{"id":25799,"date":"2025-05-02T14:40:34","date_gmt":"2025-05-02T14:40:34","guid":{"rendered":"https:\/\/www.ucf.edu\/pegasus\/?p=25799&#038;post_type=story"},"modified":"2025-05-02T20:48:34","modified_gmt":"2025-05-02T20:48:34","slug":"call-security","status":"publish","type":"story","link":"https:\/\/www.ucf.edu\/pegasus\/call-security\/","title":{"rendered":"Call Security"},"content":{"rendered":"<p>Step inside the L3Harris Engineering Center and you\u2019re greeted by 12 black and gold championship banners hanging in the atrium. A trophy case, five shelves high, houses glimmering gold cups and team photographs. Another displays more than 40 crystal awards and plaques.<\/p>\n<p>\u201cWe are somewhat out of display space,\u201d says Senior Instructor <strong>Tom Nedorost \u201902MS<\/strong>, coach for the UCF Collegiate Cybersecurity Competition Team and advisor for the university\u2019s Collegiate Cyber Defense Club, better known as Hack@UCF. \u201cI have three more trophies in my office that still need a place to go.\u201d<\/p>\n<p>Perhaps it\u2019s time to invest in a larger trophy case. If history is known to repeat itself, Hack@UCF has <em>a lot<\/em> more success in store.<\/p>\n<p>The club is arguably the best in the nation at what it does. No other university has won more <a href=\"https:\/\/www.ucf.edu\/news\/cyber-security-dynasty-ucf-wins-sixth-super-bowl-of-collegiate-cyber-defense-competitions\/\">National Collegiate Cyber Defense Competitions (NCCDC)<\/a>. At last count in early April, Hack@UCF had earned 105 first-place awards \u2014 35 second-place and 30 third-place finishes at regional and national competitions.<\/p>\n<p>Its students and alumni are regularly employed for paid internships and full-time positions fresh out of college at some of the world\u2019s biggest companies \u2014 including Amazon, Apple, Google, IBM, Lockheed Martin, Meta and Microsoft, to name just a few. In a world that is increasingly online \u2014 even refrigerators and washing machines are \u201csmart\u201d these days \u2014 the evolution of the Internet of Things has expanded our vulnerability with more backdoor access points. On a micro level from our bank accounts and personal health data, to the macro level of national security, if it\u2019s connected to the internet, it can be hacked.<\/p>\n<p>\u201cCyber touches everything, and that\u2019s why you\u2019re seeing a lot more companies investing in security,\u201d Nedorost says. \u201cWe are nowhere near close to saturating the number of opportunities that are out there for our students.\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-25892 img-fluid\" src=\"https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/4\/files\/2025\/04\/CallSecurity-Spot1-Pegasus-Spr25-1200x800-1.jpg\" alt=\"UCF Cyber Defense Team\" width=\"1200\" height=\"800\" srcset=\"https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/4\/files\/2025\/04\/CallSecurity-Spot1-Pegasus-Spr25-1200x800-1.jpg 1200w, https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/4\/files\/2025\/04\/CallSecurity-Spot1-Pegasus-Spr25-1200x800-1-300x200.jpg 300w, https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/4\/files\/2025\/04\/CallSecurity-Spot1-Pegasus-Spr25-1200x800-1-1024x683.jpg 1024w, https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/4\/files\/2025\/04\/CallSecurity-Spot1-Pegasus-Spr25-1200x800-1-768x512.jpg 768w, https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/4\/files\/2025\/04\/CallSecurity-Spot1-Pegasus-Spr25-1200x800-1-600x400.jpg 600w, https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/4\/files\/2025\/04\/CallSecurity-Spot1-Pegasus-Spr25-1200x800-1-360x240.jpg 360w, https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/4\/files\/2025\/04\/CallSecurity-Spot1-Pegasus-Spr25-1200x800-1-620x413.jpg 620w, https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/4\/files\/2025\/04\/CallSecurity-Spot1-Pegasus-Spr25-1200x800-1-263x175.jpg 263w, https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/4\/files\/2025\/04\/CallSecurity-Spot1-Pegasus-Spr25-1200x800-1-515x343.jpg 515w, https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/4\/files\/2025\/04\/CallSecurity-Spot1-Pegasus-Spr25-1200x800-1-220x147.jpg 220w, https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/4\/files\/2025\/04\/CallSecurity-Spot1-Pegasus-Spr25-1200x800-1-190x127.jpg 190w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/p>\n<h2>Joining the Force<\/h2>\n<p>Nedorost has been with the club since its inception in Fall 2012, when a senior information technology student, <strong>Jonathan Singer \u201913<\/strong>, approached him with the idea to form a cybersecurity team to participate in a competition the following spring.