Knowledge, Skills, & Abilities
This is a Paragraph. Click on "Edit Text" or double click on the text box to start editing the content and make sure to add any relevant details or information that you want to share with your visitors.
Education
I hold an Associate of Applied Science (AAS) in Network Administration & Cybersecurity from Lake Superior College, where I graduated with High Honors and a 4.0 GPA in Spring 2022. This program provided me with a strong foundation in networking, systems administration, and cybersecurity, with a focus on defensive security strategies. Additionally, I completed general elective coursework at Bemidji State University from 1997 to 1999, further broadening my academic background.
Lake Superior College
Network Administration & Cybersecurity
Associate of Applied Science (AAS)
Cumulative GPA: 4.0
Graduated Spring 2022 with High Honors
​
​The Network Administration and Cybersecurity degree combines both networking and systems administration fundamentals, with a focus on defensive strategies to securing systems.
Bemidji State University
General Electives
1997-1999
​
​Bemidji State University is a public university in Bemidji, Minnesota. Founded as a preparatory institution for teachers in 1919, it provides higher education to north-central Minnesota. It is part of the Minnesota State Colleges and Universities system.
Training
I hold an Associate of Applied Science (AAS) in Network Administration & Cybersecurity from Lake Superior College, where I graduated with High Honors and a 4.0 GPA in Spring 2022. This program provided me with a strong foundation in networking, systems administration, and cybersecurity, with a focus on defensive security strategies. Additionally, I completed general elective coursework at Bemidji State University from 1997 to 1999, further broadening my academic background.
SANS
FOR578 – Cyber Threat Intelligence
Cyber threat intelligence represents a force multiplier for organizations looking to update their response and detection programs to deal with increasingly sophisticated advanced persistent threats. Malware is an adversary's tool but the real threat is the human one, and cyber threat intelligence focuses on countering those flexible and persistent human threats with empowered and trained human defenders. During a targeted attack, an organization needs a top-notch and cutting-edge threat hunting or incident response team armed with the threat intelligence necessary to understand how adversaries operate and to counter the threat.
FOR578: Cyber Threat Intelligence will train you and your team in the tactical, operational, and strategic level cyber threat intelligence skills and tradecraft required to make security teams better, threat hunting more accurate, incident response more effective, and organizations more aware of the evolving threat landscape.
7 Minute Security
Light Pentest LITE
The Light Pentest LITE course is structured as a 3-day course, with each class session being 3 hours long. This training consists of live (via Zoom), hands-on, instructor-led sessions focused on teaching you how to find, exploit and defend against common Active Directory weaknesses!
You will be given access to a "real" corporate network and a Windows virtual machine that is pre-loaded with all the tools and scripts you need to be successful during the course. We will work through a series of objectives together, with the ultimate goal of "owning" the entire enterprise!
Knowledge & Skills
I have a strong foundation in cybersecurity, networking, and systems administration, with hands-on experience across various enterprise technologies. My expertise includes server administration, virtualization, and network security, along with extensive work in threat intelligence and penetration testing. I am proficient in utilizing security tools for monitoring, threat detection, and incident response. Additionally, I have participated in numerous cybersecurity competitions and hands-on labs, continuously honing my skills in ethical hacking, digital forensics, and security analysis.
Server
Throughout my studies I have used multiple Windows Server 2019 servers to run different projects or to do work in lab environments. In my home lab I run a handful of different server platforms.
Solutions: Microsoft Server 2019, Ubuntu Server 20.04, FreeNAS/TrueNAS.
Networking
I have experience with different networking equipment from home and small business networks to enterprise level configurations. Have used Cisco’s Packet Tracer to explore network setups and solutions.
Solutions: Cisco, Ubiquiti, TP-Link, PFsense, Linksys, Netgear, Sophos.
Virtualization
I have experience with many virtualization solutions including both type-1 and type-2 hypervisors. I have utilized VMware player, Desktop Pro, ESXi, vSphere, and vCenter. I have also used Microsoft Hyper-V to run virtual environments. I utilize Proxmox in my home lab and do some work with Docker containers.
Solutions: VMware, Microsoft Hyper-V, Microsoft Azure, Proxmox, Docker.
Threat Intelligence
There are many sources of threat intelligence and various Threat Intelligence Platforms available for use.
Solutions: Palo Alto Networks, Anomali ThreatStream, Anomali STAX, MISP, OpenCTI.
