Sam Bederman
Education
Texas A&M University - College Station Aug 2023 – May 2027
Bachelor of Science in Computer Science, 4.0 GPA | Minors: Cybersecurity, Music Technology
Skills
- Programming Languages: C, C++, Win32 API, Python, Java, SQL, HTML, CSS, JavaScript
- Computer Security: Burp Suite, Wireshark, Hashcat, Metasploit, Ghidra, Nmap, Kali Linux, CrowdStrike
- Software Development & Technology: Agile Methodology, Atlassian, Git, Docker, ServiceNow
- Soft Skills: Leadership, Communication, Problem Solving, Adaptability
Experience
MicrosoftMay 2026 – Aug 2026
Security Research Intern
Capital OneJun 2025 – Aug 2025
Threat Detection Engineer - Cyber Security Internship Program
- Researched MITRE Techniques, evaluating security coverage and detection feasibility
- Created automated attack simulations to test existing detections
- Identified vulnerable gaps and potential improvements in existing detections
- Developed new detections for macOS and Linux techniques with no previous coverage
Hitachi EnergyMay 2024 – Aug 2024
Cyber Security Analyst Intern
- Managed a Burp Suite Enterprise environment, utilizing Burp Scanner to enhance application security
- Evaluated multiple threat modeling tools, creating technical documentation to support them
- Managed data analytics for security questionnaires, spearheading a project to automate the process
- Improved Confluence and SharePoint pages, enhancing efficiency for over 300 active users
Texas A&M UniversityNov 2023 – Present
Cyber Security Apprenticeship Program - Student Security Analyst
- Investigated, analyzed, and resolved hundreds of security incidents as a SOC team member
- Triaged tickets and identified threats utilizing SIEM, SOAR, IPS/IDS, and EDR systems
- Utilized and developed in-house tools and dashboards to help automate processes
Certifications
CompTIA Security+ Dec 2024
GIAC Certified Incident Handler (GCIH) May 2024
GIAC Security Essentials (GSEC) Aug 2023
Projects
COM Hijacking ResearchMay 2025
- Researched 6 COM hijacking techniques of varying complexity and obscurity
- Built and demonstrated PoC exploits with C and Win32, utilizing Koppeling for DLL proxying
- Led to an accepted contribution (#5526) to Elastic’s Detection Rules repository
Security Research LabJan 2025 – Current
- built and configured a lab for malware analysis, development, and detection engineering
- Consists of Kali Linux, Windows 11 (FlareVM), and REMnux VMs configured together to support research
- Includes a fully containerized Elastic Defend instance configured with tailscale to test and log activity
High Performance Multithreaded Cave Graph TraversalsJan 2025 – Mar 2025
- Uses pipes to communicate with threads that traverse the rooms/vertices of a cave (vertex weighted graph)
- v1 supports BFS, DFS, bFS, and A-Star, v2 is BFS with batching, both versions built with Win32 API and C++
- https://tinyurl.com/cavesearchv1 and cavesearchv2 have reports for v1 and v2
Awards
1st Place Information Security Talent Search (ISTS) Mar 2025
1st Place TAMUctf Mar 2025
3rd Place TAMUctf Apr 2024
National Cyber Scholar with Honors 2022, 2023, 2024