I'm a Technology Services Manager at the North Carolina Association of County Commissioners — primary helpdesk resource, internal developer, and the person who built the security awareness infrastructure from scratch.
My work lives at the intersection of systems engineering, cybersecurity, and automation. I build tools that actually get used: production Azure portals with Entra ID auth, MITRE ATT&CK-mapped detection engines, secrets scanners, and raw-socket recon tooling.
Outside of work I run a Dell PowerEdge T430 / Proxmox home lab and am actively building toward a cybersecurity engineering career.
Windows Event Log analyzer with 21 YAML-driven MITRE ATT&CK detection rules. Threshold-based brute force, password spray, and Kerberoasting detection. Shannon entropy analysis, JSON/CSV/HTML reporting. CI tested across Python 3.10–3.12.
Secrets and credential scanner for git repos and file trees. Shannon entropy analysis, YAML detection rules, git history auditing. Covers AWS keys, PEM certs, JWTs, .env secrets, database connection strings. Maps to MITRE T1552.
Network reconnaissance CLI built from raw sockets — no nmap wrappers. TCP port scanner with threading and CIDR support, service banner grabbing, DNS A/MX/TXT/NS enumeration, WHOIS via raw socket on port 43.
Red vs Blue Team War Room with live scoring, ransomware kill chain visualizer, OSINT terminal with 9 commands, and solvable CTF arena with 13 challenges.
IR command center — NIST SP 800-61r2 playbook engine, OSINT/attack surface mapper, malware sandbox with 6 malware families and MITRE ATT&CK mapping.
Threat intel workstation — IP analysis, password auditing, hash identification, subnet calculator, port scanner, encoder/decoder, JWT decoder, security header checker.
Production CRM for a statewide government association. Entra ID SSO, Leaflet.js county/district map, automated daily Teams digest, Mailchimp sync, role-based access, CSV export.
Enterprise phishing simulation platform — 10 HTML templates, Jinja2 rendering, Graph API mailer, campaign analytics dashboard, Entra App Registration integration.
Primary helpdesk resource and internal developer for a statewide government association. Built and maintain multiple internal platforms on Azure. Architected a security awareness program including a custom phishing simulation platform, Barracuda email security policies, and staff training materials. Manage M365, SharePoint, Power Apps, and Azure infrastructure.
Client-facing technical account management for SMB and mid-market customers. Transitioned into engineering and infrastructure work during tenure, accelerating the pivot to a full technical career path.
Associate of Applied Science in Cybersecurity alongside a Penetration Testing certificate program. Foundations in ethical hacking, network security, vulnerability assessment, and security operations. Additional Python certification.
Open to cybersecurity engineering, detection engineering, and senior technical roles. Always down to talk home lab setups, tooling, or weird side projects.
// TRY THE KONAMI CODE //