security research // CTF writeups // threat intelligence _
Hey, I'm aeronique – a security researcher transitioning from intelligence work to cybersecurity.
Currently serving as a Geospatial Intelligence Analyst with the U.S. Army Reserve (TS/SCI), I lead strategic and operational-level targeting while managing intelligence operations. I'm leveraging my analytical background and technical skills to break into offensive security and threat research.
I'm a SANS Cyber Academy Scholar working toward GSEC certification, with hands-on experience in CTF competitions, purple team operations, and security research. My homelab runs Proxmox, Wazuh SIEM, Active Directory, and MITRE Caldera for continuous learning and experimentation.
Competitive achievements: 2nd place overall in 2025 Target Cyber Defense Challenge, 5th place in 2025 SANS Holiday Hack Challenge.
$ cat offensive_security.txt
$ cat defense_&_analysis.txt
$ cat tools.txt
2nd place overall finish in national cyber defense competition. Successfully defended infrastructure against red team operations while maintaining critical services.
5th place finish in annual SANS Holiday Hack Challenge. Solved complex challenges involving reverse engineering, web exploitation, and cryptographic analysis.
Built comprehensive homelab running Proxmox with Wazuh SIEM, Active Directory domain, and MITRE Caldera for adversary emulation and detection engineering.
Advanced mapper for National Geospatial-Intelligence Agency's GEMINI program, contributing to critical mapping initiatives supporting national security operations.
Deep dive into solving the 2025 SANS Holiday Hack Challenge, including router exploitation (CVE-2023-1389), reverse engineering with Ghidra, and advanced web application attacks.
Read more →Lessons learned from placing 2nd in a national cyber defense competition. Team coordination, incident response under pressure, and defensive strategies that worked.
Read more →Complete guide to setting up a purple team lab environment for adversary emulation and detection engineering using MITRE Caldera, Wazuh SIEM, and Active Directory.
Coming soon →