Passionate professional possessing a solid foundation of technical experience and expertise in digital forensic techniques. Dedicated candidate that holds a Top Secret/SCI clearance. Communicative collaborator accustomed to standard computer operating networks and hardware and security software. Analyst skillful in managing and breaking down large volumes of information. Dedicated to analyzing findings in investigative matters and developing fact-based technical reports to detail events over specified periods of time.
August 23, 2022 - Current (20 hours per week)
Supervisor: Scott Gilliam - (205) 347-0608
Internship for Credit Hours
May 22, 2023 - August 20, 2023 (40 hours per week)
Summer Internship - Office of the Inspector General
Supervisor: David Hawbecker 202-809-1764
Hourly Wage: $22.10 (GS-6)
March 9, 2019 - August 2, 2022 (30 hours per week)
Supervisor: Terra Weber - (270) 978-9022
Seasonal, Hourly Wage: $2.30
Top Secret
Basic Military Training
United States Air Force , Cyber Systems Operations Technical School
Magnet Forensics Training Conference
Digital Forensics for National Security Conference
Python Script for GrayKey
Penguin Project, Playhouse in the Park
June 2022 , Murray, KY
• Aided to children and young adults with disabilities
• Assisted in the deconstruction of the set. • Ensured the cleaning process was safe and effective.
St. Jude Memphis Marathon
August 2021 — December 2021, Memphis, TN
• Assisted in raising funds for St. Jude Research Hospital.
• Committed and raised money to meet the gold standard of at least $3,000 raised.
• Participated and assisted with the half marathon to encourage support of St. Jude.
United States Air Force Reserve
Feb 6, 2021 — Present
Montgomery, AL
Senior Airman, E-4; Part-Time, Salary: $319 Monthly
Infrastructure Technician (Cyber Systems Operator)
Supervisor: TSgt Greg Cothran; NCOIC, Knowledge Management; (334) 657-0271
Duties/Responsibilities:
• Awarded Airmen of the Quarter.
• Designed, installed, and supported Air Force systems and ensured defensive computer operations systems were working properly.
• Supports identification, reconnaissance, and remediation of vulnerabilities while enhancing capabilities within cyber environments to achieve desired effects.
• Assisted in supporting DoD Microsoft Office Applications to create a cohesive unit.