Email
Phone
+12489432251

I am a cybersecurity professional with over 7 years of experience in research, development, and national security projects. I specialize in threat detection, vulnerability assessment, and system security, having contributed to cutting-edge solutions at Sandia National Laboratories while supporting academic initiatives. My expertise spans technical roles and collaborative efforts, driving innovations in secure systems and cybersecurity defense.

LinkedIn
GitHub
Google Scholar

2020-06 — 2023-10

R&D S&E, Cybersecurity

Led innovative research and development in cybersecurity, focusing on threat detection, vulnerability assessments, and system security for critical infrastructure. Collaborated with multidisciplinary teams to deliver advanced solutions aligned with national security objectives.

Highlights

  • Developed an ensemble fuzzing system that integrated 5-10 fuzzers, significantly improving threat detection and response.
  • Achieved 70-90% coverage on critical binary targets using AFL++ variants, meeting stringent security requirements.
  • Reduced debug time by 30% by enforcing development standards and leading backlog refinement efforts.

2018-06 — 2020-05

Critical Skills Recruiting Program Fellow

Advanced critical technology initiatives while pursuing a fully funded Master's degree, contributing to Sandia's national security goals. Developed innovative solutions alongside technical teams to address pressing cybersecurity challenges.

Highlights

  • Created a robust framework in the ICS/SCADA modeling platform to facilitate Data Acquisition (DAQ) with Hardware-in-the-Loop (HITL), strengthening infrastructure security applications.
  • Conducted research in cyber modeling and simulation, focusing on high-consequence networks, high-value networks, embedded systems, and control systems.

2017-05 — 2018-05

Center for Cyber Defenders Intern

Supported national cybersecurity efforts, specializing in vulnerability assessments, malware analysis, and intrusion detection. Applied computer science expertise to solve complex software and hardware security challenges.

Highlights

  • Improved automated ELK dashboard deployment and monitoring within an ICS/SCADA platform, enhancing the analysis of cyber/physical impacts on critical infrastructure systems.
  • Implemented honeypots within an experimental cyber range designed to simulate and analyze sophisticated cyber threats.

2017-09 — 2018-04

Instructional Aide for Introduction to Computer Security

Assisted in teaching computer security principles, providing support on coursework related to network vulnerabilities and secure system design. Guided students through practical exercises to deepen their understanding of cybersecurity threats.

Highlights

  • Enhanced Cybersecurity course content and projects, ensuring alignment with educational objectives, resulting in an increase in student engagement and course satisfaction.
  • Oversaw the smooth administration of exams for 300+ students, managing writing, testing, grading, and testing locations, ensuring efficient processes and positive student experiences.
  • Supported student success by delivering effective answers to 10+ curriculum-related questions on Piazza daily, contributing to a dynamic learning atmosphere in computer science courses.

2016-09 — 2017-05

Instructional Aide for Programming and Introductory Data Structures

Led students through foundational programming and data structure concepts, offering individual support and troubleshooting. Simplified complex topics in lectures and helped students develop their coding skills.

Highlights

  • Managed exam logistics for 1000+ students, ensuring smooth processes and upholding academic integrity.
  • Expanded Stanford's MOSS with custom scripts, identifying 5-7% of projects as potential academic misconduct violations.
  • Led weekly sessions for 25 students, improving understanding of introductory programming concepts.

2016-05 — 2016-08

Grader for Programming and Introductory Data Structures

Reviewed and graded coursework for introductory programming and data structures, ensuring adherence to technical standards. Provided detailed feedback to students to improve code efficiency and problem-solving techniques.

Highlights

  • Graded weekly lab assignments for accuracy and course adherence.
  • Provided feedback on coding style, encouraging best practices.

2016-01 — 2016-12

Undergraduate Research Assistant

Contributed to research focused on data-driven solutions, conducting experiments and analyzing results to support ongoing academic projects. Developed algorithms and models to solve interdisciplinary research problems.

Highlights

  • Conducted literature reviews, recommending relevant academic papers to support research.
  • Authored summaries and analyses to enhance understanding of research findings.

2015-09 — 2016-09

Computer Operator

Provided technical support for faculty, staff, and students, resolving issues with computers and AV equipment. Managed help desk operations, handled equipment setups, and maintained the ticketing system for efficient troubleshooting.

