Competencies


This page showcases technologies and tools that I am experienced with. Many of these tools I use on a daily basis. You can see my public projects on my github.

Digital Forensics and Incident Response (DFIR)
  • Wazuh

    Experience: 2 years

    Wazuh is a tool that I use every day personally and professionally. I have also used Wazuh in the Rocky Mountain Collegiate Cyber Defense Competition (RMCCDC) as an Intrusion Detection System (IDS).

  • Suricata

    Experience: several months

    As mentioned above, I use Wazuh quite a lot. However, Wazuh is good at gathering logs but struggles at detecting threats. This is where Suricata shines. I am currently learning Suricata and implementing it into my personal and work networks in order to better detect threats.

  • Magnet Forensics Suite

    Experience: several months

    While working at the Department of Justice, I use several Magnet Forensics tools to forensically analyze server images, malware Indicators of Compromise (IOCs), and other artifacts. I have also used some Magnet tools in the Forensics class taught at Southern Utah University.

  • Volatility Framework

    Experience: several months

    Volatility is another tool I used while working at the Department of Justice to analyze server memory. I also used Volatility in the Hack The Box Intermountain CTF 2024 competition hosted at Brigham Young University, in which our team got third place.

  • Ghidra

    Experience: several months

    I have experience with several debuggers and decompilers such as Ninja, Cutter, and GNU Debugger (GDB), but Ghidra is my favorite. I have used it several times in Capture The Flag (CTF) competitions and to analyze malware executables at the Department of Justice.

  • Autopsy

    Experience: several months

    While working at the Department of Justice, I use Autopsy to forensically analyze server images and other artifacts. I have also used Autopsy in the Forensics class taught at Southern Utah University and during several Capture The Flag (CTF) competitions.

  • Sysinternals Suite

    Experience: 6 months

    The Sysinternals suite is by far the most powerful and useful suite of Windows tools I have found. I use it quite a lot while working for the Department of Justice for Malware analysis on Windows machines.

Offensive Security
  • Kali Linux

    Experience: 5 years sporadically

    Kali Linux is a tool I use almost on a daily basis. I use it for Hack The Box competitions, Capture The Flag (CTF) competitions, researching vulnerabilities in development systems, and as a hobby.

  • Metasploit

    Experience: 5 years sporadically

    Although I don't use Metasploit professionally, I have used it in Capture The Flag (CTF) competitions, Hack The Box scenarios, and in an offensive security class taught at Southern Utah University.

  • Nmap

    Experience: 5 years

    Nmap is another tool I use almost every day. I have used nmap for offensive reconaissance as well as for testing developmental applications. All in all, I am very familiar and comfortable with nmap.

  • Burp Suite

    Experience: 5 years sporadically

    Burp Suite is one of my most essential tools for web exploitation and reconaissance. Over the years I have used it in the Hack The Box platform, several Capture The Flag (CTF) competitions, and even to fuzz developmental web apps to find potential vulnerabilities.

  • Bloodhound

    Experience: several months

    Over the short amount of time I have spent using Bloodhound, I have installed and configured the docker application and scanned several Acitve Directory (AD) networks. Each scan has given vital insight into how the AD network is setup and what possible attacks and exploits could be mitigated.

  • Hashcat

    Experience: 5 years sporadically

    Hashcat is a useful tool for cracking passwords. I have used it for Capture The Flag (CTF) competitions, Hack The Box competitions, and for experimentation with password strength.

  • OpenVAS

    Experience: 1 year

    I use OpenVAS as a vulnerability assessment tool for my current job at AIVector, LLC., scanning around 200 machines each month. I personally installed, configured, and maintain the company's OpenVAS server.

  • Other

    Offensive security often uses very specialized tools. Therefore, I am competent with many more tools than this list can hold but I only use periodicaly. Some of these include EvilWinrm, Netexec, Wireshark, John the Ripper, Wfuzz, PeassNG, sqlmap, impacket, steghide, enum4linux, hydra, aircrack-ng, crackmapexec, and more.

