

CyberSecurity Professional
Cybersecurity professional specializing in IAM operations, access governance, and identity hygiene, with hands-on experience supporting enterprise systems, stakeholder coordination, and security-focused project delivery.







Cybersecurity professional specializing in IAM, privileged access, and automation, leveraging AI and data-driven insights to secure enterprise systems efficiently.
Cybersecurity analyst focused on IAM, AI automation, and privileged access, strengthening enterprise security through efficient identity controls.
Why Partner With Me
Providing enterprise security solutions with technical precision, professionalism, and measurable results for clients.
Splunk Administrator
Supported IAM operations at CVS Health using Splunk for identity enrichment, lookup management, event correlation, and LDAP-based access validation.
CyberArk Admin
Administered CyberArk at Deloitte through vault management, privileged account onboarding, policy configuration, session monitoring, access control, and audit support.
AI Specialist
Utilized AI for IAM ticket triage, SLA resolution, website development, cloud server configuration, DNS services, VPN tunneling, and filtering.
What I Can Do For You
Supporting IAM, PAM, and cybersecurity operations across enterprises.
My Typical Work Process
A clear and structured process that ensures every project is user-focused, refined, and aligned with business goals.
Assessment, Discovery & Planning
Reviewing requirements, current-state systems, access needs, and security gaps to define a clear technical direction.
Solution Design & Configuration Planning
Mapping access flows, system configurations, and security controls to support smooth deployment, governance, and operations.
Configuration & Security Planning
Planning system settings, access controls, and technical workflows to improve security, usability, and operational readiness.
Core Skills & Security Expertise
A refined skillset focused on securing infrastructure, managing access, strengthening governance, and supporting reliable IT and security operations.





My Tech Projects
A collection of technical, security-focused projects demonstrating IAM expertise, automation skills, and problem-solving.
Simple & Transparent Hourly Pricing
Market-informed pricing for IAM, PAM, and cybersecurity roles, based on scope, complexity, and technical specialization.
.webp)
.webp)
.webp)
.webp)
.webp)
.webp)
.webp)
.webp)
.webp)
.webp)
.webp)
.webp)
.webp)
.webp)
.webp)
.webp)
.webp)
.webp)
.webp)
.webp)
.webp)
.webp)
.webp)
.webp)
.webp)
.webp)
.webp)
.webp)
.webp)
.webp)
Education Background
Master’s studies, certifications, and apprenticeships building a strong foundation in cybersecurity and IAM.
Frequently Asked Questions
I’m available to discuss projects, ideas, or opportunities anytime via contact form.
I hold both a Bachelor’s and Master’s degree in Cybersecurity from Old Dominion University, backed by hands-on experience in IAM, PAM, CyberArk, Azure, Active Directory, and access governance across enterprise environments.
I strongly prefer fully remote work and am especially interested in mission-aligned industries such as education, public health, civic technology, and nonprofit service. I do my best work in environments with clearly defined duties, structured priorities, and security-focused operations.
In previous roles, I’ve worked with ServiceNow (ITSM), CyberArk PAM tools including Vault, CPM, PSM, PVWA, PTA, and AIM, along with Azure, Azure AD / Active Directory, LDAP, Splunk, PowerShell, and Microsoft 365 technologies. My experience also includes access governance, provisioning workflows, security group reviews, privileged access administration, and automation across enterprise IAM and cybersecurity environments.
My background includes certifications such as Security+ and Azure Fundamentals, along with additional LinkedIn Learning certificates including Introduction to Ethical Hacking. I also build personal projects that strengthen my hands-on skills, including a HomeLab where I created a secure tunneled connection from a personal device to a cloud server, built a fully recursive DNS server, and set up a VPN server from scratch. These projects continue to sharpen my experience in networking, secure access, cloud infrastructure, and system administration.
My pay expectations are based on competitive market rates for the specific role, industry, level of responsibility, and technical specialization involved. I typically look for compensation that aligns with current market demand for IAM, PAM, cybersecurity, or systems work, while also reflecting scope, complexity, and business impact.










Get in Touch With Me
I’m available to discuss projects, ideas, or opportunities anytime via contact form.
.webp)














