Network Engineer
- Designed and maintained AWS VPC architectures including public/private subnets, route tables, NAT Gateways, Internet Gateways, and Transit Gateway (TGW) attachments to support hybrid DoD environments.
- Implemented IAM least-privilege access models using roles, managed policies, permission boundaries, and service control policies (SCPs) across multi-account AWS organizations.
- Built and automated infrastructure using Terraform and AWS CloudFormation, developing reusable modules and stacks for VPCs, security groups, ALB/NLB, EC2, and IAM resources.
- Leveraged Amazon CloudWatch for centralized monitoring, custom metrics, alarms, dashboards, and log aggregation to support operational visibility and incident response.
- Integrated CloudWatch Alarms with operational workflows to detect availability, performance, and security events across EC2, ALB, and VPC Flow Logs.
- Used AWS CloudTrail and CloudWatch Logs to support audit readiness, forensic investigations, and FedRAMP/NIST 800-53 compliance requirements.