System Administration
  • Amazon Web Services (AWS)

    Experience: several months

    I have setup and administered several EC2 instances and an S3 bucket while working for AIVector, LLC.

  • Kubernetes

    Experience: 6 months

    I created and now manage a Highly Available (HA) Kubernetes cluster with six nodes. This Kubernetes cluster will soon host all of AIVector, LLC.'s web applications.

  • ESXi/vSphere

    Experience: 1.5 years

    Currently, I manage about 200 virtual machines running off of ESXi and use vSphere as an ESXi manager at AIVector, LLC.

  • Linux

    Experience: 5 years

    From Rocky Linux to Raspberry Pi OS, I have worked with Linux professionally for around five years now, and am very familiar with command line interfaces (CLI). Of the 200 machines I now manage, around 125 of those machines are running a flavor of Linux OS. I currently use Debian 12 as my daily workstation.

  • Ansible

    Experience: 1.5 years

    Ansible is a very powerful tool that I use at work for AIVector, LLC. and on my home network. I'm familiar with the ansible vault, creating playbooks, managing the hosts file, and running scripts.

  • Pacemaker and Corosync

    Experience: several months

    Setting up and managing a High Availability (HA) cluster is no small feat. I have done tis with two different clusters. These were a Kubernetes cluster (mentioned earlier), and a MySQL Galera Cluster both for AIVector, LLC.

  • Apache Web Server

    Experience: 2 years

    Of all web hosting software I have experienced, I like apache the most. I have used apache to help build, host, and administer about 20 different web applications while working for AIVector, LLC.

  • OpenVPN

    Experience: 5 years

    I use OpenVPN on a daily basis to connect to AIVector networks. I have also setup an OpenVPN server with FreeRadius to enable Multi-Factor Authentication, which I also connect to almost daily.

Development
  • git

    Experience: 5 years

    Git has been used for almost every software project I have created since High School. Git is a tool I use almost every day and am very familiar with.

  • HTML

    Experience: 5 years sporadically

    My experience ranges from exploiting HTML web applications to building pure HTML and CSS websites to using HTML inside environments such as Node.js.

  • CSS

    Experience: 1 year

    Similarly to HTML, I have a wide range of experience with CSS. This website is my most recent project that uses CSS, specifically utilizing Tailwind CSS.

  • JavaScript

    Experience: 1.5 years

    Most work with JavaScript was during my year and a half as a full stack developer at AIVector, LLC. developing dynamic web applications.

  • PHP

    Experience: 1.5 years

    Like JavaScript, I used PHP a lot during my year and a half as a full stack developer at AIVector, LLC. I worked on several projects that used PHP including APIs and web application backends.

  • MySQL,MariaDB, and PostgreSQL

    Experience: 1.5 years

    Many of the web applications that I have worked on use databases on the backend. I am most familiar with MariaDB and MySQL, but I have used PostgreSQL, MongoDB, and MSSQL among others. I have also taken a database design and management class at Southern Utah University.

  • Python

    Experience: 11 years sporadically

    From scripts to data parsers to small games to developing custom exploits, I have experienced a lot that Python has to offer, and Python was the first programming language that I learned.

  • Java

    Experience: 1 year

    Although I don't have any professional experience with Java, programming classes at Southern Utah University are taught with Java. In those classes I learned how to create data structures such as linked lists, trees, and arrays, and I also created several smaller projects designed to teach the fundamentals of Java.

  • C/C++/C#

    Experience: 4 years sporadically

    My C and C++ experience comes from Robotics and microcontrollers. My most recent project using C is an LED cube which can be found on my github. While at AIVector, LLC. I worked on a windows application built with C# for several months. I have also worked on several smaller projects like a space invaders game, binary exploitation, and developing small exploits with C and C++.


Below are the major technologies I used to create this webpage.

Node.js


An open-source, cross-platform JavaScript runtime environment.

Next.js


Next.js enables you to create high-quality web applications with the power of React components.

React


The library for web and native user interfaces.

tailwindcss


A utility-first CSS framework packed with classes that can be composed to build any design, directly into markup.

git


A free and open source distributed version control system designed to handle everything from small to very large projects with speed and efficiency.