Aaron Sierra

Computer Scientist with Cybersecurity Concentration

Who Am I?

I have the experience and technical foundation of a computer scientist, which means I'm not just comfortable with coding, but I also enjoy digging into complex systems and understanding how they work. Computer Science is great, but my true passion is cybersecurity. I’ve explored many different areas within the field, but lately, I’ve been diving deeper into offensive security. I love learning and constantly expanding my skills to stay on top of the latest in cybersecurity.

Professional Headshot

Education

Baylor University

Bachelor of Science in Computer Science Concentration in Cybersecurity

Graduation: May 2025

Courses Taken:

Computer Systems (x86 course), Data Structures, Software Eng II, Intro Algorithms, Database Design, Data Communications (Networking), Intro Cyber, Operating Systems, Foundations of Computing.

Calc II, Linear Algebra, Cryptology, Statistics

Contact Info

Email: aaron_sierra1@baylor.edu

Email 2: aaronsierra2nd@gmail.com

Phone: 806-922-3947

www.linkedin.com/in/aaronsierra1/

www.github.com/ElTragedy/

TryHackMe: https://tryhackme.com/p/aaronsierra

Your Image Badge

HackTheBox: https://app.hackthebox.com/profile/817994

Skills/Experience working with

Certifications: CompTIA Security+

Resume

Resume (updated: 1-14-2025)

Resume

Leadership Experience

Project Manager for Group Project - Baylor Software Engineering II

Project Manager for Team Sandilya - General Motors Software Engineer Project

Cyber@Baylor Club Founding Officer (Treasurer)

Red Teaming Mentor Cyber@Baylor Club

Red Team Captain for CCDC

Former Vice President of OSO Esports

Former Team Captain for Overwatch 2 Team OSO Esports

Work Experience

Undergraduate Cybersecurity Research Assistant

Baylor University - August 2024-Current

Researching initiatives aimed at developing educational labs to teach cybersecurity principles. Organized, executed, and supported cybersecurity student competition, Cybersecurity Interdisciplinary Incident Response Competition (CIIRC). Performed penetration testing on competition networks after establishing Rules of Engagement (ROE). Created post-mortem reports to analyze findings for improvement of future competition frameworks. Current project consists of collaborating with Head of CS Dept to research AI/ML applications in offensive cybersecurity strategies for upcoming implementation in curriculum strategies and am excited to expand my experience in this emerging area.

Skills and Technologies Learned:

AI/ML WEKA Sklearn KNN Terraform

Digital Information Technology Intern

General Motors - May 2024-August 2024

Developed distinct applications crucial to the operations of the Operating Systems Engineers (OSE) team. These applications were designed to track, schedule, or analyze and were compatible with multiple operating systems, including Linux, Windows, macOS, Android, and iOS. Applied various software engineering principles such as General Responsibility Assignment Software Patterns (GRASP) and Keep It Simple, Stupid (KISS).

Skills and Technologies Learned:

C# .NET MAUI Agile HashiVault Microsoft Graph API Insomnia

Security Operations Center (SOC) Intern

Baylor University - August 2023-May 2024

Used Splunk for security information and event management (SIEM) . Worked extensively with Intrusion Detection Systems (IDS), including Host-based Intrusion Detection Systems (HIDS) and Network-based Intrusion Detection Systems (NIDS). Performed real-time threat monitoring, log analysis, and incident response, providing a strong foundation in cybersecurity operations and defense strategies.

Skills and Technologies Learned:

Splunk Python Incident investigation

Information Security Analyst Intern

General Motors - May 2023-August 2023

Gained hands-on industry experience on the Cyber Detect team analyzing security logs and evaluating the severity of alerts. Monitored and secured cloud environments utilizing Microsoft Sentinel and 365 Defender. To streamline the process of identifying potential threats for the team, I employed Jupyter Notebooks to automate security log analysis and aggregate detected data.

