As a passionate Cyber Security student, I thrive as a dedicated team player, demonstrating proven leadership abilities alongside effective communication skills. I am eager to leverage my talents and learning journey to contribute meaningfully within the Cyber Security realm.I’ve been doing everything I can to improve my skills and gain exposure, and have produced and released content(see below). Thank you for reviewing my portfolio
• 4/4 Professional Cumulative GPA
• Entrance Scholarship recipient
• Google Cybersecurity
• Google Technical Support Fundamentals
• Google The Bits and Bytes of Computer Networking
• ISO/IEC 27001 Information Security Management Systems Awareness On-demand Training Course
• Actively working towards completing my Security+ certification
Student Researcher 01/2024 - Present|Oakville,Canada
• Partnered with fellow researchers on a research project titled “Objective Method for Diagnosis of Chronic Pain” in collaboration with Karmy Clinic
• Conducted research on identifying Lying through facial expressions using machine learning.
• Assisted in the creation of a comprehensive dataset aimed at understanding human behavior, specifically focusing on truth-telling and lying.
• Developed a deep learning model trained on this dataset, with the objective of accurately determining whether a subject was lying or telling the truth. This involved extensive work in model architecture design, training, and evaluation.
• Worked in a diverse team of 6 researchers, fostering a collaborative environment to drive the project forward.
• Leveraged C++ and Python to enhance the functionality and performance of the software.
• Conducted comprehensive research on the software and related projects to deepen my understanding of the underlying technology and to identify innovative ideas for enhancing the software.
CTF Developer 03/2024 - Present|Oakville,Canada
• Collaborated in a dynamic team of 6+ members to develop engaging and challenging Capture The Flag (CTF) events.
• Contributed to the design, development, and deployment of CTF challenges, ensuring a balance of difficulty levels to cater to a wide range of participants.
• Worked closely with team members to brainstorm, develop, and refine CTF challenges, fostering a collaborative and innovative work environment.
• Leveraged my technical knowledge and creativity to design unique and engaging CTF challenges that tested a variety of skills and knowledge areas.
• Developed challenges that not only tested participants’ skills but also engaged them on a deeper level, encouraging critical thinking and problem-solving.
• Actively sought feedback from participants and used it to refine and improve future challenges, demonstrating my commitment to continuous learning and improvement.
Coordinator 04/2016 – 08/2022|Toronto,Canada
• Supervised and coordinated contractor schedules; work orders and projects spread throughout multiple properties.
• Managed budget for 3 projects valued at over $10,000 each.
• Worked as leader on team of three project coordinators.
• Knowledge of basic networking concepts (e.g. OSI model, TCP/IP, Wi-Fi)
• Proficiency with Python, C/C++, Linux and SQL
• Strong verbal & written communication, organizational, and interpersonal skills.
• Strong problem-solving skills that allow me to handle even the most stressful of situations
• Excellent customer service skills with the ability to maintain a professional demeanor at all times.
• Installed and configured Nessus Essentials to perform credentialed vulnerability scans against Windows 10 Hosts
• Implemented Vulnerability Management Function on sandbox networks: -Discover, Prioritize, Assess, Report, Remediate, Verify
• Conducted vulnerability assessments with Nessus; remediated vulnerabilities
• Active Directory Administration on Server 2019: Provisioning, Maintaining, and Deprovisioning user accounts
• Implementation and maintenance of Windows DNS and DHCP services
• Developed a Python keylogger that captures all keys typed by the user and writes them to a file
• Created a feature that collects computer information and writes it to a separate file
• Implemented encryption for the keylogger’s output files to ensure data security
• Created a program to decrypt files encrypted by the Python keylogger
• Developed an assembly language program that checks whether a given word entered by the user is a palindrome or not
• Utilized memory addressing and comparison operations to identify palindrome words within the input string
• Employed conditional jumps and looping structures for effective character comparison and traversal
• Utilized iterative processes to analyze and compare characters in the input string for palindrome identification
• The program accurately counted and displayed the number of palindrome words found within the input sentence.
• Utilized FTK Imager, a digital forensics tool, for the investigation.
• Explored the concept of ADS, a feature of NTFS file systems.
• Identified hidden streams attached to files, often used by attackers to conceal malicious activity.
• Uncovered a hidden stream that contained the password to a critical file.
• Demonstrated the ability to use advanced forensics tools and methodologies.
• Developed an assembly program in 8086 architecture to encrypt and decrypt user-input strings based on a specified key value.
• Leverages memory manipulation to read user input, encrypt, and decrypt strings.
• Employs XOR operations with a specific key value to transform characters for encryption and decryption.
• Prints both the encrypted and decrypted versions of the input string for user verification.
• Conducted a detailed analysis of disk images using FTK Imager. Created and embedded files in a disk image, then verified their integrity by comparing hash values upon reopening, demonstrating proficiency in digital forensics and understanding of file integrity checks.
• Analyzed a provided pcap file containing a fragmented network-transferred file.
• Successfully located, extracted, and identified the file, demonstrating strong skills in network forensics and data extraction.
• Conducted a lab exercise where I sent a file through HTTP and captured the packets using Wireshark while downloading the file on another machine.
• Hosted a Python HTTP server and accessed it on a Windows machine to download the file.
• Successfully located and downloaded the file from the captured packets in Wireshark, demonstrating my skills in network packet analysis, HTTP server hosting, and file extraction from network traffic.