Andrew Bonner

A dynamic and strategic cybersecurity leader aspiring to become a Chief Information Security Officer. Passionate about developing and leading cutting-edge information security programs to protect organizational assets and support business objectives. Brings a solid foundation in computer science with a focus in cybersecurity, complimented with hands-on experience in industry cybersecurity tools and practices, research, and collegiate leadership roles.

Portrait

About Me

I am a Computer Science student with a concentration in Cybersecurity and Data Analytics, driven by a strong interest in defensive security, threat detection, and secure system design. My academic and professional experiences have allowed me to build a solid foundation in both theoretical concepts and hands-on security operations, with a growing focus on how security programs protect real-world organizations.

Currently, I work as a Security Intern with the Office of Information Security Services at Ball State University, where I support day-to-day security operations and monitoring efforts. In this role, I utilize SIEM tools such as Splunk for security event analysis and threat hunting, investigate network alerts, and assist with vulnerability monitoring across campus systems. I have contributed to identifying and blocking ransomware-related executables, domains, and IP ranges, performed routine testing of penetration testing tools, and stayed current on emerging vulnerabilities and security threats impacting enterprise environments.

In addition to my security experience, I have served as a Teaching Assistant in the Computer Science department, helping students understand advanced programming concepts, data structures, and algorithms. This role strengthened my ability to communicate complex technical ideas clearly and reinforced my own understanding of core computer science fundamentals. I have also participated in academic research focused on intrusion detection, where I worked with real-world datasets to study anomaly detection techniques using decision trees and the ID3 algorithm.

Beyond technical roles, I bring leadership experience through campus involvement and professional work. I have held multiple leadership positions within student organizations and balanced long-term management responsibilities in a fast-paced work environment, developing strong communication, teamwork, and decision-making skills. These experiences have shaped my ability to collaborate effectively and take ownership of responsibilities in both technical and non-technical settings.

I am actively seeking opportunities in cybersecurity where I can continue developing my skills in security monitoring, incident response, and defensive operations while contributing to teams that prioritize strong security practices and continuous improvement.

Education

Ball State University - Muncie, Indiana

B.S. in Computer Science

Focus: Cybersecurity & Data Analytics

GPA: 3.52Expected Graduation: May 2026Relevant Coursework: Introduction to Cybersecurity, GIAC GSEC 401 Security Essentials, Digital Forensics, Operating Systems and Networks, Database Design, Computer Organization & Architecture, Data Structure & Objects, Data Analytics, Advanced Programming, and ProgrammingCampus Involvement | Vice President of Computer Science Collective, President of the Ball State Colony of Iota Phi Theta Fraternity Inc., Student Advisory Council Representative of the College of Science and Humanities, Student Ambassador and Representative of the Computer Science Department

Work Experience

Click an item to expand and view details.

  • Security Intern

    Ball State University OISSMuncie, Indiana

    Jan 2025 - Present

    + Expand
    • Utilizing SIEM tools, such as Splunk, in Security Event Monitoring, Analysis, and Threat Hunting
    • Working on alerts on the network that come through the Alert Management Environment
    • Continuously staying up to date and reporting on current relevant IT Security news and vulnerabilities.
    • Scanning webservers on different ports throughout campus to assure monitoring, authentication against ADFS, and are up to date
    • Identified and blocked ransomware-linked executables, domains, and IP ranges for remote desktop software using Delinea.
    • Conduct monthly reporting and testing of the Responder pen testing tool against a Virtual Server to ensure no vulnerabilities arise
  • Teaching Assistant

    Ball State UniversityMuncie, Indiana

    Aug 2023 - May 2025

    + Expand
    • Facilitate student comprehension of advanced topics including new programming languages, object-oriented programming, and data structures.
    • Provide student tutoring support to improve learning outcomes, meticulously evaluating algorithmic assignments to ensure thorough understanding and mastery of concepts.
  • Teacher Scholar Researcher

    Ball State UniversityMuncie, Indiana

    Jan 2023 - May 2023

    + Expand
    • Collaborated with Dr. Xin Sun of the computer science department to study the NSL-KDD training datasets that are used to build anomaly detection systems using the ID3 algorithm and decision trees to significantly advance the capabilities of detecting malicious internet packets.

Projects

A few projects that highlight security, networking, and software development.

View GitHub’

Featured

Open Energy Dashboard Security Implementations Capstone

This project focuses on improving security in OED by addressing findings from a professional penetration test and completing partial fixes from prior PRs along with outstanding security issue that are still present. This involved an extensive review of the vulnerabilities outlined within the penetration testong document along with the pull requests associated with each security issue, implement testing for each of the fixes, or seek approval of potentially alternate security fix sollutions.

GitHub Unavailable
JavaScriptNode.jsMocha.jsChai.jsExpress.jsAPI Routing and MappingDocker

Personal Local Area Network

For this project, a local area network was contructed by implementing virtual switches, hosts, and routers within Java on three different machines. It also implements several different algorithms (Ethernet Leanring Switch algorithm, IP Forwarding algorithm, Bellman-Ford equation) along with distance vector routing.

JavaIntelliJNetworkingRouting
View on GitHub →

Airline Booking System Using MySQL

This program is made to access a particular MySQL server through knowing the following information: Server url, server password, server username, database name (optional). The only class that needs to be changed in the order to accommodate the different servers is the parameters for the ConnectionHandler object in the Main class. The Main class is where the main method is called.

MySQLJavaSQLIntelliJ
View on GitHub →

TCP File Service

Designed and implemented a Java-based TCP client–server file service that supports listing, uploading, downloading, renaming, and deleting files using a custom application-layer protocol, demonstrating reliable data transfer, command parsing, and networked system design.

JavaIntelliJTCPNetwork Data Transfer
View on GitHub →

Implimented CPU Scheduling Algorithms

Implemented and simulated multiple CPU scheduling algorithms in Java, including FCFS, Shortest Job First, Shortest Remaining Time First, and Round Robin, to analyze per-process and average waiting times and compare scheduling performance under different workloads.

JavaOperating SystemsIntelliJCPU Scheduling
View on GitHub →

Connect 4 Terminal Game

Developed a two-player Connect 4 game in Java featuring an AI opponent implemented with the Minimax algorithm and alpha–beta pruning, using depth-limited search and heuristic evaluation to make optimal decisions in a large game state space.

JavaAlgorithmsArtificial IntelligenceAlpha Beta PruningIntelliJ
View on GitHub →

Skills

Programming Languages

PythonJavaJavaScriptTypeScriptCSQLR

Tools & Software

WiresharkDelineaSnortSplunkSentinal OneVirtualBoxProxmoxWindows SecurityVaronisNmapTCP ViewProcess Explorer

Operating Systems

Linux(Ubuntu, Debian, RHEL)WindowsMacOS

Security Practice

Threat AssessmentSIEMVulnerability AssessmentIncident ResponseIntrusion DetectionThreat IntelligenceThreat AnalysisEvent Logging & Monitoring

Frameworks & Tools

Node.jsExpressReactMongoDBGit & GitHub

Resume

Download my resume as a PDF:

Contact

Feel free to reach out via phone or send me a message below.