Growing up in the PC gaming and early internet culture, I didn’t just use technology, I wanted to know how it worked and where it could break. That early curiosity led me to explore everything from the darknet to offensive security techniques long before I considered it as a career.Today, I take 12 years of experience in law enforcement and apply it to modern security problems, using that same investigative grit to find vulnerabilities and protect infrastructure.
Validated security findings through coordinated Bug Bounties/Vulnerability Disclosure Programs (VDPs). I analyze web application behavior to identify critical weaknesses and develop proof-of-concept evidence for security teams.
I am a Cybersecurity professional and DoD 8570.01-M IAT Level II compliant with a B.S. in Cybersecurity and Information Assurance. I leverage 12 years of high-pressure experience in the Los Angeles County Sheriff's Department to deliver incident response, and security policy enforcement. Certifications: CompTIA Security+, CySA+, PenTest+, Network+, A+, ISC2 SSCP, and ITIL 4.
Currently open to Associate Penetration Testing, SOC Analyst, or General Entry-Level Cybersecurity roles. Reach out to discuss how my investigative background and technical skills can support your team.
First item
Second item
Third item
The Vulnerability: Discovered an unauthenticated, publicly accessible S3 storage bucket belonging to a major global logistics platform. The bucket contained a massive 4.5GB compressed archive of internal infrastructure data.Technical Impact:Secret Leakage: Identified over 170+ hardcoded administrative credentials, including API tokens for RMM tools (Atera), cloud storage, and blockchain integrations.Proprietary Data: Exposed internal geospatial geofencing definitions and source code artifacts, allowing for high-fidelity mapping of the company's core logistics engine.Chain Potential: The leakage of RMM keys provided a theoretical path to Remote Code Execution (RCE) on managed corporate endpoints.The Outcome: Reported via Coordinated Disclosure. Although triaged as a duplicate, the finding was validated by the security team, confirming the critical nature of the exposure.
Vulnerability Research: Multi-Vector User Enumeration & Info DisclosureThe Discovery: Identified a flaw in an enterprise account recovery portal belonging to a major telecommunications provider. The system returned inconsistent error messages that allowed for the validation of internal employee accounts.Technical Impact:Username Enumeration: Confirmed valid internal accounts by analyzing server response variations (e.g., "user does not exist" vs. "account type not supported").Administrative Exposure: For certain account types, the system disclosed partial email addresses of internal managers, providing a roadmap for social engineering.Lack of Rate Limiting: The absence of request throttling allowed for automated, large-scale harvesting of employee data using standard wordlists and intruder tools.The Outcome: Documented and reported through a formal VDP. This finding demonstrates the risk of "Information Oracles" when combined with a lack of brute-force protections, which can be leveraged for high-fidelity spear-phishing campaigns.
Critical Finding: Full Administrative Takeover via Hardcoded CredentialsThe Vulnerability: During a security assessment of a U.S. Federal Government geospatial portal, I discovered that background search requests were leaking a Basic Authentication header. Decoding this header revealed hardcoded administrative credentials for an exposed Apache Solr dashboard.Technical Impact:Unauthorized System Control: Validated "admin" role access, granting full control over the search infrastructure and all indexed production data.Massive Data Exposure: Gained full read access to a core database containing over 15.1 million records.System Sabotage: Admin privileges allowed for the creation, modification, or deletion of search cores, as well as access to internal file paths and system shutdown keys.The Outcome: Reported to the U.S. Department of Defense (DoD) Vulnerability Disclosure Program. The finding was validated and triaged as Critical (9.0 - 10.0) within 24 hours.