Cybersecurity Graduate Student · Cybersecurity SME Intern · Graduate Teaching Assistant · Former Network Security TAC Engineer · Actively Looking for Full-time Opportunities
3 years enterprise HPE-Aruba network security experience → MS AIT in Cybersecurity @ GMU → MSSP Cybersecurity SME Intern → Graduate Teaching Assistant
I spent three years as a Network Security TAC Engineer at Movate, supporting enterprise HPE-Aruba deployments, troubleshooting production incidents, analyzing security logs and events using NMS and SIEM tools like HPE Intelligent Management Center, Splunk, SolarWinds, and Aruba Central.
Running VAPT cycles with Qualys and Nessus, hardening access controls, and securing enterprise environments running Comware, Aruba ProCurve, ArubaOS CX, and Aruba Central. Daily hands-on packet analysis and traffic diagnosis with Wireshark and Nmap — often replicating customer issues in simulated lab environments before pushing fixes to live networks.
That operational background pushed me toward Cybersecurity formally. I left Movate to pursue a Master's in Cybersecurity at George Mason University. During the program I worked within Comtech LLC's MSSP practice as a Cybersecurity SME Intern — supporting client security engagements end-to-end, from whitepapers and proposals through threat assessments and managed service delivery. Now I'm teaching Information Security Fundamentals as a Graduate Teaching Assistant while finishing the degree.
- 🎓 MS Applied Information Technology (Cybersecurity) @ George Mason University — GPA 3.77 — May 2026
- 👨🏫 Graduate Teaching Assistant — IT 223: Information Security Fundamentals @ GMU (Aug 2025 – May 2026)
- ✍️ Writing CTF writeups on Medium — OverTheWire Natas series
- 🎯 Actively working on hands-on Projects and CompTIA Security+ Certification
- 🔬 Building a multi-platform cloud security assessment (AWS + Azure + GCP)
👨🏫 Graduate Teaching Assistant — George Mason University (Aug 2025 – May 2026)
Supporting IT 223 (Information Security). Conduct weekly office hours, guide students through ZyBooks hands-on labs (malware analysis, email phishing, security basics), grade assignments with detailed feedback, and support 200+ students via office hours and emails throughout the semester.
🛡️ Cybersecurity SME Intern (MSSP)— Comtech LLC, Reston VA (May 2025 – Aug 2025)
Worked within Comtech's MSSP practice as a technical security resource across client engagements in healthcare and US State/Local Government — covering the full managed security service lifecycle from client outreach and requirement gathering through threat assessments, gap analyses, and service delivery.
- Conducted threat assessments for client healthcare IT infrastructure using STRIDE and DREAD frameworks — identifying vulnerabilities, prioritizing risks, and producing client-facing reports
- Initiated and configured a Home SOC Lab environment to simulate threat detection and incident response workflows — used to demonstrate MDR capabilities and validate security monitoring approaches for client engagements
- Authored 2-3 technical whitepapers and supported cybersecurity bid/proposal development for government and healthcare contracts
- Developed a Managed Services Package covering network and web security tooling, gap assessment methodology, and service delivery checklists
- Evaluated security solutions against client requirements and budgets; briefed senior management on emerging tools and market trends relevant to Comtech's service portfolio
- Supported Comtech's CMMC initiative and participated in weekly reviews for active State/Local Government client engagements
🌐 Network Security TAC Engineer (L1 → L2 Escalation Engineer) — Network Security & Infrastructure Operations Movate Technologies / HPE-Aruba Networking (Sep 2021 – Jul 2024)
Three years supporting enterprise HPE-Aruba environments — HPE Comware, ProCurve, ArubaOS CX, Aruba Central, and HPE IMC — with a consistent security operations component alongside the networking work. Operated daily with SolarWinds, Splunk (log aggregation), Qualys and Nessus (VAPT cycles), Wireshark, and Nmap on live customer networks. Handled OSPF, BGP, MPLS, DHCP, and STP troubleshooting including Cisco and Arista cross-platform incidents. Implemented and validated 802.1X, RADIUS, and TACACS+ access controls for enterprise customers. Progressed from L1 to L2 escalation engineer and trained junior team members.