<\/p>\n<p>Singer emailed fellow students with a link to the prospective competition, requesting their attendance at an exploratory meeting a few days later.<\/p>\n<p>\u201cI was hoping we\u2019d have at least 12 students there so we could field a full team, and the room ended up packed,\u201d Nedorost recalls. \u201cWe decided to form a cybersecurity club for interested students, and it\u2019s just been ongoing and growing ever since.\u201d<\/p>\n<p>The club now boasts more than 450 student members, whom Nedorost describes as highly motivated self-starters committed to upholding Hack@UCF\u2019s legacy of achievement and contributing to the industry even before they graduate. It\u2019s proving to be an industry with a lot of lucrative shoes to fill.<\/p>\n<p>According to U.S. Bureau of Labor Statistics projections, jobs for information security analysts, with a median salary of $120,360, are expected to grow 32% from 2022 to 2032.<\/p>\n<p>\u201cI\u2019ve seen peers who were in the same classes with me \u2014 we have the same degree, but I was in the club and they weren\u2019t \u2014 and it took them a few years to even get started,\u201d says <strong>Christian Campana-Emard \u201920<\/strong>, who worked paid summer internships at Northrop Grumman and Microsoft before becoming a cloud security engineer at medical device and healthcare company Abbott Laboratories.<\/p>\n<h2>Full STEM Ahead<\/h2>\n<p class=\"p1\">These Knights\u2019 enthusiasm and interest in the field, combined with their sustained success, have led to some major milestones not just for the club, but the university as a whole.<\/p>\n<p class=\"p1\">In 2016 UCF was named a National Center of Academic Excellence in Cyberdefense Education by the U.S. Department of Homeland Security and the National Security Agency. In 2019 Lockheed Martin donated $1.5 million for a cyber innovation lab to serve as a practice hub and continuing education space for the team.<\/p>\n<p class=\"p1\">In 2021 UCF added a <a href=\"https:\/\/www.ucf.edu\/degree\/cyber-security-and-privacy-ms\/\">master\u2019s degree in cyber security and privacy<\/a>, a huge win for the more than 6,000 <a href=\"https:\/\/www.ucf.edu\/degree\/computer-science-bs\/\">computer science<\/a>, <a href=\"https:\/\/www.ucf.edu\/degree\/information-technology-bs\/\">information technology<\/a> and <a href=\"https:\/\/www.ucf.edu\/degree\/computer-engineering-bscpe\/\">computer engineering<\/a> undergraduate students enrolled as of Spring 2025. UCF produces one in four engineering and computer science graduates in Florida, according to the State University System.<\/p>\n<p class=\"p1\">By day, they\u2019re gaining a solid base of knowledge in how computers work in the classroom. By night, they\u2019re gaining practical experience in the club. It\u2019s a winning combination.<\/p>\n<p class=\"p1\">\u201cI think UCF does a good job of teaching core principles, but it\u2019s hard to teach the deeper concepts, and that\u2019s where Hack@UCF comes in,\u201d says <strong>Matthew McKeever \u201924<\/strong>, a full-time cyber engineer at intelligence solutions company Nightwing and master\u2019s student who was part of the 2024 NCCDC championship squad and selected to the U.S. Cyber Team in 2023. \u201cThat experience you get from competing is so valuable. Winning national CCDC is like a year\u2019s worth of work experience on your resume.\u201d<\/p>\n<p class=\"p1\">It\u2019s hard to argue with the results.<\/p>\n<p class=\"p1\">Encouraged by the university\u2019s trajectory and investment in its foundational STEM and technical programs, Nedorost says he\u2019s confident about the future of Hack@UCF.<\/p>\n<p class=\"p1\">And now, with an ever-growing alumni base, he\u2019s got reinforcements to help ensure the next generation of Hack@UCF members are ready to tackle whatever cyber innovations are thrown their way.<\/p>\n<p class=\"p1\">\u201cWe\u2019re all so thirsty for knowledge about cybersecurity and have a genuine excitement for it,\u201d says <strong>Kevin Colley \u201918<\/strong>, a staff product security engineer at Tesla. \u201cWhen one of us figured something out, we\u2019d present it to the rest of the members, so we were always collectively learning together. That doesn\u2019t end with graduation. Alumni come back to teach workshops or provide mentorship to further enrich the new students. It\u2019s a beautiful cycle.