PacerCon was one of those events that reminded me why I like security in the first place. The CTF pulled in a mix of technical challenges that forced quick adaptation, clear thinking, and a willingness to shift approaches when the obvious path stopped working.
The challenge set covered the kind of categories I enjoy most, including web exploitation, reverse engineering, and general security problem solving. Some tasks rewarded careful enumeration and pattern recognition, while others required digging into binaries, understanding behavior at a lower level, and staying patient long enough to find the one detail that mattered.

What stood out most was the pace. Good CTF competition is not just about having the right knowledge, it is about applying it under time pressure while keeping your process organized. That mix of speed, creativity, and technical depth is a big part of why I enjoy this kind of work.
Taking first place meant a lot because it validated both the technical side and the way I approach problems. It was a strong reminder that I perform well in environments where I need to learn fast, think adversarially, and execute under pressure.