About Me

Seasoned creative & technical Business Consultant with over 12 years in B2B & B2C Online/ Retail Sales, transitioning into a career in Cybersecurity | Seeking opportunities

A Lifelong Passion for Technology
Ever since I can remember, I’ve had a strong passion for the tech industry and its rapid advances. My daily routine includes consuming tech journalism, listening to podcasts, and reading reviews to stay updated on the latest trends and innovations. Over the years, I’ve attained numerous professional certifications such as Google Cybersecurity Professionals, A+, Google Ads, and Creativity and A.I.

Industry Experience
My professional journey has been diverse and enriching. I’ve worked in IT roles with well-known companies like Dell, Gamestop, and Fry’s Electronics. Additionally, I have experience in tech sales on platforms like eBay and Amazon.

The Catalyst for Change: A Personal Story
Transitioning into cybersecurity was not just a career move; it was a deeply personal decision. A loved one’s harrowing experience with targeted cyber threats led to years of therapy and agoraphobia. This painful journey opened my eyes to the devastating impact of cyber threats, fueling my commitment to protect individuals and businesses from similar vulnerabilities.

Academic and Professional Background
I am a proud MBA graduate and a former Student Leader at the University of Houston-Clear Lake—Go Hawks! My professional background is as diverse as it is extensive. I am a performance-oriented business strategist and marketer with a solid history of examining and improving organizational systems and structures. My approach involves direct updates and monitoring progress to ensure smooth changes, all while resolving problems through close collaboration with management and team members.

  1. Experience Summary
    Six years in retail sales/management
    Twelve years in online sales
    Three years in entrepreneurship
    Six years in leadership roles

Thank you for taking the time to learn more about me. I invite you to explore the rest of my portfolio, including my resume, portfolio projects, and blog, to get a fuller picture of my skills and aspirations. Feel free to reach out for any collaborations or discussions—I’m always eager to engage in meaningful conversations in the tech and cybersecurity fields!

  • Incident handler’s journal

    Incident handler’s journal

    Date: July 23, 2024 Entry: #1 Description Documenting a cybersecurity incident   This incident occurred in the two phases: Initial Detection and In-Depth Analysis: The situation describes the organization’s initial discovery of the ransomware attack. To further scrutinize the incident, the organization engaged multiple external experts for specialized technical guidance. Containment Measures, Eradication Procedures, and… Read more

  • Incident handler’s journal

    Incident handler’s journal

    Date: July 23, 2024 Entry: #1 Description Documenting a cybersecurity incident Tool(s) used None. The 5 W’s Who: An organized group of unethical hackersWhat: A ransomware security incidentWhere: At a health care companyWhen: Tuesday 9:00 a.m.Why:The security breach occurred when malicious actors successfully infiltrated the company’s systems through a phishing scheme. Upon securing unauthorized access,… Read more

  • Update a file through a Python algorithm

    Update a file through a Python algorithm

    Project description At my organization, access to restricted content is controlled with an allow list of IP addresses. The “allow_list.txt” file identifies these IP addresses. A separate remove list identifies IP addresses that should no longer have access to this content. I created an algorithm to automate updating the “allow_list.txt” file and remove these IP… Read more

  • Stakeholder memorandum

    Stakeholder memorandum

    TO: IT Manager, stakeholders FROM: (Your Name)DATE: (Today’s Date)SUBJECT: Internal IT audit findings and recommendations Dear Stakeholders, Kindly examine the subsequent details pertaining to the internal audit of Botium Toys, which encompass the audit’s scope, objectives, key findings, summary, and recommendations. Scope: Goals: Critical findings (must be addressed immediately): Findings (should be addressed, but no… Read more

  • Controls Assessment & Compliance

    Controls Assessment & Compliance

    Current assets Assets managed by the IT Department include: Administrative Controls Control Name Control type and explanation     Needs to be implemented (X) Priority   Least Privilege Preventative; reduces risk by making sure vendors and non-authorized staff only have access to the assets/data they need to do their jobs X High Disaster recovery plans… Read more

  • Incident report analysis

    Incident report analysis

    Summary The organization faced a security incident characterized by a sudden halt in network services. Upon investigation, the cybersecurity team identified the cause as a Distributed Denial of Service (DDoS) attack, specifically an ICMP flood. Immediate actions were taken to block the attack and prioritize the restoration of critical network services. NIST CSF Application Identify… Read more