<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Home on Kyler Nats | Cybersecurity Portfolio</title><link>https://kylernats.github.io/personal-blog/</link><description>Recent content in Home on Kyler Nats | Cybersecurity Portfolio</description><generator>Hugo -- 0.159.1</generator><language>en-us</language><atom:link href="https://kylernats.github.io/personal-blog/index.xml" rel="self" type="application/rss+xml"/><item><title>About Me</title><link>https://kylernats.github.io/personal-blog/about/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kylernats.github.io/personal-blog/about/</guid><description>&lt;style&gt;
/* Header Section - Name and Subtitle */
.about-header {
padding-top: 40px;
margin-bottom: 20px;
}
.about-header h1 {
font-size: 3rem;
margin: 0;
color: var(--primary);
letter-spacing: -1.5px;
text-align: left;
}
.about-header .subtitle {
font-size: 1.15rem;
color: var(--secondary);
margin: 8px 0 0 0;
font-weight: 400;
text-align: left;
}
/* Side-by-Side Grid for Photo and Paragraph */
.content-grid {
display: grid;
grid-template-columns: 220px 1fr;
gap: 60px;
align-items: start; /* ALIGNS TOP OF PHOTO WITH TOP OF TEXT */
padding-bottom: 50px;
border-bottom: 1px solid var(--border);
margin-bottom: 50px;
}
.profile-photo {
width: 220px;
height: 220px;
min-width: 220px;
border-radius: 50%;
object-fit: cover;
object-position: 50% 15%;
border: 3px solid #AB0520;
box-shadow: 0 10px 25px rgba(0,0,0,0.15);
}
.value-statement {
font-size: 1.1rem;
line-height: 1.7;
color: var(--primary);
margin: 0; /* Ensures no top margin pushes text down */
}
/* Mobile view - Stack centered */
@media (max-width: 800px) {
.about-header {
text-align: center;
}
.about-header h1, .about-header .subtitle {
text-align: center;
}
.content-grid {
grid-template-columns: 1fr;
justify-items: center;
text-align: center;
gap: 30px;
}
}
/* Experience Styling */
.section-label {
font-size: 1rem;
font-weight: 700;
color: var(--primary);
text-transform: uppercase;
letter-spacing: 1.5px;
margin: 50px 0 35px 0;
}
.exp-item {
margin-bottom: 45px;
}
.exp-header {
display: flex;
justify-content: space-between;
align-items: baseline;
}
.exp-header h3 {
margin: 0;
font-size: 1.35rem;
color: #AB0520;
font-weight: 700;
}
.exp-line {
width: 35px;
height: 2px;
background-color: #AB0520;
margin: 10px 0 20px 0;
opacity: 0.8;
}
.exp-date {
font-size: 0.95rem;
color: var(--secondary);
}
.exp-text p {
margin-bottom: 15px;
line-height: 1.65;
}
/* Skills Table */
.skills-table {
width: 100%;
border-collapse: collapse;
margin-bottom: 60px;
}
.skills-table td {
padding: 15px 0;
border-bottom: 1px solid var(--border);
vertical-align: top;
}
.skills-cat {
width: 25%;
font-weight: 700;
color: #AB0520;
}
&lt;/style&gt;
&lt;div class="about-header"&gt;
&lt;h1&gt;Kyler Nats&lt;/h1&gt;
&lt;p class="subtitle"&gt;Cybersecurity Professional | M.S. in MIS&lt;/p&gt;</description></item><item><title>Automated AWS Infrastructure with Terraform</title><link>https://kylernats.github.io/personal-blog/projects/aws-terraform-infra/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kylernats.github.io/personal-blog/projects/aws-terraform-infra/</guid><description>&lt;hr&gt;
&lt;p&gt;Learning how to replace manual cloud configuration with a secure, immutable Infrastructure-as-Code (IaC) pipeline to deploy hardened AWS environments.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id="project-impact--core-functionality"&gt;Project Impact &amp;amp; Core Functionality&lt;/h2&gt;
&lt;p&gt;This project transitioned a manual workflow into a repeatable, version-controlled architecture, ensuring that every security group rule and subnet association is documented as code. By architecting a custom Virtual Private Cloud (VPC), I established a baseline for secure cloud operations that eliminates the risks of manual misconfiguration. The result is a functional, hardened web server environment that serves as the scalable foundation for future security labs.&lt;/p&gt;</description></item><item><title>Lab Notes</title><link>https://kylernats.github.io/personal-blog/lab-notes/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kylernats.github.io/personal-blog/lab-notes/</guid><description>&lt;p&gt;Working on these security simulations taught me that theory is very different from practice. I decided to build these labs because I wanted to see how vulnerabilities actually look when you are the one finding and fixing them.&lt;/p&gt;
&lt;p&gt;One of the biggest takeaways for me was seeing how dangerous legacy software can be. I found that old services like vsftpd often have known backdoors that give an attacker full control almost instantly. It made me realize that keeping systems updated is not just a chore but a critical part of defense.&lt;/p&gt;</description></item><item><title>My Portfolio Infrastructure</title><link>https://kylernats.github.io/personal-blog/projects/portfolio-infrastructure/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kylernats.github.io/personal-blog/projects/portfolio-infrastructure/</guid><description>&lt;hr&gt;
&lt;p&gt;How I built a containerized, high-performance portfolio using Hugo and Docker to ensure consistent deployments and secure web hosting.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id="project-impact--core-functionality"&gt;Project Impact &amp;amp; Core Functionality&lt;/h2&gt;
