Resume
[email protected] | (931)-472-9818 | Cookeville, TN
Objective
In a Degree Path Designated for Cyber Defense Education by the National Centers of Academic Excellence in Cybersecurity. I have a deep interest in cyber competitions like CCDC and CPTC and hope to pursue a career in a cyber crime related field.
Education
Tennessee Technological University (NCAE)
Cybercorps SFS Scholar
In a Degree Path Designated for Cyber Defense Education by the National Centers of Academic Excellence in Cybersecurity.
B.S. Computer Science | Cybersecurity
M.S. Computer Science | Cybersecurity • Expected: Fall 2027
Work Experience
- Served as Scrum Master for a 6-person team, coordinating sprints, managing the product backlog, and ensuring timely delivery of a digital music evaluation platform.
- Oversaw the design and implementation of security features, including Azure AD authentication, RBAC via SharePoint Groups, and strict Least-Privilege Enforcement.
- Successfully developed the platform entirely within the university's Microsoft 365 licensing (SharePoint, Power Automate, Teams), eliminating the need for third-party platforms.
- Directed the design of a NoSQL/List-based data model and managed core Power Automate workflows for automated data routing.
- Contributed to the development of Infrastructure as Code (IaC) solutions using Python, OpenTofu, and HashiCorp CDK.
- Automated the deployment and management of the CEROC Cyber Range on Canonical MicroCloud hypervisor.
- Troubleshot infrastructure problems and enhanced overall system functionality in collaboration with the Cyber Range Engineer.
- Conducting research in "Zero Trust" security for satellites built off the blockchain model.
- Developing encrypted verification methods to ensure trusted communication between satellites and ground stations.
- Designing a system incorporating load balancing and low power limitations.
- Building a physical testbed simulating a satellite constellation using Jetson Orin devices and Raspberry Pis to model network interactions.
Competition & Leadership Experience
- Designed and deployed custom automation scripts in Go and Bash to enforce security policy and audit user accounts across multiple Linux machines.
- Established proactive threat hunting and forensic capabilities to detect advanced Red Team persistence (covert beacons, kernel hooks, user-space rootkits).
- Engineered dynamic, isolated testing environments to validate hardening scripts and incident response procedures.
- Secured critical Linux services by implementing secure configurations, host-based firewalls, and file integrity monitoring.
- Conducted comprehensive web application penetration tests on multi-tiered live environments utilizing OWASP Top 10 methodology.
- Developed a holistic attack narrative by correlating web vulnerabilities with network-level findings to demonstrate full chain compromises.
- Authored professional-grade penetration test reports using Ghostwriter, detailing findings, business impact, and remediation strategies.
- Engineered and deployed the Official Club Website (cybereagles.org) using free hosting for resource efficiency.
- Coordinated and hosted regular club meetings with guest speakers from leading tech companies and government agencies.
- Managed administrative operations, budgets, and outreach initiatives to increase club visibility and membership.
- Secured web applications and databases by hardening configurations and managing access controls.
- Hunted and neutralized real-time Red Team attacks by analyzing network traffic and investigating logs.
- Administered Linux systems and pfSense firewalls, performing OS hardening and security automation with Bash scripts.
- Architected and deployed a 16+ machine training environment simulating attack scenarios.
- Developed and led technical training sessions on complex topics (digital forensics, privilege escalation, rootkits).
- Designed and delivered educational content and practical labs for diverse audiences.
- Utilized LXD cyber range with SaltStack to create secure, repeatable training environments.
Projects
Cyber Truck Challenge 2025
Performed specialized security assessments targeting vehicle communication systems and embedded hardware. Analyzed CAN Bus/internal protocols and utilized deep analysis techniques to exploit vulnerabilities in a simulated automotive environment.
Home Lab Cluster
Managed high-performance virtualization using dual Proxmox hypervisors (50 CPU cores, 200GB RAM). Established secure, isolated ranges for malware analysis and C2 testing. Automate lab functionality with Wake-on-LAN via Raspberry Pi.
Personal Website (nightwalker.cv)
Established and maintained a permanent static website utilizing free hosting solutions. Configured custom domain to centralize professional content, GitHub repositories, and academic projects.