As a young child, I have always been intrigued by technology. I would always tinker around playing with components and trying to figure out how things worked. As I grew throughout the years, I followed those interests, expanding my ever-growing education. With that, let me show you what I can do.
Download ResumeDeployed and configured Cisco routers and switches in high-volume production environments, including implementation of advanced security protocols such as firewalls, VPNs, and IDS/IPS’s to ensure secure network operations. Contributed to the design, implementation, and maintenance of network infrastructure and security measures such as VLANs, QoS, and access control to ensure optimal network performance and security.
Provided crucial technical support to ensure uninterrupted IT operations for my organization. My expertise includes diagnosing and resolving hardware and software issues, configuring workstations, and delivering exceptional customer service. I contribute to the efficiency of the workplace by resolving IT challenges and maintaining a seamless user experience.
Developed and delivered comprehensive cybersecurity curriculum to students, including virtual and in-person lectures on advanced topics such as brute-force attacks, malicious traffic detection, and IP network analysis.
Developed and implemented a new marketing campaign demonstration software that effectively showcased the capabilities and features of new and current devices, resulting in a 11% increase in customer walk-ins within Walmart's electronics department.
Implemented Sandboxie and Python to create previews of weblinks before they are visited, precluding users from unintentional malicious downloads and personal data gathering. The application reduced user confrontation with phishing websites and fake application downloads. Implemented LinksByte to Discord, a instant messaging and digital distribution platform.
Developed a new methodology for detecting malicious processes running within a portable executable file through the use of Process Explorer and Python; this new approach prevented DLL hijacking attacks and malicious file injections.
Engineered an alternative means to decrypt data that had been encrypted through the PETYA ransomware attack by finding a vulnerability in PETYA’s known-plaintext attack within a cipher stream.
BruteDNS was designed as a team to find and detect misconfigured DNS servers, alerting the user of the application of a cyberattack. Using multiple sequences and common penetration-testing services like NMAP & BlackBox, BruteDNS forced DNS zone transfers, gathering private network information.