Secure Infrastructure & Web Systems Specialist

I’m a Computer Information Systems major focused on networking, troubleshooting, security, and web development. I thrive in environments where systems need to be built, secured, optimized, and clearly structured. With hands-on experience in network fundamentals, system configuration, web platforms, and security principles, I combine analytical problem-solving with technical execution to deliver reliable and impactful solutions.

I build. I secure. I design. I improve.

〰️

I build. I secure. I design. I improve. 〰️


My Projects

Selected UX/UI +Web design work

Secure Infrastructure Deployment

Professional Foundations

How I Work

My professional foundation is built on structured execution, accountability, and disciplined problem-solving developed through U.S. Army service and years of hands-on technical experience.
I approach projects with clarity, ownership, and long-term thinking. Whether in military environments or technical deployments, I prioritize structure, communication, and measurable outcomes.

• Developed operational discipline and resilience through Army service

• Execute with structure, documentation, and accountability

• Adapt quickly to evolving teams and technical environments

• Communicate clearly across technical and non-technical stakeholders

• Perform effectively under pressure and high-responsibility roles

What I’ve Built

I lead technical projects from planning to deployment with a focus on usability, security, and operational efficiency. Each implementation reflects structured thinking and long-term maintainability.
From infrastructure deployment to web system design, I prioritize clarity, scalability, and measurable impact.

• Led full website design and launch for licensed healthcare practice

• Structured user flow, accessibility, and information hierarchy

• Implemented on-page SEO and Google indexing strategies

• Deployed Microsoft 365 Business and Entra ID identity management

• Configured secured Windows endpoints with BitLocker encryption

• Established asset tracking and documentation systems

• Introduced security policy frameworks and user onboarding protocols

Pursuing roles in IT administration, identity and access management, and security-focused systems operations

Secuirty & Compliance

Active U.S. Secret security clearance with compliance-driven experience.

  • Experience working in regulated, high-trust environments

  • Comfrotable operating within structured policies and procedures

  • Proven reliability under responsibility-sensitive conditions