May 2014 – February 2015
At NREL I worked alongside the cyber security team as a Web Security Specialist helping to strengthen the security of the lab. I conducted vulnerability assessments on internal and external NREL websites, dabbled in database security, helped conduct site-wide phishing exercises and assisted with managing NREL’s web application firewall. I immensely enjoyed being a part of an organization’s cyber security team for the first time (in the past I had done cyber security work for others, but never for my own company). This opportunity gave me deep insight into how an organization is constantly evolving in order to protect itself from unrelenting cyber attacks.
Colorado Springs, Colorado
February 2012 – August 2013
As a Cyber Security Engineer at the MITRE Colorado Springs site, I primarily focused on assessing the vulnerabilities of various government systems. My first year involved a lot of travel to customer sites (mostly to Baltimore, MD … but sometimes to more exciting places like San Francisco!) where I worked alongside a team of other MITRE-ites assessing a particular system. My job was to investigate the web applications while others looked at the databases, firewalls, servers, documentation, etc. It was during this time that I learned how to use a web application proxy to bypass client-side checks, identify patterns in cookie generators, and crack weak password algorithms. After the travel calmed down, I focused on testing the security of various open source systems and reporting on my findings.
While pursuring my graduate degree in Computer Science at GWU, I interned on the bioinformatics team at MITRE in McLean, VA. The following abstract sums up my summer research:
Here we envision the face as a set of geometric features (eyebrows, eyes, nose, mouth, etc.) that can be both recognized and described by humans and also quantitatively measured and evaluated by computers. While humans are quite adept at recognizing and describing different qualities of a human face, without specific programs and ideal conditions, computers find it difficult to do the same. Here we use a face recognition tool to locate and numerically characterize different geometric features. By comparing the interperson and intraperson results, we conclude that it is possible to numerically represent facial features with a moderate level of accuracy. This accuracy level guarantees that images of the same subject will always be assigned the same human descriptors as long as the descriptors’ generality is high (ex: round face vs. thin face). However, all of the features surveyed were weak, meaning that by just knowing the characteristics of one individual feature, it is impossible to then match that feature with an individual.
August 2010 – January 2012
In January 2012 I earned my masters degree in computer science with an emphasis on cyber security at GWU. As part of this program, I took courses in the following subjects:
- Advanced Software Paradigms
- Computer System Architecture
- Design and Analysis of Algorithms
- Internet Protocols
- Information Policy
- Computer Security Principles
- Computer Cryptography
- Network Security Principles (des animation)
- Information Security in Government
Additionally, my bachelors degree in computer science included courses in Discrete and Finite Automata, Language Design, Databases with Web Interfaces, Computer Graphics, Combinatorics and Graph Theory, and Computer Networks.
The summer after my sophomore year I traveled to Washington DC for a summer internship with Booz Allen Hamilton. I worked in the Rosslyn, VA office on the Modeling, Simulation, Wargaming and Analysis team and spent most of my summer creating a tool to help customers assess any risk associated with their product. While creating this tool, I learned Visual Basic and Microsoft Access. Additionally, I helped update a GUI for the Navy using my knowledge of Java Swing.