Skip to content
View taylor-marrion's full-sized avatar

Block or report taylor-marrion

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
taylor-marrion/README.md

Hello, I'm Taylor

πŸ‘¨β€πŸ’» Cyber Capabilities Developer | πŸŽ“ MSCS in Computer Science | πŸ” Reverse Engineering & Vulnerability Research Enthusiast | 🧠 ML for Cybersecurity


🎯 Objective

I am a U.S. Army National Guard Soldier and graduate student. I am currently on military orders supporting the 91st Cyber Brigade as a Cyber Capabilities Developer (CCD) and also taking the final course of my Masters of Science in Computer Science (MSCS) with a specialization in cyber operations. I have a deep interest in low-level security topics such as reverse engineering, vulnerability research, and threat hunting. Understanding manual workflows is essential, but I believe that automating or integrating them into Machine Learning and Large Language Models (ML / LLM) can set me apart from my peers.

As I near my return to the civilian workforce and completion of my degree, I’m actively seeking roles. I would love to find roles where I can focus on reverse engineering and vulnerability research, or bring a unique skillset to your red team or threat hunters.

I bring a unique mix of:

  • Deep experience in low-level C programming, architecture, and binary analysis
  • A strong foundation in cybersecurity across both offensive and defensive domains
  • Practical and academic exposure to machine learning applied to security-related problems

πŸ’» Skills

Skill Associated Project/Experience
C/Assembly, Memory Safety ARCYBER Development, Data Structures, Multithreading
Malware Analysis, Reverse Engineering Ghidra, IDA Pro, gdb, Static + Dynamic Analysis
Binary Exploitation Python, pwntools, fuzzing, Ropper
Threat Hunting & Emulation Log analysis, intrusion detection, Cyber Threat Emulation
Machine Learning & NLP for Security ML-based malware detection and LLM-based vulnerability detection

🧰 Tools & Frameworks

Low-Level + RE

Security & Analysis

Machine Learning


πŸ‘¨β€πŸ’» Projects

  • 🧱 Generic Server-Client Architecture & Data Structure Libraries A modular C-based networking framework with reusable client-server code and custom implementations of data structures (BST, linked hash tables, queues).
    Purpose: Demonstrates strong C programming and low-level architectural design. Serves as a foundation for future tooling.

  • πŸ” Machine Learning for Malware Detection A supervised classifier trained on Windows PE import features to distinguish malicious from benign executables.
    Focus: Feature engineering, dimensionality reduction, and model comparison (KNN, MLR).

  • πŸ”§ FSM-Based Vulnerability Detection in Binary Executables A finite state machine-based static analyzer written in C for detecting uninitialized memory usage in compiled Juliet Test Suite binaries.
    Focus: Manual static analysis, compiler-aware design, vulnerability pattern matching.

  • πŸ”¬ LLM-Based Vulnerability Detection in Tokenized Assembly A transformer-based model trained to detect the use of uninitialized variables from disassembled binaries.
    Focus: Integrates NLP-style tokenization, FSM-derived supervision, and disassembly features.


πŸŽ“ Education

M.S. Computer Science – Dakota State University (Aug 2025)

Specialization: Cyber Operations
Coursework: Software Exploitation, Machine Learning, Cryptography
Special projects: FSM-Based static analyzer, LLM-Based vulnerability detection

B.S. Cyber Operations – Dakota State University (May 2023)

Coursework: Reverse Engineering, C Programming, Assembly Language, Network Security, Threat Hunting


πŸ“œ Certifications

πŸ›‘οΈ DoD 8570 IAT Level II Compliant
πŸ” TS/SCI Security Clearance – Active

Popular repositories Loading

  1. security_scripts security_scripts Public

    Small security scripts I've developed

    PowerShell

  2. pyWars pyWars Public

    pyWars functions

    Python

  3. reclass_samples reclass_samples Public

    Army MOS 17C (Cyber Operations Specialist) course credit equivalency samples

    PowerShell

  4. Java Java Public

    A smattering of undergrad assignments

    Java

  5. C_Cpp C_Cpp Public

    A smattering of undergrad assignments

    C

  6. assembly assembly Public

    Assembly projects used as a primer for Reverse Engineering

    Assembly