π» Operations Engineer @ ThreatSpike Labs
π Cybersecurity Researcher | Ethical Hacker | Forensic Analyst | AI Engineer
π Focused on Malware Analysis, Penetration Testing, Artificial Intelligence, and Digital Forensics
I specialize in cybersecurity, penetration testing, and exploit research, combining a background in software engineering with deep curiosity for offensive and defensive security. My passion lies in understanding and countering malware, rootkits, bootkits, trojans, and spywareβboth through hands-on analysis and theoretical research. I have also undertaken a serious interest and passion in how artificial intelligence can assist in every aspect of cybersecurity research and being used ethically to combat cyber crime world-wide.
My mission is to bridge cybersecurity, AI, and law enforcement, using technology to protect vulnerable communities and investigate digital crime.
- Programming: Python, Java, PowerShell, C/C++ (for exploit dev), Bash
- Cybersecurity: Penetration Testing, Reverse Engineering, Vulnerability Exploitation, Malware Analysis, Digital Forensics
- Networking & IT: VPNs, Intune/Autopilot, API Integrations, Windows Administration
- Applied AI/ML: Automation for threat detection, heuristic-driven search, OSINT workflows, classification, nerual nets
- π¬ Malware Analysis & Forensics Lab
Built controlled environments for reverse engineering, dynamic malware testing, and forensic triage to study trojans, rootkits, and ransomware safely. - β‘ Exploit & Payload Engineering
Developed custom proof-of-concepts (PoCs) to explore vulnerabilities, memory corruption, and evasion techniques, with a focus on Windows internals and low-level payload design. - π Security Knowledge Base & Integrations
Authored documentation and built integrations for ThreatLocker and CloudRadial, helping clients understand endpoint security controls and creating transparent educational resources for MSP environments. - π Full-Stack Security Dashboards (in progress)
Prototyping dashboards that combine threat intel, forensic data, and OSINT automation into visual tools for investigations.
- Advanced Windows Defender/EDR evasion (AMSI bypass, direct syscalls, ETW tampering)
- Kernel-mode development for rootkits and bootkits
- Full-stack web development for security dashboards and visualization
- Forensic methodologies for detecting stealth malware in modern environments
- Artificial Intellegence for informed searches and classifying anomalous objects based on features
- CompTIA Network+, Security+, CySA+
- Kent State Master's of Science in Artificial Intelligence
- Kent State Bachelor's of Technical and Applied Science Focus in Cybersecurity
- Lakeland Community College Associate of Applied Business in Software Engineering
- Pursuing Pentest+, TCM Security certifications, and OSCP
- Expand exploit development knowledge into kernel and hypervisor layers
- Build forensic techniques for investigating rootkits and bootkits
- Apply technical expertise in cybercrime investigations with a focus on protecting at-risk populations
- Create automation platforms that integrate with AI and forensic activities
- Fluent in Spanish πͺπΈ and ASL π€, conversational in French π«π·
- Outdoor enthusiast: hiking, camping, and nature exploration
- Avid follower of science fiction and AI-driven narrativesβcurious about how speculative futures intersect with real-world security challenges
β¨ βTechnology should be used to protect the vulnerable, not exploit them.β