Protecting What Matters Most- Your Data and Reputation

​​Cybersecurity Specialist | Risk & Compliance Specialist

ABOUT
I am a driven and detailed-oriented IT professional with a background in security and public service. With a Bachelor's degree in Cybersecurity and an Associate of Science in Information Technology, I bring a blend of academic knowledge and hands-on experience to the field. My career began as a Detention Officer, where I developed strong leadership and crisis management skills-qualities that now infrom my approach to IT challenges. I have successfully transitioned into technology roles where I design secure network environments, manage enterprise-level cloud platforms, and implement robust cybersecurity measures. My technical expertise includes working with Linux, Windows Server, AWS, Microsoft Azure, and a wide range of cybersecurity tools such as Nessus, WireShark, and IAM protocols. Whether managing a network migration for a law firm or optimizing a SIPR environment, I strive to deliver secure, efficient, and scalable solutions. I am passionate about cybersecurity and committed to continual learning and professional growth in the evolving tech landscape.

Projects Recognized

Highlighting network or security work praised

Team Leadership

Led cybersecurity and network upgrade initiatives.

Compliance Successes

Successfully improved SIPR compliance implementation.

Memberships

Cybrary SANS WICYS

Proof of Concept Technical Solutions

Proof of Concept Technical Solutions

Designed and deployed a secure network topology for a law firm, ensuring compliance with NIST security standards. Implemented robust firewall rules, VPN access, and user authentication protocols to enhance data protection. Delivered a comprehensive security plan, access control policies, and audit documentation to support long-term compliance.

Read More  
IT Domain Security Analysis--iSeeU Eyesore

IT Domain Security Analysis--iSeeU Eyesore

This document analyzes iSeeU Eyecare's IT infrastructure across all seven IT domains. It identifies critical security priorities, particularly focusing on the User and LAN-to-WAN domains, and evaluates the relevance of Zero Trust architecture. Additionally, it highlights essential digital forensics documents for responding to incidents such as ransomware attacks and data breaches. The analysis demonstrates comprehensive knowledge of IT domain integration, security risk prioritization, and incident response documentation.

Read More  
SnowBe Online Security Plan

SnowBe Online Security Plan

A comprehensive organizational cybersecurity plan developed for SnowBe Online, this document outlines policies, standards, and procedures aligned with industry frameworks such as NIST 800-53 and PCI DSS. It includes roles and responsibilities, detailed security policies (access control, patch management, network security, training, etc.), and version history. This work showcases my capability in designing and documenting security governance for a digital business environment.

Read More  
Least Privilege Access Control Policy (AC-6)

Least Privilege Access Control Policy (AC-6)

This policy defines the implementation of Role-Based and Privilege-Based access controls in SnowBe Online. It aligns with NIST standards and details procedures for limiting user access based on job functions, enforcing SIEM monitoring, and establishing policy enforcement actions. It demonstrates my ability to apply key security principles--such as least privilege and separation of duties--into a formal organizational policy structure.

Read More  
Password Management Procedure (PP-1)

Password Management Procedure (PP-1)

This procedure sets standardized rules for password creation, change, and recovery within SnowBe Online. It includes requirements for strong passwords, user responsibilities, and compliance enforcement mechanisms. This work illustrates my understanding of authentication security and my ability to document secure operational practices in support of broader organizational policies.

Read More  
Network System Implementation Project - Marconi Law Firm, LLC

Network System Implementation Project - Marconi Law Firm, LLC

This comprehensive project report outlines the full design and implementation of a network infrastructure for Marconi Law Firm in Orlando, Florida. As the lead consultant, I developed a complete static IP address schema, designed a secure network topology, and implemented a user and group configurations using Windows Server 2019. The project included detailed hardware and software specifications, folder permissions, capital/operating costs, and timesheet tracking for project milestones. This work demonstrates my practical expertise in IT project management, secure network configuration, system administration, and enterprise hardware/software planning.

Read More