Hi! I'm a concurrent Cybersecurity and Computer Engineering student at Iowa State University – pursuing my B.S. in Computer Engineering (Class of 2026). My academic and professional journey centers on building secure, scalable networked systems through hands-on research, applied cybersecurity projects, and advanced coursework in information assurance and network defense.
Actively seeking opportunities to apply my expertise in network security, cybersecurity operations, and secure system design.
Administered a multi-node wireless network across Ames, IA, ensuring stable connectivity for critical user equipment while troubleshooting system-level failures using journalctl and network diagnostic tools. I deployed configuration updates to base stations and user equipment through Docker containerization, Systemd service orchestration, and flco-cli automation, which enhanced throughput, reliability, and interference mitigation. Additionally, I authored comprehensive technical documentation with Sphinx and reStructuredText, streamlining deployment procedures and reducing onboarding time for new team members. Throughout the project, I collaborated closely with research staff and engineers to align network modifications with evolving project requirements.
Worked as a Supplemental Instruction Leader for Data Structures & Algorithms, hosting three after-class sessions weekly with an average of 13 students per session to prepare them for tests and quizzes. Additionally, I led 2-hour review sessions before midterms and final exams, attended by over 100 students. These efforts collectively led to a 30% average improvement in student scores compared to non-attendees.
Completed National Service in the Singapore Armed Forces (SAF), where I securely managed close to 500+ personnel files, including physical fitness scores and medical information. I meticulously tracked these scores for annual inter-battalion competitions, demonstrating strong data integrity and organizational skills.
Analyzed offensive and defensive cyber operations, including threat intelligence, nation-state tactics, propaganda campaigns, and strategic approaches to protecting critical infrastructure.
View Detailed SummaryInvestigated digital evidence collection, preservation, and analysis techniques for incident response, applying forensic tools to reconstruct attack timelines and identify security breaches.
View Detailed SummaryExamined OS fundamentals including process management, memory allocation, file systems, and concurrency, with practical implementation of scheduling algorithms and synchronization primitives.
View Detailed SummaryBuilt a backend app for students' job search that connects peers in similar fields, with RESTful APIs, CI/CD pipelines, and structured MySQL databases.
View Detailed SummaryStudied algorithm design paradigms including divide-and-conquer, dynamic programming, and greedy methods, along with complexity analysis and optimization techniques for efficient problem-solving.
View Detailed SummaryEngineered pipelined CPU architectures and VHDL simulations to explore ISA design, hazard mitigation, and memory hierarchy performance.
View Detailed SummaryConducted systematic hazard and failure analyses (FTA, SFMECA) and employed formal verification and static analysis to identify, prioritize, and mitigate risks in safety-critical software systems.
View Detailed SummarySimulated network topologies and packet-level interactions to explore TCP/IP protocol design, IP routing mechanisms, and network security vulnerabilities.
View Detailed SummaryExplored fundamental security principles including cryptography, authentication mechanisms, access control models, and defensive strategies against common attack vectors.
View Detailed SummaryDeveloped a mock aircraft dataload system with wireless support, focusing on cybersecurity, network design, and aviation standards within real-world operational and certification constraints.
View Detailed SummaryA social networking iOS application built with Swift, SwiftUI, and SwiftData, enabling users to connect, share experiences, and build meaningful friendships through an intuitive mobile interface.
Sharpened Linux command-line skills by authoring detailed Bandit challenge write-ups, demonstrating troubleshooting and secure scripting techniques.
View OverTheWire SolutionsCrafted network tools such as port scanners, packet sniffers, and reverse shells using Python sockets and threading, showcasing protocol analysis and automation.
View ExperimentsConsolidated core scanning techniques, flag explanations, and command usage into a refined PDF guide, useful for penetration testing and network enumeration practice.
View NMAP Notes (PDF)