whoami

PROFESSIONAL SUMMARY


Highly motivated, solutions driven professional with several years of proven success in information security, system administration, project management, automation, process improvement, and business analysis. One of one hundred recipients of the 2019 SANS Institute’s Cyber FastTrack Scholarship.

COMPETENCIES & SKILLS


Technical Skills:

  • Security Assessments
  • Vulnerability Management
  • Incident Response
  • VMWare Administration
  • Systems Administration
  • Citrix Administration
  • PowerShell Scripting
  • Automation
  • Firewall Management

Tools:

  • Burp Suite
  • nmap
  • Metasploit
  • Nessus
  • John the Ripper
  • Hashcat
  • tcpdump
  • Wireshark
  • Zeek
  • InsightIDR
  • InsightVM
  • SonarQube
  • Docker
  • Jenkins
  • Apache Tomcat
  • SQL
  • Active Directory
  • LDAP

Hardware/OS:

  • Linux
  • AIX
  • Windows
  • Checkpoint Firewalls
  • IBM Power7/Power8 Servers
  • Dell Servers
  • VMWare

Professional:

  • Collaboration
  • Team Oriented
  • Documentation
  • Critical Thinker
  • Project Management
  • Vendor Management
  • Mentoring
  • Cross Training

CERTIFICATIONS


GIAC: GCIA, GPEN, GCIH, GDSA, GSEC, GFACT, GSTRT, GCPM, SSAP

(ISC)2: CISSP, CCSP, SSCP

CompTIA: A+, Network+, Security+, Project+

PMI: CAPM

EC-Council: CEH Practical

Rapid7: InsightIDR Certified Specialist, InsightVM Certified Administrator

EDUCATION


SANS Technology Institute: M.S. Information Security Engineering - June 2022

Western Governors University: M.S. Information Technology Management - July 2019

Western Governors University: B.S. Cybersecurity and Information Assurance - June 2018

PROFESSIONAL EXPERIENCE


Application Security Analyst

Credit Acceptance - 2020-Present

  • Perform application security assessments for both new and existing applications.
  • Develop and maintain a repeatable security assessment framework.
  • Document and report application vulnerabilities and suggest mitigation methods and strategies.
  • Develop and manage a repeatable secure development process.
  • Analyze industry security threats and develop strategies to detect and mitigate.
  • Discuss and present technical solutions to all levels of employees across the organization.

Systems Administrator

Michigan Schools and Government Credit Union - 2015-2020

  • Maintain and administer core banking systems ensuring 99.999% availability.
  • Led implementation of Rapid7 InsightVM and InsightIDR.
  • Lead incident handler for organization.
  • Assisted risk management team with internal and external audits.
  • Lead disaster recovery for core banking system and ancillary connections.
  • Automated over 250 processes throughout the organization.
  • Lead projects to implement new or replace/update existing systems.

Systems Operations Specialist

Michigan Schools and Government Credit Union - 2014-2015

  • Responsible for daily, monthly, and annual scheduled operational tasks.
  • Worked with business analysts to develop or improve over fifty new processes.
  • Acted as front-line support for Symitar core banking system.
  • Assisted network engineers with infrastructure and hardware replacement projects.

Technical Support Specialist

Extra Credit Union - 2013-2014

  • Administered and maintained core banking system.
  • Managed ShoreTel phone system, including system maintenance and user setup.
  • Responsible for front line support for entire organization of 100 employees.
  • Led migration of desktop systems from Windows XP to Windows 7 for 200 PCs.
  • Led implementation of GFI Cloud for asset and vulnerability management.

PERSONAL PROJECTS/ACHIEVEMENTS


  • Developed a curated list of additional resources for the SANS Institute’s undergraduate program.
  • Participant in Hack the Box challenges achieving the rank of Pro Hacker with 29 systems rooted.
  • Top 1% of users on TryHackMe.
  • Active member of GIAC Advisory Board.
  • Serve as Crusader for Cybersecurity Gatebreakers.
  • Built out home lab to test out several exploits, including Kerberoasting, SQL injection, Linux/Windows privilege escalation, and OWASP Top 10 web application exploits.