Lab: Placeholder
Lab Description
FIRST OBJECTIVES
- Collect incident artifacts from Azure Activity and Storage logs
- Replay the intrusion timeline entirely with KQL queries
- Deploy a Logic App playbook that locks compromised storage keys
I am recent Computer Science Graduate from James Madison University looking for an intro role in the Cybersecurity field. I bring a unique variety of skills to the table that transcends just the computer world.
SIEM
EDR
IDS
Projects, tools and more that I have made.
Enterprise security information and event management (SIEM) analytics dashboard with real-time threat detection, automated incident response workflows, and comprehensive security metrics visualization. Built with security-first principles including role-based access control, encrypted data transmission, and audit logging.

Developed a robust algorithmic movement system in Python using ROS2 to simulate high-stakes search and rescue operations. This project centered on a custom autonomous function that orchestrated a TurtleBot 3 through a dynamic environment to locate and identify victims. Tested in a competition environemnt.

Fixture Flow is a personalized, accessibility-first web application designed to solve "information overload" in sports tracking. While most soccer platforms overwhelm users with dense layouts and unnecessary data, Fixture Flow prioritizes a clean, curated experience. Users can select their favorite teams and leagues to create a bespoke home screen that delivers real-time scores and upcoming schedules at a glance.

HOME LABS
Homelab work dedicated to practicing my skills in an applicable way.
Lab Description
FIRST OBJECTIVES
ACADEMIC JOURNEY
From computer science foundations to cybersecurity expertise. My journey through academic excellence, professional certifications, and organizations.
James Madison University
With this degree, I received my formal education in the areas of comptuation that provides the backbone of Cybersecurity including computer systems, operating systems, programming languages, and data structures.
Academic Projects:
An industry-recognized certification validating a foundational understanding of cybersecurity principles and best practices. This credential demonstrates proficiency in security operations, network security, and risk management. It signifies a commitment to the ISC2 Code of Ethics and a mastery of the essential technical skills required to protect organizational assets in an evolving threat landscape.
ID: 2409600
An active member of the world's leading professional organization for computer science and information technology. Membership signifies a commitment to the ACM Code of Ethics and professional excellence in the computing field. This affiliation provides access to the world’s largest digital library of computing research, keeping my technical knowledge at the forefront of industry-leading innovations and peer-reviewed standards.
ID: Member ID available upon request
A globally recognized, vendor-neutral certification that establishes the industry standard for launching IT careers and supporting today’s hybrid workforce. This credential validates foundational skills across key technologies, confirming expertise in configuring, troubleshooting, and maintaining hardware, software, operating systems, and networks, while ensuring security and operational efficiency across a diverse range of devices and platforms.
A globally recognized, vendor-neutral certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career. This credential confirms expertise in assessing the security posture of an enterprise environment, recommending and implementing appropriate security solutions, and monitoring and securing hybrid environments, including cloud, mobile, and IoT.
A vendor-neutral certification validating the essential knowledge and skills needed to confidently design, configure, manage, and troubleshoot any wired or wireless network. This credential confirms expertise in networking fundamentals, including IPv4/IPv6 addressing, DNS, and DHCP, alongside a strong grasp of network security, cloud computing concepts, and critical infrastructure resilience.
TIMELINE
From experience in Civil Engineering to formal academic education and work in Computer Science. Each experience shaped my analytical approach to cyber defense giving me a balanced sight to physical and technical security.
DataAnnotation · Freelance Remote
Reviewed, corrected, and validated code results against specifications and test cases to improve quality. Worked extensively with JSON and Node.js to reproduce issues, debug logica errors, and verify fixes.
Key Achievements:
MusicCPR · Part-time
Coordinated with professors on solving various bugs within the site. Conducted independent testing on the site using my background in music.
Key Achievements:
Townes Site Engineering · Full-time
Worked along a team of engineers and other geotechs to complete contracted work by various construction sites. With this I conducted independent testings/inspections on site and in lab on materials including soil, concrete, and steel.
Key Achievements:
WRITEUPS
My recent discoveries in the world of cybersecurity.

Deep dive on the methodolgies of offensive security in the world of cars including physical and remote access.

A comprehensive guide to creating, implementing, and maintaining incident response playbooks for security operations teams.
MY CONTACT
Reach out through these channels.