NT-AUTH-NewPrompt
Windows capability leveraging NT AUTHORITY mechanisms to spawn an elevated prompt. Demonstrates advanced Win32 API usage including token manipulation and privilege escalation techniques at the user-level.
View on GitHub
Senior Software Engineer specializing in low-level systems and distributed architectures, with expertise in C/C++ development across Windows and Linux environments. Experienced in Windows internals, networking, and performance-critical software, with a background in security-focused engineering and adversarial environments. Proven ability to design, integrate, and deploy production AI systems that accelerate development and drive measurable outcomes.
Senior Software Engineer with experience building low-level systems and distributed software across Windows and Linux environments, including work in security-focused and adversarial contexts. Specialized in Windows internals and Win32 API development, with a focus on reliability and performance in constrained environments. Leads agile development for a team of four engineers, managing delivery and stakeholder expectations end-to-end.
Proven track record designing and delivering system-level capabilities, leading large-scale cybersecurity operations planning, and developing solutions that improve visibility into enterprise network performance and security posture.
Proven AI integration expertise — from architecting LLM-powered pipelines and deploying production inference APIs to embedding AI-assisted workflows that cut development cycles and surface actionable intelligence faster. Want to see it firsthand? Feel free to talk to the AI assistant on this page.
780th Military Intelligence Brigade · Fort Gordon, GA
White Knight Labs · Atlanta, GA (Remote)
U.S. Army Cyber Protection Brigade · Fort Gordon, GA
U.S. Army Cyber Protection Brigade · Fort Gordon, GA
U.S. Army Cyber Protection Brigade · Fort Gordon, GA
U.S. Army Cyber Training Battalion · Fort Gordon, GA
A selection of open-source work I've built or contributed to recently — tools and proof-of-concepts that reflect my focus on Windows internals and offensive capability development.
Windows capability leveraging NT AUTHORITY mechanisms to spawn an elevated prompt. Demonstrates advanced Win32 API usage including token manipulation and privilege escalation techniques at the user-level.
View on GitHub
Proof-of-concept demonstrating abuse of SeRestorePrivilege in Windows
environments. Enables targeted file system manipulation for privilege escalation
scenarios, implemented in C against the Win32 API.
Georgia Institute of Technology · Atlanta, GA
White Knight Labs
Retained for part-time contract work after delivering high-impact results during an Army-sponsored internship.
University of South Florida
Helped develop a catalyst for syngas reformation for use in a $2M pilot plant.
Resolute Forest Products
Enabled conversion of main paper machine to alkali process; chemical dosage calculations yielded approximately $5M in annual savings.
Oak Ridge National Laboratory
Developed a technique improving accuracy in mass spectrometry data evaluation, saving approximately 10% of analysis time for researchers worldwide.
Open to discussing roles in offensive security, capability development, or red team engineering.