Seth Stemen
Computer Science and Engineering student at The Ohio State University
about me
Ohio State University 2025 Undergraduate Student – Computer Science and Engineering | Information Security
I’m an undergraduate student at the Ohio State University studying Computer Science and Engineering with a specialization in Software Engineering, along with a minor in Information Security. My interests include software development, pen testing and following the latest trends in cybersecurity.
Competition Appearances
Buckeye Programming Competition 2024
Hosted by the Competitive Programming Club at Ohio State, this was a competition where I had a weekend to solve a series of programming challenges.
BuckeyeCTF
Competed in 2022, 2023, and 2024 (9th Place – Undergraduate Division)
Hosted by the Cybersecurity Club at Ohio State, this is a capture the flag competition where I had to solve as many cybersecurity challenges in 48 hours. During these events, I primarily solved forensics and web challenges.
Skills
Python
C/C#/C++
Java
Kotlin
Wireshark
JADX
Microsoft Office Sutie
Kali Linux/Metasploit
Work Experience
Managed staff, created schedules and a comprehensive training manual. Designed and maintained databases for office logistics and inventory tracking.
Troubleshoot issues concerning Active Directory, DHCP, Crowdstrike, Remote Management and networking in addition to deployment and configuration of new systems.
Developed a custom HMI to coordinate the route planning of an autonomous vehicle. Researched potential attack vectors utilizing Wireshark and JADX, in addition to developing custom Python scripts.
Personal Projects
Homelab
- Configured a server for remote access via VPN to facilitate remote file transfer and SSH access
- Currently using Homelab to enable self-hosted applications to be accessed on LAN and remotely via VPN
Pen Testing Lab
- Configured a set of VirtualBox virtual machines to be used during pen testing of vulnerable virtual machines
- Configured a DHCP server to facilitate offline testing
- Utilizing Kali Linux and the Metasploit framework to exploit vulnerabilities