A highly motivated and hardworking individual working towards a Bachelor of Science degree.
I am
currently seeking an internship opportunity with a business professional
to build upon my career as a
Computer Scientist in the field of cybersecurity.
Scroll down to learn more about me
I am a driven cybersecurity professional with a B.S. in Cybersecurity Analytics and Operations, a program specifically tailored by the NSA. With an emphasis in geopolitics, I possess a unique perspective that integrates global insights into my approach to cybersecurity. Complementing my degree, I hold minors in Security and Risk Analysis, reflecting mastery of NIST 800 framework, and in Information Sciences and Technology, showcasing my proficiency in application development. Backed by an undergraduate certificate from the National Security Agency, I am poised to excel in roles that demand a blend of technical expertise, compliance knowledge, and a strategic global viewpoint within the realms of Engineering or IT.
I am a dedicated cybersecurity professional with a robust educational foundation and practical experience in web design and programming. Since 2020, I've immersed myself in the dynamic realm of cybersecurity, focusing on policy writing, compliance, and specialized areas such as ABAC implementation and Splunk utilization.
Currently holding a Bachelor's degree in Cybersecurity Analytics and Operations with an emphasis on Geopolitics from the Pennsylvania State University, I've fortified my academic journey with minors in Information Sciences and Technology, emphasizing application and software development, as well as Security and Risk Analysis (SRA).
My journey into technology began with web interface design. Proficient in CSS3, Bootstrap, and HTML5, I honed the ability to create elegant and visually pleasing web interfaces. This venture not only showcased my technical skills but also allowed me to contribute positively to my local community.
My aptitude expanded as I explored various programming languages, including Visual Basic, C++, C#, Javascript, Python, and Java. These skills, acquired during my time at Wayne Hills High School, empower me to approach problems from diverse angles and craft innovative solutions.
Transitioning to university, I've actively participated in clubs and extracurricular activities to augment my learning journey. I've served in pivotal roles, including Vice President and Webmaster of the Information Sciences and Technology Special Living Option (IST SLO). Additionally, I am a mentor for New Jersey STEM Girls, a branch of FIRST Inspires dedicated to inspiring young girls to pursue STEM disciplines.
My commitment to continuous growth is underscored by my recent achievement of the Security+ certification, reflecting my unwavering pursuit of excellence. This dedication fuels my aspirations to advance within the cybersecurity landscape. Beyond my academic and extracurricular achievements, I've been actively involved in the cybersecurity field since 2020. I've focused on critical areas such as cyber security policy formulation and compliance. My expertise extends to specialized domains, including ABAC implementation and utilizing Splunk to derive enhanced security insights.
Throughout my professional journey, I've applied my skills as an Associate Cyber Security Analyst at Bell Helicopter, ensuring ITAR and EAR compliant security policies, conducting compliance audits, and automating processes through PowerShell scripting. My role as an IT Security Analyst Intern at Textron Systems involved risk assessments, security monitoring, and encryption of sensitive data.
My academic pursuits have enriched me with practical skills. Courses like Malware Analytics and Computer Forensics have equipped me with the tools to dissect malware, analyze memory allocation, and handle digital evidence.
My diverse skills span programming languages from C++ to Python, alongside a comprehensive software toolkit encompassing Demisto, Jira, Confluence, Darktrace, QRadar, and more. This breadth underscores my ability to adapt to a wide range of technical scenarios.
Armed with a multifaceted background, practical experiences, and a demonstrated commitment to growth, I am primed to excel in roles demanding technical finesse, compliance acumen, and a strategic mindset. I look forward to contributing to the innovative, secure, and dynamic world of Engineering or IT.
Obtained a Bachelor of Science degree in Cybersecurity Analytics and
Operations (CYAOP) with an emphasis in Geopolitics.
This degree prepares students to protect digital information from attack through
cyberdefense strategies. With a foundation in mathematics and computer programming, students
will be prepared to recognize, analyze, defend against, and manage risks related to a wide range
of threats to online information, data stores, and networks.
Understanding the geopolitical landscape is key to understanding and modeling cyberthreats
from nation-states and other threat actors. The skills gained from this focus allow students to
pursuing cybersecurity careers in government or related consulting sectors.
Recognizes exemplary college-level achievement, for obtaining an average score of at least 3.25 on all AP Exams taken, and scores of three or higher on four or more exams. May 2017 Exams
Completed high school with honors. Was the Co-Vice President of the Wayne Hills Computer Club, ran Tech Help Day, was a Peer Minister for three years, and did countless projects for the school and community.
