Table of Contents

RIT’s Double-Major Personal Statement: Computing Security and Computer Science

Sotus Bay Yacht Club harbor taken by Ethan Hall, RIT’s 2021 Commodore


This post includes my double-major personal statement and how I wrote it. If you are interested in why I decided to double major in computer science, see How to Double-Major in Computer Science and Computing Security at RIT.


RIT’s CSEC/CS double major instruction guide asks for a one-page personal statement to be submitted along with Double Major Authorization form. Statements should include the following information:

  • Your name and contact information
  • Why you are hoping to add a Double Major in Computer Science 
  • Your academic strengths
  • Your professional goals and interests

Document specifications


I used 12-point Times New Roman font, but Arial is also acceptable.

Document header

I included my contact information in the header. I formatted the document header to match my resume (click “Download Resume” to view the header). This was an easy and professional way to include my contact information in the document.

Addressing the committee

I used standard MLA format.

Double Major Committee

Department of Computer Science

17 December 2020

Double Major Personal Statement


Below is the signature I included.


Olivia A. Gallucci


🌸👋🏻 Let’s take this to your inbox. You’ll receive occasional emails about whatever’s on my mind—offensive security, open source, academics, boats, software freedom, you get the idea.


  • Paragraph 1: Why I want to add a double major in Computer Science
  • Paragraph 2: Academic strengths
  • Paragraph 3: Professional goals and interests
  • Paragraph 4: Conclusion

My personal statement

I redacted names from my statement. Additionally, please note that I did not include subheadings in my personal statement. I’m including them, so my statement is easier to read.

Why I want to add a double major in Computer Science

I want to double major in Computing Security and Computer Science because I am extremely interested in both fields, and I want the ability to solve complex problems that overlap in computing security and computer science. Last summer, I researched current problems in the cybersecurity industry and software industry. I found that computer programmers had difficulty writing secure code, and that cybersecurity professionals could not fix insecure code because of insufficient programming knowledge. Since I enjoy cybersecurity and computer science, I decided that I should apply for a double major, so I would be able to help solve these problems. 

Academic strengths

Last semester, I earned a 4.0 grade point average (GPA). I worked very hard, and I am extremely proud of my accomplishments at Rochester Institute of Technology (RIT). I realize that double majoring requires more effort than a single academic track. However, I love school, and I realize that I need to work hard in order to succeed. The combination of hard work, and a genuine love for education will enable me to be successful in a double major.  

Professional goals and interests

At RIT, I have been exposed to people that work in fields where computing security and computer science intersect. In September, after multiple tests and three interviews, I was offered an internship at Deloitte’s Cyber Risk and Advisory Department. At Deloitte, I met one of my career mentors, John Doe. Mr. Doe and I have spoken about double majoring at RIT. Since Mr. Doe’s occupation requires expertise in computing security and computer science, he thought that having a formal double major was an excellent idea. I would like to work in a position that is similar to Mr. Doe’s, so I believe that double majoring will help me reach my career goals. 


In summary, I love academics, and I work very hard. These traits helped me achieve a 4.0 GPA at RIT. I believe that these traits will also enable me to be successful while pursuing a double major, and that a double major in computing security and computer science will enhance my career goals. 

Portrait of Olivia Gallucci in garden, used in LNP article.

Written by Olivia Gallucci

Olivia is an honors student at the Rochester Institute of Technology. She writes about security, open source software, and professional development.