Ryan Miller

I am a |

I like doing cool stuff


          

About

Back in high school, I peeked my head into tech through game development by making a few simple games with Unity and other software. As I've grown I explored other areas and after coming to Cal Poly Pomona, I stumbled upon cybersecurity which I have now dedicated myself towards.

These days I have been focusing on gaining experience through internships and competitions aswell as some fun side projects. Feel free to reach out if you want to connect!

Experience

Jun 2025 —
Aug 2025
Incoming Security Engineer Intern · Palantir

Summer 2025

Application Security
Sep 2025 —
Dec 2025
AI Security Reserach Intern · Archer Faris

Improved quality of the researcher and document parsing LLM agents by conducting ground truth research on security and compliance claims of enterprise SaaS products. Triaged AI agent evaluations for accuracy, validated data output, and modified agentic workflows and methodology.

GRC Security Research AI Training
Jun 2025 —
Aug 2025
Cyber Security Intern · Capital One

Developed scalable SQL queries in Snowflake to detect dangerous entitlements and workgroups. Visualized data on AWS Quicksight to highlight risk trends, common failure points, and specific high-risk findings. Automated Slack and Email alerts to responsible stakeholders.

SQL Snowflake AWS Quicksight
Jun 2024 —
Aug 2024
Security Research Intern · Knowtion Health
Collaborated with the CISO to construct a white paper analyzing the causes and impacts of recent healthcare data breaches and strategies to secure Knowtion Health. Researched Knowtion Health’s current security posture and compliance with HITRUST, HIPPA, and SOC 2.
HITRUST HIPPA SOC 2

Competitions

Jun 2024 —
Feb 2026
Collegiate Penetration Testing Competition · 1st Place Regionals (2025/2026)
Performed Prompt injection against vulnerable AI models and created a custom AI Vishing model to impersonate an employee. Exploited exposed databases, web applications, Active Directory configurations, and default service credentials. Created a detailed report detailing findings, business impact, and compliance violations for executives and presented findings to C-suite audience.

Check out our final 2025 report HERE.
Prompt Injection Vishing OWASP
April 2025 —
April 2025
Information Technology Competition (Security) · 1st Place (2025)
Identified and exploited misconfigurations in Active Directory, Linux, and AWS environments, with a focus in Web Application and AI Exploitation. Performed web exploits including blind SQL injection, prompt injection photos, and PII exposure through IDOR. Compiled formal written reports detailing our findings, business impact, compliance violations, and remediation and presented findings to C-suite audience.

Check out our final report HERE.
SQL Injection Command Injection Prompt Injection
Jan 2024 —
Apr 2024
NCAE Cyber Games · 2nd Place Nationals (2024)
Organized multiple practice sessions every week, developed a team game plan, voted MVP and Most Improved. Set up a DNS server using bind9 with forward and reverse zones for custom internal and external IPv4 addresses. Hardened linux server by implementing egress firewall, changing passwords, and threat hunting existing backdoors.
DNS Linux Iptables Threat Hunting
Jun 2024 —
Feb 2025
Collegiate Cyber Defense Competition
Developed and implemented hardening techniques to mitigate red-team attacks on business-critical infrastructure. Responded to business requests including system inventory reports, incident reports, and user access management. Managed Databases and Websites across multiple Linux and Windows machines on a connected network.
Automation Databases Threat Hunting