Computer science and cybersecurity student building secure systems and tools to solve real-world problems.
Hello, Im Caden, a developer and a cybersecurity student with a strong interest in building practical and useful tools. I have a background in software engineering and spend alot of my time exploring areas like malware analysis, threat detection and secure systems design. Whether im developing a project, looking at network logs or expirementing with Raspberry Pi setups, I enjoy solving complex problems and learning something new along the way.
Lately, ive been interested in projects that combine AI and cybersecurity, along with building reliable systems that are nice to look at and are able to work in real world environments. I care about writing solid code, understanding how things work and continuously learning and improving my skills. My goal is to create a portfolio that reflects the depth of my skills and my creativity, in order to keep growing into someone who can make a real impact in the field.
In my free time, you can find me working on side projects or diving into CTF's, but I also make time for gaming, working out or playing with my cat!
Tanoshi
Jan 2025 - Present
Third Wave Psychotherapy
Apr 2023 - Present
Raging Waters
Jun 2021 - Sep 2022
George Fox University, Newberg
2023 - Present
A modern and responsive portfolio website built with HTML, CSS, and JavaScript. It features a clean and minimalist design with smooth animations and a responsive layout that works well on all devices.
A complete Chess implementation written in C++. Used skills that included Object-Oriented Programming, Unit Testing, and designing a board and piece class hierarchy. The project demonstrates code organization, dynamic memory management, and adherence to standard chess rules.
Built a Python script for Tanoshi to automate scheduled, encrypted data backups across multiple systems, reducing manual effort, and improving data reliability.
Conducted as part of a university digital forensics lab. Analyzed a forensic USB image and network logs to uncover hidden and deleted files related to illegal rhino images. Used tools to extract steganographic data, reconstruct user activity, and compile a detailed forensic report.
Competed in cryptography, network forensics and ethical hacking challenges
Placed 23rd out of all U.S. college teams in ethical hacking capture-the-flag challenges
- CompTIA Security+ (in progress)
- Verizon Cloud Platform Certification
- MasterCard Cybersecurity Certification