RESUME
****, ***** *****, ****, ** *****, *****************@*****.***, 720-***-****
GitHub, LinkedIn
EDUCATION & CERTIFICATION
UNIVERSITY OF COLORADO BOULDER, Boulder, CO
B.A in Computer Science, Minor: Business May 2025
Relevant Courses: Data structures, Computer System, Database systems, Algorithms and Software, Object-Oriented Analysis/Design, Intro to Cybersecurity, Datamining, HCI human interaction, Relevant Course work GPA: 3.6
GOOGLE CYBERSECURITY CERTIFICATION December 2024
Comprehensive certification covering key cybersecurity concepts including network security, Security frameworks, controls, design principles.
COMPTIA SECURITY+ Jan 2025 – Jan 2028
general security concepts, threats and vulnerabilities, security architecture, operations, and program management COMPTIA NETWORKING+ June 2025 – June 2028
configuring, managing, and troubleshooting networks, as well as understanding network security and related technologies TECHNICAL SKILLS
Languages: C++, Python, Java, HTML, JavaScript, MySQL, MongoDB, Assembly
Development: Git Version Control, Agile Methodology, Object-Oriented Programming (OOP)
Data Structures: Arrays, Stacks, Queues, Linked Lists, Trees, Hash Tables
Tools: GitHub, Burp Suite, VS Studio, IntelliJ, Wireshark, Nmap, kali Linux
Cybersecurity: Introductory knowledge of Cybersecurity protocols and standards EXPERIENCE
Home Networking Summers 2020-2021
Freelancer
Setting up route configurations, securing wi-fi setup and network segmentation. Also created server virtualizations via Docker and deployed custom home servers for friends and family. Projects
Space Invaders (C++)
• Simulated a space theme game in a randomly generated grind environment where the players can buy, sell, visit planets and fight creatures to aim for the highest score using C++
University Course Identification System (C++)
• Built a data structure system using Hash Tables to store and retrieve University of Colorado Boulder’s course and professor information.
• Implemented Open Addressing, Chaining, and Binary Search Trees to optimize course lookups. Hack the Server
• Conducted a simulated penetration test as part of a cybersecurity course to identify server vulnerabilities and capture a hidden flag.
• Used tools like Wireshark for traffic analysis and Nmap for port scanning and service enumeration.
• Exploited discovered vulnerabilities to establish a remote SSH connection, gaining access to the target server.
• Demonstrated secure shell command-line navigation and file system inspection to locate and extract the challenge flag. ADDITIONAL INFORMATION (or PERSONAL INTERESTS)
Comfortable working in physically demanding technical environments; familiar with tasks like cable routing, equipment mounting, and basic hardware troubleshooting.
Proficient with Linux command-line tools and remote server access (SSH), as well as scripting basic tasks and network diagnostics Proficient in using google, ai tools for in problem solving. Proficient in Microsoft Office suite of products (including Word, Excel, PowerPoint and Outlook in problem solving.