Security engineer. Offensive background, detection focus.
I build systems that detect abuse through behavioral patterns — not content inspection.
$ ls projects/
→ PARALLAX — behavioral threat detection for AI platforms. 0.68 AUC on 17M real events.
→ KESTREL — cloud workload anomaly detection. 0.766 recall on 34K real CloudTrail events.
→ ReconAI — AI-powered offensive reconnaissance and target prioritization.
$ history --career
2025—now
2023—2025
2022
2021
2019—2023
SWE II, Vulnerability & Detection Engineering — GM Financial
ML fraud detection · zero-trust architecture · Terraform/Azure · team mentorship
Offensive Security Researcher — RTX/RTX BBN
8 zero-days · DoD briefings · firmware RE · ICS protocol fuzzing
↑ converted from intern
Senior Cybersecurity Intern — RTX
Information Security Intern — Reata Pharmaceuticals
IR during active breach · stood up centralized logging
B.S. Computer Science — Arizona State University
$ history --research
2026
PARALLAX — 15 detectors, tested on 17M real LANL events
2026
KESTREL — 3 detectors, tested on 34K real CloudTrail events
2026
ReconAI — AI-powered offensive recon with GPT-4
$ cat certs.txt
AWS Security Specialty · CRTO · CySA+ · Security+ · AWS SA Associate · Terraform Associate · Splunk Cybersecurity Defense Analyst · SecAI+