Presently US-Based IT professional with 20+ years industry experience.

Unprofessionally? Much longer. Starting with BASIC on an Atari 800 XL.


Viciously enjoying learning and growing my skill set, I am immensely passionate about technical problem solving. I've had the distinct pleasure of finding myself in interesting roles while having countless opportunities to have worn many hats (some of them fitting better than others). Over the years, I've had the privilege to collaborate with some truly exceptional colleagues, architect and implement system while continuing to learn new almost every day.

It's wonderful knowing that life can still surprise you every so often.

Skill set includes PowerShell, MSSQL, Bash, Rest API, HTML, CSS, Azure CLI, and many others. A wide breadth and width of knowledge complimented by deep dives. Oh, and comments.

Lots of comments.

Build infrastructure that genuinely matters, and in the process, inconvenienced a fair number of electrons.

Married for 13 years and, together with my wife, we're the proud parents of four amazing canines. Firm believer that dogs should always be rewarded for not being people.




Technical and Institutional Knowledge Acquisition

In the dynamic landscape of IT, the continuous learning and assimilation of both technical and institutional knowledge stand paramount. Over the years, I've delved deep into the intricacies of various technologies, tools, and platforms. But beyond the technicalities, understanding the ethos, the culture, and the operational nuances of institutions has been equally pivotal. This blend of technical prowess and institutional insight allows for a more holistic approach to problem-solving and innovation.

Workflow Evaluation and KPIs for IAM

A significant facet of my journey has been the evaluation of existing workflows, orchestrations, and automations, especially in the realm of Identity and Access Management (IAM). Addressing key performance indicators (KPIs) such as user onboarding time, access request fulfillment rate, and compliance audit success, have always been at the forefront. These metrics not only offer a quantifiable measure of IAM efficiency but also drive continuous improvement initiatives.

Streamlining IAM Lifecycle Management

An organization's infrastructure and its security needs are intricately linked to IAM. Understanding these correlations has been pivotal in optimizing the IAM lifecycle from initiation to de-provisioning. This involves ensuring that the right individuals have the right access at the right time, aligning with the principle of least privilege, and making sure access is revoked when no longer needed. Streamlining these processes reduces security risks and enhances operational efficiency.

Adherence to Industry and OWASP Best Practices

Code review, configuration checks, and documentation are more than just routine tasks; they are the pillars of secure and efficient systems. In my endeavors, ensuring alignment with industry standards and the best practices outlined by the Open Web Application Security Project (OWASP) has been a priority. This commitment ensures that the systems and applications under my watch are resilient against potential threats and vulnerabilities.

Experience from Conventions

Participating in industry conventions like Microsoft Ignite, DEFCON, and other tech summits has been a transformative experience. These events serve as a melting pot of ideas, innovations, and insights. The knowledge shared, the collaborations formed, and the exposure to cutting-edge tech trends have played an instrumental role in shaping my perspective and approach towards IT solutions.


Enhanced System Robustness and Security

With a firm grasp of technical and institutional knowledge, there's been a marked improvement in the robustness of the systems I've managed. Ensuring that the infrastructure adheres to both industry and OWASP best practices means that vulnerabilities are swiftly identified and rectified. As a result, the systems exhibit enhanced resilience against potential threats, ensuring data integrity and boosting stakeholder confidence.

Optimized IAM Workflows

By meticulously evaluating and tweaking IAM workflows, tangible results have materialized in the form of faster user onboarding and offboarding processes. The time taken to provision and de-provision access rights has been reduced significantly. Consequently, the streamlined workflows not only bolster security but also enhance user satisfaction by ensuring they have the resources they need promptly.

Improved Operational Efficiency

Thanks to the continuous learning from conventions and hands-on experiences, I've been able to implement best practices that have drastically improved operational efficiency. Automation scripts, refined configurations, and efficient orchestration have minimized manual interventions, thereby reducing human errors and freeing up valuable resources for more strategic initiatives.

Proactive Threat Mitigation

Having a deep understanding of infrastructure and security needs has empowered me to adopt a proactive stance towards threat mitigation. By staying updated with the latest in security trends, especially from insights gained at conventions like DEFCON and Microsoft Ignite, I've been able to anticipate potential vulnerabilities and implement preemptive measures. This proactive approach has invariably reduced the frequency and severity of security breaches.

Cross-functional Collaboration and Knowledge Sharing

The collaborative environment at industry conventions has fostered a culture of knowledge sharing in my professional sphere. By regularly interfacing with peers, exchanging ideas, and absorbing new methodologies, I've been instrumental in setting up cross-functional workshops within organizations. These sessions have facilitated the dissemination of best practices across departments, leading to a more unified and informed approach to tackling complex IT challenges.


Previously worked in strategic roles such as: