Keith DeSantis

Cybersecurity Analyst & Developer

Hero Imgs About Me

about me

Hello! I'm interested in Cybersecurity, Software Development, Networking, and System Administration. I graduated from Worcester Polytechnic Institute with a Bachelor's in Computer Science and Focus in Cybersecurity in 2023. In my free time I enjoy rowing, video & board games, Dungeons and Dragons, playing guitar, and baking.

Resume

Below you can find a short summary of my resume along with a downloadable PDF copy.

Download Resume
Experience:
  • Portsmouth Naval Shipyard:
  • Cyber Defense Developer & Administrator
  • Systems Engineering Internship
  • Worcester Polytechnic Institute:
  • Undergraduate Cybersecurity Research
  • Certifications:
  • Splunk Enterprise Certified Admin
  • Splunk Enterprise Certified Power User
  • Relevant Courses:
  • Operating Systems, Software Engineering, Introduction to Artificial Intelligence, Advanced Computer Networks, Software Security Engineering, Computer Network Security, Introduction to Cryptography
Proficient in:
  • Java
  • Splunk
  • Python
  • OpenFlow
  • C and C++
  • Networking
  • JavaScript & HTML
  • Command Line
  • Powershell
  • Windows
  • MySQL
  • Linux
  • Bash
  • PHP
  • Git

Projects

Listed below are some projects from my time at WPI, relating to cybersecurity, system administration, network security, and software development.

img

Warden: CFI in Web Applications

A system to detect control flow integrity compromises in PHP web applications with line number granularity.

read more
img

SDN Networking Through OpenFlow

A term project simulating a Software Defined Network using OpenFlow and the Ryu Controller, allowing for packet modification and inspection.

read more
img

Brigham and Women's Hospital App

A full stack application built for a Brigham and Women's Hospital kiosk to help guide visitors and input service requests.

read more
img

Web Infrastructure Security

A online mock election infrastructure, that we then executed a man-in-the-middle attack against to compromise the ballots, then implemented HTTPS to secure the site.

read more
img

Multi-Factor Authentication

A project where we used a timing attack to compromise a mock 2FA system, then designed an offline authenticator app based on real world practices.

read more
img

Botnets and Intrusion Detection

A mock implementation of a Command and Control botnet with proof of concept on an isolated network, as well as a SDN based intrusion detection system to combat the botnet.

read more

Contact

If you would like to contact me you can do so using any of the methods below: