RYAN_LE.exe

🐐
_______________ / \ / CYBERSECURITY \ / PROFESSIONAL \ |_____________________| || || || || _||__||_ |________|

RYAN LE

Tampa, FL

SUMMARY

Energetic Cybersecurity student at The University of Tampa. Seeking a summer internship to apply technical problem-solving. As a Root@UT Board Member, I help lead technical Hackthebox walkthroughs, complemented by an analytical CTF competitor mindset. As a dedicated Homelabber, I build and secure my home network environment to bridge theory and enterprise practice. Enthusiastic about applying collaborative and technical skills in professional contexts. (Happy to relocate)

EDUCATION & CERTIFICATIONS

Bachelor of Science in Cybersecurity

The University of Tampa

Expected May 2027

CompTIA Security+, Network+ (Expected 2/22/26)

CERTIFIED

Certification ID: COMP001022944222

EXPERIENCE

Identity and Access Management Intern

Cortevo Technologies LLC - Tampa, FL

October 2025 - Present

  • Administered identity and access management (IAM) services for clients, including account provisioning, permissions maintenance, and enforcing security best practices
  • Configured, managed, and monitored API integrations between student information systems (SIS) and organizational applications to ensure reliable and secure data synchronization
  • Responded to support tickets and provided technical assistance to charter school clients, troubleshooting application, account, and system issues in a helpdesk environment
  • Supported internal IT operations by implementing mobile device management (MDM), performing hardware/software updates, and resolving IT issues to improve office technology reliability

Ethical Hacking Club

Root@UT - The University of Tampa

August 2024 - Present

  • Participated in the National Cyber League (NCL) competition, scoring 1530 while gaining hands-on experience and skills in OSINT, cryptography, log analysis, password cracking, scanning, enumeration and exploitation, network traffic analysis, forensics and web app exploitation
  • Led hands on Hackthebox Labs taking down retired machines, practicing ethical hacking concepts including reconnaissance with Nmap, and password cracking with Hashcat
  • Contributed to real-world missing persons investigations through the Trace Labs OSINT Search Party, utilizing advanced digital forensics and open-source intelligence (OSINT) gathering
  • Led collaborative review sessions for Security+ practice exams, analyzing question patterns and trends to develop effective test-taking strategies and improve collective pass rates

TECHNICAL SKILLS

IAM
Virtual Machines
PowerShell
IT Helpdesk
Linux
Parallels
OSINT
Hackthebox
PowerShell
Capture the Flag
Networking
Command Line
HomeLabbing
Wazuh

© 2025 RYAN LE | CYBERSECURITY PROFESSIONAL

AVAILABLE FOR INTERNSHIPS AND ENTRY-LEVEL POSITIONS | OPEN TO RELOCATION

CAPTURE THE FLAG COMPETITIONS

A record of CTF competitions and cybersecurity challenges I've participated in.

PAST COMPETITIONS

DOE CyberForce Competition

U.S. Department of Energy

October 2025

Participated in the Department of Energy's annual cybersecurity competition focused on defending critical energy infrastructure. The competition simulated real-world cyber-physical systems and required teams to maintain operational technology while defending against coordinated cyberattacks.

  • Defended critical infrastructure systems against simulated cyberattacks
  • Collaborated with team members to identify and remediate security vulnerabilities
  • Maintained system availability while implementing security hardening measures
  • Responded to incident scenarios in real-time competitive environment

National Cyber League (NCL)

Cyber Skyline

2025 - Present

Competed in individual and team-based NCL competitions, tackling challenges across multiple cybersecurity domains in both practice and competitive seasons. Scoring 1500pts in the individual game

  • Solved challenges in OSINT, cryptography, log analysis, and password cracking
  • Performed scanning, enumeration, and exploitation of vulnerable systems
  • Conducted network traffic analysis and digital forensics investigations
  • Identified and exploited web application security vulnerabilities

Gasparilla CTF

HackTheBox

February 2026

Partnered with Root@UT board members to navigate a multi-disciplinary CTF, securing 3rd place through rapid problem-solving and cross-functional collaboration.

  • Executed Web Application penetration testing techniques to identify vulnerabilities and leveraged OSINT methodologies to gather actionable intelligence from public data sources.
  • Performed deep-dive Digital Forensics to reconstruct attack timelines and conducted Reverse Engineering of compiled binaries to bypass security checks and extract hidden flags.
  • Managed real-time communication and task delegation among board members to efficiently tackle high-point challenges under strict time constraints.

UPCOMING COMPETITIONS

NCAE Cyber Games

National Centers of Academic Excellence in Cybersecurity

February, 2025

Preparing to compete in the NCAE Cyber Games, a national competition featuring challenges across multiple cybersecurity domains including network defense, digital forensics, and offensive security operations.

  • Training in advanced penetration testing techniques
  • Practicing incident response and threat hunting scenarios
  • Developing skills in forensic analysis and malware reverse engineering
  • Collaborating with Root@UT team members on competition preparation

Trace Labs OSINT CTF

Trace Labs

Upcoming

Preparing to participate in Trace Labs OSINT Search Party CTF, a crowd-sourced OSINT competition that assists law enforcement with real missing persons cases. Teams compete to gather actionable intelligence on active cases using open-source intelligence techniques.

  • Developing advanced OSINT techniques for real-world missing persons investigations
  • Training in social media analysis, geolocation, and digital footprint tracking
  • Learning ethical OSINT practices and proper evidence documentation
  • Contributing to meaningful humanitarian efforts through competitive intelligence gathering

> ROOT@UT ETHICAL HACKING CLUB

Active board member of The University of Tampa's ethical hacking club, regularly participating in various Capture the Flag challenges and cybersecurity training exercises to develop practical offensive and defensive security skills.