Penn State student specializing in Security Operations and Cloud Security, focused on building secure, resilient systems and defending organizations’ environments against modern threats.
Website is powered on AWS via Infrastructure-as-Code!
Personal background and professional philosophy
I'm a Penn State student passionate about securing organizations’ infrastructure and defending against sophisticated cyber threats. My journey into tech began with a low-end laptop I pushed to its limits just to play games, a simple challenge that sparked a fascination with how systems work. That curiosity evolved into becoming a Computer Technician in high school, where I developed practical experience in troubleshooting, system optimization, and helping people feel confident in their technology.
This foundation led to my deep dive into cybersecurity and cloud computing. Today, what motivates me is building secure, reliable, and resilient systems, and ensuring organizations can operate safely in an environment where threats are constantly evolving.
To defend modern environments by designing secure architectures, reducing attack surfaces, and implementing proactive security measures that help organizations stay ahead of emerging threats.
I improve security posture across cloud and on-prem environments by implementing secure-by-design architectures, conducting threat-driven assessments, automating defensive controls, and deploying reliable infrastructure that supports enterprise-scale operations.
Beyond building systems, I’m committed to continuous security learning, staying ahead of threat trends, studying attacker behavior, strengthening defense strategies, and adopting modern practices. I also seek to explore how to integrate security deeper into workflows to create environments that are both agile and resilient.
Specialized expertise areas
Threat hunting, incident response, vulnerability management, Threat Modeling, Threat intelligence
95% Expertise
Security policies, mapping controls to frameworks, risk assessments, and ensuring compliance requirements
90% Expertise
Designing and managing secure, scalable infrastructure across AWS and Azure
85% Expertise
Least-privilege access, authentication/authorization, IAM policies and roles, and designing identity governance
80% Expertise
Technical proficiencies and tools
Filter by category to explore (More projects coming soon!)