As part of the National Society of High School Scholars (NSHSS) I am part of a group of high-achieving scholars with a drive to succeed, and a desire to change their world for the better. NSHSS is proud to be an inclusive organization, drawing from a broad, diverse pool of students. They are committed to supporting our members by connecting them with opportunities to learn, lead and change the world.
• Recruit for Textron, highlighting brands: Bell Flight, Cessna Aircraft, Beechcraft, and more.
• Specialize in intern and entry-level talent acquisition.
• Shape careers, and foster fresh perspectives.
• Guide emerging professionals, and drive innovation.
• Ensured compliance with standards, fostering cyber-resilient aircraft.
• Led cross-functional collaboration, aligning with security benchmarks.
• Executed design allocation, and architectural analysis using MBSE.
• Led threat modeling, orchestrated cyber tabletops.
• Achieved RMF certification, driving compliance initiatives.
• Developed, documented, and executed processes for control.
• Enabled clear communication, assessing design impact.
• Implemented and maintained ITAR and EAR compliant security policies for information assurance and continuity within the organization.
• Used Tenable scripts to perform RedHat CIS Benchmark compliance audits on Unix, Linux, and Windows servers.
• Improved LDAP pull efficiency using automated PowerShell scripting.
• Created PowerShell scripts to pull user data out of company assets.
I worked directly with the Information Security teams and department, to perform risk assessments, mitigation, security monitoring, and analysis of IT policy and regulatory compliance.
• Analyzed and automated data processes to identify anomalies and implement risk mitigation actions
• Encrypted external hard drives with AES for employees handling sensitive information
• Used Splunk to run queries (with Regex) looking for anomalies in Linux and Windows Servers
• Made a visual representation of new security policies and mapped them to the Cybersecurity Maturity Model Certification (CMMC) to ensure compliance with government standards
• Configured firewalls and switches to learn more about how infrastructure is implemented at the company
Implemented automation of new hire access controls and credentials management using Demisto, reducing
processing time from 3 weeks to less than a day.
• Updated and deployed company security policies in response to incident reports.
• Developed security evaluation reports of prospective software and external APIs.
• Organized Information Security Engineering team workflow and processes using Jira.
As Vice President, I have to plan and implement at least two events every month of an academic nature as well as at least one event of a social nature on a topic relevant to the purpose of the IST SLO, make regular reports about IST College issues, and serve as a proxy for the President. Along with this, I plan and execute social and academic events in collaboration with the executive board for over 80 students who are involved in a living and learning community on campus.
Attended spring break trip with seven other freshmen to San Francisco, California to explore different companies in the technology industry. During this trip, I gained exposure to the growing corporate cultures in different settings, and learned how to network outside of an educational setting. Along with this, I networked and attended information sessions with Reddit, Juniper Networks, Weebly, PwC, drive.ai and Cloudera.
This program introduces students to opportunities at the undergraduate and graduate levels. Throughout the program participants are introduced to students and faculty who have applied for, and earned prestigious awards. It is designed to give students the opportunity to assess their strengths, develop their critical thinking and technical writing, envision their future, and create a plan to help them along their envisioned path and become a competitive candidate for major fellowships.
As webmaster, I have completely redone the IST SLO website, making it easier for users to navigate and join the SLO. With this, I have given the SLO more exposure to new members, whether they are incoming freshmen, or they are upperclassmen that already live on campus, and want to get involved with a student organization.
My role is to continuously improve the team's operating model, designated capability areas (communicate with the Programmers), and provide backup support to other capability areas (communicate with the Outreach Captain, Coaches, Mentors, and Treasurer). I also relay any information that I get from the Captain, and to work with him on making decisions on behalf of the team. For Outreach, I help get in contact with professionals to give us some helpful tips with how to improve our robot, create Team Spirit Activities, liase with other teams, and create a promotional video for the season.
I put together a team, where we created an application that won The Third Annual Congressional App Challenge. The application called Book Browser was designed to, benefit schools by allowing them to donate old used textbooks to underprivileged schools and communities. This application will be displayed with other winners of the competition on the House of Representatives webpage. Congress has scheduled a formal presentation ceremony on Capitol Hill on April 4, 2017.
As a member of NJ STEM Girls, I identify ways to encourage young girls to join the STEM community, teach them about programming, and understand what STEM is. As part of the Steering Committee, I help plan events for future STEM Girls events, and arrange outreach events.
