A collection of hands-on labs where I explore aspects of cybersecurity such as threat hunting, analysis, vulnerability remediation, and compliance.

Nov 1, 2025

Threat Hunting Investigation

In this project, I simulate a scenario where management suspects a subject is using TOR browser to bypass company security controls. Acting as a threat hunter, I use Microsoft Defender for Endpoint and KQL to trace file activity, process execution, and network connections—validating whether the suspected user launched TOR and connected to known relay nodes.

Tools Used
Microsoft Azure & EDR, KQL
See On Github
Sep 21, 2025

Phishing Analyzer - Email Scanner

A Python tool that scans .eml email files for signs of phishing. It checks the sender, message text, links, and attachments for red flags like suspicious keywords, fake domains, and risky file types. The tool gives each email a score, a clear verdict, and can optionally check link reputations with VirusTotal.

Tools Used
Python, Virus Total
See On Github
Aug 20, 2025

Vulnerability Management Program

In this project, I scan my Azure cloud environment with Nessus to uncover security vulnerabilities across virtual machines and services. I focused on identifying and prioritizing high‑severity risks based on potential impact. I applied targeted fixes and confirmed improvements through follow‑up scans, resulting in a stronger overall security posture.

Tools Used
Microsoft Azure, Nessus
See On Github
Coming Soon...

AI SOC Analyst - Using
Python and Open AI API

In this project I develop a Python workflow that connects Open AI’s API with my Azure cloud environment to aggregate and centralize security logs. I leverage AI to scan, triage, and investigate potential vulnerabilities, streamlining the analysis process. This approach reduced manual workload and accelerated incident detection, showcasing the power of automation in SOC operations.

Tools Used
Microsoft Azure, OpenAI API
View Project
See On Github
Coming Soon...

Honey Pot - Catching Bad Actors

In this project, I built a honeypot in Azure to attract and monitor malicious activity in a controlled cloud environment. A honeypot is used to simulate vulnerable systems, luring attackers so their behavior can be observed and analyzed without risking real assets. My setup captures brute-force login attempts and other suspicious actions, which I investigate by querying logs with KQL. I also visualize attacker locations on a custom map, helping me identify patterns and analyze their tactics, techniques, and procedures.

Tools Used
Microsoft Azure & MDE
View Project
See On Github

Experience

Prodigy Pest Solutions
Pest Control Technician
Philadelphia, PA
Aug 2020 - Present
Prodigy Pest Solutions
Philadelphia, PA
Pest Control Technician
Aug 2020 - Present
Conduct thorough inspections of residential and commercial properties to identify pest infestations and assess safety risks
Administer EPA-approved treatments and evaluate outcomes to ensure consistent, effective pest management
Provide exceptional customer service by educating clients on pest prevention, recommending treatment plans, and upselling service packages to drive revenue growth
Service and calibrate pest control equipment, and mentor new technicians on safety protocols and operational best practices
TD Bank, NA
Bank Teller
Holmes, PA
Apr 2019 - Aug 2020
Prodigy Pest Solutions
Philadelphia, PA
Pest Control Technician
Aug 2020 - Present
Process daily customer transactions—including deposits, withdrawals, transfers, and loan payments with accuracy and full compliance to TD Bank’s operational standards
Deliver professional customer service by resolving account inquiries, guiding clients through digital banking tools, and fostering trust
Identify opportunities to meet client financial needs by recommending and referring TD Bank products and services, helping achieve branch sales targets
Reconcile and balance cash drawer each shift, maintaining strict compliance with internal controls and regulatory requirements

Education

Salt Lake City, UT
Bachelor of Science - BS, Cybersecurity and Information Assurance (Expected: Fall 2026)
Western Governors University
Completed competency-based coursework covering network security, cryptography, digital forensics, incident response, vulnerability assessment, cloud security, Python scripting, SQL optimization, Linux administration, SIEM tools, and NIST/ISO security frameworks.
Middletown, PA
Computer Engineering Studies
Pennsylvania State University
Completed Computer Engineering coursework at Penn State Brandywine, covering digital logic design, circuit analysis, microprocessor fundamentals, Java and C programming.

Certifications

(ISC)² CC - Certified in Cybersecurity
Security concepts, access controls, risk analysis, incident response, cryptography, network and systems security
View
CompTIA A+ (In Progress)
Computer hardware, operating systems, networking, and troubleshooting
View
CompTIA Network+ (In Progress)
Network architecture, implementation, security, troubleshooting
View
CompTIA Security+ (In Progress)
Risk management, threat mitigation, compliance
View