My Work

What I do
From securing networks to responding to incidents, I focus on identifying risks and building resilient systems. My goal is to turn cybersecurity knowledge into practical solutions that protect people, organizations, and missions.
Network Security
I configure, monitor, and secure networks to prevent unauthorized access and attacks. From setting up firewalls to analyzing network traffic with Wireshark, I work to strengthen defenses against intrusions.
Penetration Testing
By simulating real-world attacks, I identify vulnerabilities before malicious actors can exploit them. Using tools like Nmap, Burp Suite, and Metasploit, I test systems and recommend solutions.
Digital Forensics
I use forensic analysis techniques to recover evidence, analyze compromised systems, and trace the source of attacks. This includes examining logs, extracting artifacts, and ensuring chain of custody.
Risk Management
I assess potential risks to systems and organizations, prioritize them based on impact and likelihood, and recommend strategies to mitigate threats. My approach balances technical security with business objectives to reduce overall risk exposure.
Incident Response
When threats occur, fast and structured response is critical. I have experience in detecting, analyzing, and containing security incidents, as well as documenting and reporting findings for follow-up action.
Cyber Training & Leadership
As a contracted Army ROTC Cadet preparing to commission as an officer, I bring leadership, discipline, and the ability to train and manage teams. I combine technical knowledge with military leadership experience to achieve mission success.

