About
Back in high school, I peeked my head into tech through game development by making a few simple games with Unity and other software. As I've grown I explored other areas and after coming to Cal Poly Pomona, I stumbled upon cybersecurity which I have now dedicated myself towards.
These days I have been focusing on gaining experience through internships and competitions aswell as some fun side projects. Feel free to reach out if you want to connect!
Jun 2025 —
Aug 2025
Incoming Security Engineer Intern · Palantir
Application Security
Sep 2025 —
Dec 2025
AI Security Reserach Intern · Archer Faris
Improved quality of the researcher and document parsing LLM agents by conducting ground truth research on security and compliance claims of enterprise SaaS products.
Triaged AI agent evaluations for accuracy, validated data output, and modified agentic workflows and methodology.
GRC
Security Research
AI Training
Jun 2025 —
Aug 2025
Cyber Security Intern · Capital One
Developed scalable SQL queries in Snowflake to detect dangerous entitlements and workgroups.
Visualized data on AWS Quicksight to highlight risk trends, common failure points, and specific high-risk findings.
Automated Slack and Email alerts to responsible stakeholders.
SQL
Snowflake
AWS Quicksight
Jun 2024 —
Aug 2024
Security Research Intern · Knowtion Health
Collaborated with the CISO to construct a white paper analyzing the causes and impacts of recent healthcare data breaches and strategies to secure Knowtion Health.
Researched Knowtion Health’s current security posture and compliance with HITRUST, HIPPA, and SOC 2.
HITRUST
HIPPA
SOC 2
Jun 2024 —
Feb 2026
Collegiate Penetration Testing Competition · 1st Place Regionals (2025/2026)
Performed Prompt injection against vulnerable AI models and created a custom AI Vishing model to impersonate an employee.
Exploited exposed databases, web applications, Active Directory configurations, and default service credentials.
Created a detailed report detailing findings, business impact, and compliance violations for executives and presented findings to C-suite audience.
Check out our final 2025 report
HERE.
Prompt Injection
Vishing
OWASP
April 2025 —
April 2025
Information Technology Competition (Security) · 1st Place (2025)
Identified and exploited misconfigurations in Active Directory, Linux, and AWS environments, with a focus in Web Application and AI Exploitation.
Performed web exploits including blind SQL injection, prompt injection photos, and PII exposure through IDOR.
Compiled formal written reports detailing our findings, business impact, compliance violations, and remediation and presented findings to C-suite audience.
Check out our final report
HERE.
SQL Injection
Command Injection
Prompt Injection
Jan 2024 —
Apr 2024
NCAE Cyber Games · 2nd Place Nationals (2024)
Organized multiple practice sessions every week, developed a team game plan, voted MVP and Most Improved. Set up a DNS server using bind9 with forward and reverse zones for custom internal and external IPv4 addresses. Hardened linux server by implementing egress firewall, changing passwords, and threat hunting existing backdoors.
DNS
Linux
Iptables
Threat Hunting
Jun 2024 —
Feb 2025
Collegiate Cyber Defense Competition
Developed and implemented hardening techniques to mitigate red-team attacks on business-critical infrastructure.
Responded to business requests including system inventory reports, incident reports, and user access management.
Managed Databases and Websites across multiple Linux and Windows machines on a connected network.
Automation
Databases
Threat Hunting