Abbey Robinson

University of Tampa • Cybersecurity • M.S. Candidate
abbey@portfolio:~$

About Me

I’m Abigail (Abbey) Robinson, a cybersecurity student at the University of Tampa and an M.S. candidate in Cybersecurity. My academic background has given me a broad foundation in cybersecurity, with an interest in threat intelligence, SOC operations, and defensive security analysis. I’m eager to apply my skills in a real-world environment and continue developing as a defensive security professional.

Projects

Honeypot Project (Cowrie + Raspberry Pi)

Defensive Security • Threat Analysis

SSH honeypot hosted via Cloudflare tunnel, capturing attacker activity, logs, and CTF artifacts.

Hack The Box CTFs
Linux • Web • Enumeration

Writeups documenting recon, exploitation, and methodology.

NCL Scouting Report

Web Application Exploitation • Password Cracking • Teamwork

Final rankings and catagory stats.

PC Build Notes

Hardware • Troubleshooting

Notes if interested in my pc build.

Home Lab (In Progress)

Virtualization • Networking

Building a lab to practice real security concepts and protect my own network and machines.

Intelligence 4 Good: Scambusters

Investigation • Threat Hunting • Scam Topology

Investigating and disrupting real-world cryptocurrency scam networks.

CTFs

National Cyber League (NCL)

Competition Rankings

Spring 2026 Individual Game: 57 / 7,010 nationally • 100th percentile

Spring 2026 Team Game (Experienced Bracket): 29 / 34199th percentile

Spring 2025 Team Game: 99th percentile • Placed 54 / 4200 overall • Ranked #1 team in the state of Florida

Trace Labs

OSINT • Missing Persons

Participated in Trace Labs OSINT investigations focused on supporting real-world missing persons cases through open-source intelligence research.

Used investigative techniques including social media analysis, username correlation, geolocation, public records research, metadata analysis, and digital footprint tracking to uncover actionable intelligence and potential leads.

Collaborated in timed OSINT-based challenges designed to simulate real-world investigative workflows while emphasizing ethical intelligence gathering and evidence documentation.

Tools

Blue Team

Wireshark
Splunk
CrowdStrike
Nessus
OpenVAS

Red Team

Nmap
Burp Suite
SQLmap
Metasploit
Hashcat

Resume

Contact