This site documents my ongoing development in digital forensics and cybercrime investigation. Through structured academic training and simulated casework, I am building the technical discipline required to analyze digital evidence, reconstruct cyber incidents, and document findings with forensic rigor.
A concise activity gallery of what I’ve been building, leading, and learning.
Security+ earned and baseline competencies established; focusing next on casework and investigative fundamentals.
Over the past few weeks, we’ve accomplished key milestones, including...
We met amazing student leaders and alumni, and shared our mission...
Over the past few weeks, we’ve introduced 4th and 5th graders to the exciting world of STEM through hands-on activities in...
The perfect opportunity to highlight the importance of STEM and to share the impact NSBE...
Initiative to distribute school supplies, food, personal care products, clothes, and more to the Tampa Bay community..
Want the full activity stream? I post concise updates and supporting media on LinkedIn.
View LinkedIn →The capabilities I’m actively practicing and proving through simulated casework.
Wireshark-based analysis, baseline vs anomalous behavior, and evidence notes.
What can be proven, what is unknown, and what evidence would close gaps.
Event sequencing across artifacts + logs with clear documentation discipline.
Auth/system/web logs, persistence checks, and disk evidence handling (Case‑002).
Core lab tooling used for analysis, validation, and reproducibility.
Baseline security concepts supporting investigative practice and lab work.
Simulated investigations demonstrating forensic methodology and evidence analysis
Completed simulated investigation analyzing recurring after-hours outbound HTTPS activity, incorporating baseline comparison, packet-level analysis, persistence validation, and structured timeline reconstruction.
Planned DFIR simulation on an isolated lab network: deterministic web exploit (DVWA) → foothold shell → root via misconfiguration → persistence (SSH keys + systemd) → staged data exfil (scp/curl).
Available for internships and entry-level roles aligned with digital forensics, incident response foundations, and investigative cybersecurity