About Me/Resume
Biography
I go by the handle “Legoclones”, which I’ve had since a tween when I was VERY interested in LEGOs and clone troopers. I’m a cybersecurity student (both at BYU and for life) and love the challenge that cyber presents. I’m initiative-driven, detail-focused, and highly motivated to learn and contribute to the InfoSec community. I’m technical by nature, which is why I’ve felt naturally drawn to CTFs.
I’m currently a SMART Scholar for the Department of Defense, and am a member of the US Cyber Team which competes internationally in cyber competitions. I also play CTFs with my school team BYU Cyberia, and the international team Project Sekai. Cyber competitions are my bread and butter, and I love pushing myself to improve.
Interests
- Website exploitation
- Offensive security research
- Penetration testing
- Digital forensics
- Password cracking
- FPS games
- Star Wars and Sci-Fi
- Action and military movies
- Soccer
Achievements
- Placed 1st in DEFCON 30’s AppSecVillage CTF
- Published 8 CVEs (CVE-2022-4271, CVE-2023-24261, CVE-2023-31472, CVE-2023-31475, CVE-2023-31476, CVE-2023-31478, CVE-2023-33620, CVE-2023-33621)
- Member of US Cyber Team to represent the United States in ICC 2023
- Individually placed 2nd in Utah-wide SAINTCON Hacker’s Challenge 2022
- Individually placed 5th/6675 students in NCL Individual CTF in Fall 2022
- Placed 3rd/316 student teams in NCL Team CTF [Experienced Bracket] in Winter 2023
- Placed 1st in 8 cyber competitions
- Placed 2nd in 8 cyber competitions
- Placed 3rd in 5 cyber competitions
- Hosted 6 CTF competitions
- Participated in over 80 CTFs since 2020
Education
- Brigham Young University, Ira A. Fulton College of Engineering (April 2024)
- Bachelor in Cybersecurity (GPA of 3.70)
- Academic, Full-Tuition Scholarship
- Department of Defense SMART Scholar
Certifications
- CompTIA Security+ SY-601
- CompTIA Pentest+ PT0-002
- eLearnSecurity eJPTv1 (Credential ID 3886217)
Experience
Instructor/Teaching Assistant, BYU College of Engineering (April 2023 – Present)
- Designed and will teach a 500-level University course at Brigham Young University
- Created and tested 10 labs for IT&C 515R, titled “Vulnerabilities, Exploitation, and Reverse Engineering”
SMART Scholarship Intern, US Army Cyber Command (June 2023 – July 2023)
Security Engineer and Engineering Team Lead, BYU Life Sciences IT (Aug 2021 – April 2023)
- Designed, implemented, and containerized secure infrastructure of the largest college on campus
- Resolved dozens of security threats and incidents across 1000+ servers, labs, and work computers
- Led a team of 4 student engineers in brainstorming, planning, and accomplishing 40+ projects
- Documented the processes of creating and maintaining 25+ different projects and services
Officer, BYU Cybersecurity Student Association (Apr 2021 – Present)
- Led BYU’s competitive penetration team in weekly training meetings and competitions
- Created and taught a dozen lessons focused on teaching beginners foundational CTF skills
- Taught monthly interactive lessons to BYU students about offensive security and penetration testing
Skills & Tools
- General - Linux, Windows, TCP/IP Networking, Virtualization/Docker/Kubernetes
- Programming/Scripting - Python, PHP, SQL, JavaScript, Bash, C, Assembly
- Website/Network exploitation - Burp Suite, Python requests, Nmap, enum4linux
- Penetration testing - Metasploit, Dradis, John the Ripper, Hashcat, Hydra
- Reverse Engineering/Pwn - Ghidra, GDB, x64dbg, Python pwntools, Ropper
- Digital Forensics - Wireshark, Autopsy, Volatility, FTK Imager
- IT Management - Active Directory/Group Policy, WSUS, Ansible