Microsoft Word


Dynamic Chief Technology Officer and Senior Security Architect with over 20 years of experience integrating executive strategy with hands-on engineering expertise. Specializes in designing global Zero Trust ecosystems, automating SOC operations using GenAI/n8n, and navigating complex compliance frameworks. Proven track record includes achieving SOC 2 Type II attestation and modernizing legacy infrastructures for prominent organizations such as Aspen Insurance and Bob's Discount Furniture. Renowned for driving technological advancements and business transformations while fostering strong team collaboration and adaptability to evolving business needs.
● Security Architecture: Zero Trust (Zscaler ZIA/ZPA), SASE, Network Segmentation, Defense-in-Depth
● Identity & Access: Microsoft Entra ID (Azure AD), Active Directory, Bomgar BeyondTrust PAM, Delinea SecretServer, Thales HSM, PKI, IAM, SAML, Auth0, Entra ID, MFA
● Threat Detection & Intelligence: Microsoft Sentinel, QRadar, EDR/XDR, Darktrace, Proofpoint, SIGMA/YARA, MISP, OpenCTI, OpenBAS
● DevSecOps & AI: Python, FastAPI, n8n, SCORCH, Azure Data Lake, Google Gemini Integration, SAST/DAST, SNYK
● GRC & Compliance: SOC 2 Type II, CMMC, HIPAA, PCI-DSS, GDPR, Microsoft Purview DLP, Data Classification, Varonis, Sailpoint, Force Point, KnowBe4, NIST
● Project Management: Jira, Smartsheet, Agile, Waterfall, DevOps, project sponsorship
● Vulnerability Management: Qualys, Tenable, Rapid7
● Endpoint Management: Intune, SCCM, JAMF, Automox, Ivanti EPM, SCCM, Footprints,
• Achieved SOC 2 Type II Attestation:
Situation: The organization lacked a formal security attestation required to win enter- prise-level trust and contracts.
Task: Lead the end-to-end design and implementation of security controls to achieve and maintain SOC 2 Type II compliance.
Action: I built engineering teams from the ground up and implemented a comprehensive control framework, aligning technical operations with audit requirements.
Result: Successfully achieved and maintained SOC 2 Type II attestation, modernizing legacy infrastructure and establishing a baseline for enterprise growth.
• AI-Driven Threat Intelligence Optimization:
Situation: Detection engineering was a manual, time-consuming process that struggled to keep pace with incoming threat data.
Task: Architect a modern threat intelligence platform to automate the ingestion of MISP intel and the creation of detection logic.
Action: I utilized Python and n8n to integrate Google Gemini, automating the consumption of intelligence feeds and the generation of SIGMA queries.
Result: Reduced detection engineering time by 70% and improved the organization’s overall speed to respond to emerging threats.
• Global Zero Trust Transformation:
Situation: A global insurance provider was relying on legacy MPLS and VPNs, which presented a significant attack surface and performance bottlenecks.
Task: Lead the global architectural rollout of a Zero Trust ecosystem to replace perimeter-based networking.
Action: I architected the migration to Zscaler (ZIA & ZPA) and implemented granular "User-to-App" segmentation based on Microsoft Entra ID attributes.
Result: Modernized the global estate, eliminating the need for legacy VPNs and significantly reducing the internal lateral movement risk
• Hardware-Backed Security: :
Situation: The organization required a more robust, hardware-backed security foundation for its global infrastructure to protect sensitive cryptographic keys.
Task: Manage the complete lifecycle of Thales/Luna HSMs and migrate the existing Microsoft Certificate Services (AD CS) from software-based storage to hardware-backed keys.
Action: I executed physical Key Ceremonies to establish root-of-trust and integrated the HSMs with the global PKI architecture.
Result: Successfully enhanced the security posture of the global estate by ensuring that all critical digital certificates and keys were stored in tamper-proof hardware, significantly reducing the risk of unauthorized key export or compromise
• HIPAA Compliant Data Governance:
Situation: The organization needed to align its data handling with strict HIPAA and CMMC regulatory requirements.
Task: Design and implement a data-centric security program to identify, classify, and protect sensitive information.
Action: Using Microsoft Purview, I defined Data Owners and deployed "Audit -> Block" policies to enforce data loss prevention
(DLP) across the environment.
Result: Achieved full compliance with HIPAA and CMMC frameworks while improving visibility into data movement across the organization.
Luna HSM Certified System Engineer (Thales)
CompTia A+
Microsoft Word
Microsoft PowerPoint
Microsoft Excel
Proofpoint
Qualys
Beyond Trust
Delinea Secret Server and PAM
Active Directory
Azure
Entra ID
Microsoft Purview
Varonis
Darktrace NDR and Email
N8N
AI Architecture and Compliance