Collaborated with multidisciplinary teams to deliver advanced solutions aligned with national security objectives.
Highlights
- Developed an ensemble fuzzing system that integrated 5-10 fuzzers, significantly improving threat detection and response.
- Achieved 70-90% coverage on critical binary targets using AFL++ variants, meeting stringent security requirements.
- Reduced debug time by 30% by enforcing development standards and leading backlog refinement efforts.
2018-06 — 2020-05
Advanced critical technology initiatives while pursuing a fully funded Master's degree, contributing to Sandia's national security goals. Developed innovative solutions alongside technical teams to address pressing cybersecurity challenges.
Highlights
- Created a robust framework in the ICS/SCADA modeling platform to facilitate Data Acquisition (DAQ) with Hardware-in-the-Loop (HITL), strengthening infrastructure security applications.
- Conducted research in cyber modeling and simulation, focusing on high-consequence networks, high-value networks, embedded systems, and control systems.
2017-05 — 2018-05
Supported national cybersecurity efforts, specializing in vulnerability assessments, malware analysis, and intrusion detection. Applied computer science expertise to solve complex software and hardware security challenges.
Highlights
- Improved automated ELK dashboard deployment and monitoring within an ICS/SCADA platform, enhancing the analysis of cyber/physical impacts on critical infrastructure systems.
- Implemented honeypots within an experimental cyber range designed to simulate and analyze sophisticated cyber threats.
2017-09 — 2018-04
Assisted in teaching computer security principles, providing support on coursework related to network vulnerabilities and secure system design. Guided students through practical exercises to deepen their understanding of cybersecurity threats.
Highlights
- Enhanced Cybersecurity course content and projects, ensuring alignment with educational objectives, resulting in an increase in student engagement and course satisfaction.
- Oversaw the smooth administration of exams for 300+ students, managing writing, testing, grading, and testing locations, ensuring efficient processes and positive student experiences.
- Supported student success by delivering effective answers to 10+ curriculum-related questions on Piazza daily, contributing to a dynamic learning atmosphere in computer science courses.
2016-09 — 2017-05
Led students through foundational programming and data structure concepts, offering individual support and troubleshooting. Simplified complex topics in lectures and helped students develop their coding skills.
Highlights
- Managed exam logistics for 1000+ students, ensuring smooth processes and upholding academic integrity.
- Expanded Stanford's MOSS with custom scripts, identifying 5-7% of projects as potential academic misconduct violations.
- Led weekly sessions for 25 students, improving understanding of introductory programming concepts.
2016-05 — 2016-08
Reviewed and graded coursework for introductory programming and data structures, ensuring adherence to technical standards. Provided detailed feedback to students to improve code efficiency and problem-solving techniques.
Highlights
- Graded weekly lab assignments for accuracy and course adherence.
- Provided feedback on coding style, encouraging best practices.
2016-01 — 2016-12
Contributed to research focused on data-driven solutions, conducting experiments and analyzing results to support ongoing academic projects. Developed algorithms and models to solve interdisciplinary research problems.
Highlights
- Conducted literature reviews, recommending relevant academic papers to support research.
- Authored summaries and analyses to enhance understanding of research findings.
2015-09 — 2016-09
Provided technical support for faculty, staff, and students, resolving issues with computers and AV equipment. Managed help desk operations, handled equipment setups, and maintained the ticketing system for efficient troubleshooting.
New York University 2018-09-01 — 2020-05-20
Courses
- Design and Analysis of Algorithms I
- Software Engineering I
- Information Visualization
- Penetration Testing and Vulnerability Analysis
- Artificial Intelligence I
- Computer Networking
- Introduction to Offensive Security
- Distributed Systems
University of Michigan 2015-01-01 — 2018-04-26
Courses
- Elementary Programming Concepts
- Discrete Math
- Programming and Introductory Data Structures
- Data Structures and Algorithms
- Introduction to Computer Organization
- Foundations of Computer Science
- Introduction to Computer Security
- Computing for Computer Scientists
- Mobile App Development for Entrepreneurs
- Introduction to Cryptography
- Introduction to Operating Systems
- Database Management Systems
Black Hat USA 2019 Student Scholarship
June 06, 2025RSAC 2019 Security Scholar
June 06, 2025Taint-Driven Firmware Fuzzing of Embedded Systems 2020-05-15
CommPact: Evaluating the Feasibility of Autonomous Vehicle Contracts 2018-12-05
Taint-Driven Embedded Software Fuzzing 2019-03-06
RSAC Security Scholar Poster Board Exhibition
Artificial Network Traffic Generation 2017-07-26
Core Competencies
- Analytical Reasoning
- Creativity
- Solution-Oriented Thinking
- Stakeholder Engagement
- Team Collaboration
- Technical Writing
Cybersecurity Expertise
- Incident Response
- Penetration Testing
- Application Security
- Cyber Threat Intelligence
- Malware Analysis
- Network Security
Vulnerability & Risk Management
- Vulnerability Research (osv.dev, NVD/CVE)
- Threat Modeling
- Risk Mitigation
- Exploit Development
- Secure Coding Practices
Programming & Scripting
- Python
- Bash
- C/C++
- Fuzzing
- Binary Analysis
- Reverse Engineering
- Taint Analysis
DevOps & Integration
- DevSecOps
- GitHub Actions
- CI/CD, Docker
- Kubernetes
- Jenkins
- Terraform
- AWS
- Cloud Security
Tools & Frameworks
- Wireshark
- Burp Suite
- Metasploit
- Nessus
- Splunk
- ELK Stack (Elasticsearch, Logstash, Kibana)
- SIEM solutions
Automation & Testing
- Automated Defenses
- Continuous Security Testing
- Vulnerability Scanning
- Infrastructure as Code (IaC)
- Ansible
Entrepreneurship
- Business Development
- Product Innovation
- Industrial Research
Security Operations & Threat Intelligence
- Emerging trends in Incident Response
- Automation in Cybersecurity
- Advancements in Malware Defense
Vulnerability & Risk Management
- Exploring cutting-edge methods in Vulnerability Research
- Threat Hunting
- Open-Source Security Solutions
Programming & Analysis
- Passion for improving Python skills
- Learning advanced techniques in Fuzzing and Binary Analysis
DevOps & Integration
- Continuous learning in DevSecOps practices
- Container security
- CI/CD pipeline automation