Cybersecurity Engineer | Zero Trust Architecture Specialist | Security Operations Expert
Proven track record of innovation and leadership in the development and implementation of secure network infrastructure solutions by leveraging in-depth understanding of Zero Trust Network Access (ZTNA) concepts and application-level segmentation. Passion for maintaining the security of networks with a deep understanding of the security protocols and best practices associated with ZTNA, as well as experience in cyber security incident management and response. Ability to work independently and as part of a team, with excellent communication and problem-solving skills.
Cybersecurity & Systems Engineer specializing in enterprise security solutions
Developed and enforced secure, scalable access controls for SaaS applications using identity-driven Zero Trust models.
Led security configuration assessments and remediations to harden enterprise SaaS environments and reduce misconfiguration risks.
Automated access review and policy validation workflows to increase operational efficiency and improve audit readiness.
Streamlined firewall rule workflows, reducing turnaround times by 25% and improving network operations response by 20%.
My career journey in cybersecurity and systems engineering
Develop, implement, and maintain secure network infrastructure solutions utilizing Zero Trust Network Access (ZTNA) and Virtual Private Network (VPN) technologies. Assess existing network security architectures and document findings and recommendations aligned with industry best practices. Monitor network security protocols and best practices related to ZTNA and provide guidance on improvements or updates. Respond to and manage cyber security incidents. Act as a leader and mentor to junior technical personnel. Collaborate with internal teams to develop and improve processes related to network security. Analyze data and trends to understand network security threats and vulnerabilities. Create and maintain technical documentation related to network security. Research and recommend new products and technologies to improve network security. Perform hands-on implementations and configurations of network security technologies. Ensure all security operations and maintenance activities are fully documented and up to date.
Oversaw total life cycle focus for the program from requirements development and architecture creation with a focus on complex system designs through architect definition. Partnered closely with internal teams, SMEs, program management, and Systems Engineering leadership to drive the technical solution across the program. Ensure the requirements and architecture focused on “building the right thing.” Developed architectures, defining the physical architecture, allocating requirements to architecture elements, deriving requirements to drive details into the model, creating and refining modeling standards and design patterns, and distributing and merging model elements back into the baseline.
Designed and developed system architectures, and defined key capabilities and performance requirements. Defined total systems design and technology maturity constraints in accordance with mission requirements. Developed system element architecture and design and interface definitions. Defined system implementation approach and operational concept. Developed models and architectural guidelines for current and future system development.
Developed launch pad safety beacon and public alert systems. Automated internal workflows to improve testing operations by 30%. Supported pad readiness and engineering problem-solving during critical launch preparation stages.
Delivered remote technical troubleshooting for broadband, TV, and voice services. Identified root causes and implemented solutions, reducing service disruptions by 20%. Improved customer retention through accurate diagnostics and secure data handling.
Technical skills and security expertise
Academic credentials and certifications
Purdue University Global
Specialization: Cybersecurity
Colorado State University Global
Interested in discussing cybersecurity solutions, Zero Trust architecture, or potential opportunities? I'm always open to connecting with fellow security professionals and exploring new challenges.