I am a graduate student in the FoRTE and ITSO labs at Virginia Tech. I recently graduated Summa Cum Laude with a B.S. Computer Engineering also from Virginia Tech. In an effort to pursue my passion for cybersecurity, I decided to continue my education to get a M.S. Computer Science with a certificate in Cybersecurity. My journey started on the blue team side of things, but my interests have taken me towards red team work. Specifically, I am passionate about offensive non-kinetics and vulnerability research.
May 2025
M.S. Computer Science
Graduate Certificate in Cybersecurity
May 2023
B.S. Computer Engineering - Summa Cum Laude
Minors in Computer Science and Cybersecurity
Liberal Arts and Sciences
Engineering
Institute of Electrical and Electronics Engineers
August 2024
July 2024
May 2024
Jan 2023 - Current
Aug 2023 - Current | Treasurer
Oct 2019 - May 2023
Aug 2022 - May 2023 | Controls Lead
Aug 2021 - May 2022 | SEC Representative
Aug 2019 - May 2023
Aug 2022 - May 2023 | President
Aug 2021 - May 2022 | Treasurer
Aug 2020 - May 2021 | Evening with the Industries Chair
Aug 2019 - May 2022
Aug 2021 - May 2022 | Data Committee Liasion
Aug 2020 - May 2021 | Mentor and Committee Member
Apr 2022 - Current
Sabre
Aug 2019 - May 2022
Violist
Apr 2020 - Current
Falcon Complete
June 2024 - August 2024At CrowdStrike, I worked as a front line analyst on the Falcon Complete team to assist cutomers with making changes and updates to their Faclon Complete managed systems. Additionally, I remediated hosts from commodity malware and trained to respond to Active Hands-on-Keyboard incidents and Active Directory based attacks. Finally, I contributed to automated systems to improve detection response and remediation times.
faclon complete console powershellCyber Threat Intelligence and Adversary Emulation
May 2023 - August 2023At MITRE, I worked with the MITRE ATT&CK Evaluations team to develop and improve malware used in past and upcoming rounds of evaluations. One project involved updating a Linux backdoor. This consisted of adding a handler to a C2 framework, updating the implant to be persistent and user configurable, creating and evaluating custom ethernet packets using Wireshark, and analyzing an example malware sample using Ghidra. Additionally, I sat in on a cyber exercise which evaluated deception technologies, and placed third in an intern embedded systems capture the flag competition.
rust go python ghidra wiresharkEvent Threat Detection
May 2022 - August 2022On Google Cloud’s Event Threat Detection Team, I initially worked on building customer-configurable detection modules to identify IAM-based privilege escalation attacks. After finishing the project two months early, I picked up a project that would allow security engineers to run YARA-L and SQL rules against Google Cloud Platform logs in real time. I specifically worked on parsing log data out into a table so commands could be run against them. As of now, the custom module code is in production.
java c c++ go sqlCross Media Measurement
May 2021 - August 2021On Google Ad’s Cross Media Measurement Team, I collaborated with Facebook, Amazon, and other companies to measure ad views across various media platforms to provide users with more diverse ads and advertising companies with more accurate data. I specifically worked on securing user data. This involved building a library to encrypt identifier-payload pairs for a Panel Match Batch Lookup Workflow. Encryption consisted of methods such as AES, HKDF, SHA256, and Deterministic Commutative Encryption. As of now, the code is in production.
c++ bazel git