About
I began my career defending Air Force networks that spanned classified and unclassified
systems, where the cost of a gap was immediate. That work shaped how I operate today.
I secure the architecture first, automate the repetitive work, and verify that the controls
hold under inspection.
I now design zero-trust controls and run security automation for cloud and distributed
platforms, and I run the vulnerability management that keeps them defensible.
I give the governance side as much attention as the engineering, because a control only
matters if it survives an assessment and a determined attacker. My background covers RMF,
NIST 800-53, and the audit work that proves a program is sound.
I also teach. As an adjunct professor I helped students build practical skills in threat
analysis and prepare for certification, and I mentor the engineers on my own teams. Strong
security depends on people as much as on tools.
-
Cloud and Infrastructure Security
Hardening multi-tenant cloud, VMware and NSX-T, and container workloads against NIST and CIS baselines.
-
Zero-Trust Architecture
Microsegmentation, identity, and east-west controls built to NIST 800-207.
-
Security Automation and DevSecOps
Shift-left security gates, security as code, and Ansible automation that removes manual effort.
-
Governance, Risk, and Compliance
RMF and ATO ownership, automated evidence collection, and risk-based remediation tied to business priorities.