top of page
Electronic Board

Projects

I’d love to be able to share some of my larger projects with you, but unfortunately, they are not in the public domain. However, I can share  various work from my presentations, technical writing, and my IT home lab projects and coursework.

Information Systems: 
Safety, Security & Compliance

Abstract Architecture

Performing Incident Response and Forensic Analysis

Analyzed network packet logs and the disk image for evidence; prepared findings in an incident report.

​

Tools: NetWitness, Autopsy, The Sleuth Kit

Assessing Common Attack Vectors

Investigated and conducted injection-based attacks, malware-based attacks, DOS attacks and social engineering techniques.

​

Tools: OWASP Juice Shop, Metaspoit Framework Firefox, Web Developer Tools, Irssi, Social Engineering Toolkit (SET), Thunderbird

Implementing Security Monitoring and Logging

Configured and deployed an IDS to monitor file integrity/track changes and suspicious network traffic in a Linux and Windows environment; configured and deployed pfSense firewall  using rules and a passlist; configured Snort as an IPS.

​

Tools: Snort, Tripwire, Windows Event Viewer, pfSense firewall

Performing Packet Capture and Traffic Analysis

Tools: Wireshark, PuTTy, FileZilla, Mininet-WiFi, Airodump-ng, Aireplay-ng

Using Encryption to Enhance Confidentiality and Integrity

Tools: Kleopatra, OpenSSL

Configuring Backup and Recovery Functions

Tools: NFS, Wbadmin, pfSense, Vi Editor, WindowsServer Backup

Abstract Shapes

Performing Vulnerability Assessment

Used Nessus to conduct a vulnerability assessment and identify high-risk vulnerabilities; Nmap commands within Zenmap to scan the virtual network and identify devices on the network and the operating systems and services running them. Conducted an approved penetration test as an external auditor using Nmap and OpenVAS, prepared a formal penetration test report

​

Tools: Zenmap, Nmap, Nessus, OpenVAS/Greenbone Security Manager

Curved Architectural Structure

Implementing an IT Security Policy

Tools: Windows Defender, Security Compliance Toolkit (SCT), Group policy Management Console, Active Directory Users and Groups, 

​

Molecules Bio

Applying User Authentication and Access Controls

Tools: PowerShell, TrueNAS, Active Directory 

Marketing

Lead Magnet

This is a sample of a lead magnet for a home improvement company branching into the solar industry. I also ran and managed the company's social media ads using this and similar documents: increasing website traffic, strong leads, and their bottom line. The sample was created using Canva.

​

View full document

Cover KMHI LM.png
Page 3 KMHI LM.jpg

Curriculum & Instruction

Here are a few samples of curriculum and instructional materials I have created for college board and honors courses, such as AP Biology, AP Environmental Science, Honors Physics.

​

View full document 1

​

View full document 2

Cover Exam.png
Cover Vertical Projectile.png

Presentations

Here are a few samples from presentations I have created and presented over the course of my career. 

​

View full document 1

​

View full document 2

​

View full document 3

Cover presentation RNA club.png
Cover Emerging Tech.png
Cover Research day.png

Proposals & Grants

Here are two proposal writing samples.

 

Sample 1 is of a research proposal for a PhD program using various quantitative and qualitative methods (Root-Cause Analysis, Ishikawa Analysis). The problem of practice covered student engagement, achievement, and motivation in secondary stem-related classes. 

​

Sample 2 is the aims page of an awarded NIH research grant.

​

View full document 1

​

View full document 2

RKPP cover.png
Cover Specific Aims.png
bottom of page