I began my Information Security journey in 2008, when I first started studying for my Information Systems Security degree. I have since developed extensive experience in protecting complex network infrastructures and securing sensitive data across various sectors, including healthcare, communications, research, and power, as well as state and federal government. My approach to security focuses on proactive risk management, comprehensive documentation, and the strategic implementation of industry-standard security frameworks to create resilient systems. My goal with information security is to maximize safety and security, while also maintaining utility and integrity.
Some highlights of my information security expertise include:
Network Security and Intrusion Prevention: I am skilled in deploying and managing firewalls (Checkpoint, Cisco, Palo Alto) and IPS (Tipping Point), ensuring robust defenses against unauthorized access. Through optimizing firewall rules and zero-trust network models, I have significantly enhanced the cybersecurity posture of critical infrastructure.
System Hardening and Compliance: I prioritize rigorous security configurations, having implemented hardening processes that protect systems from advanced threats. My work with organizations like Sandia National Laboratories involved meeting high-stakes security requirements, including Department of Defense compliance, underscoring my commitment to maintaining strong security practices.
Vulnerability Management: Conducting regular assessments, patching systems, and actively managing vulnerabilities are essential elements of my work. By identifying and mitigating risks, I ensure that all systems remain safeguarded against potential breaches.
Documentation and Policy Development: I have played a key role in formalizing documentation standards, creating comprehensive records of network configurations, security policies, and procedural guidelines. This documentation supports operational integrity and continuity, providing clear security protocols for system use and maintenance.
Process Improvement in Security Operations: My approach to security is not only reactive but also process-driven. I have led initiatives to streamline security update processes, such as reducing the time needed to update over a thousand network devices from six months to just weeks, allowing for a more agile, responsive security environment.
Advanced Training and Continuous Learning: Staying updated with the latest security methodologies is a priority. My ongoing studies in Kubernetes and Ansible demonstrate my commitment to leveraging modern tools to further strengthen systems security and ensure adaptable, resilient defenses.
My goal is to create a secure environment that aligns with best practices and regulatory standards, providing organizations with the confidence that their data and systems are protected against evolving threats.