Education
NYU Tandon School of Engineering
Brooklyn, NY 2010 – 2014
Degree: B.S. Comp. Sci.
Concentration: Cyber Security
Ulster County Community College
Stone Ridge, NY 2008 – 2010
Degree: Associates in Applied Science in Network Administration
Core Competencies
- Team Leadership & Cross-functional Collaboration
- Cybersecurity Strategy & Governance
- Risk Assessment & Mitigation
- Threat Intelligence & Incident Response
- Security Policy Development
- Stakeholder Communication & Collaboration
- Regulatory Compliance
- Cybersecurity Frameworks
- Penetration Testing & Vulnerability Management
- Security Automation & Optimization
Skills
- Malware Analysis
- Cyber Threat Intelligence
- Cyber Threat Hunting
- Penetration Testing
- Vulnerability Scanning and Analysis
- Security Compliance
- Threat Intelligence Platforms (TIP)
- Automation and Orchestration platforms
- Threat Hunting platforms
- Forensics platforms
- Reverse Engineering
- Assembly language
- Development languages: C, C++, JavaScript, Python, Powershell
- Database languages: SQL
- Debuggers: GDB, X86Dbg, X64Dbg
- Decompilers: IDA, Ghidra
- Scanners: Nessus, Wireshark, Nmap
Patents
Secure Embedded Data Encryption System
U.S. Patent No:
Certifications
Certified Malware Analysis Professional

Issued By: INE
Credential ID and Verification: 4660701
Granted: February 2022
Certified Ethical Hacker Master

Issued By: EC-Council
Credential ID: ECC6083971425
Granted: September 2020
Cisco Certified Network Associate

Issued By: Cisco
Credential ID: CSCO11191904
Granted: February 2010
Network+

Issued By: CompTIA
Credential ID: COMP001008838088
Granted: July 2010 (lifetime)
Executive Summary
I am a cybersecurity leader, engineer, and analyst with over 10 years of experience in public and private sectors, including government organizations. I have proven expertise in cyber threat intelligence, risk management, incident response, and security compliance. I am a hands-on leader with experience managing cross-functional teams, developing security policies, and communicating with C-suite executives. I currently hold a security clearance and multiple industry certifications, including Certified Malware Analyst and Certified Ethical Hacker.
Professional Experience
Tetrad Digital Integrity /
U.S. House of Representatives
Title: Malware Engineer
Dates: Feb. 2021 – Sept. 2023
Leadership Experience:
- Shared leadership responsibilities for Cyber Threat Intelligence team for United States House of Representatives.
- Coordinated and lead international team for House of Representatives in Cyberflag training event run by DoD and U.S. Cybercommand. Team consisted of members from: New Zealand, Canada, United Kingdom, U.S. National Guard, U.S. Senate, U.S. Library of Congress, and U.S. House of Representatives.
- Lead multiple projects for the ingestion and organization of intelligence for leadership.
- Lead annual meetings on a weekly, bi-weekly, and monthly basis with colleagues from other branches of government and international partners to coordinate efforts and share information and resources.
Technical Experience:
- Provided analysis and reverse engineering of malware samples discovered by threat hunting team.
- Results from analysis and reverse engineering were used by threat hunting to improve both automation and manual discovery of threats, both known and unknown.
- Researched threat actors to discover possible threats to members of the House of Representatives and created a notification system to inform of increased activity that may be targeted against them.
Willow Inc.
Title: Owner/Co-founder/CEO/Consultant
Dates: Nov. 2018 – Jan. 2021
Leadership Experience:
- Worked with executives from public and private sector to collaborate on solution for DARPA request for proposals.
- Managed finances and budgetary concerns for Willow, planning for future needs and expenses.
- Created businesses plan for Willow to establish company direction, policies, and culture.
Technical Experience:
- Received patent for Secure Embedded Data Encryption System (SEDES) – 8,880,892.
- Designed and developed technology for securing data communications on silicon and across networks using SEDES.
N.C. Dept. of Information Technology
Title: Security and Compliance Specialist II
Dates: Aug. 2018 – Nov. 2018
Leadership Experience:
- Responsible for upgrading State school system, K-12, network security infrastructure.
- Worked with local staff at each school to coordinate systems upgrades and maintenance.
Technical Experience:
- Worked on Cisco firewalls to configure for school systems upgrades.
- Troubleshooting network security issues from other State agencies to ensure network communications were reliable and secure.
IBM
Title: Network Specialist
Dates: June 2014 – June 2018
Leadership Experience:
- Lead Administrator for User Access control for United States Resiliency Services sites, including 3 mega sites and hundreds of satellite sites.
- Defined policy for user access control to ensure that IBM employee’s could access critical systems remotely to support customers during disaster recovery exercises and real events.
- On site subject matter expert for all Cisco security devices and worked with customers to provide reliable services during DR events.
- Worked with customer leadership to help them understand IBM’s services and guide them through working with Resiliency Services.
- Lead vulnerability scan efforts for internal systems. Worked with system owners to address findings and come to resolution.
- On site contact for Incident Response team during investigation.
Technical Experience:
- Responsible for configuration and troubleshooting of Cisco Dynamic Fabric allocation environment used for the creation of the customer network infrastructure during DR events.
- Responsible for configuration and troubleshooting of Cisco security devices: firewalls, IPS, IDS, and other appliances, for customer environments.
- Responsible for configuration and troubleshooting of F5 appliances used during customer DR events.
- Conducted vulnerability scans of internal systems using various tools. Would analyze results to determine if non-compliance reports needed to be created and would work with system owners to resolve issues discovered. Would conduct regular follow up scans to determine if fixes had been implemented if needed.
- Conducted incident response investigation under supervision of incident response team within IBM.