Security outcomes that are measurable, defensible, and built for real-world operations.
Management-track cybersecurity leader with a strong audit and risk foundation. I lead security programs, coordinate cross-functional stakeholders, and turn requirements into operational execution—controls, evidence, metrics, and continuous improvement.
About Me
A quick snapshot of how I work and what you can expect when you bring me in.
Practical security engineering and governance that reduces risk without breaking the business.
Program execution, identity controls, secure baselines, vulnerability management, and audit-ready documentation.
Clear artifacts: policies, procedures, responsibility matrices, evidence maps, reporting, and remediation plans.
Impact
How I apply audit discipline and operational risk thinking to build security programs that are both effective and defensible.
I build security with “proof” in mind—what the requirement is, what evidence demonstrates it, who owns it, and how it’s reviewed over time.
I communicate risk in plain language—likelihood, impact, and business effect—so leaders can make decisions.
I translate risk decisions into execution: prioritize, plan, implement controls, and keep evidence current.
I align stakeholders, de-escalate friction, and drive adoption so controls stick in real operations.
Leadership
Management-ready leadership style: program ownership, stakeholder alignment, and execution with measurable outcomes.
- ›Security program management: scope, priorities, delivery cadence, and measurable outcomes
- ›Operational risk management: risk decisions, remediation planning, and leadership reporting
- ›Audit coordination: evidence mapping, control validation, and continuous readiness
- ›Player-coach leadership: set standards, mentor others, and deliver alongside the team
- ›Cross-functional alignment: drive adoption across IT, engineering, vendors, and leadership
- ›Clear communication: translate technical risk into decision-ready updates for executives
Experience
Roles and responsibilities, focusing on outcomes and scope.
- ✅Led security assessments and maturity evaluations across access control, incident response, vulnerability management, and secure configuration domains.
- ✅Owned remediation planning and execution tracking—prioritizing work by risk, impact, and operational feasibility.
- ✅Coordinated stakeholders (IT, leadership, vendors) to implement MFA, least privilege, logging/monitoring, and hardened baselines with audit-ready evidence.
Prior Roles: Senior Cybersecurity Auditor, Cybersecurity Analyst, US Army Information Technology Specialist (25B)
Projects
Representative examples of security programs and initiatives I’ve led, described at a level appropriate for public review.
Brought an organization from informal security practices to a documented, auditable security program aligned to modern compliance and risk expectations.
Result: a security program leadership could explain, defend, and sustain.
- ›Designed access control, incident response, and vulnerability management procedures
- ›Established evidence mapping and review cadence tied to operational owners
- ›Prioritized remediation of high-risk gaps such as MFA and insecure remote access
- ›Enabled leadership to demonstrate security posture without ad-hoc effort
Designed and operationalized a risk register and scoring methodology that enabled leadership to prioritize security risk using consistent, decision-ready language.
- ›Defined likelihood, impact, and thresholds tied to business impact
- ›Mapped technical findings to operational and mission risk
- ›Integrated risk decisions into remediation planning and reporting
Created secure configuration and hardening standards that balanced industry best practices with operational constraints.
- ›Defined baseline standards aligned to CIS and regulatory expectations
- ›Established exception and compensating control workflows
- ›Improved consistency and reduced audit findings
Developed incident response playbooks and tabletop exercises to ensure teams could respond effectively and preserve evidence under pressure.
- ›Built IR runbooks with roles, severity tiers, and escalation paths
- ›Conducted tabletop exercises based on real-world scenarios
- ›Captured lessons learned to improve controls and readiness
Reduced attack surface by modernizing remote access patterns while maintaining usability for distributed teams.
- ›Identified and eliminated insecure remote access paths
- ›Implemented MFA and least-privilege access models
- ›Improved monitoring and access accountability
Embedded security directly into the change management process so risk is evaluated, controls are validated, and evidence is created as part of normal operations.
- ›Defined security review gates aligned to risk level and system impact
- ›Integrated security testing and approval criteria into change workflows
- ›Ensured changes generated audit-ready evidence automatically
- ›Shifted security from reactive approvals to built-in engineering workflows
Next Role
I’m pursuing a management role where I can lead people, own programs end-to-end, and scale security outcomes across the organization—building toward broader strategic responsibility over time.
- ›Security Manager / Security Program Manager — lead teams, set standards, and ensure consistent execution
- ›Cyber Risk & Compliance Manager — own risk decisions, audit readiness, and leadership reporting
- ›Director of Security / GRC / Risk — accountable for program strategy, maturity, and cross-functional alignment
- ›Lead and mentor teams with clear priorities, accountability, and measurable outcomes
- ›Translate requirements into execution: controls, evidence, validation, and reporting
- ›Run risk discussions with leadership using likelihood, impact, and tradeoffs
- ›Align security across IT, engineering, vendors, and business stakeholders
I operate as a player-coach today and am ready to take on formal people leadership with increasing program ownership.
Community & Coaching
Leadership outside of work: mentoring, conflict resolution, and building high-trust teams.
I volunteer as a youth baseball coach, helping kids build skills, confidence, and teamwork. I focus on fundamentals, discipline, and a growth mindset—especially when players hit setbacks.
- ›Coaching & mentoring: structured guidance to help players overcome obstacles and stay focused
- ›Conflict resolution: mediate disagreements, reset expectations, and reinforce respectful communication
- ›Team leadership: build an accountable culture where every player contributes and improves
- ›Communication: adapt to different personalities and learning styles to build trust quickly
Security programs succeed when people align on priorities and execution. Coaching reinforces the same skills required in security management: listening, de-escalation, setting standards, and building trust across different perspectives.
- ›Drive adoption by communicating expectations clearly
- ›Resolve friction between stakeholders and keep work moving forward
- ›Create accountability and continuous improvement
- ›Lead under pressure while staying outcome-focused
Skills
Grouped skills to help hiring managers scan quickly.
Certifications
Education
Degree verification is available upon request.