Are you confident in your IT security and network performance? Or are you worried about vulnerabilities and technical issues slowing you down? Let me help you secure, streamline, and optimize your IT environment with expert solutions tailored to your needs.
Protect your systems from cyber threats with advanced security measures designed to fortify your defenses. From vulnerability assessments to proactive threat mitigation, I ensure your IT environment is secure, resilient, and compliant—because waiting for a breach is never an option.
Get fast, reliable tech support to resolve issues efficiently and keep your devices running at peak performance. Whether it's troubleshooting, software setup, or system optimization, I provide clear, effective solutions—without the jargon.
Secure and segment your home network with professional-grade configurations. I implement VLANs, firewall rules, and advanced security measures to isolate devices, prevent unauthorized access, and protect sensitive data. Whether it's securing smart home devices or setting up guest and IoT networks, I ensure your home network is both efficient and impenetrable.
Leverage expert IT advice tailored to your unique needs. Whether you're upgrading your infrastructure, improving security, or planning for future growth, I provide strategic solutions that save time, cut costs, and enhance efficiency.
Wazuh Monitoring (EDR) Implemented Wazuh to assess endpoint security compliance with NIST standards. This project highlighted widespread security gaps in unmanaged devices and reinforced the importance of proactive threat detection, log analysis, and system hardening techniques.
Deployed a honeypot within Azure Sentinel to capture and analyze real-world brute-force attempts after disabling Windows Firewall. This project provided hands-on experience with SIEM alerting, log correlation, and incident response workflows, enhancing my understanding of cloud security monitoring.
Designed and deployed a Windows Server-based Active Directory environment, implementing Group Policy Objects (GPOs) to enforce security baselines, restrict unauthorized access, and centralize user management. This project strengthened my expertise in domain administration and enterprise security.
Want to see more? Explore my full range of IT and cybersecurity projects on GitHub, covering areas such as security hardening, automation, and cloud security. Each project showcases practical implementations of industry best practices.
Graduated from Western Governors University with a Bachelor’s degree in Cybersecurity & Information Assurance. I earned several industry-recognized certifications, including CompTIA Security+, Network+, CySA+, PenTest+, Project+, and A+, as well as ITIL v4 and ISC2 SSCP.
I started my IT career as a System Administrator in the Identity & Access Management space, gaining hands-on experience working with enterprise clients such as Mars Inc., law enforcement agencies, and healthcare organizations. I specialized in the Microsoft ecosystem, automating account provisioning across multiple platforms and deploying a Mobile Device Management (MDM) solution via Intune to secure company endpoints and safeguard critical assets.
Fresh out of WGU, I began my IT Asset Management & Operations internship, collaborating with IT leaders across the globe to gain a deep understanding of enterprise IT operations. My role allowed me to work across multiple IT departments, where I optimized asset lifecycle management and identified missing or overdue assets, improving efficiency in asset tracking.
As a Lead Field Technician at one of the largest Managed Service Providers in the Treasure Coast, I’ve developed a diverse skill set, ranging from Tier 1 Help Desk support to advanced firewall and switch configuration and optimization. This role has allowed me to provide tailored IT solutions to businesses, ensuring their networks and security systems operate at peak performance.
I am committed to lifelong learning, continuously expanding my knowledge and skills to stay ahead in the ever-evolving world of cybersecurity and IT. I actively engage in hands-on labs and training programs, and keep up with emerging technologies, frameworks, and security best practices. Whether through self-study, professional development courses, or real-world experience, I strive to refine my expertise and adapt to the latest advancements in the field.