// cybersecurity practitioner & consultant

Threat-informed.
Operator-built.

Kevin Landry — U.S. Coast Guard veteran, GMU graduate student in Digital Forensics, independent security practitioner. I build tools, break systems legally, and help organizations understand how they can be compromised.

2nd USCC Cyber Bowl East
M.S. Digital Forensics, GMU
CG Veteran · EKMS Manager
// selected work
deception · aws · python

CerberusMesh

Distributed Cowrie honeypot mesh with AI-assisted session analysis, MITRE ATT&CK enrichment, and real-time attacker engagement on AWS.

→ ran against real SSH brute-force and credential-stuffing sessions on live AWS infrastructure

threat intel · ssh · research

PatriotPot

AWS-hosted hardened SSH honeypot designed to observe real-world post-compromise attacker behavior.

→ research paper included; findings adopted into GMU's DFOR curriculum

exploit dev · rop · ctf

USCC Binary Exploits

Format string and ROP chain tooling from 2025 USCC Cyber Bowl. Blind FSB detection, stack canary brute-forcing, ret2libc chains on 64-bit ELF.

→ 2nd place finish, East division — tooling built and used during live competition

tooling · cvss · llm

CVSS Calculator

Offline CVSS v3.1 scorer with optional GPT-assisted analysis and MITRE/CWE mapping. Runs fully air-gapped when needed.

→ used in consulting engagements for structured vulnerability reporting

// capabilities
01

Adversary Simulation

Goal-oriented attack simulations using real TTPs. Custom tooling, threat-intel integration, detection gap analysis.

02

Digital Forensics & IR

Memory forensics, malware reverse engineering, disk analysis, and IR playbook development. Backed by GMU DFOR coursework.

03

Detection Engineering

IOC tuning, SIEM query development, honeypot deployment, and deception architecture grounded in MITRE ATT&CK.

04

Cloud Security

AWS architecture review, IAM hardening, least-privilege enforcement, and CloudTrail-based audit logging design.

// how I work
Scoped engagements — defined objectives, defined deliverables, no scope creep.
Direct execution — I do the work. No subcontracting, no junior handoff.
Practitioner-level output — findings come with evidence, not just observations.
CompTIA Security+
Google Cybersecurity