My Journey

I’m a cybersecurity student at UTSA currently in my junior year. My interest in cybersecurity started at Taft High School, where I completed a cybersecurity endorsement program and competed in CyberPatriot through JROTC.

When I began my associate’s degree at Northwest Vista College, I had to prioritize Business Administration courses to ensure my credits would transfer smoothly. Because of that, I no longer had a dedicated block of time for cybersecurity classes, which pushed me to take initiative and develop my skills independently.

To keep learning, I joined student organizations, attended lectures, and pushed myself through certification bootcamps. Outside of school, I spent time studying networking and cybersecurity through online resources. During this time, Professor Mathew Burch played a major role in inspiring my interest in cloud computing and AWS.

Through this self-driven approach, I earned certifications in CompTIA Tech+, Security+, Network+, AWS Certified Cloud Practitioner, and AWS Certified Solutions Architect – Associate before taking college-level cybersecurity courses.

I also helped build a networking lab through the Networking Club at Northwest Vista, contributing to a resource future students can use for hands-on learning.

After transferring to UTSA, I became involved in research groups through Cyber Jedis. In Cyber Warfare, I study APT groups and contribute to building an incident response playbook. In Threat Hunting and Intelligence, I’ve been learning about TTPs, SIEM operations, and the Incident Response Lifecycle under experienced professionals.

Today, I continue to grow through labs, research groups, certifications, and competitions, including my first CTF at RCC 2026.

Resume Access

My resume includes my skills, research involvement, and current technical focus areas.

Recognition

  • Dean’s List, 2025
  • SAEP Scholarship Recipient

Additional Technical Certificates

  • CISA 210W-08 ICS Cybersecurity Consequences (FY21)
  • IBM Cybersecurity Architecture
  • IBM Penetration Testing, Threat Hunting, and Cryptography
  • IBM Incident Response and Digital Forensics
  • IBM Database Essentials and Vulnerabilities
Cybersecurity projects banner

Currently Building

This section is still being developed, but it will soon include project summaries, screenshots, documentation, and technical writeups that reflect my hands-on work in cybersecurity, networking, automation, and cloud security.

What To Expect

  • Project overviews and key objectives
  • Progress updates and screenshots
  • Technical documentation and writeups
  • Tools, skills, and lab environments used

Planned Projects

MITRE CALDERA Lab

Planned

Adversary emulation lab focused on researching and testing attacker techniques.

Automated Active Defense System

Planned

A mini IDS/IPS-style project using Bash and Python for sensing, enforcing, intelligence gathering, and alerting, documented as a detection-as-code project.

Automated Evidence Triage Tool

Planned

A live response project using Bash and Python to collect volatile evidence before it is lost and analyze it through scripted triage workflows.

AWS Three-Tier Architecture Lab

Planned

Ephemeral AWS deployment designed to demonstrate secure cloud architecture, segmentation, and hardening.