New York University 2018-09-01 — 2020-05-20

Computer Science
Master of Science

Courses

  • Design and Analysis of Algorithms I
  • Software Engineering I
  • Information Visualization
  • Penetration Testing and Vulnerability Analysis
  • Artificial Intelligence I
  • Computer Networking
  • Introduction to Offensive Security
  • Distributed Systems

University of Michigan 2015-01-01 — 2018-04-26

Computer Science
Bachelor of Science

Courses

  • Elementary Programming Concepts
  • Discrete Math
  • Programming and Introductory Data Structures
  • Data Structures and Algorithms
  • Introduction to Computer Organization
  • Foundations of Computer Science
  • Introduction to Computer Security
  • Computing for Computer Scientists
  • Mobile App Development for Entrepreneurs
  • Introduction to Cryptography
  • Introduction to Operating Systems
  • Database Management Systems

Black Hat USA 2019 Student Scholarship

June 06, 2025
by Black Hat
The Black Hat USA Student Scholarship program offers top cybersecurity students the chance to attend the world's leading information security event. Nominated by industry expert Rebecca Lynch, I was provided with a complimentary pass to the Black Hat USA 2019 conference, where I participated in exclusive briefings, hands-on training, and technical sessions. This prestigious scholarship facilitated opportunities to engage with the latest cybersecurity research, network with industry leaders, and gain valuable insights into emerging trends and technologies.

RSAC 2019 Security Scholar

June 06, 2025
by RSA Conference
The RSA Conference Security Scholar program recognizes top cybersecurity students and provides them with opportunities to engage with leading experts and industry professionals at the RSA Conference. Scholars participate in exclusive events, such as expert dinners and roundtable discussions, and receive complimentary conference passes and travel accommodations. This prestigious program aims to enrich students' knowledge and professional networks while fostering discussions on critical cybersecurity topics.

Taint-Driven Firmware Fuzzing of Embedded Systems 2020-05-15

Published by New York University

CommPact: Evaluating the Feasibility of Autonomous Vehicle Contracts 2018-12-05

Published by IEEE Vehicular Networking Conference (VNC)

Taint-Driven Embedded Software Fuzzing 2019-03-06

Published by RSA Conference

RSAC Security Scholar Poster Board Exhibition

Artificial Network Traffic Generation 2017-07-26

Published by Office of Scientific and Technical Information (OSTI)

Core Competencies

  • Analytical Reasoning
  • Creativity
  • Solution-Oriented Thinking
  • Stakeholder Engagement
  • Team Collaboration
  • Technical Writing

Cybersecurity Expertise

  • Incident Response
  • Penetration Testing
  • Application Security
  • Cyber Threat Intelligence
  • Malware Analysis
  • Network Security

Vulnerability & Risk Management

  • Vulnerability Research (osv.dev, NVD/CVE)
  • Threat Modeling
  • Risk Mitigation
  • Exploit Development
  • Secure Coding Practices

Programming & Scripting

  • Python
  • Bash
  • C/C++
  • Fuzzing
  • Binary Analysis
  • Reverse Engineering
  • Taint Analysis

DevOps & Integration

  • DevSecOps
  • GitHub Actions
  • CI/CD, Docker
  • Kubernetes
  • Jenkins
  • Terraform
  • AWS
  • Cloud Security

Tools & Frameworks

  • Wireshark
  • Burp Suite
  • Metasploit
  • Nessus
  • Splunk
  • ELK Stack (Elasticsearch, Logstash, Kibana)
  • SIEM solutions

Automation & Testing

  • Automated Defenses
  • Continuous Security Testing
  • Vulnerability Scanning
  • Infrastructure as Code (IaC)
  • Ansible

Entrepreneurship

  • Business Development
  • Product Innovation
  • Industrial Research
English
Master
Macedonian
Master
French
Intermediate

Security Operations & Threat Intelligence

  • Emerging trends in Incident Response
  • Automation in Cybersecurity
  • Advancements in Malware Defense

Vulnerability & Risk Management

  • Exploring cutting-edge methods in Vulnerability Research
  • Threat Hunting
  • Open-Source Security Solutions

Programming & Analysis

  • Passion for improving Python skills
  • Learning advanced techniques in Fuzzing and Binary Analysis

DevOps & Integration

  • Continuous learning in DevSecOps practices
  • Container security
  • CI/CD pipeline automation