I am starting my career in Cyber Security, with my goal currently set on a Penetration Testing role. My employment history has primarily been in hospitality/food service ever since I was in High School, working summers as a server through college, a summer internship at a wastewater treatment plant, plus some retail experience at Best Buy and Geek Squad. To say the least, I'm well diverse in many technical and interpersonal skills and experienced with talking to people, de-escalation, and providing customer service. My formal education includes two Bachelors Degrees from Oregon State University: Environmental Engineering, and more recently, in Computer Science. I hope that I can bring the analytical and problem solving skills of engineering and development skills of computer science and really make an impact in the world. Penetration Testing:* Self-taught penetration testing, learned from Udemy courses, virtual home-lab, HackTheBox, TryHackMe, eLearnSecurity's PenTest Student (PTS) course, and Offensive Security's 2020 Penetration Testing w/ Kali (PWK) course. * TryHackMe's "Throwback" Active Directory Hacking Lab. 30 days of access to a network comprised of two Domain Controllers, pfSense firewall, mail servers, web servers, and user workstations. Learned and practiced Active Directory enumeration and exploitation, lateral movement, firewall pivoting, Kerberos abuse, C2 frameworks, and abusing cross-domain trusts. * Currently learning and practicing hacking skills on TryHackMe, both in offensive and defensive security. Writing up what I've learned on my blog, https://hex-men.tech. Noteworthy Programming Projects: * Created a .dll cheat written in C++ and Assembly for PWN Adventure 3, an MMORPG game created for Ghost in The Shellcode 2015. This involved dynamic debugging of the game using Cheat Engine and x64dbg to map out Unreal Engine-world and player objects, and their memory pointers. IDA ad Ghidra were used to further reverse engineer the game code in order to use function calling and hooking methods to manipulate the game. A graphical user interface with DirectX allowed the user to toggle certain cheats: infinite health and mana, teleportation, change player speed, and spawn items in the inventory. All this was completed in one Semester with no prior game hacking or reverse engineering experience; all self-taught and learned along the way.
Securitymetrics
View- Website:
- securitymetrics.com
- Employees:
- 272
-
Associate Penetration TesterSecuritymetricsEugene, Or, Us
X K Education Details
-
Computer Science -
Environmental/Environmental Health Engineering
Frequently Asked Questions about X K
What company does X K work for?
X K works for Securitymetrics
What is X K's role at the current company?
X K's current role is Associate Penetration Tester.
What schools did X K attend?
X K attended Oregon State University, Oregon State University.
Who are X K's colleagues?
X K's colleagues are Ariel Mckenna, Colton Hyer, Aaron Cottam, Jessica Herrera, Gretchen Favila, Chad Astle, Toma Davies.
Not the X K you were looking for?
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial