Security Engineer & Architect
20 years securing complex infrastructure — from on-prem data centers to multi-cloud environments at scale. Specializing in cloud security architecture, infrastructure as code, and building security programs that actually work.
Certifications
Active industry certifications across cloud platforms and security disciplines.
GIAC & CompTIA
Amazon Web Services
About
I've spent two decades building and securing infrastructure — from early enterprise networks to today's multi-cloud environments. My work lives at the intersection of cloud security, infrastructure as code, and security automation.
Currently operating at Staff/Architect level with deep expertise in Azure and AWS security architecture, hub/spoke network topologies, Terraform infrastructure as code, and HIPAA compliance in healthcare environments.
I've led ransomware recovery efforts, designed multi-cloud DR strategies, and built security automation programs from the ground up. This portfolio documents that work — sanitized and packaged as reusable patterns.
Core Skills
Cloud Platforms
Infrastructure as Code
Security Engineering
Compliance & Frameworks
Languages & Tools
Projects
Reusable infrastructure patterns extracted from real healthcare and multi-cloud environments. Publishing Q1–Q2 2026.
Terraform Module
Reusable VNet modules with NSGs, firewall rules, and subnet patterns for enterprise hub/spoke topologies.
Architecture Doc
Timeline, decisions, and lessons learned from a real ransomware recovery and full infrastructure rebuild in Azure.
Terraform Module
Azure primary + AWS secondary DR design with failover/failback procedures and infrastructure as code.
Writing
Security architecture, cloud infrastructure, and lessons from the field.
Blog Post
Design decisions and trade-offs when building container security in production environments — ECS Fargate, Kubernetes, and standalone Docker.
Blog Post
Program design principles for security automation — what works, what doesn't, and how to scope it.
Blog Post
Real lessons from migrating complex on-prem infrastructure to Azure after a ransomware incident.