\u201d<\/p>\n<h3 class=\"p1\"><strong>The following Hack@UCF alumni are a mere sampling of the many Knights impacting the cybersecurity industry today:<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<h4 style=\"text-align: center;\">Kevin Colley \u201918<\/h4>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"img-fluid wp-image-25895 size-full aligncenter\" src=\"https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/4\/files\/2025\/04\/CallSecurity-Profile-200x200-Colley.jpg\" alt=\"Kevin Colley\" width=\"200\" height=\"200\" srcset=\"https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/4\/files\/2025\/04\/CallSecurity-Profile-200x200-Colley.jpg 200w, https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/4\/files\/2025\/04\/CallSecurity-Profile-200x200-Colley-150x150.jpg 150w, https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/4\/files\/2025\/04\/CallSecurity-Profile-200x200-Colley-190x190.jpg 190w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><em>Staff Product Security Engineer at Tesla <\/em><br \/>\n<em>Seattle <\/em><br \/>\n<em>B.S. in Computer Science<\/em><\/p>\n<p class=\"p1\">Colley can only say so much about the work he does every day to help secure Tesla\u2019s electric vehicles and products.<\/p>\n<p class=\"p1\">That\u2019s why he was so excited when he received clearance to present at a professional conference last May on one of his most significant Tesla projects to date.<\/p>\n<p class=\"p1\">Over the course of six months, Colley developed XPin \u2014 a security feature for Linux, software that is part of Tesla\u2019s in-vehicle operating system \u2014 which requires any code to be securely verified.<\/p>\n<p class=\"p1\">\u201cIt enforces that all running code is cryptographically verified by Tesla, blocking an exploitation pattern used in sophisticated cyberattacks,\u201d he says.<\/p>\n<p class=\"p1\">UCF played a significant role in Colley\u2019s career success and origin story.<\/p>\n<p class=\"p1\">He says the only computer class his small-town high school offered was typing. He craved more and would regularly scour the aisles of Books-A-Million and Barnes &amp; Noble for programming books. Then he found Junior Knights. The months-long initiative \u2014 managed by UCF computer science <a href=\"https:\/\/www.ucf.edu\/faculty\/\">faculty members<\/a> Niels Lobo and Arup Guha \u2014 offered complimentary programming classes on Saturdays on the main campus.<\/p>\n<p class=\"p1\">The catch was that UCF was about a 2.5-hour drive from Colley\u2019s house.<\/p>\n<p class=\"p1\">\u201cI somehow convinced my dad to wake up early every Saturday and drive me,\u201d he says. \u201cAfter doing the whole course, I convinced him to let me do it a second time.\u201d<\/p>\n<p class=\"p1\">Guha oversaw UCF\u2019s highly successful programming team, so when Colley enrolled as a UCF student in 2013, he encouraged Colley to get involved. Colley immediately jumped into both the programming team and Hack@UCF.<\/p>\n<p class=\"p1\">He thrived in Hack@UCF as a member of two of the squads that brought home three consecutive NCCDC championships from 2014 through 2016. He also won considerable prizes from other competitions, including a MacBook Pro, thousands of dollars and the opportunity to attend DEF CON, the largest annual hacking and security convention featuring the who\u2019s who of the industry.<\/p>\n<p class=\"p1\">He says he still draws from his experience with both clubs in navigating his professional career.<\/p>\n<p class=\"p1\">\u201cAny time I encounter some programming challenge in my work, it\u2019s oftentimes that I\u2019m able to at least use the thought process that I picked up from the programming team to help me solve the problem,\u201d he says. \u201cHack@UCF has been a fantastic resource for me for improving my own cybersecurity skills, and provided me a lot of experience and networking opportunities. But I also gained a skill that others may not expect: public speaking proficiency. Since Hack@UCF is a club that gives weekly technical presentations to hundreds of students, I received really good practice in public speaking.\u201d<\/p>\n<p class=\"p1\">And he knows he\u2019s got his dad to thank, too.