About Me/Resume
Biography
I go by the handle “Legoclones”, which I’ve had since a tween when I was VERY interested in LEGOs and clone troopers. I’m a cybersecurity student (both at BYU and for life) and love the challenge that cyber presents. I’m initiative-driven, detail-focused, and highly motivated to learn and contribute to the InfoSec community. I’m technical by nature, which is why I’ve felt naturally drawn to CTFs.
I compete in CTFs and other cyber competitions with my school team BYU Cyberia, and used to play for the international team Project Sekai and the US Cyber Team. Cyber competitions are my bread and butter, and I love pushing myself to improve.
Interests
- IoT/embedded vulnerability research
- Binary exploitation (x86 and MIPS)
- Offensive security research
- Website exploitation
- Password cracking
- Video games
- Star Wars and Sci-Fi
- Action and military movies
- Soccer
Achievements
- Placed 1st in DEFCON 30’s AppSecVillage CTF
- Placed 1st in DEFCON 33’s Embedded Systems Village CTF
- Published 17 CVEs
- Presented at IoT Village during DEFCON 32
- Former member of Project Sekai, one of the top 10 CTF teams in the world
- Former member of US Cyber Team, which represented the United States in ICC 2023 and 2024
- Individually placed 1st in Utah-wide SAINTCON Hacker’s Challenge 2023
- Placed 1st in National Cyber League’s Team Game Fall 2025
- Participated in 120+ CTFs and hosted 10 CTFs since 2020
Education
- Brigham Young University, Ira A. Fulton College of Engineering (Sept 2024 - Apr 2026)
- Masters in Cybersecurity
- Working Thesis Title: ““”Stack-Based Exploit Development Techniques in the MIPS ISA”””
- Brigham Young University, Ira A. Fulton College of Engineering (Jun 2020 - Apr 2024)
- Bachelor in Cybersecurity (GPA of 3.59)
- Academic, Full-Tuition Scholarship
Certifications
- CompTIA Security+ SY-601
- CompTIA Pentest+ PT0-002
- eLearnSecurity eJPTv1 (Credential ID 3886217)
Experience
Instructor and Research Assistant, BYU College of Engineering (Apr 2023 – Present)
- Designed and taught curriculum for a 500-level course at BYU titled “Vulnerabilities, Exploitation, and Reverse Engineering”
- Designed and taught curriculum for a 400-level practical embedded hacking course at BYU
- Created and deployed 75 advanced CTF problems for university course
- Led a team of 4 students in discovering 9 unique zero days in Vilo home routers
Security Engineer and Engineering Team Lead, BYU Life Sciences IT (Aug 2021 – Apr 2023)
- Designed, implemented, and containerized secure infrastructure of the largest college on campus
- Resolved dozens of security threats and incidents across 1000+ servers, labs, and work computers
- Led a team of 4 student engineers in brainstorming, planning, and accomplishing 40+ projects
- Documented the processes of creating and maintaining 25+ different projects and services
Skills & Tools
- General – Linux, Embedded Systems, Networking, Virtualization/Docker/Kubernetes
- Programming/Scripting (Expert/Proficient) – Python, C, x86, MIPS, Bash, C++, JavaScript, PHP, SQL
- Reverse Engineering/Pwn – Ghidra, GDB, x64dbg, Python pwntools, QEMU, stack- & heap-based pwn
- Embedded Hacking – Microcontroller Binary Exploitation, Timing Attacks, Fuzzing, Fault Injection