CISSP
Experienced and results-driven cybersecurity and IT leader with over 25 years of success designing, securing, and scaling enterprise and startup environments. I specialize in aligning technology with business goals—building cloud infrastructure, implementing Zero Trust and IAM frameworks, and leading compliance programs in highly regulated industries including public sector, healthcare, energy, and eCommerce.
I’ve led from the ground up—building cybersecurity and governance programs from scratch, achieving StateRAMP and PCI-DSS compliance, and executing secure cloud migrations and business-critical integrations. Whether stabilizing global enterprise systems or launching eCommerce platforms that scale to exit, I bring a hands-on approach with a strategic lens.
I’m passionate about building secure, high-performance teams and solutions that empower growth while maintaining compliance and operational resilience. I thrive in complex, cross-functional environments—balancing executive vision with technical execution, and translating risk into opportunity.
CISSP
Built Atser’s cybersecurity and compliance program from the ground up, achieving StateRAMP Moderate authorization and leading a secure migration from AWS to Azure. Established IT governance, risk management, and DevSecOps practices. Integrated Zero Trust, PIM, Sentinel, and secure IaC pipelines to protect regulated operations and public-sector SaaS delivery.
Led PCI-DSS alignment and cybersecurity transformation for critical business systems. Implemented security policy frameworks, SIEM operations, MFA, and vulnerability management. Managed offshore teams, launched awareness training, and built incident response and business continuity programs to secure cloud-hosted infrastructure and eCommerce systems.
Designed and built the entire IT and cloud infrastructure from scratch to support multiple Shopify-based eCommerce businesses. Deployed secure Azure environments, managed platform operations, led offshore development, implemented Zero Trust, and launched multiple storefronts—culminating in a successful business exit.
Supported HPE’s hybrid cloud and identity modernization strategy. Designed and deployed ADFS for Azure integration, implemented the Enhanced Security Administrative Environment (ESAE), and led DNS infrastructure redesign. Delivered secure, scalable identity solutions aligned with enterprise architecture goals.
Contributed to the ADMA project, managing AD and messaging infrastructure operations. Enforced security policy, led patching and backup efforts, and delivered DR and network performance improvements across a global energy enterprise.
Directed enterprise services for messaging, identity, and collaboration across 50,000+ users. Led O365 migration, SharePoint rollout, and integration of 50+ mergers. Built and automated IAM solutions, reduced domain controllers from 120 to 4, and drove $1M+ in annual cost savings through automation and consolidation.
Social engineering prevention
Vulnerability assessment
Network security implementation
Identity and Access management
Cloud security management
Intrusion detection systems
Security awareness training
Incident response planning
Penetration testing
Secure software development
Security architecture design
Regulatory compliance
Mobile device security
Threat intelligence analysis
Vendor risk management
Business continuity planning
Artificial intelligence security
Risk management expertise
Data privacy compliance
Security policy creation
IoT security management
Encryption technologies proficiency
Disaster recovery strategies
Cybersecurity strategy development
Application security oversight
Incident response
Patch management
Compliance management
Network security
Application security
Intrusion detection
Information governance
Disaster recovery planning
Cloud security
Firewall configuration
Teamwork and collaboration
Problem-solving
Problem-solving abilities
Time management
Multitasking
Organizational skills
Time management abilities
Decision-making
Effective communication
Adaptability
Professionalism
Risk assessment
Security metrics
Written communication
Quality assurance
Security needs assessment
Continuous improvement
Goal setting
Security protocols
Data security
Data encryption
Business continuity
Disaster recovery
Resource allocation
Security assurance
Procedure documentation
Information protection
System administration
Vulnerability analysis
Security testing
Microsoft Hyper-v server
Security planning
Information assurance
Security maintenance