Illustration of a stylized white rocket ship launching diagonally upward against a transparent background.Minimalist abstract art with black and white shapes forming diagonal contrasts.

CyberSecurity Professional

Cybersecurity professional specializing in IAM operations, access governance, and identity hygiene, with hands-on experience supporting enterprise systems, stakeholder coordination, and security-focused project delivery.

Trusted by 10+ Happy Clients
Available for new projects
About Me

Cybersecurity professional specializing in IAM, privileged access, and automation, leveraging AI and data-driven insights to secure enterprise systems efficiently.

Cybersecurity analyst focused on IAM, AI automation, and privileged access, strengthening enterprise security through efficient identity controls.

2
3
4
5
6
7
8
9
0
4
5
6
7
8
9
1
+
+
+
+
+
+
+
+
Projects Completed
0
3
4
5
6
7
8
9
5
4
5
6
7
8
9
1
+
+
+
+
+
+
+
+
Years of Experience
1
3
4
5
6
7
8
9
0
4
5
6
7
8
9
1
+
+
+
+
+
+
+
+
Happy Clients
Why Partner?

Why Partner With Me

Providing enterprise security solutions with technical precision, professionalism, and measurable results for clients.

Splunk Administrator

Supported IAM operations at CVS Health using Splunk for identity enrichment, lookup management, event correlation, and LDAP-based access validation.

CyberArk Admin

Administered CyberArk at Deloitte through vault management, privileged account onboarding, policy configuration, session monitoring, access control, and audit support.

Active Directory Admin

Administered Active Directory at CVS Health through LDAP validation, group membership review, stale-account analysis, entitlement mapping, and access governance.

AI Specialist

Utilized AI for IAM ticket triage, SLA resolution, website development, cloud server configuration, DNS services, VPN tunneling, and filtering.

Services

What I Can Do For You

Supporting IAM, PAM, and cybersecurity operations across enterprises.

IAM Analyst

Delivers access governance, identity lifecycle management, entitlement reviews, and secure provisioning across complex enterprise environments.

Identity Lifecycle Management
Provisioning, Deprovisioning & RBAC
Entitlement Validation & Access Governance

I focus on strengthening access governance, identity lifecycle controls, and entitlement accuracy to improve security, compliance, and efficiency.

PAM Analyst

PAM Analyst experience focuses on securing privileged access through CyberArk administration, onboarding, session monitoring, compliance, and governance.

Privileged Account Onboarding & Rotation
Session Monitoring, PSM & Access Control
Audit Reporting, Governance & DR Support

PAM professional focused on securing privileged access, strengthening governance, and supporting compliant account lifecycle operations.

Security Analyst

Security analyst focused on monitoring, network hardening, secure connectivity, and access governance.

Security Monitoring, Splunk & Event Correlation
WireGuard, Recursive DNS & Tunnel Security
Firewall Rules, Network Hardening & Access Governance

Security analyst with hands-on experience securing networks, access, and enterprise infrastructure.

System Administrator

System administrator with hands-on experience supporting infrastructure, access, security, and operations.

Infrastructure Support, Monitoring & Maintenance
DNS, VPN & Secure Network Connectivity
Access Control, Hardening & Operations

System administration supports secure infrastructure, reliable connectivity, access, maintenance, and uptime.

IT Specialist

IT specialist delivers infrastructure support, secure connectivity, troubleshooting, maintenance, and access.

System Support, Monitoring & Issue Resolution
Access Control, Security Hardening & User Support
Access Management, Firewall Rules & Hardening

Providing IT support through reliable troubleshooting, secure connectivity, system maintenance, access management, and infrastructure operations for modern business environments.

Work process

My Typical Work Process

A clear and structured process that ensures every project is user-focused, refined, and aligned with business goals.

01

Assessment, Discovery & Planning

Reviewing requirements, current-state systems, access needs, and security gaps to define a clear technical direction.

Step-01
02

Solution Design & Configuration Planning

Mapping access flows, system configurations, and security controls to support smooth deployment, governance, and operations.

Step-02
03

Configuration & Security Planning

Planning system settings, access controls, and technical workflows to improve security, usability, and operational readiness.

Step-03
04

Implementation, Support & Optimization

Deploying configurations, validating access, resolving issues, and refining systems for secure, stable, and reliable operations.

Step-04
my skills

Core Skills & Security Expertise

A refined skillset focused on securing infrastructure, managing access, strengthening governance, and supporting reliable IT and security operations.

6+
My Skills
Market pricing

Simple & Transparent Hourly Pricing

Market-informed pricing for IAM, PAM, and cybersecurity roles, based on scope, complexity, and technical specialization.

Image
UI/UX Design (1 Page)
Image
Ready-made core
Image
Responsive Layout
Image
Community learning
Image
2 Revisions
Image
Email support
Image
Delivery: 3–4 Days
Image
Certification included
Image
Certification included
Image
Certification included
Image
UI/UX Design (Up to 5
Image
Ready-made core
Image
Responsive Design
Image
Community learning
Image
User Flow & Wireframe
Image
Email support
Image
3 Revisions
Image
Certification included
Image
Certification included
Image
Delivery: 6–7 Days
Image
Automation and scripting support
Image
PowerShell task automation
Image
Security controls validation
Image
Provisioning & deprovisioning
Image
Security group cleanup
Image
System maintenance operations
Image
IAM / PAM support
Image
Server maintenance & patching
Image
AD / LDAP administration
Image
Active Directory administration
Client review

Education Background

Master’s studies, certifications, and apprenticeships building a strong foundation in cybersecurity and IAM.

