Objective
Aspiring cybersecurity professional and junior Computer Science student at Stevens Institute of Technology with strong technical skills in cybersecurity, network security, and programming. A self-directed learner with proven success in independently mastering complex concepts and a diligent work ethic. Seeking an internship to tackle challenging cybersecurity problems and contribute innovative solutions, possessing skills with:
- Languages including Python, Bash, and C.
- Technologies including Linux, Nmap, and Wireshark.
- Security toolkits such as Kali Linux, Metasploit, and Burp Suite.
Education
Stevens Institute of Technology – B.S. Computer Science, 3.95 GPA Expected Dec 2025
Certifications
- CompTIA Network+, Security+
- AWS Certified Solutions Architect – Associate
Work Experience
Stevens Institute of Technology, Hoboken, NJ | Sep 2024 – Present
Course Assistant – Computer Architecture & Systems Programming
- Assisted professor in course material preparation, grading assignments, and facilitating lab sessions on topics including ARM assembly, C programming, debugging, Linux.
- Held weekly office hours open to 200+ students to resolve complex coding issues and enhance their understanding of architectural concepts.
PSEG, Newark, NJ | Jun 2024 – Present
IT Intern – Operational Technology Security
- Automated 30% of the biannual firewall rule analysis process using Python, identifying 6K+ unused rules and reducing review time by 20%.
- Identified and mitigated bandwidth issues by analyzing 10 GB+ of firewall logs, enhancing network efficiency for critical operations.
- Enhanced network monitoring capabilities by identifying 200+ devices not forwarding logs and collaborated with operations teams to configure log forwarding on these devices.
- Conducted research and shadowed senior team members in vulnerability scanning, gaining hands-on experience in identifying and mitigating security risks using Nessus Pro.
Projects
AWS Honeypot & ELK Lab with Terraform (Link) | Feb 2025 – Feb 2025
- Deployed the ELK Stack on AWS to aggregate and analyze security event logs.
- Implemented a Cowrie SSH honeypot to simulate attack scenarios and forward logs to ELK using Filebeat and Logstash.
- Automated infrastructure provisioning using Terraform, creating VPCs, subnets, security groups, and EC2 instances.
TCM Security Practical Ethical Hacking Course | Jan 2025 – Jan 2025
- Leveraged Nmap, Kali Linux, Metasploit, and Burp Suite to identify and exploit network and application vulnerabilities, enhancing penetration testing skills.
- Designed and remediated an Active Directory lab, executing attacks like LLMNR poisoning and Kerberoasting to simulate real-world penetration testing scenarios.
- Evaluated web applications for OWASP Top 10 vulnerabilities, identifying SQL injection and cross-site scripting flaws.
TryHackMe SOC Level 1 Learning Path (Link) | Dec 2024 – Jan 2025
- Conducted security monitoring using Splunk and the ELK Stack, analyzing incidents involving suspicious logins and malware activity.
- Performed detailed network traffic analysis using Wireshark, Snort, and Zeek, identifying anomalies such as unauthorized access attempts and suspicious callback domains.
- Conducted digital forensic investigations using Autopsy, KAPE, and Volatility to retrieve deleted files and analyze malware behavior in compromised systems.