GRACE LYTLE
RESUME

My name is
  Grace Lytle

Being accepted into the CyberCorps® Scholarship for Service program is a monumental step in my journey. My background in music has taught me the importance of discipline, creativity, and teamwork—skills that seamlessly translate into the world of cybersecurity and computer science. This opportunity will allow me to merge my passion for helping others with my technical skills, equipping me for an impactful role in public service

Download Resume
Grace Lytle

Committed to
Cybersecurity

About Me

About
Grace Lytle

My interest in computer science was sparked by a desire to help others. When my husband needed a website to connect with the music community for his trumpet studio, I set out to create a unique and impactful site. Rather than relying on a website builder, I learned HTML, CSS, and JavaScript. With guidance from my dad and sister, who are both computer science graduates, I successfully built the site. This inspired me to return to school and pursue Computer Science. Since returning, my enthusiasm for web development has grown, along with my understanding of the importance of cybersecurity.

In the Fall of 2023, a cryptography course solidified my interest in cybersecurity. It became apparent to me how crucial cybersecurity is, not only for web development, but for all digital platforms. My background as a trumpet player has equipped me with skills that directly transfer to the world of cybersecurity. The discipline, creativity, and attention to detail required of music translates seamlessly to securing cryptographic systems. I am excited for a career in this field, with a focus on contributing to a federal agency's mission of securing our nation's digital infrastructure.

  • Languages:Java (Advanced), Python (Advanced), C# (Advanced), SQL (Intermediate), C/C++ (Intermediate)
  • Web Dev:HTML (Advanced), CSS (Advanced), JavaScript (Int.), Pug (Adv.), Go (Adv.), SQL (Int.), Node.js (Int.), React (Int.)
  • IDEs:Microsoft Visual Studio, Visual Studio Code, IntelliJ IDEA, SQL Management Studio, Jupyter Notebook, Anaconda Vi Editor
  • Tools:Stellar Cyber (SIEM), Confluence, Jira, Fiddler, Microsoft Office Suite, Chrome Developer Tools, FileZilla, LaTeX
  • :OSWindows, Linux

My Resume

Education

Education

  • Completion May 2027
    Master of Science in Cybersecurity
    Emphasis in Computer Science
    Certificate in Data Science

    Boise State University
    SFS BRONCO SHIELD CyberCorps® Scholar

  • Completion May 2025
    Bachelor of Science in Computer Science
    Emphasis in Cybersecurity

    Boise State University
    SFS BRONCO SHIELD CyberCorps® Scholar

  • May 2019
    Bachelor of Arts in Multidisciplinary Studies
    Minor in Music, Emphasis in Trumpet Performance

    Boise State University

Certification & Training

  • In Progress
    CompTIA Security+

  • July 2024
    PortSwigger - Server-side Vulnerabilities

    Introduction to Path Traversal, Access Control, Authentication, Server-side Request Forgery (SSRF), File Upload Vulnerabilities, OS Command Injection, and SQL Injection vulnerabilities, including how attackers identify and exploit them in real-world systems

My Projects

Portfolio
  • ALL
  • WEB DEVELOPMENT
  • CYBERSECURITY
  • CRYPTOGRAPHY
  • EDUCATIONAL
  • PROFESSIONAL

Bauer Music Studio

My first project, which was the catalyst for me to return to school. Custom Azure Static application using Hugo Static site generator with templating in Go.

Be My Valentine

Custom React Site Hosted as an Azure Static application. Uses components for UI and state management and event handling for user interactions.

Web Development Final Project

Static site using Pug templating for Node.js. This app employs an SQLite database for managing comments. The database schema design uses foreign key relationships, SQL queries for CRUD operations, secure data handling through prepared statements, and user input sanitization.

  • Date : December 2023
  • Tech : HTML, CSS, Node.js, SQLite, Pug
  • Source Code : Request Access

Python scripting in SageMath

RSA and El Gamal encryption. Determining private RSA keys, decrypting messages, verifying signatures, and finding El Gamal private signature keys and random numbers. Weaknesses explored in RSA private key attacks include the Fermat, Initial Segment, One Line, GCD, and Pollard P-1 attacks.

  • Date : December 2023
  • Tech : RSA, El Gamal, Python, SageMath
  • Source Code : Request Access

JMB Insurance Services

A custom Squarespace site.

Goose Creek Coffee Roasters

A custom Shopify site.

Get in Touch

Contact

Email & Github

  Grace@Tenacious3.com

  github.com/GraceLytle

Phone

  (208) 891-7331