Offensive
Penetration testing, red teaming, vulnerability research, exploit development, reverse engineering.
- Burp Suite
- Metasploit
- Nmap
- Nessus
- Ghidra
- John
- Hashcat
I build tools and break systems for a living - threat intelligence, vulnerability research, and automation that turns noise into signal. Currently studying Cyber Operations at the University of Arizona.
A short list of things that made it past my usual delete-it filter - shipped, tested, and still running somewhere.
I'm a cybersecurity undergraduate at the University of Arizona, studying Cyber Operations with a CS minor. I spend most of my time inside other people's systems - legally - and the rest writing Python to make that work less tedious.
Past lives include a Junior SOC Analyst role at CyberEyeAW, a Cyber Intelligence internship at CogMac in New Delhi, and most recently a Cybersecurity Fellowship with Handshake AI evaluating LLM outputs on offensive-security prompts.
Outside of work I read too much about threat actor kill-chains and pretend I'll one day finish learning Rust.
University of Arizona · Tucson, AZ
Designing a critique-based evaluation framework for LLM-generated code against OWASP Top 10. Building a Python pipeline that combines static analysis, rule-based scanning (Semgrep/Bandit), and LLM reasoning.
Handshake AI · San Francisco, CA
Auditing prompt-response pairs and evaluating LLM outputs on cybersecurity-focused projects. Designing domain-specific prompts to improve correctness and alignment.
CyberEyeAW · Sierra Vista, AZ
Triaged 100+ weekly security incidents with a 99% resolution rate. Ran vulnerability assessments that reduced exposure by 70%. Collaborated with SOC teams on ThreatLocker tuning - cutting response time 30%.
CogMac · New Delhi, India
Investigated 50+ risks in hardware and financial systems, helping cut response time by 30%. Documented 25+ adversary TTPs via OSINT - playbooks adopted by 7 teams. Automated data pipelines that saved ~40 hrs/month.
Penetration testing, red teaming, vulnerability research, exploit development, reverse engineering.
SOC operations, incident response, threat hunting, SIEM tuning, forensic triage.
Python-first. Comfortable low-level when required, plus the web languages for building tools around findings.
Mapping work to standards the rest of the org actually cares about.
Lab and prod environments across hypervisors and cloud providers.
Turning raw telemetry and malware into actionable intel.