
Cybersecurity-focused professional with a strong foundation in identity and access management (IAM), systems analysis, and data security, complemented by hands-on experience in enterprise healthcare environments and operational risk management. Proven ability to enforce least-privilege access, support secure system migrations, and identify potential vulnerabilities in high-stakes, compliance-driven environments. I recently completed my Master’s in Cybersecurity, and I am currently preparing for my CISSP exam in March 2026.
• Operated across 15+ high-volume Disney venues, adhering to strict operational, safety, and compliance standards.
• Maintained security of point-of-sale systems and safeguarded guest payment and personal data.
• Demonstrated strong situational awareness and threat identification, proactively mitigating issues before escalation.
• Excelled in high-pressure environments requiring precision, accountability, and adherence to established controls—skills directly transferable to SOC and security operations roles.
• Managed and optimized enterprise inventory databases, ensuring data accuracy, integrity, and controlled access.
• Updated and maintained backend inventory systems, improving data reliability and reporting accuracy.
• Implemented process improvements and internal controls that reduced discrepancies and operational risk.
• Collaborated with technical and operational teams to deliver training and documentation on system usage and data handling best practices.
• Developed strong experience with structured data, access workflows, and system lifecycle management relevant to security operations.
• Supported Orlando Health’s $2.2B Epic EHR implementation, focusing on secure identity management and system migration across critical healthcare infrastructure.
• Administered user access controls using IAM processes, enforcing least-privilege principles to protect sensitive patient and operational data.
• Assisted in the secure migration of user accounts and credentials, ensuring data integrity and minimizing operational disruption.
• Identified and escalated configuration and access-related vulnerabilities, contributing to improved system hardening.
• Provided escalation-level technical support, troubleshooting authentication, authorization, and system access issues in a regulated environment.
Identity & Access Management (IAM)
Active Directory & User Provisioning
Least Privilege & Access Controls
SQL & Database Integrity
Python (Security Automation Foundations)
Incident Identification & Escalation
Systems & Infrastructure Security
Risk Mitigation & Compliance Awareness
Technical Documentation
Cross-Functional Collaboration