Skills and Technologies Learned:

KQL Microsoft Azure Sentinel 365 Defender for Cloud Azure Cloud Jupyter Notebook Microsoft Entitiy Management Incident Automation

Student Network Technician

Baylor University - August 2022 to May 2023

Managed and supported Baylor’s network infrastructure by building and testing Ethernet cables using RJ45 connectors, repairing network jacks, and frequently activating data ports to ensure reliable connectivity across the entire campus. Performed regular maintenance and troubleshooting for Intermediate Distribution Frames (IDFs) and Main Distribution Frames (MDFs), ensuring optimal network performance resulting in minimal downtime.

Skills and Technologies Learned:

RJ45 Data ports MDF & IDF

Cybersecurity Student Worker

Baylor University - January 2022 to August 2022

Created and maintained virtual environments for Baylor's Collegiate Cyber Defense Competition (CCDC) team. Managed and maintained a Proxmox cluster hosted on a server in a graduate laboratory, where I had hands- on access to configure and optimize resources. Designed complex, interdependent service environments to simulate real-world networks, such as setting up an Apache web server that relied on a MariaDB backend, or deploying Active Directory domains integrated with both Windows and Linux clients using RealmD. Created comprehensive documentation for Proxmox deployments to support the team’s understanding and use of the platform.

Skills and Technologies Learned:

DNS (Bind9 & Power DNS) Bash Powershell Active Directory and Forests Group Policy Databases (MariaDB & MySQL & MongoDB) Webservers (Apache Tomcat & nginx) Mail (POP3 & IMAP) Proxmox server management

Competition + Extracurricular Experience

Southwest Collegiate Cyber Defense Competition CCDC

2x Regional Qualifier - August 2022-Current

www.southwestccdc.com

The Collegiate Cyber Defense Competition (CCDC) is a high-intensity incident response competition designed to provide students with a realistic experience in managing and defending a simulated corporate network infrastructure. Participants are tasked with identifying, responding to, and mitigating a variety of cybersecurity incidents while maintaining critical business operations. Teams must secure services, handle complex scenarios, and demonstrate effective teamwork and technical skills under pressure.

During my first year competing in CCDC, I was responsible for creating the network diagram and mapping out our environment. To achieve this, I developed custom nmap scripts to scan and map out the entire subnet. Once I identified the machines on our network, I conducted comprehensive port scans on all devices to determine which ports were open and potentially vulnerable. Following this, I created a preliminary attack surface report to outline potential threats and focus our defense strategy.

In my second year, I continued with similar responsibilities, but also took on the specialized role of our team’s LDAP expert. I managed all user modifications, onboarding, and offboarding processes, as well as implementing mass password resets and enforcing password policy changes on an OpenLDAP server. This expanded role allowed me to deepen my understanding of directory services and user management, while continuing to refine my skills in network mapping and incident response.

This year (Senior Year) I will be taking on the role of the Active Directory Expert. I will be our expert on any onboarding, offboarding, and gpos that could come our way.

National Cyber League (NCL)

395th place out of 8000 participants - BiAnnual Competitor for 4 years.

www.nationalcyberleague.org

The National Cyber League (NCL) is a cybersecurity competition that helps students and professionals build and showcase their skills through hands-on challenges. Participants engage in scenarios such as cryptography, network traffic analysis, log analysis, web application security, and more. The competition allows participants to demonstrate their skills in both individual and collaborative formats. NCL is widely recognized in the industry and aligns with the NIST Cybersecurity Framework.

TryHackMe

Top 4%

https://tryhackme.com/p/aaronsierra

TryHackMe is an interactive cybersecurity training platform where I spent a lot of time learning the basics and building a solid foundation in topics like networking, Linux, and web security. After covering the fundamentals, I moved on to the Red Teaming module, where I learned more about offensive security techniques like privilege escalation, moving between systems, and finding vulnerabilities. This gave me hands-on experience in how real-world attacks work and how to think like an attacker.

HiveStorm

4x Competitor

www.hivestorm.org/

Hivestorm is a cybersecurity competition where teams work to secure and defend a network within a set time frame. I participated in this competition to get more experience with real-world defensive strategies. During Hivestorm, we focused on identifying and fixing security misconfigurations, hardening systems, and keeping critical services up and running. It was a great way to practice defending understanding what it takes to keep a network secure.