<\/p>\n<p class=\"p1\">\u201cIt\u2019s a [wild] ask to drive a five-hour round trip on a Saturday for 12 weeks\u2019 time, but he\u2019s [since] told me [that] when I asked him to take me to Junior Knights, he realized that I never really asked him for pretty much anything,\u201d Colley says. \u201cSo he thought about it and decided it would be hard to say no to something that would be very enriching.\u201d<\/p>\n<hr \/>\n<h4 style=\"text-align: center;\">Jeffrey DiVincent \u201923<\/h4>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"img-fluid wp-image-25896 size-full aligncenter\" src=\"https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/4\/files\/2025\/04\/CallSecurity-Profile-200x200-Divicent.jpg\" alt=\"Jeffrey Divincent\" width=\"200\" height=\"200\" srcset=\"https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/4\/files\/2025\/04\/CallSecurity-Profile-200x200-Divicent.jpg 200w, https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/4\/files\/2025\/04\/CallSecurity-Profile-200x200-Divicent-150x150.jpg 150w, https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/4\/files\/2025\/04\/CallSecurity-Profile-200x200-Divicent-190x190.jpg 190w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Security Engineer at Amazon <\/em><br \/>\n<em>Seattle<\/em><br \/>\n<em>B.S. in Computer Science<\/em><br \/>\n<em>M.S. in Cyber Security and Privacy<\/em><strong><br \/>\n<\/strong><\/p>\n<p class=\"p1\"><strong>Jeffrey DiVincent \u201923 <\/strong>rejects the adage, \u201cIf it ain\u2019t broke, don\u2019t fix it.\u201d<\/p>\n<p class=\"p1\">As a high schooler, DiVincent was known as the techy kid who was good with phones \u2014 specifically jailbreaking them, which is removing restrictions on a device\u2019s operating system to gain full access.<\/p>\n<p class=\"p1\">\u201cI liked playing with it and figuring out, \u2018How can I make this thing do something it\u2019s not supposed to do?\u2019 \u201d says DiVincent, who is now a Seattle-based security engineer for Amazon. \u201cThat\u2019s what makes cybersecurity so interesting to me. The best way to protect a device or system is thinking about all the ways you can break it.\u201d<\/p>\n<p class=\"p1\">He committed to attending Hack@UCF\u2019s weekly meetings every Friday as soon as he arrived on campus in 2019. Once the pandemic hit in 2020, those meetings moved online. DiVincent saw a decline in attendance, but he says he instead chose to double down on participating as an active member.<\/p>\n<p class=\"p1\">\u201cThat decision ended up paying off exponentially,\u201d he says.<\/p>\n<p class=\"p1\">He grew from \u201chaving a lot to learn\u201d to holding multiple leadership roles within the club, including serving as president his senior year. He also landed internships as an undergrad with Amazon, which ultimately led to the full-time job he scored with the company in 2024.<\/p>\n<p class=\"p1\">In his role, he\u2019s responsible for ensuring the security of some of Amazon\u2019s most sensitive applications.<\/p>\n<p class=\"p1\">\u201cIt\u2019s rewarding to see people impacted by the work I do every day,\u201d he says. \u201cMy family, my friends \u2014 it\u2019s stuff they use.\u201d<\/p>\n<p class=\"p1\">Thanks to UCF\u2019s online courses, he\u2019s simultaneously working toward finishing his master\u2019s degree in cyber security and privacy. And he\u2019s still as committed as ever to Hack@UCF, flying across the country a few times a year to participate in competitions \u2014 both as a member of UCF\u2019s Collegiate Cybersecurity Competition team and to help organize Hack@UCF\u2019s own competitions.<\/p>\n<p class=\"p1\">\u201cHack@UCF has shaped the trajectory of my career \u2014 one that I\u2019m really passionate about,\u201d he says. \u201cIt\u2019s been so integral to my life and many others. We are a professional development club first and foremost. We want to develop a skilled computer security workforce and get these people jobs in the industry, and that\u2019s what I have been most proud to be part of.