Skip to content
View Jared-Young-26's full-sized avatar

Block or report Jared-Young-26

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Jared-Young-26/README.md

πŸ‘‹ Hi, I’m Jared Young

πŸ’» Operations Engineer @ ThreatSpike Labs
πŸ” Cybersecurity Researcher | Ethical Hacker | Forensic Analyst | AI Engineer
πŸ“š Focused on Malware Analysis, Penetration Testing, Artificial Intelligence, and Digital Forensics


πŸš€ About Me

I specialize in cybersecurity, penetration testing, and exploit research, combining a background in software engineering with deep curiosity for offensive and defensive security. My passion lies in understanding and countering malware, rootkits, bootkits, trojans, and spywareβ€”both through hands-on analysis and theoretical research. I have also undertaken a serious interest and passion in how artificial intelligence can assist in every aspect of cybersecurity research and being used ethically to combat cyber crime world-wide.

My mission is to bridge cybersecurity, AI, and law enforcement, using technology to protect vulnerable communities and investigate digital crime.


πŸ› οΈ Technical Skills

  • Programming: Python, Java, PowerShell, C/C++ (for exploit dev), Bash
  • Cybersecurity: Penetration Testing, Reverse Engineering, Vulnerability Exploitation, Malware Analysis, Digital Forensics
  • Networking & IT: VPNs, Intune/Autopilot, API Integrations, Windows Administration
  • Applied AI/ML: Automation for threat detection, heuristic-driven search, OSINT workflows, classification, nerual nets

πŸ“‚ Featured Projects

  • πŸ”¬ Malware Analysis & Forensics Lab
    Built controlled environments for reverse engineering, dynamic malware testing, and forensic triage to study trojans, rootkits, and ransomware safely.
  • ⚑ Exploit & Payload Engineering
    Developed custom proof-of-concepts (PoCs) to explore vulnerabilities, memory corruption, and evasion techniques, with a focus on Windows internals and low-level payload design.
  • πŸ“– Security Knowledge Base & Integrations
    Authored documentation and built integrations for ThreatLocker and CloudRadial, helping clients understand endpoint security controls and creating transparent educational resources for MSP environments.
  • 🌐 Full-Stack Security Dashboards (in progress)
    Prototyping dashboards that combine threat intel, forensic data, and OSINT automation into visual tools for investigations.

🌱 Currently Learning

  • Advanced Windows Defender/EDR evasion (AMSI bypass, direct syscalls, ETW tampering)
  • Kernel-mode development for rootkits and bootkits
  • Full-stack web development for security dashboards and visualization
  • Forensic methodologies for detecting stealth malware in modern environments
  • Artificial Intellegence for informed searches and classifying anomalous objects based on features

πŸ§‘β€πŸŽ“ Certifications

  • CompTIA Network+, Security+, CySA+
  • Kent State Master's of Science in Artificial Intelligence
  • Kent State Bachelor's of Technical and Applied Science Focus in Cybersecurity
  • Lakeland Community College Associate of Applied Business in Software Engineering
  • Pursuing Pentest+, TCM Security certifications, and OSCP

🎯 Goals

  • Expand exploit development knowledge into kernel and hypervisor layers
  • Build forensic techniques for investigating rootkits and bootkits
  • Apply technical expertise in cybercrime investigations with a focus on protecting at-risk populations
  • Create automation platforms that integrate with AI and forensic activities

🎲 Fun Facts

  • Fluent in Spanish πŸ‡ͺπŸ‡Έ and ASL 🀟, conversational in French πŸ‡«πŸ‡·
  • Outdoor enthusiast: hiking, camping, and nature exploration
  • Avid follower of science fiction and AI-driven narrativesβ€”curious about how speculative futures intersect with real-world security challenges

🌐 Connect With Me


✨ β€œTechnology should be used to protect the vulnerable, not exploit them.”

Pinned Loading

  1. advanced-database advanced-database Public

    Forked from kentcs/advanced-database

    ADSD Fall 2025

    Python 1