Resume

Professional Summary

Table of Contents

Cybersecurity analyst with experience in incident response, vulnerability research, and security operations within a defense contractor environment. Passionate about offensive security and actively training toward a career in penetration testing. Proven ability to operate within structured enterprise security programs, contribute to threat triage and tool procurement, and deliver research presentations to senior government stakeholders.


Experience

Information Assurance Analyst — Leonardo DRS

February 2025 – Present

Member of the Cyber Emergency Response Team (CERT) responsible for protecting enterprise systems across a defense contractor environment.

  • Perform incident response and triage on emerging threats according to the PICERL response process, including documentation
  • Conduct vulnerability research across the Active Directory environment and coordinate with IT to remediate discovered vulnerabilities
  • Utilize industry-standard security monitoring tools such as Splunk, SentinelOne, Proofpoint, and the Microsoft Defender suite
  • Assist with the evaluation, selection, and procurement of new security tools

Cybersecurity Analyst Intern — Leonardo DRS

June 2024 – February 2025

  • Performed incident response on emerging threats as a member of the CERT, following established playbooks, runbooks, and incident response procedures
  • Conducted incident analysis using security monitoring platforms including Proofpoint, Splunk, and the Microsoft Defender suite
  • Identified vulnerabilities within the organization and collaborated with IT on remediation efforts
  • Gained hands-on experience with corporate security structure, acceptable use policies, and documentation standards

Certifications & Training

  • Certifications
  • Courses
CertificationOrganizationEarned
Cybersecurity Analyst+ (CySA+)CompTIADec 2025
Security+CompTIAJul 2024
Practical Ethical Hacking (PEH)TCM SecurityJan 2023

In Progress:

  • HTB Certified Penetration Testing Specialist (CPTS) — HackTheBox
CourseOrganization
Blue Team FoundationsBlack Hills Information Security
Cisco CCNA 200-301 - The Complete Guide to Getting CertifiedUdemy

In Progress:

  • Penetration Tester Learning Path — HackTheBox

Education

Bachelor of Science in Information Technology — Miami University

College of Liberal Arts and Applied Science — 2024

  • Concentration: Networking and Security
  • Thematic Sequence: Organizational Leadership

Projects

Security Research & Initiatives

  • Independently researched and identified gaps in coverage for Active Directory attack vectors including LLMNR/NBTNS poisoning and IPv6 DNS takeover via DHCPv6 spoofing
  • Collaborated with IT to implement Group Policy changes and configuration hardening to mitigate discovered vulnerabilities
  • Stood up new automation initiatives including alerting on new vulnerabilities for monitored software in our case management platform and facilitating communication between various platforms to centralize case management
  • Stood up new process for monitoring, assessing, and taking down spoofing domains
  • Utilized offensive security tools to crawl company website to identify employee email addresses to assess attack surface following a phishing incident

Home Lab

Self-hosted infrastructure running on a Raspberry Pi and VPS, built and maintained entirely independently.

  • Deployed and managed multiple services on a Raspberry Pi including a Jellyfin media server, Pi-hole DNS sinkhole, n8n automation platform, and Headscale (Tailscale) VPN coordination server
  • Configured Tailscale exit node routing through Mullvad VPN via WireGuard for privacy-preserving remote access
  • Built an automated vulnerability alerting pipeline using n8n that monitors for CVEs affecting lab services and delivers alerts via Signal
  • Hosted this website (cadenrasey.com) and a personal knowledge base on the Raspberry Pi, syncing dynamically with Obsidian notes

Capture the Flag Competitions

  • SANS NetWars — Placed 15th out of 90 competitors (top 17%)
  • HackTheBox Cyber Apocalypse 2025 — Placed 705th out of 8,130 teams (top 9%)
  • Active on HackTheBox, completing penetration tests across machines with diverse OS and service configurations

Penetration Tester Learning Path (In Progress) — HackTheBox

  • Completing the comprehensive Penetration Tester path on HackTheBox
  • Covers Active Directory attacks, web application testing, network pivoting, post-exploitation, and professional reporting
  • Directly prepares for the HTB Certified Penetration Testing Specialist (CPTS) certification

Miami University

Study Abroad: Computers and the Homeless

Manchester, England

  • Month-long study abroad focused on providing technology access to the homeless population
  • Collaborated with Lifeshare, a nonprofit organization delivering internet literacy programs
  • Wrote a Python script to perform web accessibility checking and suggest fixes, integrated with the ChatGPT API
  • Established and delivered a pitch presentation for a collaboration platform to the Lifeshare client

Diplomacy Lab — Miami University × U.S. Department of State

  • Research project and virtual presentation delivered to the U.S. Department of State
  • Presented to over a dozen members across IT and security divisions on the use of Artificial Intelligence in voice phishing (vishing) attacks
  • Covered practical threat vectors, real-world attack scenarios, and defensive recommendations

Technical Skills

Security Operations

Incident Response (PICERL), Vulnerability Research, Vulnerability Management, Threat Triage, OSINT, Phishing Analysis, Active Directory Security, Shadow IT Detection, Penetration Testing

Security Monitoring

Splunk, SentinelOne, Proofpoint, Microsoft Defender Suite, Carbon Black, ZScaler, Phishlabs, Nessus

Enumeration & Reconnaissance

Nmap, Gobuster, ffuf, Feroxbuster, Nikto, enum4linux-ng, smbclient, smbmap, ldapsearch, Wireshark, theHarvester, CeWL, Shodan, Amass, dnsrecon, WhatWeb

Exploitation

Burp Suite, Metasploit, MSFVenom, Responder, Mitm6, ntlmrelayx, Impacket Suite (secretsdump, psexec, wmiexec, smbexec), NetExec, Hydra, Evil-WinRM, SQLMap, Netcat, Socat

Post-Exploitation

Mimikatz, Rubeus, Kerbrute, Hashcat, John the Ripper, linPEAS, winPEAS, Chisel, Ligolo-ng, Proxychains, BloodHound

Attack Techniques

LLMNR/NBTNS Poisoning, SMB Relay, IPv6 DNS Takeover, Kerberoasting, AS-REP Roasting, Pass the Hash, Pass the Ticket, Password Spraying, Credential Dumping, Web Shells, OWASP Top 10

Scripting & Automation

Python, Bash, PowerShell, n8n

Infrastructure

Linux (Kali, Ubuntu, Arch), Windows Server, Active Directory, DNS, Nginx, Apache, Docker, Git, WireGuard/VPN, Tailscale/Headscale


References available upon request