Computer Scientist
with Cybersecurity Concentration
Who Am I?
I have the experience and technical foundation of a computer scientist, which
means I'm not just comfortable with coding, but I also enjoy digging into
complex systems and understanding how they work. Computer Science is great, but my true passion is cybersecurity. I’ve explored many different areas within the field, but lately, I’ve been diving deeper into offensive security. I love learning and constantly expanding my skills to stay on top of the latest in cybersecurity.
Education
Baylor University
Bachelor of Science in Computer Science Concentration in Cybersecurity
Graduation: May 2025
Courses Taken:
Computer Systems (x86 course), Data Structures, Software Eng II, Intro
Algorithms, Database Design, Data Communications (Networking), Intro Cyber, Operating Systems,
Foundations of Computing.
Project Manager for Group Project - Baylor Software Engineering II
Project Manager for Team Sandilya - General Motors Software Engineer Project
Cyber@Baylor Club Founding Officer (Treasurer)
Red Teaming Mentor Cyber@Baylor Club
Red Team Captain for CCDC
Former Vice President of OSO Esports
Former Team Captain for Overwatch 2 Team OSO Esports
Work Experience
Undergraduate Cybersecurity Research
Assistant
Baylor University - August 2024-Current
Researching initiatives aimed at developing educational labs to teach cybersecurity principles. Organized,
executed, and supported cybersecurity student competition, Cybersecurity Interdisciplinary Incident Response
Competition (CIIRC). Performed penetration testing on competition networks after establishing Rules of
Engagement (ROE). Created post-mortem reports to analyze findings for improvement of future competition
frameworks. Current project consists of collaborating with Head of CS Dept to research AI/ML applications in
offensive cybersecurity strategies for upcoming implementation in curriculum strategies and am excited to expand my
experience in this emerging area.
Skills and Technologies Learned:
AI/ML
WEKA
Sklearn
KNN
Terraform
Digital Information Technology Intern
General Motors - May 2024-August 2024
Developed distinct applications crucial to the operations of the Operating Systems Engineers (OSE) team.
These applications were designed to track, schedule, or analyze and were compatible with multiple operating
systems, including Linux, Windows, macOS, Android, and iOS. Applied various software engineering principles
such as General Responsibility Assignment Software Patterns (GRASP) and Keep It Simple, Stupid (KISS).
Skills and Technologies Learned:
C#
.NET MAUI
Agile
HashiVault
Microsoft Graph API
Insomnia
Security Operations Center (SOC) Intern
Baylor University - August 2023-May 2024
Used Splunk for security information and event management (SIEM) . Worked extensively with Intrusion
Detection Systems (IDS), including Host-based Intrusion Detection Systems (HIDS) and Network-based
Intrusion Detection Systems (NIDS). Performed real-time threat monitoring, log analysis, and incident
response, providing a strong foundation in cybersecurity operations and defense strategies.
Skills and Technologies Learned:
Splunk
Python
Incident investigation
Information Security Analyst Intern
General Motors - May 2023-August 2023
Gained hands-on industry experience on the Cyber Detect team analyzing security logs and evaluating the
severity of alerts. Monitored and secured cloud environments utilizing Microsoft Sentinel and 365 Defender. To
streamline the process of identifying potential threats for the team, I employed Jupyter Notebooks to automate
security log analysis and aggregate detected data.
Skills and Technologies Learned:
KQL
Microsoft Azure Sentinel
365 Defender for Cloud
Azure Cloud
Jupyter Notebook
Microsoft Entitiy Management
Incident Automation
Student Network Technician
Baylor University - August 2022 to May 2023
Managed and supported Baylor’s network infrastructure by building and testing Ethernet cables using RJ45
connectors, repairing network jacks, and frequently activating data ports to ensure reliable connectivity across
the entire campus. Performed regular maintenance and troubleshooting for Intermediate Distribution Frames
(IDFs) and Main Distribution Frames (MDFs), ensuring optimal network performance resulting in minimal
downtime.
Skills and Technologies Learned:
RJ45
Data ports
MDF & IDF
Cybersecurity Student Worker
Baylor University - January 2022 to August 2022
Created and maintained virtual environments for Baylor's Collegiate Cyber Defense Competition (CCDC) team.
Managed and maintained a Proxmox cluster hosted on a server in a graduate laboratory, where I had hands-
on access to configure and optimize resources. Designed complex, interdependent service environments to
simulate real-world networks, such as setting up an Apache web server that relied on a MariaDB backend, or
deploying Active Directory domains integrated with both Windows and Linux clients using RealmD. Created
comprehensive documentation for Proxmox deployments to support the team’s understanding and use of the
platform.
Skills and Technologies Learned:
DNS (Bind9 & Power DNS)
Bash
Powershell
Active Directory and Forests
Group Policy
Databases (MariaDB & MySQL & MongoDB)
Webservers (Apache Tomcat & nginx)
Mail (POP3 & IMAP)
Proxmox server management
The Collegiate Cyber Defense Competition (CCDC) is a high-intensity incident
response competition designed to provide students with a realistic
experience in managing and defending a simulated corporate network
infrastructure. Participants are tasked with identifying, responding to, and
mitigating a variety of cybersecurity incidents while maintaining critical
business operations. Teams must secure services, handle complex scenarios,
and demonstrate effective teamwork and technical skills under pressure.
During my first year competing in CCDC, I was responsible for creating the
network diagram and mapping out our environment. To achieve this, I developed
custom nmap scripts to scan and map out the entire subnet. Once I identified the
machines on our network, I conducted comprehensive port scans on all devices to
determine which ports were open and potentially vulnerable. Following this, I
created a preliminary attack surface report to outline potential threats and
focus our defense strategy.
In my second year, I continued with similar responsibilities, but also took on
the specialized role of our team’s LDAP expert. I managed all user
modifications, onboarding, and offboarding processes, as well as implementing
mass password resets and enforcing password policy changes on an OpenLDAP
server. This expanded role allowed me to deepen my understanding of directory
services and user management, while continuing to refine my skills in network
mapping and incident response.
This year (Senior Year) I will be taking on the role of the Active Directory
Expert. I will be our expert on any onboarding, offboarding, and gpos that
could come our way.
National Cyber League (NCL)
395th place out of 8000
participants - BiAnnual Competitor for 4 years.
The National Cyber League (NCL) is a cybersecurity competition that helps
students and professionals build and showcase their skills through hands-on
challenges. Participants engage in scenarios such as cryptography, network
traffic analysis, log analysis, web application security, and more. The
competition allows participants to demonstrate their skills in both
individual and collaborative formats. NCL is widely recognized in the
industry and aligns with the NIST Cybersecurity Framework.
TryHackMe is an interactive cybersecurity training platform where I spent a
lot of time learning the basics and building a solid foundation in topics
like networking, Linux, and web security. After covering the fundamentals, I
moved on to the Red Teaming module, where I learned more about offensive
security techniques like privilege escalation, moving between systems, and
finding vulnerabilities. This gave me hands-on experience in how real-world
attacks work and how to think like an attacker.
Hivestorm is a cybersecurity competition where teams work to secure and
defend a network within a set time frame. I participated in this competition
to get more experience with real-world defensive strategies. During
Hivestorm, we focused on identifying and fixing security misconfigurations,
hardening systems, and keeping critical services up and running. It was a
great way to practice defending understanding what it takes to keep a
network secure.