• Agile project management
  • Computer security operations, continuous monitoring, and incident response
  • Linux system administration, for on-premises and cloud operations
  • Network engineering and network security

In Progress: Master of Science in Information Assurance, Iowa State University (Expected 2020)

  • GPA 4.00

Bachelor of Science in Information Technology, New Mexico Institute of Mining and Technology (2015)

  • Highest Honors
  • Addy and Rhavi Bhasker Award for Excellence in Information Technology
  • CyberCorps Scholarship for Service Recipient

Information Security Analyst III, Federal Reserve Bank of San Francisco (2015-2016)

Served as an intrusion detection analyst on the National Incident Response Team, a security operations center at the intersection of private industry and the federal government. Triaged and investigated incidents through network forensics. Prioritized and escalated incidents in light of policy, risk exposure, and threat intelligence. Developed, tested, and maintained network-based detection including signatures and correlation logic.

Intern, NIE-IS, Los Alamos National Laboratory (2014-2015)

Architected and implemented a new Puppet and Git-based configuration management practice for core network infrastructure. Trained team members for transition to Puppet and Git from legacy configuration and version control. Began development of automation tools for compliance with security standards expressed in SCAP. Performed general Linux system administration.

System Programmer, Tech Computer Center, New Mexico Tech (2011-2015)

Administered a broad range of institutional infrastructure, with a focus on Linux and network services. Architected and implemented print and database services. Investigated and handled user requests escalated from help desk. Developed internal and end-user documentation and tools.

IT Compliance Intern, IT Leadership Program, GE Automation (2014)

Worked with internal clients to improve documentation and information management procedures. Developed internal tools and workflows for user support and configuration management.

  • Freelance technical journalism in industry publications including LWN
  • GIAC Certified Intrusion Analyst
  • GIAC Certified Forensic Analyst
  • CompTIA Security+
  • Puppet Certified Professional
  • Scrum Alliance Certified Scrum Master
  • SAFe Certified Product Owner/Product Manager
  • InfraGard
  • GIAC Advisory Board