Threat Intelligence Feeds: Palo Alto WildFire & Unit42, Federal Partners, AlienVault OTX, and Deloitte.
Penetration Testing
Penetration testing, also known as “pen testing” or ethical hacking, describes the intentional launching of simulated cyberattacks that seek out exploitable vulnerabilities in computer systems, networks, websites, and applications.
Solutions: Bloodhound, Mimikatz, Rubeus, ADCollector, SharpShares, CrackMapExec, Inveigh, Neo4j, SharpHound, SharpGPOAbuse, PowerSploit, HashCat, John the Ripper
Tactics, Techniques, & Procedures (TTPs): Network Enumeration, DNS Zone Transfers, Password spraying, Bypass AMSI, Kerberoasting, ASREPRoasting, Unquoted Service Paths, Privilege Escalation, Pass-the-hash attacks, Credential "Traps," Abusing unconstrained delegation.
Lab Environment
Virtual labs allow students to complete laboratory experiments, exploring concepts online. I have used the following labs to build on my education and knowledge around key cybersecurity concepts and skills.
InfoSec Learning: Infosec’s cloud based, scalable, self-assessing virtual platform and labs are ideal for any school, business, or agency wanting to train and/or assess on any cyber or information security skill.
Cengage Labs: Live Virtual Machine Labs is an interactive learning environment in MindTap course activities where you can practice problem-solving skills, in real time, on live IT systems.
OWASP Juice Shop: OWASP Juice Shop is probably the most modern and sophisticated insecure web application! It can be used in security trainings, awareness demos, CTFs and as a guinea pig for security tools. Juice Shop encompasses vulnerabilities from the entire OWASP Top Ten along with many other security flaws found in real-world applications.
OpenDNS Security Ninjas: Security Ninjas is an Application Security Training Program created for our software developers here at OpenDNS. It has helped our developers write more secure code and hence reduced the burden on our security team.
Capture The Flag (CTF)
Participants compete in security-themed challenges for the purpose of obtaining the highest score. Competitors are expected to “capture flags” to increase their score. I have participated in the following CTF challenges to build a solid foundation and to continue developing my skill sets.
National Cyber League: The National Cyber League (NCL) is the most inclusive, performance-based, learning-centered collegiate cybersecurity competition today.
Hack The Box: Hack The Box is a massive, online cybersecurity training platform, allowing individuals, companies, universities and all kinds of organizations around the world to level up their hacking skills.
Hack The Box Academy: Cyber security training with hands-on exercises and labs made by Hack The Box.
Try Hack Me: A free online platform for learning cyber security, using hands-on exercises and labs, all through your browser!
NIST NICE Challenges: The NICE Challenge Project develops real-world cybersecurity challenges within virtualized business environments that bring students the workforce experience before the workforce. Our goal is to provide the most realistic experiences to students, at-scale year-round.
Achievements
I have consistently demonstrated academic excellence, earning a place on the Dean’s List for six consecutive semesters from Fall 2019 to Spring 2022 by maintaining a 4.0 GPA. As an active member of Phi Theta Kappa Honor Society since January 2020, I have been recognized for my academic achievements and commitment to scholarly excellence. Additionally, I have competed in the National Cyber League (NCL), where I achieved strong rankings in both individual and team competitions across multiple seasons, further honing my cybersecurity skills in real-world scenarios.
Dean's List
The Deans’ List represents high academic achievement. Students recognized for the Deans’ List during Fall or Spring semester achieved a grade point average (GPA) greater than or equal to 3.5.
Semester: Fall 2019, Spring 2020, Fall 2020, Spring 2021, Fall 2021, Spring 2022
Pi Theta Kappa
Phi Theta Kappa Honor Society is the international honor society of students attending open-access institutions and seeking associate degrees, bachelor’s degrees, or other college credentials.
Active Member Since: January, 2020
National Cyber League
The National Cyber League (NCL) is the most inclusive, performance-based, learning-centered collegiate cybersecurity competition today!
Fall 2019: National Rank 1,108/4,149
Bronze Bracket Rank 112/2,092
National Team Rank 23/689
Team Gold Rank 23/103
Spring 2020: National Rank 2814/5357
Silver Bracket Rank 1297/1533
National Team Rank 102/925
Team Silver Rank 15/276
Spring 2021: National Rank 1441/4180
Bronze Bracket Rank 166/2093