Cybersecurity Executive
& Strategic Advisor

Building resilient T-shaped teams and protecting business integrity with the steady hand of experience.

View Strategic Briefs

The "Steady Hand" Framework

I’ve spent the last two decades at the intersection of complex technology and high-stakes business strategy. As a cybersecurity leader, my job isn’t just to manage risk—it’s to ensure that security serves as a foundation for growth, not a bottleneck for innovation.

Holding CISSP and CISM certifications, I believe that the most important tools in a CISO’s arsenal aren't just technical—they are clarity, composure, and a deep understanding of organizational goals. Risk is inherent to business, but data integrity is non-negotiable. If your data cannot be trusted, your business cannot function.

When I’m not defending the perimeter, I’m likely coaching a youth baseball game, exploring the nuances of 90s Hip Hop and R&B, or working on initiatives to bridge the communication gap between technical experts and business stakeholders.

Leadership Manifesto

Principles for organizational excellence and resilient team building.

The Dugout Mentality

Inspired by 90s championship dynamics, I build "T-Shaped" teams. Deep specialists who share a foundational crossbar of knowledge, ensuring we never leave a gap uncovered in a crisis.

The Partner of "How"

Security should not be the "Department of No." I view friction as a managed speed bump. We focus on controllables and find the "blessing in disguise" to improve processes safely.

Safety-First Innovator

Shadow IT is inevitable. Rather than fight the future, I set high-integrity guardrails. I champion "innovation in isolation," allowing talent to safely stress-test tools like AI before enterprise deployment.

Personalized Mentorship

Succession planning is vital. I set an uncompromising standard of excellence but personalize the path to help each team member reach it. I lead to leave a department better than I found it.

The Steady Hand of Trust

Political capital is built through service. From directly assisting stakeholders to translating technical risk into business narratives, I build the trust required to secure boardroom backing before a crisis hits.

The Briefcase

Measurable ROI, Risk Mitigation, and Strategic Execution.

Zero-Trust Architecture Migration

Transitioned from aging hyperconverged IaaS to a cloud-native, identity-centric Zero-Trust model. Deployed via MDM with zero downtime for a nationwide workforce over two weeks.

80% Attack Surface Reduction
20% OpEx Reduction
Read Full Brief →

CMMC Enclave Development

Led the strategic shift to M365 GCC High, creating an isolated regulated data enclave. Controlled audit scope, avoided costly physical infrastructure flow-downs, and overhauled SSP and POA&M.

VALIDATED SPRS Score & Bidding
SECURED Revenue Readiness
Read Full Brief →

The Innovation Hub

To lead in cybersecurity is to be a perpetual student. I maintain a private, production-grade R&D environment—anchored by a Dell PowerEdge R440—where I stress-test emerging technologies. Currently, my focus is on the intersection of AI and Automation, exploring how local LLMs and automated defensive frameworks can be leveraged to reduce the 'Mean Time to Detect' (MTTD) in enterprise environments.