Ryan Murphy

Building Tools
That Ship.

Automating workflows, building AI-powered apps, and engineering security tools — all the way to production.

4
Projects Shipped
5yr
Networking
3yr
Security
2yr
App Development
Active Research
Vulnerability management automation & AI in security operations — completing MS Cybersecurity (UWF) · PhD Cyber Defense incoming at Dakota State University (NSA CAE, Fall 2026)Vulnerability management automation & AI in security operations — completing MS Cybersecurity (UWF) · PhD Cyber Defense incoming at Dakota State University (NSA CAE, Fall 2026)

Selected Work

Projects Shipped

01
TPS — Tokens Per Second logo◆ Fully Autonomous

TPS — Tokens Per Second

Fully autonomous AI/LLM news platform. Polls 30+ sources every 15 min, classifies with Claude Haiku, publishes 5–10 articles daily — zero human intervention.

Next.jsSupabaseVercelClaude AI
02
Passrank logo◆ Fully Autonomous

Passrank

Autonomous security tool — evaluates and ranks 20+ password managers across 30+ security criteria. Self-updating via AI pipeline, no manual maintenance.

SecurityTypeScript
03
CArtels logo◆ Fully Autonomous

CArtels

Certificate transparency monitor — tracks SSL/TLS certificate chains, CT log entries, and CA issuance events to detect mis-issuance and domain hijacking.

SecurityTypeScript
04
CR Threat Hunter logo

CR Threat Hunter

Azure MDE SOC automation — ingests Microsoft Defender alerts, correlates IOCs, and triggers automated response workflows to reduce mean-time-to-respond.

AzurePythonSecurity

Credentials

Education & Certifications

Academic

Ph.D. in Cyber DefenseIncoming
Dakota State University
Beacom College of Computer & Cyber Sciences · NSA Center of Academic Excellence
Starting Fall 2026
Master of Cybersecurity, Data Security
University of West Florida
Aug 2024 – Aug 2026
BASc, Computer Systems Networking & Telecommunications
Florida State College at Jacksonville
Aug 2014 – May 2018

Certifications

CompTIA

SecurityXCASP+CSAECySA+PenTest+Cloud+Security+Network+A+

Microsoft

Azure AI Engineer AssociateAzure AI FundamentalsAzure Fundamentals

AWS

Certified AI PractitionerCloud Practitioner

Cisco / Juniper

CCNA R&SJNCIA-Junos

ISC2 / LPI / PagerDuty

CC (ISC2)Linux EssentialsIncident ResponderAPI Specialty

Stack & Tools

TypeScriptPythonBashNext.jsReactNode.jsSupabasePostgreSQLVercelRailwayKali LinuxBurp SuiteWiresharkNmapDockerREST APIsAI / LLM APIsGitTypeScriptPythonBashNext.jsReactNode.jsSupabasePostgreSQLVercelRailwayKali LinuxBurp SuiteWiresharkNmapDockerREST APIsAI / LLM APIsGit

Live Threat Intelligence

CISA Known Exploited Vulnerabilities

Source: CISA KEV Catalog · Updated daily

CVEVulnerabilityVendorRansomwareAdded
CVE-2024-1708ConnectWise ScreenConnect Path Traversal VulnerabilityScreenConnectConnectWiseUnknownApr 28, 2026
CVE-2026-32202Microsoft Windows Protection Mechanism Failure VulnerabilityWindowsMicrosoftUnknownApr 28, 2026
CVE-2025-29635D-Link DIR-823X Command Injection VulnerabilityDIR-823XD-LinkUnknownApr 24, 2026
CVE-2024-7399Samsung MagicINFO 9 Server Path Traversal VulnerabilityMagicINFO 9 ServerSamsungUnknownApr 24, 2026
CVE-2024-57728SimpleHelp Path Traversal VulnerabilitySimpleHelpSimpleHelp UnknownApr 24, 2026
CVE-2024-57726SimpleHelp Missing Authorization VulnerabilitySimpleHelpSimpleHelp UnknownApr 24, 2026

Vulnerability management is a core focus of my MS and PhD research. The CISA KEV Catalog is the authoritative source for exploitation-confirmed vulnerabilities — the empirical foundation for any evidence-based patch prioritization framework. I track it daily. Data via cisa.gov.

Available for Work

Let's Build
Something.

Open to security engineering, full-stack development, and automation roles. Let's talk.

Hire Me