Security Engineer, Innovative Problem Solver, and Engaging Mentor
20 years building, securing, and evolving digital infrastructure.
From repairing first computers to architecting secure enterprise environments — I bring a full-stack perspective to every challenge. Committed to advancing technology in education and beyond.
Endpoint protection, threat analysis, web filtering, and security architecture across enterprise environments.
Where it all started. Full front-end development, UI design, and modern web architecture built for performance and clarity.
End-to-end hardware and software support, networking, systems administration, and enterprise IT management.
Volunteer advisory board member working to positively influence how technology is integrated and governed in educational settings.
Rare combination of depth and breadth — equally comfortable diagnosing hardware at the bench, architecting a secure network, or consulting on educational technology strategy.
Leading security initiatives including endpoint protection, secure web access, and automation. Implementing, automating, and maintaining EDR, web filtering, and SIEM to reduce organizational risk.
I turn technology headaches into business advantages. With 500+ computers troubleshot and 100+ networks built from the ground up, I bring hands-on expertise and genuine care to every client.
Advising on technology strategy, policy, and infrastructure decisions to positively shape the role of technology in education. Bridging the gap between technical capability and educational outcomes.
Started with hands-on hardware repair and client support, then led into broader IT consulting. Built a comprehensive technical foundation from the ground up.
Where the journey began. Designing and building websites introduced a systematic way of thinking about both aesthetics and function that continues to shape my approach to every technical challenge.
Every system, every decision — security considerations come first. Not as an afterthought, but as a foundational design principle baked into every recommendation.
Passionate about ensuring students and educators have access to technology that works for them — safely, equitably, and effectively — rather than against them.
No ivory tower solutions. Real environments are messy, underfunded, and full of legacy systems. The best answer is one that actually gets implemented and maintained.
The threat landscape never stops evolving. Neither does the toolkit. Staying current isn't optional — it's the job. Always studying, always experimenting, always growing.
Whether it's a security challenge, an IT project, or a conversation about technology in education — I'm always happy to talk.