About Me
I am an aspiring information technology analyst and cybersecurity consultant passionate about leveraging networking fundamentals, operating systems knowledge, cloud platforms, and vulnerability assessment to solve the problem of vulnerable digital infrastucture in critical environments and ensure businesses are able to operate with little-to-no room for malicious actors to compromise.
My decision to pursue this field of work came from a love for technology and an ever-growing realization of how easy it is for us to grow complacent and create holes in what should be a nigh-impenetrable wall. That realization only deepened as I progressed through my academic journey. As the youngest graduate in the history of the University of the Virgin Islands, I earned my Associate’s and Bachelor’s degrees in Computer Science with a concentration in cybersecurity. Through hands-on implementation and research with technologies like Windows Sandbox, Hyper-V, ESP32 devices, and self-hosted services over private VPNs, I’ve built a deep understanding of secure architecture and threat mitigation in both enterprise and embedded environments.
In my senior research, I designed and executed experiments comparing Windows Sandbox and traditional virtual machines to evaluate their effectiveness in detecting and containing malware. This included setting up isolated environments, capturing system and network logs, and testing forensic techniques to understand how anti-forensics methods could disrupt investigations. My findings contributed to a growing body of knowledge on the practical limits of virtualization in real-world security applications.
Outside of formal research, I’ve also explored self-hosting workflows with Syncthing, Git, and Tailscale to maintain private, redundant infrastructure—an extension of my belief in empowering users to retain control over their data.
My long-term goal is to help organizations – from small businesses to critical infrastructure operators – develop and maintain secure digital ecosystems that adapt to evolving threats without sacrificing usability or performance.