Security and systems engineer for a global engineering firm. Responsible for identity security, incident response, and cloud architecture. Build custom automation in Python/Bash/PowerShell rather than rely on vendors. Investigate incidents, harden authentication, design collaboration security controls, and manage Microsoft 365 infrastructure. Linux tooling for analysis and troubleshooting.
Designed and enforced authentication controls, identity governance, and incident response workflows for global organization.
Built Python/Bash/PowerShell automation for identity hygiene, phishing investigation, audit reporting, and compliance. Scripted rather than purchased.
Designed and executed multi-site cloud migrations, collaboration security controls, and Microsoft 365 architecture serving global engineering workflows.
Implemented Conditional Access, eliminated legacy auth protocols, enforced MFA, and designed identity controls aligned with NIST frameworks.
Entra ID, Conditional Access, RBAC, sign-in and audit log investigation, Exchange message trace, mailbox rule review, phishing containment, evidence-grade documentation.
Microsoft 365 (Exchange/SharePoint/OneDrive), permission architecture, external sharing controls, secure migration design, email authentication (SPF/DKIM/DMARC), TLS lifecycle.
Python, Bash, PowerShell for building custom automation and investigation tools. Linux (Arch/Kali/Ubuntu) for analysis, packet inspection (Wireshark/tshark), log parsing. Nmap, URLScan, VirusTotal for investigation workflows.
Built and ran phishing simulations with evolving templates and payloads, tracked metrics by office and department, and fed results into security awareness training.
Designed and executed office-by-office migrations from legacy file servers to SharePoint/OneDrive using custom PowerShell, preserving permissions and minimizing workflow disruption.
Built Python toolkit for rapid phishing triage: automated message trace pulls, mailbox rule detection, URLScan integration, and evidence collection.