\u201d<\/p>\n<hr \/>\n<h4 style=\"text-align: center;\">Sydney Munro \u201919<\/h4>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-25897 img-fluid aligncenter\" src=\"https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/4\/files\/2025\/04\/CallSecurity-Profile-200x200-Munro.jpg\" alt=\"Sydney Munro\" width=\"200\" height=\"200\" srcset=\"https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/4\/files\/2025\/04\/CallSecurity-Profile-200x200-Munro.jpg 200w, https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/4\/files\/2025\/04\/CallSecurity-Profile-200x200-Munro-150x150.jpg 150w, https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/4\/files\/2025\/04\/CallSecurity-Profile-200x200-Munro-190x190.jpg 190w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Software Engineer at Google<\/em><br \/>\n<em>San Francisco<\/em><br \/>\n<em>B.S. in Computer Science<\/em><\/p>\n<p class=\"p1\">At one point in her life, <strong>Sydney Munro \u201919 <\/strong>says the prospect of working for a company like Amazon or Google was completely foreign to her. She achieved both before the age of 28.<\/p>\n<p class=\"p2\">Munro didn\u2019t have a clear direction in mind when she started on a mathematics path at Broward College in her hometown. But she had a conversation with a friend who was studying computer engineering at UCF at the time, and that got her thinking. When that same friend landed an internship at Microsoft within the next year, Munro was sold.<\/p>\n<p class=\"p1\">\u201cIf she could do it, I could do it, too. It made it attainable. I thought, \u2018Let\u2019s give this a go,\u2019 and pretty much the rest is history,\u201d says Munro, who joined Google in 2021 and recently took a position with the company in San Francisco as a site reliability engineer, working with its cloud system.<\/p>\n<p class=\"p1\">Munro transferred to UCF and joined Hack@UCF in 2017. During her time with the club, she competed on UCF\u2019s cybersecurity competition team that placed third at the 2019 Wicked6 Cyber Games in Las Vegas. She also got involved as a mentor for Junior Knights.<\/p>\n<p class=\"p1\">She says an internship at Amazon helped open her world and was a game-changer for her schooling and future career.<\/p>\n<p class=\"p1\">\u201cMy internship at Amazon really prepared me for when I came back to school and took courses like <i>Senior Design<\/i>,\u201d she says. \u201cAll of a sudden, my team is like, \u2018Hey, we need to build this app, and we need to host it somewhere.\u2019 Well, I just came from a company that has AWS (Amazon Web Services) as their cloud provider. I know these tools pretty well, so I [knew I could] probably do this. I learned so much, and Amazon was really big [on] informing [me of ] what the rest of my career \u2014 so far, at least \u2014 would look like.\u201d<\/p>\n<p class=\"p1\">As soon as she graduated, she was hired full time as a software development engineer and left for Seattle. She didn\u2019t have any jitters about moving away from the only home she had known to a new city across the country because of the community Hack@UCF had, and continues to provide, today, she says.<\/p>\n<p class=\"p1\">\u201cI moved to Seattle with six of my best friends after college because I was in Hack@UCF, and we all got jobs at Amazon and Microsoft,\u201d Munro says. \u201cIt was a space where I met people [who] would become coworkers and friends. So while there is that technical and learning aspect of Hack@UCF, I think at its core, it is people \u2014 people that you get to do life with.\u201d<\/p>\n<p class=\"p1\">Imagine a 5-year-old managing her Type I diabetes by wearing a glucose monitoring sensor. Her parents have peace of mind because they can check on the sensor\u2019s data syncing to their phones in real time. But one day the system crashes, or a hacker messes with the levels and breaks the sensor. Now that very important, potentially life-saving data is compromised.<\/p>\n<hr \/>\n<h4 style=\"text-align: center;\">Christian Campana-Emard \u201920<\/h4>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-25894 img-fluid aligncenter\" src=\"https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/4\/files\/2025\/04\/CallSecurity-Profile-200x200-Campana-Emard.jpg\" alt=\"Christian Campana-Emard\" width=\"200\" height=\"200\" srcset=\"https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/4\/files\/2025\/04\/CallSecurity-Profile-200x200-Campana-Emard.jpg 200w, https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/4\/files\/2025\/04\/CallSecurity-Profile-200x200-Campana-Emard-150x150.jpg 150w, https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/4\/files\/2025\/04\/CallSecurity-Profile-200x200-Campana-Emard-190x190.jpg 190w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Cloud Security Engineer at Abbott<\/em><br \/>\n<em>Orlando<\/em><br \/>\n<em>B.S. in Information Technology<\/em><\/p>\n<p class=\"p1\">That is what <strong>Christian Campana-Emard \u201920 <\/strong>works to prevent every day in his role as a cloud security engineer at Abbott Laboratories.