Session 00  ·  Tampa, FL  ·  2026
JAYDEN
WILLIAMS
|
"They say the bounty hunter who carries their work home will never rest.
I carry Splunk dashboards."
✓ Security+ ✓ CySA+ ✓ CSAP Stackable
Cowboy Bebop
Security+ · CySA+ · CSAP · Splunk · Sysmon · MITRE ATT&CK · Wireshark · Python · Azure · AWS · Threat Detection · Log Analysis · Incident Response Security+ · CySA+ · CSAP · Splunk · Sysmon · MITRE ATT&CK · Wireshark · Python · Azure · AWS · Threat Detection · Log Analysis · Incident Response
◆ Session 01 · About
Session 01
ABOUT
Somewhere in Tampa, Florida...

I'm a 19-year-old cybersecurity student at Hillsborough Community College with a 3.60 GPA and Dean's List recognition. I plan to transfer into USF's B.S. in Cybersecurity program in Fall 2027.

My focus is blue team operations, threat detection, log analysis, SIEM engineering, and incident response. I build labs, simulate attacks, and document detections publicly to improve my skills outside the classroom.

I earned Security+ in March 2026 and CySA+ in April 2026, earning the CompTIA CSAP stackable certification. I'm also a member of HCC Cyberhawks and National Society of Black Engineers.

// Status Report
Certs Earned3
Lab Projects5
GPA3.60
Attacks Captured63
Medium Views97+
Medium Reads40
StatusOPEN TO WORK
◆ Session 02 · Projects
Session 02
BOUNTIES
Active hunts, each one documented
Featured Bounty · May 2026 · Published on Medium
COWBOY BEBOP THREAT HUNTING LAB
Three-VM SIEM lab simulating four MITRE ATT&CK techniques: Initial Access, Persistence, Credential Access, Lateral Movement. Red Dragon (Kali) attacked Swordfish II (Windows 11). Bebop (Splunk) caught everything.
SplunkSysmonKali LinuxWindows 11MITRE ATT&CKVirtualBox
Bounty · Apr 2026
24-HOUR AWS HONEYPOT LAB
Deployed T-Pot 24.04.1 on AWS EC2 and captured 63 attacks from 5 unique source IPs within 24 hours. Detected NMAP recon and SSH brute force. Mapped TTPs to 5 MITRE ATT&CK techniques using Kibana and Suricata.
T-PotAWS EC2KibanaElasticsearchSuricata
Bounty · Mar 2026
AZURE VM VULNERABILITY MANAGEMENT
Deployed a Windows VM in Azure, ran Tenable Nessus scans, remediated with PowerShell, and built a GitHub Actions CI/CD pipeline to automate patch execution in a repeatable scan-patch-validate workflow.
AzureNessusPowerShellGitHub Actions
Bounty · Mar 2026
WIRESHARK TRAFFIC ANALYSIS AUTOMATION
Captured and analyzed 24,834 packets using Wireshark, automating identification of top talker IPs, protocol distribution across TCP, UDP, QUIC, and TLSv1.3, and active port activity from raw CSV export using a Python/Pandas script.
WiresharkPythonPandas
Bounty · Feb 2026
SYSMON DETECTION LAB
Installed and configured Sysmon on a Windows 10 VM with a custom XML ruleset. Captured 7+ command executions via Event ID 1. Simulated living-off-the-land techniques using encoded PowerShell.
SysmonPowerShellWindowsMITRE ATT&CK
◆ Currently Building
Active
CURRENTLY BUILDING
Lab · In Progress · 2026 · Second Medium Post
COWBOY BEBOP MALWARE ANALYSIS LAB
Isolated three-VM lab (Bebop/Splunk · Swordfish II · Red Dragon/Kali) performing static analysis on real-world samples sourced from theZoo GitHub repo for full reproducibility, cross-referenced with MalwareBazaar for threat intel context. PEStudio workflow: strings extraction, hash lookup on VirusTotal, PE header analysis (imports, sections, entropy). Episode-name VM snapshots before each sample. All indicators mapped to MITRE ATT&CK.
PEStudioVirusTotalMITRE ATT&CKtheZooMalwareBazaarVirtualBox
◆ Education
Academic
EDUCATION
Expected 2028
UNIVERSITY OF SOUTH FLORIDA
B.S. Cybersecurity · Tampa, FL
Aug 2024 – Dec 2026
HILLSBOROUGH COMMUNITY COLLEGE
A.A. Cybersecurity Pathway · GPA 3.60 · Dean's List
◆ Session 03 · Arsenal
Session 03
ARSENAL
Tools of the trade
CategoryTools & Technologies
Security Tools
SplunkSysmonWiresharkTenable NessusVirtualBoxKali Linux
Languages
PythonC++ (in progress)SQLPowerShellBash
Cloud & Infrastructure
AzureAWS EC2GitVMware
Frameworks
MITRE ATT&CKNIST CSFCVSSOWASP Top 10SIEMThreat DetectionVulnerability ManagementThreat HuntingNetwork Traffic Analysis
Honeypot & SIEM
T-PotKibanaElasticsearchSuricata
◆ Session 04 · Credentials
Session 04
CREDENTIALS
Click any earned cert to view the certificate PDF
CompTIA · Mar 2026
SECURITY+
SY0-701 · Valid through Mar 2029
ID: COMP001023011776
✓ Earned View PDF ↗
CompTIA · Apr 2026
CYSA+
CS0-003 · Valid through Apr 2029
ID: COMP001023011776
✓ Earned View PDF ↗
CompTIA · Apr 2026
SECURITY ANALYTICS PROFESSIONAL
CSAP Stackable · Security+ + CySA+
ID: COMP001023011776
✓ Earned View PDF ↗
// Awards
Microsoft · Last Mile Education Fund · Spring 2026
CYBERSECURITY TALENT FUND
Microsoft Cybersecurity Talent Fund — Last Mile Education Fund
✓ Awarded
◆ Session 05 · Writing
Session 05
LOGS
Published writeups from the field
Medium · May 2026 · 97+ Views · 40 Reads · 41% Read Rate
SEE YOU SPACE COWBOY:
BOUNTY HUNTING THREATS WITH SPLUNK
Four MITRE ATT&CK techniques. Four detections. Full walkthrough with real screenshots and SPL queries: Initial Access via PowerShell download cradle, Persistence via registry run key, Credential Access via LSASS dump attempt, Lateral Movement via rogue service creation.
Read on Medium ↗
◆ Session 06 · Dossier
Session 06
DOSSIER
Full resume, available for download
// Jayden_Williams.pdf Updated May 2026
Jayden Williams
HCC → USF · B.S. Cybersecurity · Expected 2028
GPA: 3.60 · Dean's List · Tampa, FL · U.S. Citizen
Security+ · CySA+ · CSAP
↓ Download
◆ Session 07 · Contact
LET'S
CONNECT
Open to SOC analyst internships and cybersecurity opportunities in Florida. Open to relocation. U.S. citizen. Available for on-site, hybrid, or remote.
GitHub activity Send Email ↗
Featured In · Medium ↗ · LinkedIn ↗