Aspiring Cybersecurity Professional
I am a recent University of South Florida Information Security graduate actively building a career in the cybersecurity space. My technical interests are geared toward SOC Analyst operations, vulnerability management, and Governance, Risk, and Compliance (GRC). I am a strong believer in continuous learning, frequently using Kali Linux for CTF challenges, building custom home labs to learn different tools, and use websites like TryHackMe and Hack The Box to get hands-on technical experience with daily SOC operations.
Technology has been my passion since I was young. I graduated from the University of South Florida with a degree in Information Science — Information Security, where I built a strong foundation in cybersecurity principles and practices.
Unfortunately I ran into the problem of needing experience to get a job, but needing a job to get experience. Rather than sit around and try to get lucky with applications, I built a home-lab: deploying Security Operations Centers, automating threat intelligence, and engineering secure cloud infrastructure from the ground up.
I'm continuing to sharpen my skills further through Capture The Flag competitions (earning a Top 8% finish at the U.S. Department of Defense Cyber Sentinel CTF), relevant cyber certifications (Security+, ISC2 CC), and websites like TryHackMe, and Hack The Box where I can get hands-on experience with tools and security operations I may find myself using in the cyberspace.
Select a project to see more details
Built a simulated Security Operations Center to combat alert fatigue. A Python script automatically correlates internal network logs against external threat intelligence feeds, converting low-context data into actionable analyst alerts focused on genuine threats.
Bridged the gap between a technical vulnerability scan and a business-level risk decision. Used OpenVAS to identify vulnerabilities, then translated the output into a formal Plan of Action & Milestones (POA&M) — creating an auditable compliance trail for a GRC team.
Developed a monitoring tool that parses SSH authentication logs in real time, identifies brute-force patterns and anomalous login attempts, and generates structured alerts — demonstrating detection engineering fundamentals in a home lab environment.
Engineered a secure AWS cloud environment using Terraform and IaC principles — implementing least-privilege IAM policies, network segmentation, and security group rules aligned to DevSecOps best practices. Infrastructure is fully version-controlled and repeatable.
I'm always open to discussing cybersecurity, new opportunities, or collaborating on CTF and security projects. Whether you're looking for a dedicated team member or want to connect in the field feel free to reach out!
// Direct contact
US Citizen. Based in Florida. Open to remote, hybrid, or local roles in the Tampa Bay area and beyond. Open to relocation anywhere in the United States.