Portfolio

Learning and Demonstrating Advanced Cybersecurity Skills

Explore my certifications, hands-on experience, and projects that illustrate my commitment to protecting digital environments.

Operating System Proficiency & Deployment

I maintain a platform-agnostic environment to ensure seamless transitions between administrative and offensive tasks. My lab infrastructure is built on:

Virtualization: Expert use of VMware and VirtualBox to architect isolated sandboxes and vulnerable “target” environments..

Offensive Linux: Primary use of Kali Linux on dedicated hardware and MSI dual-boot systems for penetration testing and network auditing.

Enterprise Windows: High-performance Windows 11 Pro on Ryzen 9 architecture for GPU-accelerated cracking and large-scale data analysis.

Unix & macOS: M4 MacBook Air and Mac Mini nodes for secure development, documentation, and infrastructure management.

Penetration Testing Expertise

I am currently honing my penetration testing skills through rigorous, hands-on lab environments on platforms like Hack Smarter, Hack the Box, and Try Hack Me. By completing “rooms” that simulate real-world enterprise vulnerabilities, I’ve gained practical experience in initial access, privilege escalation, and lateral movement within Active Directory environments.

Help Desk & IT Support

My journey into cybersecurity is built on a strong technical base. By earning my Google IT Support credentials, I’ve refined my expertise in everything from the “bits and bytes” of computer networking to the fundamentals of technical support. These certifications represent my commitment to understanding how systems work from the ground up before I secure them.

Current Operating Systems

  • CyberPower Ryzen 9 Windows 11 Pro
    High-performance workstation for GPU-accelerated cracking (Hashcat), large .pcap analysis, and heavy virtualization.
  • MSI Stealth A1 Dual-Boot: Win 11 Pro + Kali
    Mobile security rig for on-site forensics, wireless auditing, and field-based penetration testing.
  • M4 Mac Mini (macOS)
    Primary hub for Burp Suite Pro, Nessus vulnerability scanning, Python scripting, and technical reporting.
  • M4 MacBook Air (macOS)
    Lightweight, high-efficiency development, secure documentation, and web infrastructure management.
  • Mac Mini (i3)Debian / Linux
    Rack-mounted server for persistent network monitoring, VLAN management, and automated security scripts.
  • Raspberry Pi 4BRaspberry Pi OS / Kali
    IoT security research, physical drop-box simulation, and localized network sniffing.

Professional Certifications

“Security is not a product, but a process.”Bruce Schneier

Technical Profile & Specialized Hardware

I actively integrate specialized hardware into my security workflows to bridge the gap between digital and physical security:

Hardware Interfacing: Deploying Raspberry Pi nodes for localized network monitoring and utilizing tools like the HackyPi and BLEShark Nano for HID and Bluetooth Low Energy (BLE) security research.

Sub-1GHz & RF Analysis: Utilizing the LILYGO CC1101 and Flipper Zero to intercept, analyze, and emulate radio frequency signals.

Wireless Auditing: Leveraging the BrosTrend AC1200 and DSTIKE Deauther for advanced 802.11 monitoring, packet injection, and WPA2/3 handshake analysis.

Professional Mission & Growth

I am a highly motivated Cybersecurity student at SNHU, driven by an insatiable curiosity for how systems—both wired and wireless—can be hardened against modern threats. My background in IT support, combined with my current focus on Ethical Hacking and Penetration Testing, allows me to view security through both a defensive and offensive lens.
I am eager to contribute to the security community, share my lab findings, and connect with industry professionals to tackle the evolving challenges of the digital landscape. I am currently seeking opportunities to apply my hands-on experience in a professional environment where continuous learning and technical rigor are valued.

“To catch a thief, you must think like one. To stop a hacker, you must be one.”