> init_sequence.sh
Focusing on Offensive Security, Network Engineering, and Vulnerability Research.
I specialize in bridging the gap between physical infrastructure and digital security. With field experience in enterprise Access Control and CCTV systems, I combine hands-on hardware expertise with offensive security research in Web Applications and CTFs.
My approach is holistic and practical—securing the physical perimeter with the same rigor as the digital network. I actively compete in CTFs and perform Bug Bounty research under the handle Flamingo444.
Bachelor of Science in Cybersecurity
AC/AV Installation Technician
High-end installation and configuration of business security solutions. Specialized in deploying Geovision CCTV camera systems, commercial audio-visual setups, and integrated access control hardware for enterprise clients.
AC/AV Installation Technician
Deployed robust access control and CCTV infrastructure using industry-standard ecosystems including Brivo, Avigilon, Control4, Doorking, Dormakaba, and Schlage. Responsibilities included complex hardware installation and security management system integration.
Access Control Assistant Technician
Led small teams in large-scale access control deployments (75+ locks/day). Focused on Salto hardware installation, system maintenance, and ensuring compliance with university security standards.
Beyond digital security, I have extensive experience in the physical domain, designing and deploying robust Access Control and Surveillance systems. I understand that true security requires bridging the gap between physical and digital infrastructures.












Competing as Flamingo444
| Competition | Team | Rank | Year |
|---|
Vulnerability Researcher
Collaborator: Nina Lam
Discovered a critical vulnerability exposing PII (Personally Identifiable Information) within an Azure environment. Conducted thorough analysis of access controls and responsibly reported findings to the CISO.
Hardware Researcher
Collaborator: Wes Powell
Identified a major security flaw allowing for RFID/NFC card cloning in physical access control systems. Utilized hardware tools like Flipper Zero and Proxmark RDv4 to demonstrate the exploit path.
Developer
Collaborator: Wes Powell
Engineered a Python-based Discord bot to automate high-volume web scraping of NBA, MLB, and NFL player data. Implemented probability algorithms to analyze daily fantasy sports projections.
Automation Engineer
Collaborator: Nicholas Anthony
Developed a high-speed automated checkout platform capable of completing transactions in under 3 seconds. successfully harvested captcha tokens and bypassed sophisticated anti-bot detection.
Personal Project
Designed and maintained a secure virtualized environment using Proxmox, pfSense, and Docker. Hosts offensive security tools and practice targets.