My Story
My journey began in 2005 enlisted in the Army as an IT expert. This evolved into intelligence operations with US Cyber Command and the National Geospatial-Intelligence Agency. I've conducted red team operations across government, finance, and social media sectors - from the Department of Labor to TikTok's Offensive Security Team. My expertise focuses on physical security, social engineering, and advanced penetration testing within large highly secure environments. Today I am bringing this real-world intelligence and defense experience to help organizations secure their critical assets.
Let's Work TogetherTechnical Expertise
Cybersecurity & Penetration Testing
Extensive red team experience across government (NGA, Army Cyber Command), finance (Investors Group), and social media (TikTok) sectors. Expert in both internal and external penetration testing with real-world intelligence operations background.
- Custom web application testing to detect real vulnerabilities in production systems
- Attack surface assessment to identify unknown attack vectors and blind spots
- Novel attack development against custom installations and proprietary systems
- Red team penetration testing across diverse environments and infrastructure
- Custom tool development for penetration testing and security assessment
- Integration of security testing into development pipelines and CI/CD workflows
Software Development
Full-stack development experience with React, C#, Python, and various frameworks. Created secure coding training programs and integrated security testing into CI/CD pipelines.
- React component and full-stack development
- Integration of security tools into CI/CD pipelines
- Secure coding training and education
- API development and integration
- Decrease development costs by improving QA and security speed to market
- Implementing secure coding processes for automation and security
- Static Application Security Testing (SAST) for novel code bases
- Security-focused code review and vulnerability assessment
AI Consulting & Integration
Helping businesses leverage artificial intelligence to automate processes, enhance software capabilities, and drive innovation while maintaining security standards.
- AI-powered coding assistance and development workflow optimization
- Process automation strategies and intelligent system design
- AI integration for existing systems and legacy application modernization
- AI strategy and implementation roadmaps for enterprise adoption
- Machine learning for cybersecurity threat analysis and predictive security modeling
- AI-enhanced development methodologies and coding strategy improvements
- Demonstrated expertise through AI-assisted development of this website and similar projects
Physical Security Assessment
Intelligence-grade physical security expertise including access control bypass, badge spoofing, wireless signal tracking, and adversarial audits. Experience testing heavily armed facilities and remote site security.
- Physical security system bypass techniques and access control circumvention
- Adversarial audit and tiger team operations against highly secure DoD assets
- Social engineering and physical security assessment in real-world scenarios
- Wireless signal tracking and exploitation of RF communications
- Site and base security evaluation for military and government facilities
- Testing of high-security facilities including military bases and government buildings
Defense & Intelligence Consulting
Intelligence-grade security consulting drawing from extensive experience in threat assessment, asset protection, and strategic security planning within classified environments.
- Deep understanding of relevant DoD and Intelligence Community regulations
- Experience with SCIF environments and classified network operations
- Cross-boundary domain segregation
- Data retention and usage policies
- Security blind spot identification
- Advanced persistent threat simulation and counterintelligence operations
- Classified information handling and compartmentalized security protocols
- Strategic threat assessment for high-value government assets
Ready to Get Started?
Whether you need cybersecurity expertise or software development, I'm here to help you achieve your technical goals. Contact me today to discuss how we can work together.
Book Me