Smiling man with dark hair wearing a gray button-up shirt against a plain gray background.

I earned both my Bachelor’s and Master’s degrees in Cybersecurity from Old Dominion University, building a strong academic foundation in security operations, identity management, and risk-focused problem-solving. That education continues to support my practical approach to IAM, PAM, and enterprise cybersecurity work.

Old Dominion University
Masters Cybersecurity - 3.9 GPA
Smiling young Asian man wearing a navy blazer and white t-shirt against a light gray background.

My certification training in Security+, Microsoft Azure Fundamentals, and LinkedIn Learning Ethical Hacking strengthened my foundation in security principles, cloud identity concepts, risk awareness, and practical defensive thinking. Together, these credentials support my ability to contribute in enterprise cybersecurity environments where access control, IAM, PAM, cloud security, and secure operations require both technical discipline and business-focused judgment.

Certifications
Security + & Azure Fundamentals & LinkedIn Learning Ethical Hacking
Our Faq’s

Frequently Asked Questions

I’m available to discuss projects, ideas, or opportunities anytime via contact form.

I hold both a Bachelor’s and Master’s degree in Cybersecurity from Old Dominion University, backed by hands-on experience in IAM, PAM, CyberArk, Azure, Active Directory, and access governance across enterprise environments.

I strongly prefer fully remote work and am especially interested in mission-aligned industries such as education, public health, civic technology, and nonprofit service. I do my best work in environments with clearly defined duties, structured priorities, and security-focused operations.

In previous roles, I’ve worked with ServiceNow (ITSM), CyberArk PAM tools including Vault, CPM, PSM, PVWA, PTA, and AIM, along with Azure, Azure AD / Active Directory, LDAP, Splunk, PowerShell, and Microsoft 365 technologies. My experience also includes access governance, provisioning workflows, security group reviews, privileged access administration, and automation across enterprise IAM and cybersecurity environments.

My background includes certifications such as Security+ and Azure Fundamentals, along with additional LinkedIn Learning certificates including Introduction to Ethical Hacking. I also build personal projects that strengthen my hands-on skills, including a HomeLab where I created a secure tunneled connection from a personal device to a cloud server, built a fully recursive DNS server, and set up a VPN server from scratch. These projects continue to sharpen my experience in networking, secure access, cloud infrastructure, and system administration.

My pay expectations are based on competitive market rates for the specific role, industry, level of responsibility, and technical specialization involved. I typically look for compensation that aligns with current market demand for IAM, PAM, cybersecurity, or systems work, while also reflecting scope, complexity, and business impact.

Books Read - 2026
Books Read 2025
II Kings (In A Whirlwind) - Alex Israel
The Profits of Religion - Upton Sinclair
The Managed Heart (Commercialization of Human Feeling) - Arlie Russell Hochschild
I Kings (Torn In Two) - Alex Israel
Salt Sugar Fat - Michael Pollan
The David Story - Robert Alter
I Samuel (A King In Israel) - Amnon Bazak
The Myth Of Mental Illness (Foundations of a Theory of Personal Conduct) - Thomas S. Szasz, M.D.
Ruth (From Alienation to Monarchy) - Yael Ziegler
The Age of Surveillance Capitalism (The Fight For A Human Futre At The New Frontier of Power) - Shoshana Zuboff
Judges (The Perils of Possession) - Michael Hattin
Joshua (The Challenge of The Promised Land) - Michael Hattin
From Sinai to Ethiopia (The Halachic and Conceptual World of Ethiopian Jewry) - Dr. Sharon Shalom
Mind Over Explicit Matter - Dr Trish Leigh
The Koren Ethiopian Haggada Journey To Freedom - Rabbi Menachem Waldman
Your Brain on Porn (Internet Pornography and The Emerging Science of Addiction) - Gary Wilson
Sh'ma' (A Concise Weekday Siddur) - Rabbi Zalman Schachter-Shalomi
Simple Shabbat Siddur (Your Guide to a Restful, Peaceful, Traditional Shabbat)
Tribal Blueprints - Twelve Brothers and The Destiny of Israel - Nechama Price
Covenant & Conversations Devarim - Rabbi Lord Jonathan Sacks
Covenant & Conversations Bamidbar - Rabbi Lord Jonathan Sacks
Covenant & Conversations Vayikra - Rabbi Lord Jonathan Sacks
Covenant & Conversations Shemot - Rabbi Lord jonathan Sacks
Covenant & Conversations Bereshit - Rabbi Lord Jonathan Sacks
A Game of Thrones by George R. R. Martin
The 50th Law by 50 cent & Robert Greene
Rich Coop Alpha
The Hebrew Story of Abraham by Eli Lizorkin-Eyzenberg
The Hebrew Story of Jacob by Eli Lizorkin-Eyzenberg
The Hebrew Story of Joseph by Eli Lizorkin-Eyzenberg
Contact me

Get in Touch With Me

I’m available to discuss projects, ideas, or opportunities anytime via contact form.

Isack Chane
CyberSec Pro
Available
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.