Leadership Certified Information Systems Security Professional

I’ve been fascinated with computing since the days of Math Blaster on the Apple II. When I was eventually given an IBM PC-AT 286 6MHz, with a 40MB MFM hard drive and a 2400bps modem – I was off into the world of bulletin board systems (BBS). The Internet quickly eclipsed the BBS world around the time my Mom decided to go back to college, so I ‘borrowed’ her credentials to play around on the big-boy Sun Sparc workstations at the university and discovered a whole new world – the world that lacked any sort of security and where one system or network unequivocally trusted another … all at T-3 speeds. You know – ‘just because.’ Thus, my passion for security was cemented.

Partner / Chief Information Security OfficerMarch 2007 – PresentAlpha Theory, LLC – New York, NY and Charlotte, NCGoverned all information security policies and procedures while managing the day-to-day operations of the SOC and Infrastructure teams. Primary responsibilities were to develop and continually improve the security posture of the organization, manage and respond to organizational wide incidents, coordinate disaster recovery and business continuity efforts, and be the internal champion for continuous improvement across all infrastructure and security disciplines. Led the firm through multiple audits by some of the largest hedge funds in the world, culminating with over $100 billion USD under Alpha Theory management.
Senior Systems Engineer, Infrastructure and SecurityAugust 2009 – September 2011Honda Aircraft Company – Greensboro, NCTeam lead for the Windows, VMware, and Security groups. Championed the effort to standardize our hardware from desktop and datacenter, reducing deployment time to 1 hour for desktops and a few minutes for virtual machines. Led the effort to flatten and modernize the global datacenter, eliminating the aging fiber channel layer and converging everything on fiber via 10Gbps/40Gbps FCoE. Deployed the first RSA SecureID and DLP systems, securing over $1 billion dollars in R&D and Intellectual Property.
Senior System X Backoffice EngineerJanuary 2006 – February 2007IBM – Research Triangle Park, NCTier 3 Support for the Entry and Mid-Range xSeries and System X server lines. Linux and Security escalation point and interface to Product Engineering.
Desktop Security EngineerJanuary 2004 – January 2006AIG United Guaranty – Greensboro, NCDaily responsibilities included support of remote workforce, coordination of all mobile laptop and phone device encryption, and assisting with junior level network administrative duties as required.
Staff Trainer and Senior Network EngineerJanuary 2001 – January 2004IT Training and Solutions – Greensboro, NCOn-staff trainer for Microsoft and CompTIA certification paths. Built the solutions side of the business exponentially – leading to winning the public WiFi contracts for Center City Park, S. Elm Street, and the Greensboro Coliseum.

2017 Cisco Global Cyber Ops Scholarship Recipient Today’s organizations are challenged with rapidly detecting cybersecurity breaches and effectively responding to security incidents. Teams of people in Security Operations Centers (SOC’s) keep a vigilant eye on security systems, protecting their organizations by detecting and responding to cybersecurity threats. CCNA Cyber Ops prepares candidates to begin a career working with associate-level cybersecurity analysts within security operations centers.

Areas of Expertise
Defensive Posture (Blue Team)Over a decade of building and evolving defensive (Blue Team) solutions for organizations with up to $100 billion under management.
Disaster Recovery (DR)Designed a multi-datacenter regional disaster recovery plan using off-the-shelf technologies with a targeted RPO of 15 minutes and RTO of <1 hour. Coordinated the bi-annual DR exercise, updating and tweaking our DR plan as needed based upon the outcome.
Infrastructure (Hybrid Cloud)Very strong infrastructure background – including Windows, Linux, VMware, Hyper-V and Cisco IOS as well as the fundamentals of Infrastructure, such as TCP/IP, firewalling, and L2/L3 VLANs. Built a hybrid cloud environment to reduce capital expenditure on depreciating assets and allow for maximum flexibility based upon compute, storage, or network needs.
Offensive Posture (Red Team)A solid understand of attack approaches and methodologies – including phishing, social engineering, and exploitation.