
I am a Dallas-based Information Security Administrator at the Medical Review Institute of America. I focus on analyzing logs, identifying vulnerabilities, and ensuring the security of sensitive medical data.
Outside of work, I enjoy a balance of quiet time and exploration. Whether it's watching shows like "The Rookie" or "Love Island," taking a road trip, or spending time in my home lab, I bring a calm and practical approach to everything I do.

I'm an InfoSec professional with hands-on experience in security monitoring, desktop support, and system administration. I enjoy working with tools like Microsoft 365, Active Directory, PowerShell, and endpoint protection platforms. I'm passionate about cybersecurity, process automation, and solving real-world technical problems with a calm, focused approach.
Completed a multidisciplinary degree focused on information technology, business, and leadership. Developed strong skills in IT project management, organizational communication, and business process improvement. Gained hands-on experience with group projects, presentations, and real-world problem solving.
Studied core concepts in cybersecurity, networking, and system administration. Learned to identify and mitigate security threats, manage Windows and Linux environments, and apply best practices for data protection. Completed labs and coursework in ethical hacking, digital forensics, and risk management.
Monitor and respond to security threats, manage endpoint protection and SIEM tools, and support compliance with HIPAA and NIST standards.
Resolved escalated support issues, automated tasks with PowerShell, and supported Microsoft 365, Intune, and MDM rollout.
Provided desktop support for end users, handled account issues in AD/Azure AD, and set up Windows workstations and peripherals.
Led repair team operations, handled escalations, improved service workflows, and trained staff on tech and customer service.
Diagnosed and repaired hardware/software issues on Windows and Apple devices, with a focus on data recovery and malware removal.
Below is a snapshot of my technical and security skills, including the tools, frameworks, and languages I use most often in my work as an Information Security Administrator.
Here is a good spot for a message to your readers to let them know how best to reach out to you.