I have been working non stop to redesign the local community's club websites. The Packanack Lake BBQ Club site is one that not only gathers community members together, but also remembers the death of one of the most beloved members of the Packanack Lake community.
To continue to stay active in the church, and be able to spread my faith to others, whether they are younger or older than myself. Also allows for me to help out plan youth activities.
Was a member of the marching band where I not only played the flute, but I was also a Color Gaurd member. Through this, I learned about the importance of team work and dedication to one another.
Assessment and mitigation of security vulnerabilities for people, organizations, industry sectors, and the nation.
Fundamental issues and concepts of network security, network security technologies and protocols, and emerging technologies in network security.
Legal environment of information technology, constitutional/political issues, intellectual property, management, e-commerce, privacy, access, computer contracting, cyberspace regulation.
Students develop and document an incident response plan for a company. Students will become familiar with the NIST standards for responding to cyber incidents. This is a writing-intensive course. This course fulfils the writing across the curriculum general education requirement.
Provided an overview of decision theoretical and analytical concepts and tools in the security risk analysis field.
This course exposes students to problems and puzzles that arise in the study of international relations. It also examined the major scholarly approaches to studying these phenomena. These approaches vary in terms of theory and in the way that evidence is collected to support or refute specific ideas. Among the topics that are discussed are the nature of the international system, the causes and effects of international conflict, and the difficulties countries face in establishing cooperation. Political Science 14 also focused on issues that have increased in importance since the demise of the Cold War, such as international trade, economic development, interdependence, and the global environment. Finally, the class discussed some of the new challenges facing scholars of world politics.
Fundamental issues and concepts of computer forensics; aspects of computer and cyber crime; methods to uncover, protect, exploit, and document digital evidence; tools, techniques, and procedure to perform computer and cyber crime investigation.
The course follows the general format of experiential studios in the arts and architecture. It was primarily problem-based and project oriented. Peer and instructor design critiques were the major feedback and assessment mechanisms. Students were be expected to complete deliverables in different phases of the systems development lifecycle (i.e. problem definition, requirements analysis, design, development, test).
This is the second course in application development. It focuses on the intermediate knowledge needed to create applications that use high level programming languages, combining original code with existing code libraries and application programming interfaces (APIs).
This course provides students with an understanding of an array of mathematical concepts and methods which form the foundation of modern information science, in a form that will be relevant and useful for IST students.
This program has students learn the principles of information security, security architectures and models, aspects and methods of information security such as physical security control, operations security, access control, hacks/attacks/defense, systems and programs security, cryptography, network and web security, worms and viruses, and other Internet secure applications. Students also learn how to plan and manage security, security policies, business continuity plans, disaster recovery plans, and social and legal issues of information security.
This studio course teaches four basic hands-on cyber-defense skills: configuring a firewall, implementing a host-based intrusion detection software tool, using the Metasploit tool to do penetration testing, and implementing a network intrusion detection tool.
This course introduces the basics of computer networks to students who seek to pursue a career in information technology and cyber security. Starting from a discussion of common network applications such as the Web and e-mail, the course addresses network design and implementation issues at each network layer. The course discusses the issues involved in efficiently transporting data while maintaining high availability and design modularity.
Worked in a group to redesign a movie rental company database using various design techniques and Microsoft SQL Server. This class brought databases to life with a unique approach that focuses not only on constructing databases and using database tools, but also the implications of data uses and issues.
This program introduces students to computer systems literacy and teaches fundamental skills and understanding. With this course I learned how to recognize computer components, install multiple operating systems, configure operating system security features, install and configure software, connect systems together across a network, and configure some server operating system components to manage security features.
This is an introductory course with a broad focus on terrorism and crime in relation to security and risk analysis. The course introduces students to the nature, scope and seriousness of the security threats posed by terrorist and criminal activity. Students examine law enforcement and counter-terrorism policies and measures, including international counter-terrorism cooperation
This course presents the ideas that make information sciences and technology professionals the leaders of the 21st Century. The mission of this course is to introduce students to the problems and opportunities found in the interaction between information, people, and technology, make students better critics of the information devices they use every day, and engage students with the resources available for collegelevel research, study, and learning.
The course was focused on application development foundations including: fundamental programming concepts, basic data types and data structures, problem solving using programming, basic testing and debugging, basic computer organization and architecture, and fundamentals of operating systems. It was a hands-on course designed to help students learn to program a practical application using modern, high-level languages.
With this class students learn how to identify vulnerabilities in government agencies and business organizations.