Career
Currently (since August 2022) working as a Security Software Engineer at Microsoft as part of MORSE. When I was in undergrad I completed internships at a variety of companies focusing on cybersecurity, specifically vulnerability research. I have worked at a government lab, small contractors, a medium sized private company, and a West Coast tech giant, leading to a well rounded skillset.
For more details see my resume.
Past
- Vulnerability Research Intern at Microsoft, where I found an arbitrary kernel memory disclosure (CVE-2021-41336) via syscall fuzzing and developed a proof of concept exploit.
- Cybersecurity Engineering Intern at Caesar Creek Software, where I obtained a root shell for a device running a customized Linux-based operating system through initramdisk injection.
- Software Engineering Intern at Garmin, where I planned and implemented software library porting for TLS on embedded devices as part of the Core Technology team.
- Cybersecurity Engineering Intern at Kudu Dynamics, where I developed a program analysis system based on graph theory.
- Computer Science Intern - Wright Scholar at the Air Force Research Lab (AFRL) in the Gaming Research Integration for Learning Lab (GRILL), where I sourced and ingested data for an interactive training exercise model.
Skills
-
Cybersecurity Tools
- Binary: Ghidra (example), GDB, WinDbg, pwntools, AFL, Bochs
- Networking: Wireshark, Nmap, socket libraries, Aircrack-ng
- RF: Inspectrum, GNU Radio, Gqrx
- Other: Binwalk, JtR, Metasploit, forensics software
-
General Computing
- Languages: C, Python
- Environments: Linux, Git, Bash, Windows kernel, embedded ARM
-
Soft Skills
- Leadership
- Communication
- Spanish