Security+ Certified  ·  Open to Work

Jaedon Chin

Cybersecurity | Infrastructure | Systems

Cybersecurity engineer building secure infrastructure at the intersection of networking, cloud, and AI.

Houston, TX MIS @ Texas Southern May 2026
1st Place NBA Beyond the Ball Security+ Certified 600+ Enterprise Deployments 5,000+ Households Impacted

About

Jaedon Chin

I've been taking things apart since I was a kid: computers, networks, anything I could get my hands on. That habit never went away. Now I get paid to put them back together and make sure nobody else can break in.

My focus is making systems that actually work in production. I've built CRMs, deployed infrastructure, configured enterprise networks, and automated the repetitive stuff so I can spend time on problems that actually matter.

Targeting cybersecurity infrastructure, cloud security, and GovTech roles. Hands-on experience with enterprise Cisco, production access controls, containerized deployments, and AI-powered security tooling. Security+ certified, graduating May 2026.

TSU Grad BBA in Management Information Systems
Sec+ Certified
1st NBA Tech Challenge

Recognition

NBA Beyond the Ball Tech Challenge - 1st Place
1st Place: Beyond the Ball
Title III Conference Presenter
Title III Conference Presenter
TSU Cybersecurity Student Lead
TSU Cybersecurity Student Lead
Destined for Success Worldwide
Certified Professional Development

Community & Mentorship

Prompt Engineering Curriculum

Created and delivered a structured prompt engineering lesson for NBA Tech Challenge students, bridging AI capability and practical application.

Peer Mentorship

Mentoring non-technical peers on AI tools and app development fundamentals, making technology accessible beyond CS majors.

Cyber Program Development

Contributing to cybersecurity curriculum and lab infrastructure development at TSU, supporting the university's growing cyber initiative.

Industry Engagement

Active engagement with defense and cybersecurity organizations including MITRE, Lockheed Martin, HII, and Leidos across the GovTech ecosystem.

Projects

Real systems solving real problems. Not tutorials, not toy projects.

TSU Cybersecurity Teaching Lab

Active
Cisco Catalyst 9200 Catalyst 8200 Meraki MS130 Firepower 1000 UCS C220

Problem

Texas Southern University had no dedicated cybersecurity lab. Students lacked access to enterprise networking equipment for hands-on learning, limiting practical skill development in a field that demands it.

Architecture

Multi-layer campus network with Cisco Catalyst 9200/8200 core switching, Meraki MS130 access layer, and Firepower 1000 for threat inspection. UCS C220 rack servers provide compute for lab workloads. Full VLAN segmentation isolates student traffic from production.

What I Built

  • Physical and logical network infrastructure from bare metal to operational
  • VLAN segmentation separating lab, management, and campus traffic
  • Network diagrams and topology documentation for the full environment
  • Configuration documentation and handoff guide for program continuity
  • Rack installation, cabling, and hardware commissioning

Security

Firepower IPS/IDS providing real-time threat inspection. VLAN-based segmentation enforcing least-privilege access between zones. Dedicated management VLAN for infrastructure administration.

R-Value CRM

In Progress
Next.js TypeScript Supabase PostgreSQL Tailwind

Problem

Insulation contractors were running their businesses out of text threads, spreadsheets, and sticky notes. No visibility into job profitability until it was done. Generic CRMs didn't fit the workflow; industry-specific ones were expensive.

Architecture

Next.js App Router frontend connected to Supabase (Postgres + Auth). Row Level Security handles multi-tenancy so each contractor only sees their own data. Strict client/server split throughout. Playwright catches regressions before they reach production.

What I Built

  • Drag-and-drop kanban for tracking leads through the pipeline
  • One-click lead-to-job conversion that keeps everything linked
  • Time tracking workers can use without logging in (just the job link)
  • Real-time cost tracking with automatic labor calculation from time entries
  • Profit dashboard showing estimated vs. actual
  • Activity feed logging all actions with timestamps

Current State

Core features complete and tested. Schema locked with migrations. Polishing UI and building the marketing site. Contractors are already using it.

Pandora: Local-First AI Voice Assistant

In Progress
Python faster-whisper Ollama Kokoro TTS Docker WireGuard Next.js

Problem

Cloud voice assistants are a privacy liability, add noticeable latency, and get expensive fast. I wanted sub-second local voice processing that could still reach cloud APIs when needed, without giving an AI unrestricted access to my infrastructure.

Architecture

Two-machine setup. RTX 3070 handles the real-time voice pipeline (wake word, speech-to-text, LLM, text-to-speech) within 8GB VRAM constraints. VPS runs Postgres, n8n, and Qdrant for semantic search, connected over an encrypted WireGuard tunnel. About 60% of queries stay local; the rest route to cloud APIs. Agent Zero on the VPS handles long-running autonomous tasks.

