Accomplished cybersecurity expert and PhD candidate in Cybersecurity Management at Nova Southeastern University, with a proven track record in governance, risk, and compliance (GRC), SOC operations, and security training Coordination. Skilled in crafting policies aligned with SOC 2, ISO 27001, and NIST frameworks, conducting risk assessments, and driving incident response. Holds a Master’s in Cybersecurity Technology from UMGC (4.0 GPA) and certifications including CISM, and Security+. Committed to strengthening organizational security and promoting accessible, high-quality cybersecurity education.
• Create and refine policies, standards, and procedures that align with top frameworks (SOC 2, ISO 27001, NIST CSF, HIPAA, HITRUST, and more)
• Performed technical security risk assessments on medical devices, third-party vendors, servers, applications, and IoT devices.
• Created comprehensive Security Risk Assessment reports, including HITRUST controls mapping, risk identification, mitigation recommendations, and probability analysis.
• Monitor legal requirements and coordinate responses to regulatory inquiries.
• Develop compliance training programs and maintain ongoing audit readiness.
• Support the creation and maintenance of privacy policies and procedures
• Monitored and analyzed security alerts and incidents, providing timely response and remediation.
• Collaborated with cross-functional teams to integrate security controls into business operations.
• Advised stakeholders and policy owners during security policy discussions; interfaced with clients on IT security inquiries.
• Prepared and presented reports on organizational security posture, cybersecurity health, audits, and compliance status.
• Researched and applied emerging cybersecurity threats, trends, and regulatory changes to maintain effective security measures.
• Assisted in developing and implementing incident response plans and procedures.
• Contributed to the Security Advisory Board (SAB), providing insights and recommendations on governance, risk, and compliance.
• Supported IS Security operational staff with backup assistance to ensure continuity of security operations.
• Performed real-time log analytics across ICT assets, including firewalls, IDS/IPS, SOAR, Microsoft Windows, Linux, UNIX, Solaris, databases, applications, web servers, and network devices across multiple remote sites.
• Monitored networks, applications, data centers, and infrastructure to detect and protect against cyber threats.
• Conducted alert triage, determining criticality and scope of impact, and investigated endpoint alerts using SIEM and EDR tools such as Splunk ES, IBM QRadar, CrowdStrike, McAfee ePO, and Cylance, supported by OSINT.
• Implemented preventive security measures and contributed to incident response (IR) and disaster recovery (DR) planning.
• Investigated phishing email alerts via Proofpoint, processed website review requests using OSINT, and conducted proactive threat hunting with StrikeReady and other intelligence tools.
• Supported 24/7 SOC monitoring, detection, and response operations to ensure rapid containment and remediation.
• Collaborated with SIEM managers, threat hunters, and senior SOC analysts to optimize the organization’s CERT plan; shared IoCs with stakeholders for containment of advanced threats.
• Investigated and resolved Data Loss Prevention (DLP) alerts from McAfee DLP Manager; escalated validated PII incidents to Privacy teams.
• Managed security incidents from detection to closure, documenting investigations to meet SLA/SLR requirements.
• Delivered weekly SOC training sessions to enhance analyst readiness and contributed to daily SOC reporting and customer briefings
Completing a PhD in Cybersecurity Management at Nova Southeastern University provides advanced expertise in governance, risk, compliance, and security leadership. Graduates gain skills to lead SOCs, design enterprise risk programs, and influence cybersecurity policy. The degree also prepares you for executive roles (CISO, Director of Security, GRC Lead) or academic careers, with the ability to publish research, teach, and shape strategies at the intersection of technology, policy, and management.
Develop advanced cyber threat prevention skills.
In online master's program in cybersecurity technology at University of Maryland Global Campus, you'll develop cybersecurity strategies using interpersonal and leadership skills as part of a diverse and multidisciplinary cybersecurity team to build, configure, monitor, maintain, and secure cybersecurity technology environments and operations. Learn how cybersecurity technology underpins the success of organizations. The program offers a wide perspective of the field, providing the understanding of cybersecurity technology needed while balancing the use of people, policy, and technology in shaping the future of cybersecurity.
Develop advanced cyber threat prevention skills.
In online master's program in cybersecurity technology at University of Maryland Global Campus, you'll develop cybersecurity strategies using interpersonal and leadership skills as part of a diverse and multidisciplinary cybersecurity team to build, configure, monitor, maintain, and secure cybersecurity technology environments and operations. Learn how cybersecurity technology underpins the success of organizations. The program offers a wide perspective of the field, providing the understanding of cybersecurity technology needed while balancing the use of people, policy, and technology in shaping the future of cybersecurity.
Third-party assessments
Business analysis
Problem-solving
Risk assessment
Business continuity planning
Self motivation
Excellent communication
Financial risk manager (FRM)
Security architecture
Ethics management
Analytical thinking
Decision-making
Data privacy
SOX compliance
GDPR compliance
ISO standards
Contingency planning
Regulatory compliance
Cybersecurity best practices
Internal auditing
Control testing
Vendor risk management
Risk mitigation strategies
Risk mitigation
Enterprise risk management
HIPAA compliance
Training and awareness
Risk analysis training
IT governance
Governance frameworks
Incident management
PCI DSS compliance
Operational risk
Information security
Compliance monitoring