██╗ █████╗ ███╗ ██╗ ██████╗███████╗ ███╗ ███╗ ██║ ██╔══██╗████╗ ██║██╔════╝██╔════╝ ████╗ ████║ ██║ ███████║██╔██╗ ██║██║ █████╗ ██╔████╔██║ ██║ ██╔══██║██║╚██╗██║██║ ██╔══╝ ██║╚██╔╝██║ ███████╗██║ ██║██║ ╚████║╚██████╗███████╗ ██║ ╚═╝ ██║ ██╗ ╚══════╝╚═╝ ╚═╝╚═╝ ╚═══╝ ╚═════╝╚══════╝ ╚═╝ ╚═╝ ╚═╝
Hi, I'm Lance.
I'm a cybersecurity student focused on AI security. I do contract work reviewing AI-generated code for vulnerabilities like injection vectors, cryptographic misuse, and authentication bypasses. I also red-team models to find failures in their reasoning and guardrails, and I look at why those failures happen.
Currently working toward a B.S. in Cybersecurity at Western Governors University, with graduation expected in 2028.
Looking for internships in AI safety, LLM security, AI red teaming, or adversarial evaluation.
AI Training Contractor — Security & Cryptography Domain
Red team work on AI coding models. I probe models for security flaws and review the code they generate for vulnerabilities.
- Reviewing AI-generated code for security vulnerabilities, cryptographic misuse, and authentication flaws
- Identifying issues such as injection vectors, broken crypto implementations, and authorization bypass patterns
- Crafting engineering prompts intended to probe the boundaries of model reasoning
- Authoring production-quality reference solutions that serve as training signal for subsequent model generations
B.S. Cybersecurity and Information Assurance
In-depth, competency-based program covering core information technology and cybersecurity disciplines, including networking, operating systems, scripting, cloud and network security, digital forensics, risk management, cryptography, and security operations.