Skip to content

Commit

Permalink
updated resume
Browse files Browse the repository at this point in the history
  • Loading branch information
hi committed Aug 27, 2024
1 parent af56e02 commit d3f84b1
Showing 1 changed file with 36 additions and 53 deletions.
89 changes: 36 additions & 53 deletions resume.typ
Original file line number Diff line number Diff line change
@@ -1,31 +1,36 @@
#import "template.typ": *

#show: doc => conf(
doc,
)
#show: doc => conf(doc)

== Education
#chiline()

#degree(
"The Ohio State University",
"Bachelor of Arts in Computer and Information Science",
"Expected May 2025"
)
#degree("The Ohio State University", "Bachelor of Arts in Computer and Information Science", "Expected May 2025")

== Experence
#chiline()

#entry(
"IBM X-Force Red",
"Pentest Intern",
"Austin, Texas",
"May-August 2024",
(
"Shadowed experienced pentesters during engagements, gaining insights and experience",
"Worked in small team to engineer a custom solution for stealthy LDAP enumeration and writing by designing and implementing Windows Communication Foundation (WCF) framework in Python. The project, encompassing nearly 7,000 lines of code, involved reversing and implementing eight protocol layers and authentication mechanisms from scratch. Conducted extensive research and review of Windows protocol documentation, ensuring full interoperability with the Impacket toolset. Produced a standalone tool and presented it to IBM executives",
),
)

#entry(
"IBM X-Force Red",
"Pentest Intern",
"Austin, Texas",
"May-August 2023",
(
"Shadowed experienced pentesters on web app, external, and internal network penetration tests, gaining valuable insights",
"Participated in comprehensive bootcamp training covering internal network penetration, webapp security, cryptography, social engineering, and mobile application security",
"Conducted research on Windows Offensive tooling as part of a team, contributing to the advancement of offensive security knowledge within the organization. Presented findings to IBM executives"
)
"Completed comprehensive internal training in internal network penetration, web application security, cryptography, social engineering, and mobile application security",
"Worked in team to develop a C2 system using ETW for opportunistic traffic sniffing on Windows devices, enabling command execution and communication without direct socket use. Created and presented a proof of concept to IBM executives",
),
)

#entry(
Expand All @@ -34,58 +39,36 @@
"Columbus, Ohio",
"May 2022 - August 2022",
(
"Develop processes to track and document vulnerability remediation across over four thousand devices",
" Worked with the myriad of tools used to secure and manage large enterprise environments including CrowdStrike, Qualys, and the SolarWinds suite"
)
"Develop processes to track and document vulnerability remediation across four thousand devices",
"Worked with the myriad of tools used to secure and manage large enterprise environments including CrowdStrike, Qualys, and the SolarWinds suite",
),
)

== Athletics
== Extracurricular
#chiline()

#entry(
"The Ohio State University Pistol Team",
"Varsity Student-Athlete",
"OSU Cyber Security Club",
"Vice President / Member",
"Columbus, Ohio",
"August 2020 - Present",
(
"Dedicate 20+ hours a week to training and practice while maintaining a full academic course load",
"Communicate with teammates of various demographic backgrounds to establish a positive team environment",
"2021, 2022 All-American, OSU Scholar Athlete"
)
)

#entry(
"US National Shooting Team",
"Athlete",
"Columbus, Ohio",
"August 2016 - Present",
(
"Learn to communicate with various cultures while competing in worldwide locations",
"2018 CAT Games Mexico, 2018 Sourth Korea World Championship team, 2019 Pan-American Games Lima, 2020 Tokyo Olympian, Rapid Fire Pistol"
)
"Member of the winning RIT ISTS 2022 team. Competed in ISTS 2022-2024",
"Participated in the Cyber Truck Challenge 2022, working in a six-person team to map and attack heavy truck engine control units, communication networks, and cyber-physical systems. Presented findings and vulnerabilities to OEMs",
"Collaborated with the Truck Cybersecurity Research Group to develop attack methodologies for Engine Control Units",
"Design Python network support for J1939 intelligent fuzzers and J1939 Transport Protocol",
),
)

== Extracurricular
#chiline()

#entry(
"Center for Automotive Research OSU",
"Undergraduate Researcher",
"Columbus, Ohio",
"July 2022 - May 2023",
"Athletics Experience, Target Pistol Shooting",
"US National Team",
"OSU Varsity Athelete",
"August 2016 - 2024",
(
"Worked with OSU Truck Cybersecurity Research Group to develop attacks for Engine Control Units",
"Design Python network support for J1939 intelligent fuzzers and J1939 Transport Protocol"
)
"Dedicate 20+ hours a week to training and practice while maintaining a full academic course load",
"Communicate with teammates of various demographic backgrounds to establish a positive team environment",
"2021, 2022, 2023, 2024 All-American, OSU Scholar Athlete",
"2018 CAT Games Mexico, 2018 Sourth Korea World Championship team, 2019 Pan-American Games Lima, 2020 Tokyo Olympian, Rapid Fire Pistol",
),
)

#entry(
"OSU Cyber Security Club",
"Vice President / Member",
"Columbus, Ohio",
"August 2020 - Present",
(
"Member of six person Information Security Talent Search (RIT ISTS) 2022 winning team from OSU",
"Part of the six-person Cyber Truck Challenge 2022 team from OSU. Mapped and attacked heavy truck engine control units, communication networks, and cyber physical systems. Presented to OEMs on vulnerabilities"
)
)

0 comments on commit d3f84b1

Please sign in to comment.