Skip to content
View Jared-Young-26's full-sized avatar

Highlights

  • Pro

Block or report Jared-Young-26

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Jared-Young-26/README.md

πŸ‘‹ Hi, I’m Jared Young

πŸ’» Operations Engineer @ ThreatSpike Labs πŸ” Cybersecurity Researcher | Ethical Hacker | Forensic Analyst | AI Engineer πŸ“š Focused on Malware Analysis, Penetration Testing, Artificial Intelligence, and Digital Forensics


πŸš€ About Me

I specialize in cybersecurity, penetration testing, and exploit research, combining a background in software engineering with a deep focus on both offensive and defensive security. My work centers on understanding and countering malware, rootkits, bootkits, trojans, and spyware through hands-on analysis, controlled experimentation, and research-driven investigation.

I am particularly interested in how artificial intelligence can be applied ethically to cybersecurityβ€”enhancing threat detection, forensic analysis, and investigative workflows. My long-term goal is to bridge cybersecurity, AI, and law enforcement, using technology to combat cybercrime and protect vulnerable communities.


πŸ› οΈ Technical Skills

  • Programming & Scripting Python, Java, PowerShell, Bash, C/C++ (exploit development)

  • Cybersecurity & Research Penetration Testing, Malware Analysis, Reverse Engineering, Vulnerability Exploitation, Digital Forensics

  • Systems & Networking Windows Administration, VPNs, Intune/Autopilot, API Integrations, Endpoint Security

  • Applied AI / ML Classification models, neural networks, heuristic-driven search, OSINT automation, anomaly detection


πŸ“‚ Featured Projects

  • πŸ”¬ Malware Analysis & Forensics Lab Designed controlled environments for reverse engineering, dynamic malware analysis, and forensic triage, enabling safe study of trojans, rootkits, and ransomware.

  • ⚑ Exploit & Payload Engineering Developed custom proof-of-concept exploits to explore memory corruption, Windows internals, and evasion techniques, with an emphasis on low-level payload behavior.

  • πŸ“– Security Documentation & Integrations Authored technical documentation and built integrations for ThreatLocker and CloudRadial, improving security transparency and client education within MSP environments.

  • 🌐 Security & Forensics Dashboards (In Progress) Prototyping dashboards that integrate threat intelligence, forensic artifacts, and OSINT automation into visual investigation tools.


🌱 Current Focus Areas

  • Advanced Windows Defender / EDR evasion (AMSI bypass, ETW tampering, direct syscalls)
  • Kernel-mode development and low-level Windows internals
  • Full-stack web development for security tooling and visualization
  • Forensic techniques for detecting stealthy malware and persistence mechanisms
  • Artificial intelligence for informed search, pattern recognition, and anomaly classification

πŸ§‘β€πŸŽ“ Education & Certifications

  • CompTIA Network+, Security+, CySA+
  • Master of Science in Artificial Intelligence β€” Kent State University
  • Bachelor of Technical and Applied Studies (Cybersecurity) β€” Kent State University
  • Associate of Applied Business in Software Engineering β€” Lakeland Community College
  • Currently pursuing Pentest+, TCM Security certifications, and OSCP

🎯 Goals

  • Advance exploit development into kernel and hypervisor layers
  • Develop forensic methodologies for investigating rootkits and bootkits
  • Apply technical expertise to cybercrime investigations, with an emphasis on protecting at-risk populations
  • Build AI-assisted automation platforms for security and forensic analysis

🎲 Fun Facts

  • Fluent in Spanish πŸ‡ͺπŸ‡Έ and ASL 🀟; conversational in French πŸ‡«πŸ‡·
  • Outdoor enthusiast β€” hiking, camping, and exploring nature
  • Science fiction fan, especially stories exploring AI, intelligence, and speculative futures

🌐 Connect With Me


✨ β€œTechnology should be used to protect the vulnerable, not exploit them.”

Pinned Loading

  1. Kent-State-University Kent-State-University Public

    A consolidated collection of graduate-level coursework and applied projects completed at Kent State University, spanning artificial intelligence, machine learning, data mining, database systems, cy…

    Python