Hi, I'm Jonathan! Aspiring Cybersecurity / IT Specialist
Iโm a junior in Computer Science at UNC Charlotte with a concentration in Cybersecurity.
Passionate about technology and security, Iโm building skills across programming languages and tools.
This portfolio highlights my hands-on projects, competitions, and achievements, reflecting my commitment to continuous learning and real-world application of cybersecurity skills.
- ๐ต๏ธ Holmes CTF 2025: Write-Up - An official write-up on the Holmes Capture the Flag 2025 competition.
- ๐ Kali Linux Malware Analysis: Home Lab - An analysis of a metasploit payload in action.
- โป๏ธ The Conscious Closet - An educational website on sustainable fashion and best practices.
- ๐ฅ Hospital Management Database System Project - A class project that developed a Hospital Management Database System to manage patients, doctors, billing, and insurance using a relational SQL database.
HackTheBox: North Carolina Army National Guard CTF | Team Competition
Tools: Volatility3, Promon, Docker, Kali Linux, OSINT, Reverse Engineering, Digital Forensics, AI Exploitation, Web Exploitation
- Collaborated with a team of 5 peers as part of UNC Charlotteโs 49th Security Division in a Hack The Box Capture The Flag event hosted by the North Carolina Army National Guard, facing 23 collegiate teams.
- Captured 15+ forensic and exploitation-based flags across multiple domains including OSINT, reverse engineering, digital forensics, and AI exploitation.
- โ Placed 2nd overall โ demonstrating excellence in technical analysis, collaboration, and applied forensics under timed competition conditions.
Hack The Boo 2025 | Solo Competition
Tools: OSINT, Reverse Engineering, Digital Forensics, Web Exploitation, PWN, Crypto, Python, BinaryNinja, Ghidra, Wireshark, Kali Linux
- Competed individually in Hack The Boxโs annual Halloween-themed Capture the Flag competition.
- Solved 15 out of 23 challenges spanning OSINT, reverse engineering, digital forensics, and exploitation techniques.
- โ Placed Top 9% (259 / 2,893 participants) โ demonstrating growth in problem-solving, persistence, and technical adaptability across multiple cybersecurity domains.
Holmes CTF 2025 | Team Competition
Tools: Event Viewer, Wireshark, Ubuntu, VMware, PowerShell
- Collaborated with a team of 5 peers in a week-long global Capture the Flag competition.
- Solved 50 forensic/security tasks spanning Threat Intel, SOC, DFIR, and Malware Reversing.
โ Placed Top 8% (634/7,085 teams) โ showcasing blue-team defense, forensics, and teamwork.
- Google Cybersecurity Professional
- ISC2 Candidate
- Responsive Web Design (freeCodeCamp)
- JavaScript and Data Structures (freeCodeCamp)
Security Tools: Kali Linux, Splunk, Wireshark, Metasploit, Nmap, Suricata, John the Ripper, Windows Event Viewer, Volatility3
Programming/Scripting: Python, Java, C, SQL, Bash, PowerShell, HTML/CSS/JS
Systems & Platforms: Linux, Windows, IAM/IDM, Azure, Virtualization