A highly motivated and hardworking individual working towards a Bachelor of Science degree.
I am currently seeking an internship opportunity with a business professional
to build upon my career as a Computer Scientist in the field of cybersecurity.
Scroll down to learn more about me
My career goal is to become a fully qualified and experienced IT professional utilizing my skill sets of programming, cybersecurity, risk analysis, and project management. With my knowledge and skills, I want to be able to take what I am learning in the classroom and apply it to the workforce.
Currently, I am a Senior in the College of Information Sciences and Technology at the Pennsylvania State
University. I am pursuing a degree in Cybersecurity Analytics and Operations with an application focus in
Geopolitics. On top of this, I am also minoring in both Information Sciences and Technology (application
and software development), and Security and Risk Analysis (SRA).
Since high school, I have been working as a web interface designer primarily with a background in CSS3, Bootstrap, and HTML5 to help create a clean and elegant styling for web interfaces. I started to construct and design websites as a way to help the local community, showcase my skills, and make a difference.
Since going to university, I have been active in clubs and extracurricular activities to help further my education. I am the current Webmaster of the Information Sciences and Technology Special Living Option (IST SLO), and a mentor to for the New Jersey STEM Girls- a department of FIRST Inspires that inspires young girls to be involved with STEM.
Currently working towards a Bachelor of Science degree in Cybersecurity Analytics and
Operations (CYAOP) with an emphasis in Geopolitics.
This degree prepares students to protect digital information from attack through cyberdefense strategies. With a foundation in mathematics and computer programming, students will be prepared to recognize, analyze, defend against, and manage risks related to a wide range of threats to online information, data stores, and networks.
Understanding the geopolitical landscape is key to understanding and modeling cyberthreats from nation-states and other threat actors. The skills gained from this focus allow students to pursuing cybersecurity careers in government or related consulting sectors.
Recognizes exemplary college-level achievement, for obtaining an average score of at least 3.25 on all AP Exams taken, and scores of three or higher on four or more exams. May 2017 Exams
Completed high school with honors. Was the Co-Vice President of the Wayne Hills Computer Club, ran Tech Help Day, was a Peer Minister for three years, and did countless projects for the school and community.
As part of the National Society of High School Scholars (NSHSS) I am part of a group of high-achieving scholars with a drive to succeed, and a desire to change their world for the better. NSHSS is proud to be an inclusive organization, drawing from a broad, diverse pool of students. They are committed to supporting our members by connecting them with opportunities to learn, lead and change the world.
I worked directly with the Information Security teams and department, to perform risk assessments, mitigation, security monitoring, and analysis of IT policy and regulatory compliance.
• Analyzed and automated data processes to identify anomalies and implement risk mitigation actions
• Encrypted external hard drives with AES for employees handling sensitive information
• Used Splunk to run queries (with Regex) looking for anomalies in Linux and Windows Servers
• Made a visual representation of new security policies and mapped them to the Cybersecurity Maturity Model Certification (CMMC) to ensure compliance with government standards
• Configured firewalls and switches to learn more about how infrastructure is implemented at the company
Implemented automation of new hire access controls and credentials management using Demisto, reducing
processing time from 3 weeks to less than a day.
• Updated and deployed company security policies in response to incident reports.
• Developed security evaluation reports of prospective software and external APIs.
• Organized Information Security Engineering team workflow and processes using Jira.
As Vice President, I have to plan and implement at least two events every month of an academic nature as well as at least one event of a social nature on a topic relevant to the purpose of the IST SLO, make regular reports about IST College issues, and serve as a proxy for the President. Along with this, I plan and execute social and academic events in collaboration with the executive board for over 80 students who are involved in a living and learning community on campus.
Attended spring break trip with seven other freshmen to San Francisco, California to explore different companies in the technology industry. During this trip, I gained exposure to the growing corporate cultures in different settings, and learned how to network outside of an educational setting. Along with this, I networked and attended information sessions with Reddit, Juniper Networks, Weebly, PwC, drive.ai and Cloudera.
This program introduces students to opportunities at the undergraduate and graduate levels. Throughout the program participants are introduced to students and faculty who have applied for, and earned prestigious awards. It is designed to give students the opportunity to assess their strengths, develop their critical thinking and technical writing, envision their future, and create a plan to help them along their envisioned path and become a competitive candidate for major fellowships.
As webmaster, I have completely redone the IST SLO website, making it easier for users to navigate and join the SLO. With this, I have given the SLO more exposure to new members, whether they are incoming freshmen, or they are upperclassmen that already live on campus, and want to get involved with a student organization.
My role is to continuously improve the team's operating model, designated capability areas (communicate with the Programmers), and provide backup support to other capability areas (communicate with the Outreach Captain, Coaches, Mentors, and Treasurer). I also relay any information that I get from the Captain, and to work with him on making decisions on behalf of the team. For Outreach, I help get in contact with professionals to give us some helpful tips with how to improve our robot, create Team Spirit Activities, liase with other teams, and create a promotional video for the season.
