Georgia Institute of Technology
Master of Science in Cybersecurity
Information Security Track
University of North Georgia
GPA: 3.85
B.S. Cybersecurity with Minor in Computer Science
Georgia Institute of Technology
VIP (Vertically Integrated Program)
Cybersecurity and Embedded Systems
SANS Technology Institute
SEC401, Security Essentials, PASSED
GIAC GSEC (GIAC Security Essentials Cert.)
SEC504, Hacker Tools, Techniques, and Incident Handling, PASSED
GIAC GCIH (GCIH Certified Incident Handler)
GIAC GCIH (GIAC Certified Incident Handler)
expires on July 31, 2028
GIAC GSEC (GIAC Security Essential Certification)
expires on May 30, 2027
Cisco EH (Ethical Hacker)
issued Nov 2023
Introduction to MongoDB
issued Mar 2023
M121: The MongoDB Aggregation Framework
issued Mar 2023
OPIc Japanese Language Proficiency Intermediate Low
expired on Aug 6, 2023
OPIc Mandarin Language Proficiency L1
expires on Aug 5, 2024
Georgia Tech Research Institute
Graduate Intern
Georgia Tech Research Institute
Assured Software and Information Engineer Temp
Monster Beverage Corporation
Brand Ambassador
University of North Georgia
Cybersecurity and Computer Science Tutor
University of North Georgia
Resident Assistant
Georgia Tech Research Institute
Undergraduate Researcher
U.S. Army Cyber Command
Information Technology Intern
Moe's Southwest Grill
Team Member
Kentucky Fried Chicken
Cook Trainer
Windows Examination with PowerShell
Utilized PowerShell scripting to identify malware indicators (IOCs) for Calcache and Dynamics samples in Windows 10, employing process analysis, network connection inspection, registry key examination, and differential analysis techniques.
Network Investigation
Investigated network evidence from a ransomware attack. Analyzed network traffic capture (pcap file) and Squid proxy logs to identify compromised systems, C2 server communication, and timeline of events.
Windows Threat Analysis with Hayabusa
Utilized Hayabusa for Windows event log analysis and Sigma rule-based threat detection in a ransomware attack investigation.
Real Intelligence Threat Analytics (RITA)
Utilized Real Intelligence Threat Analytics (RITA) and Zeek to analyze network traffic logs, identify anomalous Command and Control (C2) activities, and enhance threat detection capabilities.
AWS Bucket Discovery
Successfully identified and accessed misconfigured cloud storage buckets using AWS CLI, bucket_finder, and CeWL, demonstrating proficiency in cloud security assessment and reconnaissance techniques.
Operational Assessment
Worked on a publication for the U.S. Army Cyber Command about intern effectiveness with the operational assessment of Superset and Druid replacing Microsoft’s PowerBI.
For details and more Projects please see my GitHub (https://github.com/ScottSnow13)
Mike and Lynn Cottrell Business Scholarship
Issued by the University of North Georgia
DoD CLDP Scholarship
Issued by the University of North Georgia
Zell Miller Scholarship
Issued by the University of North Georgia
Hammock Scholarship
Issued by the University of North Georgia
2024 Cyber Excellence Award
Issued by the University of North Georgia
NCL Fall 2023 3rd Place
Issued by the National Cyber League