This site is built on GitHub Pages using HTML, CSS, and JavaScript and is deployed via GitHub Actions. Powered by modern web tech, caffeine, and a dash of AI magic.
"Identity theft is not a joke, Jim!" – Dwight Schrute
Frostburg, MD | Aug 2018 - Apr 2022
Cum Laude; Dean’s List 2018-2022
Relevant Coursework: Data Analysis, Algorithms, Operating Systems, Python, Network Segmentation & Security
Northumbria Upon Tyne, UK | Jul 2022 - Jan 2023
Honorable Mentions: University of the Year 2022, Awarded Full CIE Rowe Scholarship
2024 - Present
Architected enterprise FedRAMP compliant Infra.
Designed Zero Trust architectures.
Engineered CI/CD pipelines.
Deployed & Developed Terraform Modules for IaC.
Administered STIG-hardened Linux machines.
2023 - 2024
Managed Kubernetes clusters.
Built observability pipelines.
Optimized CI/CD workflows.
Administered dockerized workloads in a multi-region deployment.
AWS | May 2023 – Nov 2023
Migrated Dockerized microservices to Kubernetes with Istio for secure communications.
Reduced operational overhead by 15% with Fargate-based scaling.
Leveraged Terraform + Terragrunt for multi-regional EKS deployments.
Implemented blue-green deployment for zero downtime.
Created Grafana dashboards for monitoring.
AWS & Azure | July 2024 – Aug 2024
Developed DoD IL5-compliant multi-cloud architecture.
Integrated AWS GovCloud & Azure Gov.
Implemented Zero Trust frameworks.
Configured Sentinel, Defender, and Log Analytics for insights.
GCP | Oct 2024 – Dec 2024
Identified security and architectural gaps for FedRAMP & FIPS 140-2 compliance.
Deployed GKE and Cloud IAP for a containerized control plane.
Leveraged Terraform and Google Chronicle SIEM for threat detection.
Amazon Web Services | Oct 2024 – Dec 2024
Upgraded a Splunk “cluster” from RHEL 7 to STIG‑compliant RHEL 8.10, meeting Rev 5 FedRamp requirements. Designed a blue‑green migration strategy to replace cluster components with minimal downtime.
Built STIG‑hardened AMIs using Packer and RHEL STIG guidelines, achieving 85%+ vulnerability scan results meeting compliance.
Automated deployment with Terraform, provisioning VMs and AMIs.
Used cloud‑init scripts to configure TLS and Splunk installation.
Migrated Heavy Forwarders (HF), Cluster Manager (CM), Indexers, and Deployment Server (DS) to RHEL 8.10.
Navigated and troubleshot Splunk configurations under /opt/splunk, debugging logs, permissions, and system processes for stability.
Terraform Associate (003)
Associate (Sitting 2/19)
Specialty (In Progress)
Certified