Georgia Tech Research Institute
Graduate Intern
Temp-Engineer
Undergraduate Researcher
Stoney's Appliance Repair LLC
Independent Contractor
University of North Georgia
Cybersecurity and Computer Science Tutor
Resident Assistant
U.S. Army Cyber Command
Information Technology Intern
Monster Beverage Corporation
Brand Ambassador
Moe's Southwest Grill
Team Member
Kentucky Fried Chicken
Cook Trainer
Georgia Institute of Technology
M.S. in Cybersecurity
VIP (Vertically Integrated Program)
Cybersecurity and Embedded Systems
University of North Georgia
B.S. in Cybersecurity with Minor in Computer Science
SANS Technology Institute
SEC401, Security Essentials, PASSED
GSEC (GIAC Security Essentials Cert.)
SEC504, Hacker Tools, Techniques, and Incident Handling, PASSED
GCIH (GIAC Certified Incident Handler)
GSEC (GIAC Security Essential Certification)
expires on May 30, 2031
GCIH (GIAC Certified Incident Handler)
expires on July 31, 2028
Cisco EH (Ethical Hacker)
issued Nov 2023
Introduction to MongoDB
issued Mar 2023
M121: The MongoDB Aggregation Framework
issued Mar 2023
OPIc Mandarin Language Proficiency L1
expired on Aug 5, 2024
OPIc Japanese Language Proficiency Intermediate Low
expired on Aug 6, 2023
Autonomous AI Drone
Currently creating an autonomous AI drone system by training a vision model to navigate a race course using an FPV camera and basic MAVlink protocol for Andruil's AI Grand Prix competition.
Operational Assessment
Worked on a publication for the U.S. Army Cyber Command about intern effectiveness with the operational assessment of Superset and Druid replacing Microsoft’s PowerBI.
Network Investigation
Investigated network evidence from a ransomware attack against a Linux system. Analyzed network traffic capture (pcap file) and Splunk logs to identify compromised systems, C2 server communication, and timeline of events.
Windows Examination with PowerShell
Utilized PowerShell scripting to identify malware indicators (IOCs) for Calcache and Dynamics samples in Windows 10, employing process analysis, network connection inspection, registry key examination, and differential analysis techniques.
Windows Threat Analysis with Hayabusa
Utilized Hayabusa for Windows event log analysis and Sigma rule-based threat detection in a ransomware attack investigation.
Real Intelligence Threat Analytics (RITA)
Utilized Real Intelligence Threat Analytics (RITA) and Zeek to analyze network traffic logs, identify anomalous Command and Control (C2) activities, and enhance threat detection capabilities.
Self-hosted LLM Service
Self-hosted private LLM chat service using Ollama and StreamLit for enhanced data privacy and research.
For details and more Projects please see my GitHub (https://github.com/ScottSnow13)
Thank you for viewing my website!