█████╗ ██████╗ ██╗ ██████╗ ██╗ █████╗ ██╔══██╗██╔══██╗██║██╔═══██╗██║ ██╔══██╗ ███████║██████╔╝██║██║ ██║██║ ███████║ ██╔══██║██╔══██╗██║██║ ██║██║ ██╔══██║ ██║ ██║██████╔╝██║╚██████╔╝███████╗██║ ██║ ╚═╝ ╚═╝╚═════╝ ╚═╝ ╚═════╝ ╚══════╝╚═╝ ╚═╝
IT professional with 5+ years spanning enterprise endpoint management, network infrastructure, and cybersecurity operations. I've worked across large environments at ExxonMobil and BART — device fleet management with JAMF, Intune, SCCM, and BigFix across mixed Windows and macOS estates.
Most recently: Infrastructure Analyst II and Cyber Security Analyst II at MSTS, supporting the DOE Special Technologies Laboratory in Santa Barbara. Federal infrastructure, vulnerability assessments, and incident response under NIST 800-61. That work sharpened my focus on dedicated security operations.
Outside the day job I run a home lab — Wazuh, Suricata, Kali Linux — and build tooling: TrenchWatch is a Solana token signal bot; this site runs on my own VPS. CompTIA Security+ certified (SY0-701), pursuing VMware VCP-DCV. Based in Dallas, TX. Targeting cybersecurity analyst and infrastructure roles. Open to relocation.