About

About

Current Role

  • Security Operations Center Analyst

Academia

  • University of South Florida (USF) Bachelors of Science in Cybersecurity
    • Intelligence Studies Minor
  • University of South Florida (USF) Masters of Science in Cybersecurity (Expected: December 2026)

Certifications

Competitions

  • [2025][1st] Social Engineering Competition hosted by Temple University
    • 40 teams leveraged common social engineering tactics such as vishing, phishing, and pretext creation to evaluate the security of a mock organization.
  • [2025][1st] BSides Tampa HackTheBox CTF
    • 7 Hour CTF Competition comprising challenges across AI, ICS, Pwn, Fullpwn, Web, and Reversing. Team members included Nevin Southammavong, Fagan Afandiyev, Grant Stevens (Self), Miles Stevens, and Alex Sanders.
  • [2025][3rd] Southeast Collegiate Cyber Defense Competition (SECCDC)
    • Most valuable teammate award
    • Collegiate defense competition where students defend a simulated corporate network infrastructure against simulated cyberattack
  • [2025] SouthEast Collegiate Cyber Defense Competition Qualifiers
    • Advanced to regionals
  • [2025][3rd] NCAE Cybergames
  • [2024][Top 5%] HiveStorm 2024
    • Collegiate blue team competition where teams compete to secure virtual machines by removing malware, correcting misconfigurations, and mitigating vulnerabilities
  • [2024][2nd] Naval Surface Warfare Center Dahlgren Division National CRAM Challenge
    • Holistic Exploit Risk Discovery (HERD) Tool
    • Where teams develop algorithms to measure a system’s Cyber Defensive Capabilities against full spectrum threats and calculate the probability of failure against threat profiles.

Extracurricular Activities

  • USF CyberHerd Colligate Cybersecurity Competition Team
    • Red team member
  • WhiteHatters Computer Security Club (WCSC) at USF
    • Head of Operations, Red Team Teacher (Current Role), Treasurer, CTF Architect, Member
  • ReliaQuest Cybersecurity Labs Program
  • Rapid7 Cyber Threat Intelligence Research Lab Participant
    • Participated in a non conventional investigation of a compromised environment from the perspective of a Security Analyst. Raw logs were used to break down and investigate a complete Kill Chain within a mock Active Directory enterprise.