&lt;p&gt;This project moved beyond simple web design to focus on the infrastructure required to host a professional cybersecurity brand. By using Docker, I created an isolated environment that ensures the site runs identically on my local machine and the production server, eliminating &amp;ldquo;it works on my machine&amp;rdquo; errors. The final architecture serves as a low-latency, secure platform to showcase my technical labs and research.&lt;/p&gt;</description></item><item><title>Navigating the CMMC 2.0 Framework</title><link>https://kylernats.github.io/personal-blog/blog/cmmc-framework/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kylernats.github.io/personal-blog/blog/cmmc-framework/</guid><description>&lt;hr&gt;
&lt;p&gt;As a Master&amp;rsquo;s student immersed in cybersecurity frameworks, I&amp;rsquo;ve been particularly focused on CMMC 2.0. It&amp;rsquo;s more than just another set of controls, it represents a critical shift in how the Department of Defense (DoD) manages supply chain risk. For any organization looking to engage with the DIB, understanding this framework isn&amp;rsquo;t just about compliance, it&amp;rsquo;s about operational strategy.&lt;/p&gt;
&lt;hr&gt;
&lt;h3 id="what-is-cmmc-20"&gt;What is CMMC 2.0?&lt;/h3&gt;
&lt;p&gt;At its core, CMMC 2.0 is the DoD&amp;rsquo;s answer to cyber vulnerabilities across its supply chain. It&amp;rsquo;s a verification program designed to ensure that defense contractors are actually protecting sensitive unclassified information. Rather than simply relying on contractors to say they&amp;rsquo;re secure, CMMC 2.0 mandates actual proof.&lt;/p&gt;</description></item><item><title>Offensive Security &amp; Pentesting Lab</title><link>https://kylernats.github.io/personal-blog/projects/offensive-security-lab/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kylernats.github.io/personal-blog/projects/offensive-security-lab/</guid><description>&lt;hr&gt;
&lt;p&gt;A segregated virtual lab used to simulate the end-to-end lifecycle of a cyberattack to identify and mitigate defensive gaps.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id="project-impact--core-functionality"&gt;Project Impact &amp;amp; Core Functionality&lt;/h2&gt;
&lt;p&gt;This lab environment allowed for the safe execution of offensive security tactics against a hardened Linux target, bridging the gap between theoretical knowledge and technical application. By utilizing a Kali Linux attack vector, I successfully mapped the target&amp;rsquo;s attack surface and executed a series of exploits to gain unauthorized access. The project concludes with a full post-exploitation analysis, demonstrating how weak service configurations and poor credential management lead to total system compromise.&lt;/p&gt;</description></item><item><title>Professional Resume</title><link>https://kylernats.github.io/personal-blog/resume/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kylernats.github.io/personal-blog/resume/</guid><description>&lt;p&gt;I believe my blend of academic learning and real world experience makes me a strong candidate for security roles. I have worked in a security operations center and I am comfortable using professional tools to track down malicious behavior. My goal is to find a role where I can help a company stay secure while continuing to grow as a professional.&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;&lt;a href="../uploads/KylerNats.pdf"&gt;Download My Full Resume (PDF)&lt;/a&gt;&lt;/p&gt;
&lt;div style="margin-top: 20px; border: 1px solid #444; border-radius: 8px; overflow: hidden;"&gt;
&lt;object
data="../uploads/KylerNats.pdf"
type="application/pdf"
width="100%"
height="800px"&gt;
&lt;p&gt;Your browser does not support PDFs.
&lt;a href="../uploads/KylerNats.pdf"&gt;Download the PDF instead.&lt;/a&gt;
&lt;/p&gt;</description></item><item><title>Prompt Injection vs. Jailbreaking</title><link>https://kylernats.github.io/personal-blog/blog/ai-security-jailbreaking/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kylernats.github.io/personal-blog/blog/ai-security-jailbreaking/</guid><description>&lt;hr&gt;
&lt;p&gt;Artificial Intelligence tools are powerful. But like any system, they can be manipulated. Two common attack types you may hear about are prompt injection and jailbreaking. Let&amp;rsquo;s start by breaking down what each is.&lt;/p&gt;
&lt;hr&gt;
&lt;h3 id="what-is-prompt-injection"&gt;What Is Prompt Injection?&lt;/h3&gt;
&lt;p&gt;Prompt injection happens when someone hides malicious instructions inside input data to trick an AI system.&lt;/p&gt;
&lt;p&gt;The AI believes it is reading normal content. But hidden inside that content are instructions meant to change how the AI behaves.&lt;/p&gt;</description></item><item><title>Scalable RAG Chatbot Architecture</title><link>https://kylernats.github.io/personal-blog/projects/rag-chatbot-architecture/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kylernats.github.io/personal-blog/projects/rag-chatbot-architecture/</guid><description>&lt;hr&gt;
&lt;p&gt;I built a high-performance Retrieval-Augmented Generation (RAG) pipeline designed to securely query massive datasets using vector embeddings and cloud-native architecture.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id="project-impact--core-functionality"&gt;Project Impact &amp;amp; Core Functionality&lt;/h2&gt;
&lt;p&gt;This project engineered a scalable solution for AI-driven data retrieval, allowing a chatbot to provide accurate, source-backed answers from a sprawling Amazon product dataset. By moving away from local file processing and implementing a DuckDB streaming architecture, I ensured the system could handle enterprise-scale data without crashing under memory constraints. The final architecture is fully isolated within a VPC, ensuring that sensitive data remains invisible to the public internet while remaining highly accessible to the internal API.&lt;/p&gt;</description></item></channel></rss>