Summary
Security-focused professional with expertise in vulnerability assessment, risk analysis, and implementing cyber security controls. Proficient in infrastructure hardening, secure SDLC implementation, software engineering, and integrating cybersecurity best practices across full-stack development workflows.
CBIZ Pivot Point Security | Risk Advisory
- Led ISO 27001 gap assessments, risk assessments, and development of risk treatment plans, validating technical controls and identifying compliance gaps across client environments.
- Directed ISO 27001 implementations by developing and deploying security policies, procedures, and controls to remediate identified gaps and strengthen overall security posture.
- Conducted enterprise Standardized Control Assessments (SCA) to evaluate IT and security controls, identifying vulnerabilities and recommending targeted remediation.
CBIZ Risk Advisory
- Evaluated cybersecurity and ITGC controls to reduce compliance gaps and enhance audit readiness across infrastructure and data protection.
- Produced risk-based audit reports outlining control weaknesses, supporting stakeholder transparency and effective remediation planning.
University of Kansas
- Built a GIS tool using Google Cloud Platform and Google Maps API to auto-deploy encrypted Bluetooth Mesh nodes within a region for scalable IoT networks.
- Implemented lightweight BLE encryption by modifying firmware on ESP32 development boards, mitigating sniffing and MITM attacks within Bluetooth mesh networks.
C3BE, University of Kansas
- Mapped competencies to cybersecurity roles using the NICE framework and NVivo.
Satcom Direct
- Developed full-stack features for a SaaS product within an Agile team, delivering scalable and maintainable code.
- Enhanced SDLC security by evaluating and recommending an OWASP-compliant dependency tracking solution to mitigate supply chain risks.
Hack The Box (Independent)
- Completed Linux and Windows-based boxes involving privilege escalation, lateral movement, and web exploitation.
- Used tools like Nmap, Burp Suite, Metasploit, Ghidra, and Python for exploitation and analysis.
- Experienced with reverse shells, post-exploitation, and Active Directory attacks.
- Practiced TTPs aligned with real-world incident response and penetration testing workflows.
Education
- Master of Science in Computer Science | University of Kansas — Dec 2023
- Bachelor of Science in Computer Science | University of Kansas — May 2022
Professional Certifications
- ISO/IEC 27001 Provisional Implementer — Jan 2025
- CompTIA Security+ — Expected Aug 2025
Technical Skills
- Core Security Domains: Penetration Testing, Vulnerability Management, Incident Response, Malware Analysis, Cloud Security, Ethical Hacking
- Programming Languages: C++, C, Python, Perl, SQL
- Tools: Metasploit, Nmap, Burp Suite, Wireshark, Ghidra, Docker, Kali Linux
- Security Concepts: Reverse Engineering, Cryptography, Virtualization, Secure SDLC
- Control Frameworks: ISO 27001, ISO 27701, ISO 27017, TISAX