17+ years architecting secure, scalable enterprises — from executive strategy and governance to incident command, detection engineering, and cloud security.
I'm a dual-track IT and cybersecurity leader who operates fluently at both the boardroom and the keyboard — shaping enterprise architecture strategy while hunting adversaries across hybrid and multi-cloud environments. My work fuses GRC, detection engineering, incident command, and infrastructure modernization into programs that measurably reduce risk and accelerate the business.
Impact
Measurable outcomes
Delivered across governance, operations, and security engineering.
Incident Command
Carry a 24×7 on-call rotation and act as Incident Commander on critical security events, coordinating technical, legal, and executive stakeholders through containment, eradication, and recovery — driving blameless post-mortems that reduced repeat incidents by 40%.
Detection Engineering
Built SIEM and EDR detections mapped to MITRE ATT&CK across endpoint, identity, cloud, and network domains; closed prioritized coverage gaps surfaced through hypothesis-driven threat hunting and purple-team exercises — cutting MTTD on high-severity alerts by ~35%.
Automation & Enrichment
Engineered SOAR-style playbooks and Python / PowerShell enrichment workflows that cut analyst triage time by ~50%, raised signal quality on high-priority alerts, and lowered MTTR for common intrusion patterns.
Governance That Scales
Built compliance programs aligned to SOC 2, HIPAA, NIST, and CISA guidance — decreasing audit exposure by 60% and lowering security incidents by 25% while enabling faster releases via policy-as-code.
Operational Excellence
Established formal Change Advisory Boards and vendor-governance frameworks that cut unplanned outages by 45% and tightened oversight of third-party access — turning IT from a cost center into a reliability engine.
Cloud Transformation
Drove Zero-Trust, cloud, and AI adoption across complex environments — improving operational efficiency by 40% while preserving guardrails for data, model, and identity governance.
Expertise
Where I focus
Translating adversary TTPs, enterprise risk, and architectural choices into outcomes that boards, engineers, and auditors can all align behind.
Enterprise Architecture
Modular, future-proof blueprints across compute, network, identity, and data — designed for scale, reliability, and change.
Cloud Security
AWS, Azure, and GCP landing zones, CSPM (Wiz, SCC), container security, and cost governance for predictable performance at enterprise scale.
Cyber Risk Management
Cyber risk quantification, executive-facing risk metrics, BCP/DR, vendor risk, and program leadership translating detection efficacy into board-level decisions.
Threat Hunting
Hypothesis-driven hunts fusing telemetry from SIEM, EDR, and IDS/IPS with open-source, commercial, and internal threat intelligence — tracking adversary TTPs mapped to MITRE ATT&CK.
AI Security & Enablement
AI governance, secure LLM adoption, adversarial AI and agentic threat modeling, and guardrails that let organizations move fast with AI without moving carelessly.
Team & Vendor Leadership
High-trust cultures, clear operating models, and vendor ecosystems aligned to measurable business outcomes — mentoring teams to >99.9% SLA adherence.
Experience
A 17+ year arc
Fractional executive advisory, cybersecurity engineering, enterprise IT leadership, and systems engineering.
Principal IT Consultant · Fractional CIO / vCISO
2025 – Present
Interim executive for mid-market clients, delivering enterprise-grade strategy, security architecture, and incident response. Carry a 24×7 on-call rotation as Incident Commander and build SIEM / EDR detection pipelines, SOAR automation, and domain-posture assessment tooling.
Virtual CIO · Cybersecurity & Cloud Strategy
2024 – 2025
Strategic IT advisor for a portfolio of mid-market clients — stood up cloud security monitoring and log-aggregation pipelines, led tabletop IR exercises, established CAB and vendor-risk frameworks, and drove Zero-Trust, cloud, and AI adoption.
IT Manager · Infrastructure & Cybersecurity
2023 – 2024
Owned end-to-end IT and security architecture for a high-growth venture firm (150 users), including HQ buildout with Zero-Trust controls baked in from day one. Deployed SIEM/EDR tooling with custom detections, authored 12 core security policies, and transitioned operations from an MSP to an in-house team.
Lead Technical Consultant · SaaS, Security & Compliance
2022 – 2023
Delivered complex SaaS, security, and compliance implementations for 20+ clients, driving NPS >65 and a 30% lift in RFP win rate. Led SOC 2 and CCPA readiness initiatives, moving clients from unprepared to audit-ready in as little as four months.
Senior Systems Engineer · Hospitality IT & PCI Compliance
2018 – 2021
Overhauled on-prem data centers to meet PCI-DSS, segmented payment networks, and boosted throughput 30%. Designed and migrated PMS/POS networks for enterprise hospitality properties with 99.9% uptime. Performed packet analysis and log review for suspected intrusions.
Senior IT Consultant · Cloud & Endpoint Migration
2018
Led a petabyte-scale AWS cloud migration with zero data loss. Migrated 200+ mailboxes to Google Workspace (−20% licensing costs) and deployed Jamf Pro to standardize macOS endpoints (−35% ticket volume).
Earlier Career · IT Technician / Administrator
2010 – 2015
University IT operations and the network backbone buildout for a major automotive assembly line — the hands-on foundation for a career of designing resilient systems.
Competencies
Tools & disciplines
Incident Command
Detection Engineering
Threat Hunting
SIEM / EDR
SOAR Automation
Enterprise Architecture
Cloud Security
Cybersecurity Governance
Zero-Trust Architecture
SOC 2 / NIST CSF
HIPAA / PCI / CISA
Identity Management
Network Protocols
Wireshark / Zeek
Endpoint Management
AI Security
Risk Management
Strategic Planning
Credentials
Education & certifications
Education
MBA — Georgia Southwestern State University
B.S. Computer Science (Minor: Mathematics) — Troy University
Real testimonials coming soon.
Working with me? I'd be honored to feature your words here — reach out on LinkedIn and I'll share a short prompt.
Ready to transform your IT & security foundation?
Whether you need an interim CIO, an incident commander on retainer, or a detection program built from scratch — let's align architecture, security, and operations to advance your mission.