Hands-on projects from coursework and independent research — real tools, real findings, real artifacts.
| Repository | What it covers | Course |
|---|---|---|
| 🔬 network-security-labs | Nessus vulnerability scanning, Wireshark 5-protocol analysis, NAT/VPN behavior — live environments, real output | Cybersecurity Fundamentals |
| ⚔️ applied-security-labs | SQL injection with annotated attack code · RSA-2048 with real .pem keypair and .enc artifact |
Cybersecurity Fundamentals |
| ☁️ cloud-security-iaas | Hands-on IaaS security assessment — Azure vs GCP defaults, IAM/logging gaps, CIS/NIST hardening checklist | Cloud Computing |
| 🔍 malware-progression-detection | Research: malware evolution from viruses to APTs, hybrid detection framework (signature + behavior + ML) | Network & Systems Security |
| 🛡️ identity-theft-research | Research: Equifax, Cambridge Analytica, T-Mobile case studies — IAM controls, MFA strategy, attack vectors | Identity & Access Management |
In Progress(artifacts will be published): Academic hands-on projects and assignments:
- 🔒 Secure Software Development — 6 hands-on security labs
- 📊 Information: Representation, Processing and Visualization - Understanding Victim Demographics for Violence Reduction in Chicago
- 🧮 Data Structures & Algorithms — Shortest Path Computation for Self-Driving Cars Using Dijkstra and A* Algorithms
Security Monitoring & SIEM
Splunk SPL Queries Microsoft Sentinel Wazuh
Microsoft Defender SOAR Windows Event Viewer Windows Registry
Threat Detection & Analysis
Nessus Qualys Metasploit Wireshark Nmap Autopsy Burp Suite
Frameworks & Standards
MITRE ATT&CK NIST Incident Response Lifecycle OWASP Top 10
STRIDE DREAD CVSS VAPT
Cloud Security
AWS Microsoft Azure Google Cloud Platform
GuardDuty CloudTrail AWS Security Hub
Defender for Cloud Security Command Center
Cloud Logging VPC/NSG
Networking & Infrastructure
HPE Comware ArubaOS CX Aruba Central HPE IMC ProCurve
Cisco Arista SolarWinds
VLANs STP OSPF BGP MPLS
IPSec SSL/TLS 802.1X RADIUS TACACS+
Identity & Access Management
Active Directory Azure Entra ID IAM RBAC
Operating Systems & Scripting
Linux Distros Windows PowerShell
Python SQL Bash Git GitHub
- 🏅 ISC2 Certified in Cybersecurity (CC)
- ☁️ Microsoft Certified: Azure Fundamentals (AZ-900)
- 🔍 Splunk Certified Core User Training (Hands-on Coursework)
- 🛡️ Fortinet Certified Associate Cybersecurity (FCA)
- 🛡️ Fortinet Certified Fundamentals Cybersecurity (FCF)
- 🔒 TryHackMe Pre-Security Certificate
- 🎯 CompTIA Security+ — In progress
🎓 ECE → 📡 CCNA → 🌐 HPE-Aruba Network Security TAC (3 yrs · L1→L2) → 🔐 MS Cybersecurity @ GMU → 🛡️ MSSP Cybersecurity SME Intern → 👨🏫 Graduate TA
I started in Electronics and Communications Engineering at Jeppiaar Maamallan Engineering College — and by my third year realized I needed to find something I'd actually care about long-term. After exploring software development, embedded systems, and web dev - networking became the entry point into security.
My Logic: Understand how everything connects, then learn how to Defend it.
That led to CCNA, then three years at Movate on the HPE-Aruba TAC team. Real enterprise networks, real incidents, real customers. The security component was there from the start — VAPT work, access control hardening, log analysis in Splunk, flagging misconfigurations. Started mentoring junior engineers after about a year, promoted to L2 escalation engineer after two. Once networking had given me what I came for — a deep operational understanding of how infrastructure actually works — I made the move to George Mason to formalize the security side.
Networking continuing to strengthen my security perspective.
Since then: an MSSP internship at Comtech where I worked the full security engagement lifecycle from proposals to delivery, a teaching role supporting undergraduates through their first real security coursework, and a growing portfolio of hands-on security projects spanning network security, cloud security, IAM, and offensive security techniques.
CTF walkthrough articles on Medium:
- OverTheWire Natas: Building a CTF Mindset - OverTheWire Natas Level 0 → Level 1
- OverTheWire Natas Level 1 → Level 2
- Nothing on This Page! But… What About Other Pages? - OverTheWire Natas Level 2 → Level 3
- It Wasn’t Maintenance — It Was a Ransom Note
Fairfax, VA · Open to full-time cybersecurity roles (Security Operations · Network Security · Cloud Security) starting May 2026