Intersys.
Available for consulting

Intersys

Cybersecurity Professional CISSP Penetration Tester

Turning complexity into control — securing systems, people, and data at scale.

CISSPCCSecurity+PenTest+CNVPCPT

About Me

Who I Am

A security professional driven by curiosity, rigor, and a commitment to building defenses that last.

I am a dedicated cybersecurity professional with a strong foundation in both technical defense and strategic governance. With advanced degrees from Trine University and Davenport University, I bring a rigorous academic perspective to real-world security challenges. My work bridges the gap between technical security controls and organizational risk management — helping enterprises build resilient, compliance-aligned security programs that stand up to modern threats.

$whoamiintersys

Master of Science in Information Studies

3.90 GPA

Trine University

Information Security & Technology Management

Bachelor of Science in Cyber Defense

3.97 GPA

Davenport University

Cyber Defense & Security Operations

My Approach

Proactive Defense

Security is most effective when built in from the start. I prioritize threat modeling, red-team thinking, and continuous assessment to stay ahead of adversaries rather than reacting to breaches.

Compliance Alignment

Regulatory frameworks like NIST and ISO 27001 aren't checkboxes — they're operational blueprints. I translate compliance requirements into actionable security controls that actually reduce risk.

Security Culture

Technology alone doesn't secure an organization. I invest in educating teams, building security-aware cultures, and ensuring that every stakeholder understands their role in the security posture.

Areas of Expertise

What I Do

Deep technical knowledge paired with strategic thinking across the full security lifecycle.

Security Architecture

Designing layered, defense-in-depth security architectures that align with business objectives and scale with organizational growth.

Zero TrustSASEIAM

Penetration Testing

Conducting authorized offensive security assessments to identify vulnerabilities before malicious actors can exploit them.

Red TeamWeb AppNetwork

Compliance & GRC

Translating complex regulatory frameworks into actionable security programs that satisfy auditors and reduce real-world risk.

NIST CSFISO 27001SOC 2

AI/ML in Security

Applying machine learning techniques to threat detection, anomaly detection, and security automation while securing AI systems themselves.

Threat DetectionMLSecOpsLLM Security

Threat Intelligence

Collecting, analyzing, and operationalizing threat intelligence to inform defensive posture and proactive countermeasures.

CTIMITRE ATT&CKOSINT

Incident Response

Leading coordinated responses to security incidents — from initial detection through containment, eradication, and post-incident review.

DFIRPlaybooksRecovery

Credentials

Certifications

Validated expertise across security domains, governance, and offensive security practices.

CISSP

Certified Information Systems Security Professional

(ISC)²

CC

Certified in Cybersecurity

(ISC)²

Security+

CompTIA Security+

CompTIA

PenTest+

CompTIA PenTest+

CompTIA

CNVP

Certified Network Vulnerability Professional

CompTIA

CPT

Certified Penetration Tester

GAQM

IBM

IBM Cybersecurity Certification

IBM

Proofpoint

Proofpoint Security Certification

Proofpoint

XM Cyber

XM Cyber Attack Path Management

XM Cyber

9 active certifications across 5 issuing bodies

Insights

Thoughts & Writing

Practical perspectives on security architecture, emerging threats, and building resilient programs.

Security Architecture

Zero Trust Architecture: Beyond the Buzzword

Zero Trust has become one of the most overused terms in enterprise security. Here's what it actually means and what it takes to implement it in a way that reduces real risk.

May 20, 20265 min read
Read
Security Architecture

Zero Trust in Practice: Building a Roadmap That Sticks

Most Zero Trust programs stall after the first phase. The reason is almost never technical. Here's how to build a roadmap that survives contact with your organization.

May 15, 20265 min read
Read
AI/ML Security

AI-Powered Threat Detection: Separating Signal from Noise

Machine learning in security operations creates as many false positives as it prevents. Here's how to tune your detection models and build analyst workflows that scale.

May 10, 20265 min read
Read
AI/ML Security

LLM Security: The Attack Surface No One's Ready For

Large language models introduce a new class of vulnerabilities that traditional security controls weren't designed to catch. Here's what security teams need to understand now.

May 5, 20265 min read
Read
Compliance & GRC

NIST CSF 2.0: What Changed and What It Means for Your Program

The updated framework introduces a new Govern function and expands scope beyond critical infrastructure. A practitioner's guide to mapping your existing controls to the new structure.

April 28, 20265 min read
Read
Penetration Testing

What Really Happens During a Penetration Test

A penetration test is not a vulnerability scan with a human attached. Here's what a real engagement looks like from scoping to final report and what separates useful findings from checkbox compliance.

April 20, 20265 min read
Read

Get In Touch

Let's Work Together

Available for consulting engagements, speaking opportunities, and strategic security advisory roles.

Whether you need a security architecture review, a penetration test scoped for your environment, or a keynote that makes compliance genuinely interesting — reach out and let's talk.