Resume


Objective

Aspiring cybersecurity professional and junior Computer Science student at Stevens Institute of Technology with strong technical skills in cybersecurity, network security, and programming. A self-directed learner with proven success in independently mastering complex concepts and a diligent work ethic. Seeking an internship to tackle challenging cybersecurity problems and contribute innovative solutions, possessing skills with:

  • Languages including Python, Bash, and C.
  • Technologies including Linux, Nmap, and Wireshark.
  • Security toolkits such as Kali Linux, Metasploit, and Burp Suite.

Education

Stevens Institute of Technology – B.S. Computer Science, 3.95 GPA Expected Dec 2025


Certifications

  • CompTIA Network+, Security+
  • AWS Certified Solutions Architect – Associate

Work Experience

Stevens Institute of Technology, Hoboken, NJ | Sep 2024 – Present

Course Assistant – Computer Architecture & Systems Programming

  • Assisted professor in course material preparation, grading assignments, and facilitating lab sessions on topics including ARM assembly, C programming, debugging, Linux.
  • Held weekly office hours open to 200+ students to resolve complex coding issues and enhance their understanding of architectural concepts.

PSEG, Newark, NJ | Jun 2024 – Present

IT Intern – Operational Technology Security

  • Automated 30% of the biannual firewall rule analysis process using Python, identifying 6K+ unused rules and reducing review time by 20%.
  • Identified and mitigated bandwidth issues by analyzing 10 GB+ of firewall logs, enhancing network efficiency for critical operations.
  • Enhanced network monitoring capabilities by identifying 200+ devices not forwarding logs and collaborated with operations teams to configure log forwarding on these devices.
  • Conducted research and shadowed senior team members in vulnerability scanning, gaining hands-on experience in identifying and mitigating security risks using Nessus Pro.

Projects

AWS Honeypot & ELK Lab with Terraform (Link) | Feb 2025 – Feb 2025

  • Deployed the ELK Stack on AWS to aggregate and analyze security event logs.
  • Implemented a Cowrie SSH honeypot to simulate attack scenarios and forward logs to ELK using Filebeat and Logstash.
  • Automated infrastructure provisioning using Terraform, creating VPCs, subnets, security groups, and EC2 instances.

TCM Security Practical Ethical Hacking Course | Jan 2025 – Jan 2025

  • Leveraged Nmap, Kali Linux, Metasploit, and Burp Suite to identify and exploit network and application vulnerabilities, enhancing penetration testing skills.
  • Designed and remediated an Active Directory lab, executing attacks like LLMNR poisoning and Kerberoasting to simulate real-world penetration testing scenarios.
  • Evaluated web applications for OWASP Top 10 vulnerabilities, identifying SQL injection and cross-site scripting flaws.

TryHackMe SOC Level 1 Learning Path (Link) | Dec 2024 – Jan 2025

  • Conducted security monitoring using Splunk and the ELK Stack, analyzing incidents involving suspicious logins and malware activity.
  • Performed detailed network traffic analysis using Wireshark, Snort, and Zeek, identifying anomalies such as unauthorized access attempts and suspicious callback domains.
  • Conducted digital forensic investigations using Autopsy, KAPE, and Volatility to retrieve deleted files and analyze malware behavior in compromised systems.