University at Albany Β· Undergraduate Cybersecurity Researcher
Building expertise in Network Defense, Zero Trust Architecture, Cryptography, Threat Intelligence, and IoT security through active research at University at Albany and hands-on security projects.
I'm a cybersecurity student and undergraduate researcher at University at Albany with a passion for protecting digital assets and understanding the evolving threat landscape. Through my work at the Center for Computational Research and Interships, I'm developing hands-on expertise in Zero Trust Architecture, IoT security, Cryptography, Threat Intelligence, and AI-assisted malware analysis β translating academic research into practical security insights.
I am currently preparing for two certifications β the Google Cybersecurity Certificate (expected April 2026) followed by CompTIA Security+ (expected May 2026) β that certify knowledge in threat analysis, cryptography, identity management, and security operations.
My long-term focus areas include penetration testing, AI governance, cloud security, and security operations, with a particular interest in how modern network architectures and AI-driven tooling can better defend against emerging threat vectors.
Bachelor's in Cybersecurity β coursework in network security, cryptography, security operations, and risk management through hands-on projects.
Completing hands-on security projects: network infrastructure design, vulnerability assessments, incident response simulations, and system hardening exercises.
Researching Zero Trust Architecture and IoT security at the Center for Computational Research, building experimental testbeds and analyzing real-world device traffic and threat scenarios.
Studying AI-assisted ransomware detection at the CAFE Lab, building malware analysis environments with Cuckoo Sandbox and analyzing behavioral patterns across ransomware families.
Analyzing kernel-level anti-cheat systems to understand how cryptographic integrity checks and trust mechanisms are used to prevent tampering and unauthorized code execution in Windows environments.
Foundational certification covering security fundamentals, network security, Linux, SQL, Python automation, and SIEM tools.
Preparing to validate skills in threat management, cryptography, identity & access management, and security operations.
As an undergraduate researcher at a UAlbany's lab, I investigate how Zero Trust Architecture principles can reduce the attack surface of IoT devices operating in mixed or legacy network environments. The research builds an experimental testbed using Kali Linux, Wireshark, Nmap, and the WiFi Pineapple to simulate adversarial techniques and evaluate the impact of micro-segmentation on device exposure and attack success rates.
A core focus is the ASUS Zenbo IoT robot and analyzing its communication patterns, traffic flows, and resilience against MITM interception and unauthorized access under various Zero Trust policy configurations. Findings contribute to a broader understanding of how Zero Trust network design can prevent cascading failures caused by compromised IoT devices in real-world deployments.
At the Cognitive Security, Accountability, Fairness & Explainability (CAFE) Lab, I research how AI techniques can support ransomware detection in enterprise environments. The work involves analyzing ransomware behavior to identify patterns that distinguish malicious activity from normal system operations with a focus on building a foundation for machine learning-assisted detection pipelines.
To support the research, I built a controlled malware analysis environment using Ubuntu virtual machines and Cuckoo Sandbox, allowing ransomware samples to execute safely while capturing behavioral indicators like file modifications, process creation, registry changes, and network activity. A current focus is the recently observed 01Flip ransomware; comparing its encryption patterns, persistence techniques, and network behavior against known ransomware families to understand how emerging variants evolve and where earlier detection might be possible.
This research project examines how kernel-level anti-cheat systems enhance system security by enforcing integrity checks and monitoring low-level system behavior. Using a Windows virtual machine environment with Visual Studio and the Windows Driver Kit (WDK), I am analyzing open-source anti-cheat frameworks to understand how kernel drivers interact with user-mode applications and restrict unauthorized actions
The project explores how concepts such as software integrity, memory protection, and trust enforcement are implemented at a high level. While studying these systems, I am also learning how cryptographic techniques and integrity verification contribute to preventing tampering and unauthorized code execution.
Through this process, I am evaluating system behavior before and after deploying kernel-level components to better understand how trust is established and maintained within the operating system.
Produced a structured intelligence assessment analyzing the strategic threat posed by AI-generated deepfakes across financial institutions, political communication, and public trust. The report applies a formal intelligence methodology which includes key judgments, confidence assessments, and sourced substantiation to evaluate trends from 2020β2025 and project forward-looking risks through 2028.
Conducted comprehensive vulnerability assessments on virtual oil rig environment using industry-standard tools. Documented findings and provided remediation recommendations following NIST framework guidelines.
Analyzed Stuxnet incident with a focus of AI assisted tools and threat modeling (MITRE ATT&CK) to determine best practices for future application of cybersecurity practices.
CDO is University at Albany's premier cybersecurity club, dedicated to teaching students real-world security skills through weekly workshops, team-based competitions, and hands-on server infrastructure projects. Members engage in both offensive and defensive security disciplines which includes red teaming, blue teaming, digital forensics, and network defense. The club competes in multiple CTF and cyber competitions throughout the year and hosts its own event, GDDC. CDO also runs certificate study groups to help members prepare for industry credentials like CompTIA Security+.
Won a multi-discipline cybersecurity competition combining OSINT, digital forensics, and network analysis. Teams raced to complete a series of technical challenges across investigation, intelligence gathering, and network problem-solving. First team to complete all tasks wins. Placed first against all competing teams.
Earned a place on the Dean's List at the University at Albany for both the Spring 2025 and Fall 2025 semesters, recognizing outstanding academic performance and a demonstrated commitment to excellence in the Cybersecurity program.
Student at the University at Albany, a nationally designated National Center of Academic Excellence in Cyber Defense (CAE-CD); a program jointly sponsored by the NSA and DHS. This designation recognizes institutions meeting rigorous federal standards in cybersecurity education, and reflects the depth and quality of the academic environment in which this work is conducted.
Developed a cybersecurity research showcase poster analyzing the Stuxnet malware and its impact on industrial control systems(ICS). The project examnied how the malware targeted Siemens PLC controllers and manipulated centrifuge operations while masking malicious activity from systems. The analysis highlighted how AI-assited security tools and anomaly detection could help identify unsual system behavior earlier and potentially prevent similar attacks.
Looking for cybersecurity full time opportunities and ways to contribute to security teams. Feel free to reach out anytime.