This commit is contained in:
@@ -58,7 +58,7 @@
|
||||
<ul>
|
||||
<li>Aug 2019 – Dec 2024</li>
|
||||
<li>Secure Software Development, Embedded Systems, Cybersecurity Engineering</li>
|
||||
<li>Software Reverse Engineering, System Security, Network Security</li>
|
||||
<li>Software Reverse Engineering, System Security, Network Security, ML/AI</li>
|
||||
</ul>
|
||||
<h1>Experience</h1>
|
||||
<h2>The University of Alabama System Management and Production Center, Research Assistant II</h2>
|
||||
@@ -78,7 +78,8 @@
|
||||
<h2>Embedded Systems Development: platforms include ESP-32, Arduino, and MSP430.</h2>
|
||||
<h2>Web development includes HTML templating using Pug, a JavaScript library. NodeJS for backend development.</h2>
|
||||
<h2>At UAH, I use IDA Pro and Ghidra for reverse engineering solutions.</h2>
|
||||
<h2>Extensive set of working abilities with IDS/IPS (Regional UAH Rep. Cyber Defense at CCDC)</h2>
|
||||
<h2>Extensive set of working abilities with IDS/IPS</h2>
|
||||
<h2>Used tools like Kali, Wireshark, and metaspolit in CPE 649 to attack systems.</h2>
|
||||
<h1>Projects</h1>
|
||||
<h2>Backy (<a href="https://backy.cybershell.xyz">https://backy.cybershell.xyz</a>)</h2>
|
||||
<ul>
|
||||
|
||||
Reference in New Issue
Block a user