<\/p>\n<p class=\"p1\">\u201cOur core mission is to protect that data, make sure it\u2019s confidential and also make sure that the infrastructure is working,\u201d he says.<\/p>\n<p class=\"p1\">He couldn\u2019t have predicted as a freshman at Winter Springs High School that his decision to join JROTC would eventually land him in the career he\u2019s in today.<\/p>\n<p class=\"p1\">In his first year with the program, the group joined a new initiative through the Air and Space Forces Association to sponsor a <a href=\"https:\/\/www.ucf.edu\/cybersecurity\/competitions\/\">cyber defense competition<\/a> team. In his sophomore, junior and senior years, his team advanced to the national finals in Washington, D.C.<\/p>\n<p class=\"p1\">He enjoyed the experience so much that he wanted to continue competing in college at an elite level. So he looked up the results of the CCDC, essentially the Super Bowl of these events. UCF, the university practically in his backyard, had won three years in a row.<\/p>\n<p class=\"p1\">\u201cSo I thought, \u2018OK, this is the place,\u2019 \u201d Campana-Emard says. \u201cI was so inspired.\u201d<\/p>\n<p class=\"p1\">He didn\u2019t wait until enrolling to get involved with Hack@UCF, choosing to attend meetings while still in high school. He eventually competed as a member of the club\u2019s CCDC team, winning the southeast regional competition and claiming runner-up nationally in 2018. He also scored three paid internships with Northrop Grumman and Microsoft in consecutive summers.<\/p>\n<p class=\"p1\">\u201cWorking at Microsoft inspired me to dream big,\u201d he says. \u201cI walked away with the mentality of, \u2018If I can do this, then I can do anything.\u2019 \u201d<\/p>\n<p class=\"p1\">He joined Abbott Laboratories in 2021 after spending a year as a software engineer at Capital One, and has been fulfilled by the tangible role he plays in the lives around him.<\/p>\n<p class=\"p1\">\u201cThere are so many different elements to cybersecurity, and there are jobs where you could build things that you will never see the true benefit of,\u201d he says. \u201cI love what I do because I don\u2019t have to imagine the possibility of the impact. I can see it every time I see someone wearing a Libre [glucose monitoring] sensor.&#8221;<\/p>\n<hr \/>\n<h4>The following alums also gained valuable experience through Hack@UCF before working for these major companies:<\/h4>\n<p><strong>Carolyn \u201cCarrie\u201d Chenicek \u201905 \u201916MS<br \/>\n<\/strong>Principal Security Engineer at Starbucks<\/p>\n<p><strong>Jason Cooper \u201915<br \/>\n<\/strong>Senior Security<br \/>\nEngineer at Amazon Web Services<\/p>\n<p><strong>Alex Cote \u201921<br \/>\n<\/strong>Senior Cloud Security Engineer at Abbott<\/p>\n<p><strong>Kevin DiClemente \u201915<br \/>\n<\/strong>Principal Architect at Microsoft<\/p>\n<p><strong>Peyton Duncan \u201921<br \/>\n<\/strong>Tech Lead, Senior Software Engineer &#8211; Risk and Response at TikTok<\/p>\n<p><strong>Kai Garcia \u201921<br \/>\n<\/strong>Senior Staff Security Engineer at Abbott<\/p>\n<p><strong>Milo Gilad \u201924<br \/>\n<\/strong>Associate Analyst, Falcon Complete at Crowdstrike<\/p>\n<p><strong>Harrison Keating \u201924<br \/>\n<\/strong>Senior Cybersecurity Engineer at Abbott<\/p>\n<p><strong>Colton Knight \u201924<br \/>\n<\/strong>Penetration Tester at IBM<\/p>\n<p><strong>Odell Moreno \u201919<br \/>\n<\/strong>Senior Manager, Cybersecurity at Abbott<\/p>\n<p><strong>Oliver Moreno \u201923<br \/>\n<\/strong>Cybersecurity Specialist at Abbott<\/p>\n<p><strong>David Maria \u201920<br \/>\n<\/strong>Senior Consultant at Crowdstrike<\/p>\n<p><strong>Cody McMahon \u201915<br \/>\n<\/strong>Security Software Engineer at Microsoft<\/p>\n<p><strong>Lawton Pittenger \u201923<br \/>\n<\/strong>Security Specialist Solutions Architect at Amazon Web Services<\/p>\n<p><strong>Martin Roberts \u201920 \u201922MS<br \/>\n<\/strong>Staff Security Engineer at Fountain<\/p>\n<p><strong>Michael Roberts \u201919 \u201921MS<br \/>\n<\/strong>Senior Manager, Product Security at Abbott<\/p>\n<p><strong>Austin Sturm \u201918 \u201921MS<br \/>\n<\/strong>Security