Meet the Founder

Cybersecurity.
Policy. Law.

Founder, Cipher & Counsel · UTSA Honors College · Class of 2028

InstitutionUTSA · Honors College
DegreeBBA Cybersecurity
MinorPublic Policy & Law
GPA4.0 · President's List
Class2028
CitizenshipU.S. Citizen
PlatformCipher & Counsel
Mission

Why this platform exists

"Most people do not understand or actively manage their digital footprint, leaving them vulnerable to privacy, security, and legal risks. Cipher & Counsel was built to change that."

Cipher & Counsel · Founded 2025
4.0
GPA · President's List
5yr
Professional PM Experience
5+
Original Research Publications
4+
Industry Certifications

Security does not stay inside a network. It shows up in boardrooms, courtrooms, and policy hearings where the people making decisions rarely speak the language of the practitioners who briefed them. That disconnect is where the real damage happens.

My degree in Cybersecurity with a Minor in Public Policy and Law is a deliberate commitment to working at that junction because practitioners who can translate technical risk into decisions that stick are the ones who move the needle.

As an undergraduate student in the UTSA Honors College, I founded Cipher & Counsel as a platform whose name reflects its purpose: the convergence of cyber and law. The vision is larger than a portfolio. It is an online community built to raise digital footprint awareness and develop the next generation of women working in cybersecurity, policy, and law.

Experience

Professional and
academic history

2025 – Present
Founder & Lead Researcher
Cipher & Counsel · www.cipherandcounsel.com
Founded an independent cybersecurity education and research platform at the convergence of cyber and law. Published five research documents including a Volt Typhoon OSINT investigation sourced from CISA, NSA, DOJ, MITRE ATT&CK, and Palo Alto Networks Unit 42.
OSINT ResearchThreat IntelligencePolicy CommunicationDigital Safety Education
2025 – Present
Undergraduate Researcher
University of Texas at San Antonio · BBA Cybersecurity · Honors College
Active undergraduate research across cybersecurity frameworks, threat intelligence, and policy communication applying NIST SP 800-34, ISO 22301, and MITRE ATT&CK to real-world challenges.
MITRE ATT&CKNIST FrameworksISO 22301Incident Response
Aug 2020 – Aug 2025
Project Manager
Digital Marketing Agency
Managed 10+ concurrent client campaigns using Agile and Scrum. Primary client-facing contact across five years without a missed deadline. Built internal documentation frameworks and process playbooks from scratch.
Agile / ScrumClient ManagementDocumentationTeam Leadership
Education & Credentials

Academic foundation
and certifications

Education
BBA Cybersecurity · UTSA Honors College
Minor: Public Policy and Law. GPA: 4.0. President's List. Coursework spanning cybersecurity frameworks, IT risk management, regulatory policy, and national security law. Class of 2028.
In Progress
CIPP/US · U.S. Privacy Law · IAPP
Certified Information Privacy Professional, covering U.S. privacy law, data protection regulation, and legal frameworks governing digital information. Expected 2026.
Certified 2026
Palo Alto Networks Cybersecurity Certificate
Threat analysis, network security, security operations, and cybersecurity tools including Python, Linux, and SIEM platforms.
Certified 2025
Google Project Management · Agile Product Owner
Agile methodology, Scrum frameworks, project planning, stakeholder communication, and product delivery. Applied across five years of professional PM practice.
Research & Publications

Original investigation
and research

Five documents built to industry standards using primary government sources, MITRE ATT&CK, and named vendor threat intelligence. All available at www.cipherandcounsel.com

National Security · OSINT
Volt Typhoon Threat Actor Investigation
OSINT investigation into a PRC state-sponsored threat actor. Dual-audience publication with 11-technique ATT&CK mapping, five-year campaign timeline, and behavioral detection guidance.
View Publication →
Threat Intelligence
Boggy Serpens Threat Assessment
Dual-audience threat intelligence report on an Iranian-linked threat actor. 11-technique ATT&CK mapping, 7-family malware toolkit, real IOCs from CISA, MITRE ATT&CK, Group-IB, and Huntress.
View Publication →
Incident Response
IR Documentation Suite · Operation Coastal Intrusion
Four-document suite from a single incident: Technical Report, Executive Briefing, Legal Escalation Log, and Lessons Learned — demonstrating multi-audience translation discipline.
View Publication →
API Reference
Threat Intelligence API Reference
Four endpoints with full parameter tables, Python examples, authentication error handling, rate limit documentation, and SIEM integration workflow.
View Publication →
SOC Operations
SIEM Enrichment Playbook
Step-by-step SOC enrichment playbook with IOC normalization, escalation matrix, confidence thresholds, and SLA column for security operations teams.
View Publication →
Community & Involvement

Building the community,
not just the platform

CC
Cipher & Counsel · Founder
Founded to raise digital footprint awareness and develop the next generation of women in cybersecurity, policy, and law.
W
WiCyS at UTSA · Member
Women in CyberSecurity — bringing together women from academia, research, and industry for knowledge sharing, networking, and mentoring.
CJ
Cyber Jedis · UTSA · Member
Collaborative cybersecurity organization for students of all skill levels focused on hands-on learning and community-driven skill development.
H
UTSA Honors College · Member
Pursuing an interdisciplinary path across cybersecurity, public policy, and law. 4.0 GPA and President's List throughout enrollment.

Security intelligence. Legal clarity.

Building the next generation of women in cybersecurity.