Resume

About

Extensive on-premise and cloud systems, networking, and automation experience. Embraces DevSecOps and agile mindsets. Well-versed in the penetration testing lifecycle, as well as pentesting tools and methodologies. Knowledgeable on defensive security concepts including SIEM, HIDS, NIDS, and threat hunting. Maintains a Proxmox home lab cluster to research and test a wide variety of topics.



Experience

Penetration Tester
Dark Wolf Solutions
Aug. 2023 — Present

Cyber Network Analysis Tech 3
HII Mission Technologies
Feb. 2023 — Aug. 2023

Security Specialist
SHINE Systems
Feb. 2021 — Feb. 2023

IT Systems Engineer
Cofense
Mar. 2020 — Feb. 2021

IT Systems Administrator
Cofense
Dec. 2016 — Mar. 2020

Tier 3 IT Support Analyst
AllStaff Technical Solutions
July 2015 — Dec. 2016

Tier 1 Desktop Support Analyst
L-3 National Security Solutions
Nov. 2014 — July 2015



Education

George Mason University
BA, Global Affairs
GPA 3.52/4.00
Graduated with Cum Laude honors



Certifications

Practical Network Penetration Tester (PNPT)
Nov. 2022

Offensive Security Certified Professional (OSCP)
Sept. 2022

Microsoft Azure Administrator Associate
Oct. 2020 -- Oct. 2024

LPI Linux Essentials
July 2017

CompTIA Security+ ce
Jan. 2016 -- Jan. 2025

CompTIA Network+ ce
Aug. 2015 -- Jan. 2025

CompTIA A+ ce
Oct. 2014 – Jan. 2025



Personal Projects

Home Lab Guides

Proxmox VE 8: Converting a Laptop into a Bare Metal Server
In this project, we will take a look at an in-detail process of setting up a Proxmox home lab on a bare metal server.
Building a Security Lab in VirtualBox
In this project, we we will take a look at an in-detail process of setting up an entry-level cybersecurity lab using VirtualBox

Security and Research Lab


Click here to view this diagram in a new tab



Skills

Infrastructure

  • Cloud Providers (AWS | Azure)
  • DevOps Tools (Ansible | Terraform)
  • Enterprise Services (Database | DNS | SMTP | Web)
  • Hypervisors (ESXi | Proxmox | VirtualBox)
  • Identity Providers (Active Directory | Entra AD)
  • Single Sign-On Configuration (SAML | SCIM | OAuth | OpenID)

Networking

  • IP Masking (Proxies | Tor | VPN)
  • Network Engineering (Routing | Switching | VLANs)
  • Protocol Analysis (Wireshark | Zeek)

Operating Systems

  • Server Operating Systems (BSD | Linux | Windows)
  • Desktop Operating Systems (Linux | Mac OS | Windows)

Programming

  • Scripting Languages (Bash | PowerShell | Python)

Security

  • Endpoint Monitoring (Carbon Black | Osquery | Wazuh)
  • Ethical Hacking
  • Firewalls (pfSense | ModSecurity)
  • Incident Response and Remediation
  • Intrusion Detection Systems (Suricata)
  • Security Assessment Tools (Burp Suite | Kali Linux | Metasploit | Nmap | Nessus)
  • SIEM (Wazuh | Elastic Stack)
Table of Contents
Great! You’ve successfully signed up.
Welcome back! You've successfully signed in.
You've successfully subscribed to 0xBEN.
Your link has expired.
Success! Check your email for magic link to sign-in.
Success! Your billing info has been updated.
Your billing was not updated.