Security tooling
Building forensic and defensive workflows around AI artifact reconstruction, evidence integrity, and local-first review.
Towson University · Information Technology / Network Security
Security-focused IT student building infrastructure, forensic tooling, and defensive automation.
I work on hands-on systems projects that combine Linux administration, Docker, Proxmox, cloud deployment, Python, Rust, and security documentation. My strongest work focuses on reproducible workflows: forensic artifact review, homelab automation, defensive security labs, and local-first data pipelines.
Linux systems, forensic tooling, Docker pipelines, Proxmox labs, and deployable web infrastructure.
Focused on IT infrastructure, systems administration, security operations, and cybersecurity tooling roles.
Current work spans projects, writing, infrastructure notes, and hands-on technical experience.
Building forensic and defensive workflows around AI artifact reconstruction, evidence integrity, and local-first review.
Deploying and documenting Linux, Docker, Proxmox, Cloudflare, Nginx, CI/CD, and self-hosted systems.
Turning broken or experimental systems into reproducible, documented case studies with clear architecture and debugging notes.
Local-first forensic review platform for reconstructing AI-artifact activity timelines with evidence integrity preserved during degraded auth or network states.
Dockerized traffic vision pipeline using MDOT HLS streams, Redis queues, YOLO inference, TimescaleDB, and Streamlit dashboards, hardened from fragile prototype into repeatable local stack.
Ephemeral honeypot orchestration on Proxmox for repeatable defensive security testing in homelab conditions.
Astro portfolio deployed on a hardened DigitalOcean VPS with Nginx, TLS, and GitHub Actions CI/CD.
Education, work history, technical skills, and the projects most relevant to IT and security roles.
View experience →The Productivity Trap: Balancing Connectivity and Forensic Privacy
Read latest article →