π» Operations Engineer @ ThreatSpike Labs π Cybersecurity Researcher | Ethical Hacker | Forensic Analyst | AI Engineer π Focused on Malware Analysis, Penetration Testing, Artificial Intelligence, and Digital Forensics
I specialize in cybersecurity, penetration testing, and exploit research, combining a background in software engineering with a deep focus on both offensive and defensive security. My work centers on understanding and countering malware, rootkits, bootkits, trojans, and spyware through hands-on analysis, controlled experimentation, and research-driven investigation.
I am particularly interested in how artificial intelligence can be applied ethically to cybersecurityβenhancing threat detection, forensic analysis, and investigative workflows. My long-term goal is to bridge cybersecurity, AI, and law enforcement, using technology to combat cybercrime and protect vulnerable communities.
-
Programming & Scripting Python, Java, PowerShell, Bash, C/C++ (exploit development)
-
Cybersecurity & Research Penetration Testing, Malware Analysis, Reverse Engineering, Vulnerability Exploitation, Digital Forensics
-
Systems & Networking Windows Administration, VPNs, Intune/Autopilot, API Integrations, Endpoint Security
-
Applied AI / ML Classification models, neural networks, heuristic-driven search, OSINT automation, anomaly detection
-
π¬ Malware Analysis & Forensics Lab Designed controlled environments for reverse engineering, dynamic malware analysis, and forensic triage, enabling safe study of trojans, rootkits, and ransomware.
-
β‘ Exploit & Payload Engineering Developed custom proof-of-concept exploits to explore memory corruption, Windows internals, and evasion techniques, with an emphasis on low-level payload behavior.
-
π Security Documentation & Integrations Authored technical documentation and built integrations for ThreatLocker and CloudRadial, improving security transparency and client education within MSP environments.
-
π Security & Forensics Dashboards (In Progress) Prototyping dashboards that integrate threat intelligence, forensic artifacts, and OSINT automation into visual investigation tools.
- Advanced Windows Defender / EDR evasion (AMSI bypass, ETW tampering, direct syscalls)
- Kernel-mode development and low-level Windows internals
- Full-stack web development for security tooling and visualization
- Forensic techniques for detecting stealthy malware and persistence mechanisms
- Artificial intelligence for informed search, pattern recognition, and anomaly classification
- CompTIA Network+, Security+, CySA+
- Master of Science in Artificial Intelligence β Kent State University
- Bachelor of Technical and Applied Studies (Cybersecurity) β Kent State University
- Associate of Applied Business in Software Engineering β Lakeland Community College
- Currently pursuing Pentest+, TCM Security certifications, and OSCP
- Advance exploit development into kernel and hypervisor layers
- Develop forensic methodologies for investigating rootkits and bootkits
- Apply technical expertise to cybercrime investigations, with an emphasis on protecting at-risk populations
- Build AI-assisted automation platforms for security and forensic analysis
- Fluent in Spanish πͺπΈ and ASL π€; conversational in French π«π·
- Outdoor enthusiast β hiking, camping, and exploring nature
- Science fiction fan, especially stories exploring AI, intelligence, and speculative futures
β¨ βTechnology should be used to protect the vulnerable, not exploit them.β