Engineer at Amazon<\/p>\n<p><strong>Nelson Torres \u201920<br \/>\n<\/strong>Software Engineer at Abbott<\/p>\n<p><strong>Ditmar Wendt \u201916<br \/>\n<\/strong>Senior Game Security Engineer at Amazon<\/p>\n","protected":false},"featured_media":25889,"template":"","categories":[977],"tags":[148,1738],"class_list":["post-25799","story","type-story","status-publish","has-post-thumbnail","hentry","category-feature","tag-college-of-engineering-and-computer-science","tag-hackucf","issues-spring-2025"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>UCF&#039;s Legacy of Cybersecurity Success, Talent<\/title>\n<meta name=\"description\" content=\"When the world\u2019s biggest companies need cybersecurity talent, they look to UCF\u2019s acclaimed Collegiate Cyber Defense Club.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ucf.edu\/pegasus\/call-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Call Security: UCF&#039;s Legacy of Cybersecurity Success, Talent\" \/>\n<meta property=\"og:description\" content=\"When the world\u2019s biggest companies need cybersecurity talent, they look to UCF\u2019s acclaimed Collegiate Cyber Defense Club.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ucf.edu\/pegasus\/call-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Pegasus Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/UCF\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-02T20:48:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/4\/files\/2025\/04\/CallSecurity-Pegasus-Spr25-1200x800-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Call Security: UCF&#039;s Legacy of Cybersecurity Success, Talent\" \/>\n<meta name=\"twitter:description\" content=\"When the world\u2019s biggest companies need cybersecurity talent, they look to UCF\u2019s acclaimed Collegiate Cyber Defense Club.\" \/>\n<meta name=\"twitter:site\" content=\"@UCF\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.ucf.edu\\\/pegasus\\\/call-security\\\/\",\"url\":\"https:\\\/\\\/www.ucf.edu\\\/pegasus\\\/call-security\\\/\",\"name\":\"UCF's Legacy of Cybersecurity Success, Talent\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ucf.edu\\\/pegasus\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.ucf.edu\\\/pegasus\\\/call-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ucf.edu\\\/pegasus\\\/call-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ucf.edu\\\/wp-content\\\/blogs.dir\\\/4\\\/files\\\/2025\\\/04\\\/CallSecurity-Pegasus-Spr25-1200x800-1.jpg\",\"datePublished\":\"2025-05-02T14:40:34+00:00\",\"dateModified\":\"2025-05-02T20:48:34+00:00\",\"description\":\"When the world\u2019s biggest companies need cybersecurity talent, they look to UCF\u2019s acclaimed Collegiate Cyber Defense Club.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.ucf.edu\\\/pegasus\\\/call-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.ucf.edu\\\/pegasus\\\/call-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.ucf.edu\\\/pegasus\\\/call-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.ucf.edu\\\/wp-content\\\/blogs.dir\\\/4\\\/files\\\/2025\\\/04\\\/CallSecurity-Pegasus-Spr25-1200x800-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.ucf.edu\\\/wp-content\\\/blogs.dir\\\/4\\\/files\\\/2025\\\/04\\\/CallSecurity-Pegasus-Spr25-1200x800-1.jpg\",\"width\":1200,\"height\":800,\"caption\":\"A collage of digital screens, coding, and the words \\\"Hacked\\\" and \\\"Access Denied\\\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.ucf.edu\\\/pegasus\\\/call-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.ucf.edu\\\/pegasus\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Call Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.ucf.edu\\\/pegasus\\\/#website\",\"url\":\"https:\\\/\\\/www.ucf.edu\\\/pegasus\\\/\",\"name\":\"Pegasus Magazine\",\"description\":\"The Magazine of University of Central Florida\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.ucf.edu\\\/pegasus\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.ucf.edu\\\/pegasus\\\/call-security\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"University of Central Florida\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"UCF's Legacy of Cybersecurity Success, Talent","description":"When the world\u2019s biggest companies need cybersecurity talent, they look to UCF\u2019s acclaimed Collegiate Cyber Defense Club.