Cybersecurity professional specializing in vulnerability management, endpoint security, and secure development practices. I focus on building resilient systems through comprehensive security architecture, incident response, and proactive threat mitigation. My expertise spans from secure coding and API development to network segmentation and cloud security implementations.
Entry-level IT support role providing helpdesk services and learning foundational IT skills.
Managed IT operations across multiple locations with focus on infrastructure and security.
Progressive service desk role with increasing responsibilities, automation focus, and project leadership.
Leading cybersecurity operations with focus on threat detection, vulnerability management, and security automation.
Comprehensive program covering information security, network defense, digital forensics, and secure software development. 2 classes remaining.
Foundation in computer systems, networking, and information technology fundamentals that form the basis for cybersecurity expertise.
Intermediate-level security certification covering access controls, cryptography, network security, and incident response.
Advanced cybersecurity certification focusing on threat detection, vulnerability management, and security analytics.
Specialized certification in security analytics, threat intelligence, and advanced security monitoring techniques.
Project management certification covering project lifecycle, risk management, and stakeholder communication.
Foundational cybersecurity certification covering threat management, cryptography, identity management, and risk assessment.
Specialized certification combining Security+, Network+, and Server+ knowledge for secure infrastructure management.
Network infrastructure certification covering network design, implementation, troubleshooting, and security.
Entry-level IT certification covering hardware, software, troubleshooting, and basic security concepts.
Comprehensive vulnerability management program focusing on automated patching and endpoint security improvements across the organization.
Implemented automated cloud security monitoring and remediation processes to reduce cloud infrastructure risks and improve security posture.
Implemented CIS benchmark controls for critical applications to enhance security posture while maintaining operational efficiency.
Modernizing IT operations by transitioning from local development to centralized development environments with enhanced security controls.
My homelab demonstrates enterprise-grade security architecture with network segmentation, virtualization, and comprehensive monitoring. Built around a UDM Pro gateway with VLAN-based security zones, it showcases real-world security implementations and defensive strategies.
VLAN-based security zones with UDM Pro gateway and pfSense DMZ
Dual Proxmox hypervisors for high availability and resource management
Docker containers with Portainer management and reverse proxy
Wazuh SIEM for centralized logging and threat detection
Authentik SSO for centralized authentication and authorization
Cloudflare tunnels for secure external access to internal services
This project demonstrates enterprise-grade network architecture with multi-layer security, network segmentation, and advanced traffic routing. Built to showcase real-world infrastructure design principles and security implementations.
Network Path: UDM Pro VLAN → pfSense DMZ → Proxmox → Linux VM → Docker Containers
Traffic Routing: MACVLAN + IP Routes for direct Docker network traffic, with other traffic deferred to different endpoints