I study Applied Computer Science with a concentration in Cybersecurity at the University of South Carolina Aiken, with an expected graduation date of May 2027.
I work with the university's security team as a Security Specialist and Security Operations Center Analyst, where I handle alert triage, incident documentation, vulnerability scan remediation, threat hunting, malware analysis, forensics, and the kind of utility scripting that ends up running quietly in the background for years.
I have been active with USCA's Cyber Pacers CTF team since 2023, competing in picoCTF, CarolinaCon, corCTF, NCL, iCTF, SunshineCTF, and PCDC. Our team placed third at CarolinaCon. Selected challenge write-ups live here.
My strongest interests are reverse engineering, binary analysis, penetration testing, and defensive workflows that turn investigation into repeatable tooling. The interesting work, to me, is the part where a one-off triage exercise becomes a permanent piece of infrastructure.
Beyond security work, I build projects to learn systems-level concepts and solve practical problems. I use C, C++, Python, Java, and JavaScript, with a strong preference for lower-level work where memory, networking, parsing, and operating-system behavior remain visible. Places where the abstraction is thin enough to see what is actually happening.
Ghidra·Wireshark·Burp Suite·Hashcat·pwntools·Maltego.
Nmap·Metasploit·Kali Linux·libpcap.
Microsoft Defender XDR·Microsoft Entra ID·Security Onion.