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ucf.edu\/pegasus\/call-security\/","og_locale":"en_US","og_type":"article","og_title":"Call Security: UCF's Legacy of Cybersecurity Success, Talent","og_description":"When the world\u2019s biggest companies need cybersecurity talent, they look to UCF\u2019s acclaimed Collegiate Cyber Defense Club.","og_url":"https:\/\/www.ucf.edu\/pegasus\/call-security\/","og_site_name":"Pegasus Magazine","article_publisher":"https:\/\/www.facebook.com\/UCF","article_modified_time":"2025-05-02T20:48:34+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/4\/files\/2025\/04\/CallSecurity-Pegasus-Spr25-1200x800-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"Call Security: UCF's Legacy of Cybersecurity Success, Talent","twitter_description":"When the world\u2019s biggest companies need cybersecurity talent, they look to UCF\u2019s acclaimed Collegiate Cyber Defense Club.","twitter_site":"@UCF","twitter_misc":{"Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ucf.edu\/pegasus\/call-security\/","url":"https:\/\/www.ucf.edu\/pegasus\/call-security\/","name":"UCF's Legacy of Cybersecurity Success, Talent","isPartOf":{"@id":"https:\/\/www.ucf.edu\/pegasus\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ucf.edu\/pegasus\/call-security\/#primaryimage"},"image":{"@id":"https:\/\/www.ucf.edu\/pegasus\/call-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/4\/files\/2025\/04\/CallSecurity-Pegasus-Spr25-1200x800-1.jpg","datePublished":"2025-05-02T14:40:34+00:00","dateModified":"2025-05-02T20:48:34+00:00","description":"When the world\u2019s biggest companies need cybersecurity talent, they look to UCF\u2019s acclaimed Collegiate Cyber Defense Club.","breadcrumb":{"@id":"https:\/\/www.ucf.edu\/pegasus\/call-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ucf.edu\/pegasus\/call-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ucf.edu\/pegasus\/call-security\/#primaryimage","url":"https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/4\/files\/2025\/04\/CallSecurity-Pegasus-Spr25-1200x800-1.jpg","contentUrl":"https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/4\/files\/2025\/04\/CallSecurity-Pegasus-Spr25-1200x800-1.jpg","width":1200,"height":800,"caption":"A collage of digital screens, coding, and the words \"Hacked\" and \"Access Denied\""},{"@type":"BreadcrumbList","@id":"https:\/\/www.ucf.edu\/pegasus\/call-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ucf.edu\/pegasus\/"},{"@type":"ListItem","position":2,"name":"Call Security"}]},{"@type":"WebSite","@id":"https:\/\/www.ucf.edu\/pegasus\/#website","url":"https:\/\/www.ucf.edu\/pegasus\/","name":"Pegasus Magazine","description":"The Magazine of University of Central Florida","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ucf.edu\/pegasus\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ucf.edu\/pegasus\/call-security\/#local-main-organization-logo","url":"","contentUrl":"","caption":"University of Central Florida"}]}},"acf":[],"story_subtitle":"When the world\u2019s biggest companies need cybersecurity talent, they look to UCF\u2019s acclaimed Collegiate Cyber Defense Club. ","story_description":"When the world\u2019s biggest companies need <a target=\"_blank\" href=\"https:\/\/www.ucf.edu\/cybersecurity\/\">cybersecurity talent<\/a>, they look to UCF\u2019s acclaimed Collegiate Cyber Defense Club.&nbsp;","story_thumbnail":{"url":"https:\/\/www.ucf.edu\/wp-content\/blogs.dir\/4\/files\/2025\/04\/CallSecurity-Pegasus-Spr25-1200x800-1-263x175.jpg","width":263,"height":175},"_links":{"self":[{"href":"https:\/\/www.ucf.edu\/pegasus\/wp-json\/wp\/v2\/story\/25799","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ucf.edu\/pegasus\/wp-json\/wp\/v2\/story"}],"about":[{"href":"https:\/\/www.ucf.edu\/pegasus\/wp-json\/wp\/v2\/types\/story"}],"version-history":[{"count":20,"href":"https:\/\/www.ucf.edu\/pegasus\/wp-json\/wp\/v2\/story\/25799\/revisions"}],"predecessor-version":[{"id":26076,"href":"https:\/\/www.ucf.edu\/pegasus\/wp-json\/wp\/v2\/story\/25799\/revisions\/26076"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ucf.edu\/pegasus\/wp-json\/wp\/v2\/media\/25889"}],"wp:attachment":[{"href":"https:\/\/www.ucf.edu\/pegasus\/wp-json\/wp\/v2\/media?parent=25799"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ucf.edu\/pegasus\/wp-json\/wp\/v2\/categories?post=25799"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ucf.edu\/pegasus\/wp-json\/wp\/v2\/tags?post=25799"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}