Energetic Cybersecurity student at The University of Tampa. Seeking a summer internship to apply technical problem-solving. As a Root@UT Board Member, I help lead technical Hackthebox walkthroughs, complemented by an analytical CTF competitor mindset. As a dedicated Homelabber, I build and secure my home network environment to bridge theory and enterprise practice. Enthusiastic about applying collaborative and technical skills in professional contexts. (Happy to relocate)
EDUCATION & CERTIFICATIONS
Bachelor of Science in Cybersecurity
The University of Tampa
Expected May 2027
CompTIA Security+, Network+ (Expected 2/22/26)
CERTIFIED
Certification ID: COMP001022944222
EXPERIENCE
Identity and Access Management Intern
Cortevo Technologies LLC - Tampa, FL
October 2025 - Present
Administered identity and access management (IAM) services for clients, including account provisioning, permissions maintenance, and enforcing security best practices
Configured, managed, and monitored API integrations between student information systems (SIS) and organizational applications to ensure reliable and secure data synchronization
Responded to support tickets and provided technical assistance to charter school clients, troubleshooting application, account, and system issues in a helpdesk environment
Supported internal IT operations by implementing mobile device management (MDM), performing hardware/software updates, and resolving IT issues to improve office technology reliability
Ethical Hacking Club
Root@UT - The University of Tampa
August 2024 - Present
Participated in the National Cyber League (NCL) competition, scoring 1530 while gaining hands-on experience and skills in OSINT, cryptography, log analysis, password cracking, scanning, enumeration and exploitation, network traffic analysis, forensics and web app exploitation
Led hands on Hackthebox Labs taking down retired machines, practicing ethical hacking concepts including reconnaissance with Nmap, and password cracking with Hashcat
Contributed to real-world missing persons investigations through the Trace Labs OSINT Search Party, utilizing advanced digital forensics and open-source intelligence (OSINT) gathering
Led collaborative review sessions for Security+ practice exams, analyzing question patterns and trends to develop effective test-taking strategies and improve collective pass rates
TECHNICAL SKILLS
IAM
Virtual Machines
PowerShell
IT Helpdesk
Linux
Parallels
OSINT
Hackthebox
PowerShell
Capture the Flag
Networking
Command Line
HomeLabbing
Wazuh
CAPTURE THE FLAG COMPETITIONS
A record of CTF competitions and cybersecurity challenges I've participated in.
PAST COMPETITIONS
DOE CyberForce Competition
U.S. Department of Energy
October 2025
Participated in the Department of Energy's annual cybersecurity competition focused on defending critical energy infrastructure. The competition simulated real-world cyber-physical systems and required teams to maintain operational technology while defending against coordinated cyberattacks.
Defended critical infrastructure systems against simulated cyberattacks
Collaborated with team members to identify and remediate security vulnerabilities
Maintained system availability while implementing security hardening measures
Responded to incident scenarios in real-time competitive environment
National Cyber League (NCL)
Cyber Skyline
2025 - Present
Competed in individual and team-based NCL competitions, tackling challenges across multiple cybersecurity domains in both practice and competitive seasons. Scoring 1500pts in the individual game
Solved challenges in OSINT, cryptography, log analysis, and password cracking
Performed scanning, enumeration, and exploitation of vulnerable systems
Conducted network traffic analysis and digital forensics investigations
Identified and exploited web application security vulnerabilities
Gasparilla CTF
HackTheBox
February 2026
Partnered with Root@UT board members to navigate a multi-disciplinary CTF, securing 3rd place through rapid problem-solving and cross-functional collaboration.
Executed Web Application penetration testing techniques to identify vulnerabilities and leveraged OSINT methodologies to gather actionable intelligence from public data sources.
Performed deep-dive Digital Forensics to reconstruct attack timelines and conducted Reverse Engineering of compiled binaries to bypass security checks and extract hidden flags.
Managed real-time communication and task delegation among board members to efficiently tackle high-point challenges under strict time constraints.
UPCOMING COMPETITIONS
NCAE Cyber Games
National Centers of Academic Excellence in Cybersecurity
February, 2025
Preparing to compete in the NCAE Cyber Games, a national competition featuring challenges across multiple cybersecurity domains including network defense, digital forensics, and offensive security operations.
Training in advanced penetration testing techniques
Practicing incident response and threat hunting scenarios
Developing skills in forensic analysis and malware reverse engineering
Collaborating with Root@UT team members on competition preparation
Trace Labs OSINT CTF
Trace Labs
Upcoming
Preparing to participate in Trace Labs OSINT Search Party CTF, a crowd-sourced OSINT competition that assists law enforcement with real missing persons cases. Teams compete to gather actionable intelligence on active cases using open-source intelligence techniques.
Developing advanced OSINT techniques for real-world missing persons investigations
Training in social media analysis, geolocation, and digital footprint tracking
Learning ethical OSINT practices and proper evidence documentation
Contributing to meaningful humanitarian efforts through competitive intelligence gathering
> ROOT@UT ETHICAL HACKING CLUB
Active board member of The University of Tampa's ethical hacking club, regularly participating in various Capture the Flag challenges and cybersecurity training exercises to develop practical offensive and defensive security skills.