I put together a team, where we created an application that won The Third Annual Congressional App Challenge. The application called Book Browser was designed to, benefit schools by allowing them to donate old used textbooks to underprivileged schools and communities. This application will be displayed with other winners of the competition on the House of Representatives webpage. Congress has scheduled a formal presentation ceremony on Capitol Hill on April 4, 2017.
As a member of NJ STEM Girls, I identify ways to encourage young girls to join the STEM community, teach them about programming, and understand what STEM is. As part of the Steering Committee, I help plan events for future STEM Girls events, and arrange outreach events.
I have been working non stop to redesign the local community's club websites. The Packanack Lake BBQ Club site is one that not only gathers community members together, but also remembers the death of one of the most beloved members of the Packanack Lake community.
To continue to stay active in the church, and be able to spread my faith to others, whether they are younger or older than myself. Also allows for me to help out plan youth activities.
Was a member of the marching band where I not only played the flute, but I was also a Color Gaurd member. Through this, I learned about the importance of team work and dedication to one another.
Assessment and mitigation of security vulnerabilities for people, organizations, industry sectors, and the nation.
Fundamental issues and concepts of network security, network security technologies and protocols, and emerging technologies in network security.
Legal environment of information technology, constitutional/political issues, intellectual property, management, e-commerce, privacy, access, computer contracting, cyberspace regulation.
Students develop and document an incident response plan for a company. Students will become familiar with the NIST standards for responding to cyber incidents. This is a writing-intensive course. This course fulfils the writing across the curriculum general education requirement.
Provided an overview of decision theoretical and analytical concepts and tools in the security risk analysis field.
This course exposes students to problems and puzzles that arise in the study of international relations. It also examined the major scholarly approaches to studying these phenomena. These approaches vary in terms of theory and in the way that evidence is collected to support or refute specific ideas. Among the topics that are discussed are the nature of the international system, the causes and effects of international conflict, and the difficulties countries face in establishing cooperation. Political Science 14 also focused on issues that have increased in importance since the demise of the Cold War, such as international trade, economic development, interdependence, and the global environment. Finally, the class discussed some of the new challenges facing scholars of world politics.
Fundamental issues and concepts of computer forensics; aspects of computer and cyber crime; methods to uncover, protect, exploit, and document digital evidence; tools, techniques, and procedure to perform computer and cyber crime investigation.
The course follows the general format of experiential studios in the arts and architecture. It was primarily problem-based and project oriented. Peer and instructor design critiques were the major feedback and assessment mechanisms. Students were be expected to complete deliverables in different phases of the systems development lifecycle (i.e. problem definition, requirements analysis, design, development, test).
This is the second course in application development. It focuses on the intermediate knowledge needed to create applications that use high level programming languages, combining original code with existing code libraries and application programming interfaces (APIs).
This course provides students with an understanding of an array of mathematical concepts and methods which form the foundation of modern information science, in a form that will be relevant and useful for IST students.
This program has students learn the principles of information security, security architectures and models, aspects and methods of information security such as physical security control, operations security, access control, hacks/attacks/defense, systems and programs security, cryptography, network and web security, worms and viruses, and other Internet secure applications. Students also learn how to plan and manage security, security policies, business continuity plans, disaster recovery plans, and social and legal issues of information security.
This studio course teaches four basic hands-on cyber-defense skills: configuring a firewall, implementing a host-based intrusion detection software tool, using the Metasploit tool to do penetration testing, and implementing a network intrusion detection tool.
This course introduces the basics of computer networks to students who seek to pursue a career in information technology and cyber security. Starting from a discussion of common network applications such as the Web and e-mail, the course addresses network design and implementation issues at each network layer. The course discusses the issues involved in efficiently transporting data while maintaining high availability and design modularity.
Worked in a group to redesign a movie rental company database using various design techniques and Microsoft SQL Server. This class brought databases to life with a unique approach that focuses not only on constructing databases and using database tools, but also the implications of data uses and issues.
This program introduces students to computer systems literacy and teaches fundamental skills and understanding. With this course I learned how to recognize computer components, install multiple operating systems, configure operating system security features, install and configure software, connect systems together across a network, and configure some server operating system components to manage security features.
This is an introductory course with a broad focus on terrorism and crime in relation to security and risk analysis. The course introduces students to the nature, scope and seriousness of the security threats posed by terrorist and criminal activity. Students examine law enforcement and counter-terrorism policies and measures, including international counter-terrorism cooperation
This course presents the ideas that make information sciences and technology professionals the leaders of the 21st Century. The mission of this course is to introduce students to the problems and opportunities found in the interaction between information, people, and technology, make students better critics of the information devices they use every day, and engage students with the resources available for collegelevel research, study, and learning.
The course was focused on application development foundations including: fundamental programming concepts, basic data types and data structures, problem solving using programming, basic testing and debugging, basic computer organization and architecture, and fundamentals of operating systems. It was a hands-on course designed to help students learn to program a practical application using modern, high-level languages.
With this class students learn how to identify vulnerabilities in government agencies and business organizations.