PDF Resume Link


  • Software Applications: Microsoft Office, GSuite, Visio, tcpdump, Wireshark, Remedy, and many more.
  • Operating Systems: Microsoft Windows Operating Systems (ALL), Linux, Unix, iOS, Android, Cisco iOS
  • Networking: LAN, WAN, 802.1q, 802.1s, 802.1w, 802.1x, 802.11*, and common services standards
  • Security Appliances: EPP, SIEM, IDS/IPS, Firewalls, Web Proxies, Sandboxes, DLP solutions, etc.
  • Security Software Applications: OpenVAS, Retina Eeye, Nessus, Metasploit, nmap, FTK, mimikatz, Plaso, BurpSuite
  • Programming Languages / Scripting: Powershell , Shell (BASH), Python
  • Virtualization: VMWare, Hyper-V, Virtualbox, Citrix


Chief Information Officer (Shieldmaiden LLC), (Dec 2016-Present)

  • Chief Information Officer responsible for all things related to IT documentation to include policies, procedures, POA&Ms, reports, etc
  • IT Project Management, oversees development of methodology, toolsets, and custom attack/defense solutions related to Shieldmaiden tools and services
  • Responsible for generating company culture as it relates to information systems and security between staff and clients
  • Actively performing as the Chief Editor for Shieldmaiden in generating documentation, cyber security news content, and publishing it to the public
  • Key communicator facilitating successful information flow both internal to Shieldmaiden and external to the clients

Network Security Engineer (Agile Defense Inc), (Aug 2016-Present)

  • Network Security engineer responsible for large (250+ server) RHEL environment hosting Tenable’s ACAS solution
  • Managed production network upgrade from RHEL 5 to RHEL 6 as well concurrent Tenable scanner and ACAS upgrades
  • Identified and documented vulnerabilities associated with insider threat risk inherent to RHEL and Tenable’s Security Center
  • Overhauled RHEL environment allowing for remote administration through certificate trusts, custom scripts, and Satellite Server management
  • Clearly designed and documented white papers that informed all levels of the Air Force management regarding network security solutions and best practices

Network Security Engineer (Assured Space Access Technologies Inc), (Nov 2015-Aug 2016)

  • Missile Defense Agency (MDA) Cyber Emergency Response Team (CERT) Security Engineer responsible for analyzing and preventing internal network exploitation
  • Manages in depth security scanning using ACAS across multiple domains
  • Prevents network exploitation by constant monitoring of McAfee HBSS suites on multiple domains
  • Identified malicious network traffic and prevented exfiltration of sensitive data
  • Initiated network blocks to multiple countries preventing known botnet traffic from traversing MDA boundary devices

Vulnerability Assessment Technician (United States Air Force), (Aug 2015-Nov 2015)

  • Experienced Vulnerability Assessment Technician that managed in-depth scans across 56 bases. Leveraged knowledge gained from Certified Ethical Hacker (CEH) certification to correct or mitigate known vulnerabilities, securing the Air Force enterprise network
  • Responsible for installation and patching of Retina, ACAS, and Nessus resulting in 99% uptime for all scanning devices assigned to area of responsibility
  • Ensures scanning procedures and configurations adhere to organization’s policies
  • Designs and delivers all training for work center containing 12 personnel

Lead Trainer of Cyber Operations (United States Air Force), (Jul 2011-Aug 2015)

  • Senior Engineer for network realignment team, designed and transitioned from small tactical suite to the enterprise suite containing 25 Windows virtual servers
  • Subject Matter Expert for McAfee HBSS servers across 24 separate deployed domains. Conducted anti-malware program on deployed networks assisting remote sites with incident response and implementation of anti-malware procedures. Secured $18M in theater deployable communications equipment
  • Senior Information Assurance Officer at multiple locations leveraged technical knowledge of scanning, boundary, network architecture, and HBSS to ensure Information Assurance Vulnerability Management (IAVM) program success
  • Built and maintained disaster recovery plans and security policies at four sites, including three geographically separated networks

Cyber Systems Operations Technician (United States Air Force), (Mar 2010-Jul 2011)

  • Configured network equipment for 3.5K users on two networks valued at $40M
  • Supervised installation of critical upgrades on network 1.6k assets alleviating vulnerabilities
  • Managed team fixing antivirus compatibility problem and restored 494 workstations to new baseline and secured network against future attacks

Intrusion Detection Specialist (United States Air Force), (Jul 2008-Mar 2010)

  • Managed intrusion detection suite securing $39M network and 8.8K users
  • Secured the local unclassified network by managing the antivirus suite and controlling virus updates to all IT assets
  • Monitored time critical patches for enterprise networks, ensuring compliance with vulnerability updates while securing both unclassified and classified networks


BS, Cyber Security, 2017

  • University of Maryland University College

AS, Information Systems, 2014

  • Community College of the Air Force

CompTIA Advanced Security Practitioner (CASP), 2016

  • CompTIA

Certified Ethical Hacker (CEH), 2015

  • EC-Council

Security + CE, 2016

  • CompTIA

Network +, 2010

  • CompTIA