Hi! I'm a Computer Engineering Senior at Iowa State University specializing in cybersecurity and networking. This website is a centralized hub highlighting my technical journey through hands-on projects, academic coursework, and certifications.
Administered a multi-node wireless network across Ames, IA, ensuring stable connectivity for critical user equipment while troubleshooting system-level failures using journalctl and network diagnostic tools. I deployed configuration updates to base stations and user equipment through Docker containerization, Systemd service orchestration, and flco-cli automation, which enhanced throughput, reliability, and interference mitigation. Additionally, I authored comprehensive technical documentation with Sphinx and reStructuredText, streamlining deployment procedures and reducing onboarding time for new team members. Throughout the project, I collaborated closely with research staff and engineers to align network modifications with evolving project requirements.
Worked as a Supplemental Instruction Leader for Data Structures & Algorithms, hosting three after-class sessions weekly with an average of 13 students per session to prepare them for tests and quizzes. Additionally, I led 2-hour review sessions before midterms and final exams, attended by over 100 students. These efforts collectively led to a 30% average improvement in student scores compared to non-attendees.
Completed National Service in the Singapore Armed Forces (SAF), where I securely managed close to 500+ personnel files, including physical fitness scores and medical information. I meticulously tracked these scores for annual inter-battalion competitions, demonstrating strong data integrity and organizational skills.
Built a backend app for students' job search that connects peers in similar fields, with RESTful APIs, CI/CD pipelines, and structured MySQL databases.
View Detailed SummaryEngineered pipelined CPU architectures and VHDL simulations to explore ISA design, hazard mitigation, and memory hierarchy performance.
View Detailed SummarySimulated network topologies and packet-level interactions to explore TCP/IP protocol design, IP routing mechanisms, and network security vulnerabilities.
View Detailed SummaryConducted systematic hazard and failure analyses (FTA, SFMECA) and employed formal verification and static analysis to identify, prioritize, and mitigate risks in safety-critical software systems.
View Detailed SummarySharpened Linux command-line skills by authoring detailed Bandit challenge write-ups, demonstrating troubleshooting and secure scripting techniques.
View OverTheWire SolutionsCrafted network tools such as port scanners, packet sniffers, and reverse shells using Python sockets and threading, showcasing protocol analysis and automation.
View ExperimentsConsolidated core scanning techniques, flag explanations, and command usage into a refined PDF guide, useful for penetration testing and network enumeration practice.
View NMAP Notes (PDF)