Air Force veteran. ThreatLocker engineer. Zero-trust practitioner. Building a career at the intersection of operational technology and enterprise security.
I started my career in the U.S. Air Force as a Security Forces member, where I built a foundation in access control, physical security, and incident response. That military discipline never left me.
From there I transitioned to Walt Disney World, supporting ride and show systems for six years. Working with legacy hardware, coordinating with engineering teams, and navigating real operational technology environments gave me an edge most security professionals don't have on paper.
Today I work at ThreatLocker as an Approval Request Engineer, applying zero-trust principles and analyzing endpoint behavior every day. I'm also completing my A.S. in Information Technology at Full Sail University (3.98 GPA), transitioning directly into a B.S. in Cybersecurity.
My goal is simple: bring the rigor of military service, the hands-on reality of OT environments, and the analytical depth of modern cybersecurity into a SOC or critical infrastructure role.
Promoted from Application Technician. Working within a zero-trust security platform focused on application allowlisting, ringfencing, and endpoint policy enforcement. Daily work includes reviewing audit logs, supporting enterprise security configurations, and working directly with security-focused tooling at the application layer.
Supported enterprise clients in configuring and managing zero-trust endpoint security controls. Reviewed application behavior, analyzed audit logs, and collaborated with security teams to enforce least-privilege policies across diverse environments.
Supported legacy and modern ride systems with a focus on preventive maintenance, server and audio equipment, and coordinating with engineering teams on security-adjacent hardware upgrades. Gained direct exposure to operational technology (OT) environments, legacy system constraints, and real-world critical infrastructure operations.
Access control operations, vulnerability assessments, incident response, and security procedures in high-accountability environments. Built foundational discipline in physical and operational security that continues to inform every technical role.
Continuing directly from A.S. program. Focus on advanced security engineering, threat intelligence, and critical infrastructure protection.
Coursework covering cloud networking (Azure, SDN, VPNs), cybersecurity fundamentals, scripting, network design, and security infrastructure planning. Course Director's Award recipient, January 2026.
Documented coursework including network design, security infrastructure planning, VLAN segmentation, Active Directory implementation, and hands-on lab configurations.
View on GitHubDesigned and implemented a segmented office network including VLAN architecture, IP schema (192.168.30.0/24), firewall rules, Active Directory, and a full WordPress + Ghost deployment with NginX reverse proxy on Docker.
View DetailsAssisted with live lab exercises at ThreatLocker's Zero Trust World conference including SQL injection demos, Metasploit exploitation, AI model hacking, and USB Rubber Ducky demonstrations.
View ProfileHome lab work and TryHackMe challenge writeups covering penetration testing, privilege escalation, network analysis, and security tooling on Kali Linux, Windows Server, and custom VM environments.
View on GitHubI'm always open to connecting with security professionals, exploring new opportunities, and contributing to the community. Whether it's a role, a collaboration, or just a conversation — reach out.
Currently working as an Approval Request Engineer at ThreatLocker while actively pursuing growth into EDR, SOC Analyst, or OT/ICS cybersecurity roles. Completing A.S. in IT at Full Sail University, June 2026. CompTIA SecOT+ in progress for November 2026.