About

Who Am I ?

I build and analyze security systems focusing on detection engineering, threat hunting, incident investigation, and automation. I turn behavioral understanding of systems and attacker techniques into practical detection and response solutions. I also design CTF challenges and prototype tools to improve detection coverage and analyst workflows.


Professional Experience

Cybersecurity Researcher — Dakota State University (Present)

  • Develop CTF challenges across crypto, reverse engineering, network defense, web exploitation, and forensics with documentation and walkthroughs.
  • Integrate and test challenges in competition platforms to ensure functionality, balance, and player engagement.

Security Analyst Intern — Black Hills Information Security (BHIS) (Jun '25 - Dec '25)

  • Performed frontline alert triage and investigations across Windows, Linux, and multi-cloud (AWS, Azure, GCP).
  • Investigated endpoint compromise, lateral movement, suspicious PowerShell activity, credential access attempts, persistence mechanisms, and anomalous cloud identity/API behavior using SIEM, SOAR, and EDR.
  • Coordinated documentation and improved response workflows; contributed to playbook standardization and detection-as-code initiatives.
  • Collaborated with detection engineers to design and tune detections across multiple telemetry sources to reduce false positives.

Junior Security Analyst — Dakota State University (Mar '24 - Sep '25)

  • Enhanced scalable logging and detection capabilities by optimizing Elastic Stack integrations for diverse telemetry.
  • Built automated detection mechanisms leveraging threat intelligence and MITRE ATT&CK TTP modeling in SIEM and XDR.
  • Automated Microsoft Sentinel and Defender XDR playbooks using Azure Logic Apps and integrated Teams messaging for multi-alert summarization.
  • Developed a multi-metric scoring system (CVSS, SSVC, EPSS, CKEV) to prioritize vulnerability management strategies.

Education

  • B.S. in Cyber Operations - Dakota State University (Jan '24 - Present)
  • Recipient of the Student Research Initiative (SRI) Award for research titled "Hardware Side-Channel Security of Quantum System Controllers: A Timing Attack Perspective." (Six-month undergraduate research project)

Skills

  • Detection & Response: Elastic Stack, Lima Charlie, Microsoft Defender, Detection-as-Code, proactive threat hunting
  • Automation & Scripting: Python, Bash, PowerShell, Power Automate, Logic Apps, CI/CD
  • Frameworks: MITRE ATT&CK, NIST, CISA
  • Networking & OS: TCP/IP, Linux, Windows, macOS
  • Vulnerability Management: Nessus, CVSS, SSVC, EPSS, CKEV
  • Tools: Nmap, Metasploit, Elastic / Kibana, Limacharlie, Snort, Suricata, Wireshark, Burp Suite, Hashcat, Git

Extracurricular

  • CTF Club leader; competed in NCAE Cyber Game, NSA Codebreaker, IEEE Cars CTF, Hivestorm
  • Built a homelab for automated SIEM and detection engineering workflows (Elastic Stack, Security Onion)