~/packetpursuit $ whoami

Cybersecurity Student • Researcher • Veteran • Prior Law Enforcement

Combat veteran and former law enforcement officer with over a decade of combined operational experience. Now channeling that same mission-driven mindset into cybersecurity research, threat intelligence, and defensive security operations.

> Projects

Honeynet deployments, malware analysis, home lab infrastructure, and CTF walkthroughs.

cd ./projects →

> Blog

Field notes from the trenches. Threat intel, analysis writeups, and automated feeds.

cat ./blog →

> Contact

Looking to connect? Grab my resume, send a message, or find me on LinkedIn.

ping jake@ →
[CVE-2024-3400] PAN-OS GlobalProtect Command Injection, Critical
[THREAT] Kinsing crypto miner variant detected in honeynet, Active Campaign
[CVE-2024-21887] Ivanti Connect Secure Auth Bypass, Actively Exploited
[MALWARE] Rondodox/Mirai variant, IoT botnet C2 traffic captured
[INTEL] APT29 spear-phishing campaign targeting energy sector, CISA Advisory
[CVE-2024-3400] PAN-OS GlobalProtect Command Injection, Critical
[THREAT] Kinsing crypto miner variant detected in honeynet, Active Campaign
[CVE-2024-21887] Ivanti Connect Secure Auth Bypass, Actively Exploited
[MALWARE] Rondodox/Mirai variant, IoT botnet C2 traffic captured
[INTEL] APT29 spear-phishing campaign targeting energy sector, CISA Advisory

> PacketBot_

Hey, I'm PacketBot. Ask me anything about Jake's background, projects, or how to get in touch.