What I Built

  • Custom voice pipeline: faster-whisper (INT8) to Qwen3 via Ollama to Kokoro TTS, ~3s end-to-end
  • Custom wake word model trained on synthetic speech data via openWakeWord
  • Hybrid query router: decides local LLM vs. semantic cache vs. cloud API based on complexity
  • Defense-in-depth: API wrapper with container allowlists, rate limiting, immutable audit logs
  • WireGuard tunnel with all services bound to tunnel IP, nothing exposed on public interfaces
  • Hardened Docker containers: non-root, dropped capabilities, read-only filesystems, resource limits

Security

The AI never touches the Docker socket directly. Every container operation goes through an allowlist with rate limiting. Audit logs are stored separately where the AI cannot modify them. Network is segmented by trust level: WireGuard internally, Cloudflare Zero Trust for external access. Documented threat model covers prompt injection, container escape, and secret leakage.

Rockets Loyalty+: NBA Beyond the Ball

1st Place
Next.js Supabase Tailwind AI-Assisted Ideation

Problem

Build a fan engagement solution for the Houston Rockets under competition time pressure while leading a team with mixed technical backgrounds.

Architecture

Next.js frontend with Supabase backend for auth and data persistence. Tailwind for rapid UI development. AI-assisted ideation during design to accelerate user research and feature scoping.

What I Built

  • Led development as Lead Developer: 20+ hours of hands-on coding
  • Built user personas and empathy maps grounded in real fan needs
  • Designed and led a prompt engineering lesson for participating students
  • Full-stack fan loyalty app with gamification and reward mechanics
  • Managed team delivery, technical direction, and final presentation

Result

Won 1st place in the NBA Beyond the Ball Tech Challenge. Demonstrated ability to ship under pressure, lead cross-functional teams, and combine technical execution with user-centered design.

Production VPS Infrastructure

Docker Traefik Cloudflare Ubuntu

Problem

Needed a way to run multiple projects without paying per-app platform fees and without losing track of how everything was configured six months later.

Architecture

One VPS, everything containerized. Traefik routes traffic by domain to the right container. Cloudflare handles DNS, SSL termination, and DDoS protection. Everything is defined in Compose files so the environment can be rebuilt from scratch in minutes.

What I Built

  • Traefik reverse proxy with automatic Let's Encrypt cert renewal
  • Cloudflare Tunnels: nothing exposed directly to the internet
  • Network isolation between containers at the Compose level
  • Automated backups with recovery testing

Security

Fail2ban on SSH. UFW deny-by-default. Containers run non-root with dropped capabilities. Secrets in env files that never touch git.

Skills & Certifications

Certifications

  • CompTIA Security+ SY0-701
    Active
  • CompTIA CySA+ CS0-003
    In Progress
  • AWS Cloud Practitioner CLF-C02
    Planned
  • AWS AI Practitioner AIF-C01
    Planned

Infrastructure

  • Docker / Compose
  • Linux (Ubuntu/Debian)
  • Traefik / Cloudflare
  • TCP/IP, DNS, DHCP

Networking

  • Cisco Catalyst / Meraki
  • Cisco Firepower
  • Network Segmentation
  • Wireshark

Security

  • Network Security
  • Risk Assessment
  • Incident Response
  • Firewall / RLS

Development

  • TypeScript / Next.js
  • Python
  • PostgreSQL / Supabase
  • Git / Playwright

What I'm Learning Now

CompTIA CySA+ AWS Cloud Architecture Docker Security Container Hardening

Experience

Cybersecurity Infrastructure Support Technician

Texas Southern University

Apr 2025 - Present

  • Lead student technician for TSU's first dedicated cybersecurity teaching lab
  • Configure and maintain Cisco Catalyst 9200/8200 core switching, Meraki MS130, and Firepower 1000
  • Design VLAN architecture isolating student, management, and production traffic

IT Technician: UPS Systems Installation

JosephOne Technologies / CCISD

Aug 2025 - Present

  • Deployed 600+ enterprise UPS units across a full school district
  • Physical installation, cable management, and device commissioning
  • Configured centralized monitoring dashboard for cross-campus battery health visibility

World Bank Project Intern

National Electrification Project

Jun 2022 - Aug 2022

  • Supported IT infrastructure planning for solar electrification impacting 5,000+ households in Liberia
  • Collaborated with engineers across three continents on database design and systems planning

Get in Touch

Open to full-time roles, internships, and co-ops in cybersecurity and infrastructure. Feel free to reach out.