Cybersecurity โ€” Tampa, Florida

Ryan
Le

CompTIA Security+
CompTIA Network+
University of Tampa

Tampa, FL โ€” Est. 2024
Offensive Security โ–  Identity & Access Management โ–  Capture The Flag โ–  OSINT โ–  Offensive Security โ–  Identity & Access Management โ–  Capture The Flag โ–  OSINT โ– 
๐Ÿ
Greatest
Of All Time
About

Energetic cybersecurity student operating at the intersection of offensive technique and defensive rigor โ€” bridging theory and enterprise practice through relentless hands-on work.

Security
through
practice,
not theory.

Energetic Cybersecurity student at The University of Tampa. Seeking a summer internship to apply technical problem-solving. As a Root@UT Board Member, I help lead technical HackTheBox walkthroughs, complemented by an analytical CTF competitor mindset.

As a dedicated Homelabber, I build and secure my home network environment to bridge theory and enterprise practice. Enthusiastic about applying collaborative and technical skills in professional contexts.

ryanle.co2023@gmail.com
LinkedIn   ยท   Pi-hole Project
Tampa, FL  โ€”  Open to relocation
IAM โ–  Linux โ–  PowerShell โ–  OSINT โ–  HackTheBox โ–  Networking โ–  Wazuh โ–  Forensics โ–  IAM โ–  Linux โ–  PowerShell โ–  OSINT โ–  HackTheBox โ–  Networking โ–  Wazuh โ–  Forensics โ– 

Bachelor of
Science
in Cybersecurity

The University of Tampa

Expected May 2027

CompTIA Security+
CompTIA Network+

Certified

ID: COMP001022944222

Cortevo
Technologies

Oct 2025 โ€” Present

Identity & Access Management Intern

Tampa, FL

  • Administered IAM services for clients including account provisioning, permissions maintenance, and enforcing security best practices
  • Configured, managed, and monitored API integrations between student information systems and organizational applications for secure data synchronization
  • Responded to support tickets and provided technical assistance to charter school clients in a helpdesk environment
  • Supported internal IT operations by implementing mobile device management, performing updates, and resolving IT issues

Root@UT
Ethical Hacking

Aug 2024 โ€” Present

Board Member

University of Tampa

  • Participated in the National Cyber League, scoring 1530 with hands-on experience in OSINT, cryptography, log analysis, password cracking, and web app exploitation
  • Led hands-on HackTheBox Labs taking down retired machines, practicing reconnaissance with Nmap and password cracking with Hashcat
  • Contributed to real-world missing persons investigations through the Trace Labs OSINT Search Party
  • Led collaborative review sessions for Security+ practice exams to improve collective pass rates
IAM
Virtual Machines
PowerShell
IT Helpdesk
Linux
Parallels
OSINT
HackTheBox
Capture The Flag
Networking
Command Line
HomeLabbing
Wazuh
Forensics
Nmap
Hashcat

CTF
Record

A record of competitions and cybersecurity challenges. Each event a lesson in adversarial thinking, defensive instinct, and collaborative precision.

01

DOE CyberForce
Competition

U.S. Department of Energy โ€” Oct 2025

Defended critical energy infrastructure systems against simulated cyberattacks in the DOE's annual competition focused on cyber-physical systems.

  • Defended critical infrastructure against simulated cyberattacks
  • Collaborated to identify and remediate security vulnerabilities
  • Maintained system availability while implementing hardening measures
  • Responded to incident scenarios in real-time competition
02

National Cyber
League

Cyber Skyline โ€” 2025 โ€“ Present

Individual and team-based competitions tackling challenges across multiple cybersecurity domains in practice and competitive seasons.

  • Scored 1530 pts in individual game across OSINT, cryptography, log analysis
  • Performed scanning, enumeration, and exploitation of vulnerable systems
  • Conducted network traffic analysis and digital forensics investigations
  • Identified and exploited web application security vulnerabilities
1530 pts
03

Gasparilla
CTF

HackTheBox โ€” Feb 2026

Partnered with Root@UT board members in a multi-disciplinary CTF, securing 3rd place through rapid problem-solving and cross-functional collaboration.

  • Web application penetration testing and OSINT intelligence gathering
  • Deep-dive digital forensics to reconstruct attack timelines
  • Reverse engineering compiled binaries to bypass security checks
  • Real-time communication and task delegation under time constraints
3rd Place
04

NCAE Cyber
Games

National Centers of Academic Excellence โ€” Feb 2026

National competition featuring network defense, digital forensics, and offensive security across a live ICS environment against real adversaries.

  • Blue team defense of critical infrastructure against live Red Team adversaries
  • Hardened and monitored ICS environment including PLC, HMI, databases, and webservers
  • Solved CTF challenges while neutralizing active unauthorized access attempts

Root@UT
Ethical Hacking
Club

Active board member of The University of Tampa's ethical hacking club, regularly participating in Capture the Flag challenges and cybersecurity training exercises to develop practical offensive and defensive security skills.