Working with multi-functional and cross-enterprise teams that define requirements, develop architecture specifications, select and pilot new technologies, develop enterprise-scale deployment plans and lead initial implementations.
Work closely with other Information Security departments, architecture and development teams, and external cloud providers on requirements, design, integration and delivery of these solutions.
Assesses and identifies information security risks and vulnerabilities along with mitigation activities to address them. Characterizes systems, assesses risks and recommends administrative, operational, and technical safeguards to lower risks associated with confidentiality, integrity, availability, and compliance with policy, standards, and regulations
Identifies and offers technical solutions and recommendations to solve customer needs. Create and maintain a supportive environment for customers by asking the right questions, listening carefully, taking detailed notes, and partnering with other team members. Also, diagnose technology issues through various troubleshooting activities, including using specialty software and hardware—lead training and guidance activities for new team members.
Building a website on HTML from the ground up and Styled with CSS, deployed using Cloud Storage. Setup and configure Cloud DNS, HTTPS security, Cloud Load balancer. Created an API in Python that accepts GET requests from the website and communicates with the Firestore database utilizing Cloud Run. Automated Firestore, API gateway, and Cloud storage with Terraform tool. Created CI/CD pipeline with GitHub Action to run the backend and frontend; ran end-to-end cypress test to verify that the API and website act as expected.
Minor in CyberSecurity Arizona State University, Ira Fulton School of Engineering, Tempe, AZ
Log generation, collection, storage and retention in cloud environments. Identification of malicious and anomalous activity that affect cloud resources. Extraction of data from cloud environments for forensic investigation See Credential
Search, visualize, and analyze data in Elasticsearch. See Credential
Obtained the skills, knowledge, and competency to perform the responsibilities of Kubernetes administrators. See Credential