Co-Founder & Lead Engineer | 2026
Prismont - AI Governance Platform
Architecting and building the definitive governance layer for Enterprise AI. Features structured adversarial review, policy-aligned execution, and an immutable audit trail system.
Co-Founder at Prismont AI | Master's Candidate at NJIT
About Me
I am Percy Flores, a Master's student at the New Jersey Institute of Technology, concentrating in Cybersecurity and Privacy. My journey is defined by a commitment to bridging theoretical knowledge and hands-on, real-world execution.
Currently, I am the Co-Founder & Lead Engineer of Prismont AI alongside Rajwinder Parmer (Network Engineer & MBA candidate), where we are building the definitive governance layer for Enterprise AI, featuring structured adversarial review, policy-aligned execution, and immutable audit trails. Alongside this, I perform intensive cybersecurity lab work, from exploiting network configurations to performing controlled binary exploitation.
I am actively preparing for internship opportunities within Cybersecurity and IT, with a long-term focus on network defense, threat analysis, and secure systems design. My goal is to integrate quickly, meet high engineering standards, and continuously improve to align with the expectations at world-class enterprises.
"I intentionally waited to reach this point - I wanted to present a profile that reflects stronger
practical readiness, not just coursework."
Master's program with deep focus in cybersecurity, network protocols, and counter-hacking techniques.
6 hands-on CTF-style security labs covering buffer overflows, shellcode injection, ASLR bypass, and digital forensics.
ARP poisoning, MITM attacks, VLSM subnetting, and multi-router topologies using Wireshark and Cisco Packet Tracer.
Lead Developer on a production AI chatbot (Merck Capstone) using Next.js, AI SDK, and agentic LLM tool-calling.
Technical Skills
A practitioner's toolkit - built in the lab, refined through real project execution.
Projects
Every project was executed in a real or controlled environment - no simulations, no shortcuts.
Co-Founder & Lead Engineer | 2026
Architecting and building the definitive governance layer for Enterprise AI. Features structured adversarial review, policy-aligned execution, and an immutable audit trail system.
CS 491 - Senior Capstone | Spring 2025
Led development of a production-grade AI chatbot enabling Merck project managers to query Microsoft Project schedules using natural language via 9 custom LLM tool-calling functions.
CS 646 - Network Protocols & Security | Spring 2026
Performed a controlled ARP Poisoning (Man-in-the-Middle) attack in a VM environment, intercepting live traffic with Wireshark and proposing enterprise-grade mitigations.
CS 646 - Network Protocols & Security | Spring 2026
Designed and validated a multi-router IP network using VLSM subnetting in Cisco Packet Tracer, correctly assigning addresses across 5 network segments and verifying end-to-end connectivity.
CS 647 - Counter Hacking Techniques | Fall 2025
Most advanced exploit in the series - simultaneously bypassed all three modern OS defenses using format string leaks for ASLR/canary bypass and a return-to-libc attack to evade DEP.
CS 647 - Counter Hacking Techniques | Fall 2025
Crafted a NOP sled + custom shellcode payload injected through a vulnerable strcpy() buffer to spawn an interactive shell. Calculated precise stack offsets and return addresses via GDB analysis.
CS 647 - Counter Hacking Techniques | Fall 2025
Extracted a hidden SSH private key from 5 layers of nested archives (zip, tar, gzip, bzip2, xz) and leveraged SMB credential harvest to retrieve the target flag.
CS 647 - Counter Hacking Techniques | Fall 2025
Overflowed a strcpy() buffer to redirect execution to a hidden getFlag function. Used GDB disassembly to pinpoint the target address and calculate exact 108-byte padding offset.
CS 647 - Counter Hacking Techniques | Fall 2025
Identified an unsanitized system() input in iPrint and exploited it with a backtick-injected payload. Used ltrace/strace for dynamic tracing and sudo enumeration to escalate privileges.
Proof of Work
Every claim on this portfolio is backed by the actual submitted work. Read, download, or verify any report directly below.
Hosted externally - click "Open Google Doc" above to view. Requires the recipient's Google account access level.
Cisco Packet Tracer simulation file (.pkt) - download and open in Cisco Packet Tracer to verify the live network topology and routing tables.
Education
Graduate-level coursework at NJIT combining network security, counter-hacking, and engineering capstone projects.
2024 - Present
Master of Science - Cybersecurity & Privacy
Completed
Computer Science - Undergraduate Foundation
I am actively seeking internship opportunities in Cybersecurity and IT. Whether you'd like to discuss a role, provide feedback on my work, or simply connect - I'd love to hear from you.
๐ New Jersey, USA ยท ๐ NJIT Master's Candidate ยท ๐ Cybersecurity & IT Focus