Resume

Table of contents

About

Technology enthusiast with a passion for systems engineering, computer networking, and ethical hacking. Strong systems experience in cloud and on-premise networks. Primarily programs in PowerShell and commits code to GitHub regularly. Curious and always learning, enjoys building and reverse engineering systems, and understanding systems internals. Embraces DevOps and Agile mindsets. Enjoys working with people from all backgrounds.





Experience

Security Specialist
SHINE Systems
Feb. 2021 -- to present

IT Systems Engineer
Cofense
Mar. 2020 -- Feb. 2021

IT Systems Administrator
Cofense
Dec. 2016 -- Mar. 2020

Tier 3 IT Support Analyst
AllStaff Technical Solutions
July 2015 -- Dec. 2016

Tier 1 Desktop Support Analyst
L-3 National Security Solutions
Nov. 2014 -- July 2015





Education

George Mason University
BA, Global Affairs
GPA 3.52/4.00
Graduated with Cum Laude honors





Certifications

Offensive Security Certified Professional
Sept. 2022

Microsoft Azure Administrator Associate
Oct. 2020 -- Oct. 2023

LPI Linux Essentials
July 2017

CompTIA Security+ ce
Jan. 2016 -- Jan. 2025

CompTIA Network+ ce
Aug. 2015 -- Jan. 2025

CompTIA A+ ce
Oct. 2014 -- Jan. 2025





Personal Projects

Security and Research Lab
A diagram of my lab environment is available here

Creating a Security Lab with Proxmox

Creating a Security Lab with VirtualBox





Skills

Cloud

  • AWS
  • Azure
  • Azure Active Directory
  • Microsoft 365

Infrastructure

  • Active Directory
  • DevOps Tools (Infrastructure-as-Code | Provisioning Automation)
  • Hypervisors  (ESXi | Proxmox | VirtualBox)
  • SMTP Servers
  • Web Servers

Networking

  • DNS
  • Firewalls
  • Network Models (OSI | TCP/IP)
  • Nmap
  • Protocol Analysis (Wireshark)
  • Proxies
  • Routing and Switching
  • Tor
  • VPN

Operating Systems

  • Linux
  • Mac OS
  • Windows

Programming

  • Bash
  • PowerShell
  • Python
  • REST APIs

Security

  • Burp Suite
  • Endpoint Monitoring (Carbon Black | Wazuh)
  • Ethical Hacking
  • Incident Response and Remediation
  • Intrusion Detection Systems (Suricata | Zeek)
  • Metasploit
  • OWASP Top 10
  • Penetration Testing with Kali Linux
  • SIEM (Wazuh | Elastic Stack)
  • Single Sign-On
  • Vulnerability Assessment (Nessus)

Spread the word