About Me

As a Coast Guard veteran and cybersecurity graduate student, I blend mission-critical communications experience with a passion for secure software. I served as a communications lead aboard USCGC DALLAS, managed patrol boat operations at Sector San Juan, and supervised message traffic at District 17’s command center. Today, I build tools to detect threats, reverse engineer malware, and automate incident response while studying for my M.S. in Cybersecurity.

Coast Guard Service & Award

USCGC DALLAS: Communications lead and EKMS manager; coordinated port visits to more than 15 countries and supported missions such as Operation Noble Delivery, Operation Monkey Wrench II and multiple humanitarian deployments across Central America.

Sector San Juan: Served as base officer of the day and assistant patrol boat manager; supervised the communications watch and coordinated crew rest and logistics for cutter crews.

District 17 Communications Center: Watch supervisor for seven watchstanders; processed over 1600 messages per week, implemented training and cross qualification, and ensured continuity for high latitude operations.

Awards & Medals: Meritorious Team Commendation (with gold star), Meritorious Unit Commendation, Presidential Unit Citation, Commandant’s Letter of Commendation, Coast Guard “E” Ribbon, Achievement Medal, Good Conduct Medal with star, Sea Service and Special Operations ribbons, Rifle and Pistol Marksmanship ribbons, Humanitarian Service Medal, Global War on Terrorism Expeditionary and Service Medals, and a Navy Meritorious Unit Commendation. These honors recognize cohesive teamwork, valorous unit service, and sustained excellence in support of national security and humanitarian missions.

Cybersecurity Projects & Tools

Honeypots & Threat Intelligence: HONEYBOMBCERBERUS, Corie_Death_Pot, log2pcap, Tor2PcapScript and cowrie honeypot analysis.

Security Tools & Scripts: MultiThreatScanner, Offline NIST CVSS calculators, Multi‑threat detection utilities, Python EC2 automation scripts, HttpServerTLS and various network utilities.

Research & Study: The HackBook, Security Notebooks and research repos, Cybersecurity Beginner Bible, CowrieGPT‑Access and AI/ML explorations.

Data Structures & Coursework: RedBlack tree implementation, sorting algorithms like Bottom Up Merge Sort, Bloom filter, and assignments from courses such as CPSC318 and AIT512.

Get in Touch

Feel free to reach out! Connect with me on LinkedIn to network and discuss all things cyber, explore my code on GitHub to see what I’m building next, or drop me an email if you’re interested in collaborating or have questions. I’m excited to connect with fellow cybersecurity enthusiasts and collaborators.