I'm an entry-level IT and cybersecurity professional and recent Applied Computer Science graduate with a strong interest in security operations, IT support, and protecting users and organizational systems.
I enjoy solving technical problems and working at the intersection of technology, security, and user trust. Through my coursework and hands-on learning, I've built a foundation in computer systems, networking concepts, scripting, and cybersecurity fundamentals, with a growing focus on how secure systems are designed, maintained, and defended.
I recently completed my B.S. in Applied Computer Science and am currently pursuing CompTIA Security+ and CompTIA A+, along with having completed the Google Cybersecurity and IT Professional Certificates, to strengthen my knowledge of IT infrastructure, security controls, and troubleshooting.
Areas of Focus:Outside of technology, I value balance and discipline through staying active and exploring the outdoors, which helps me bring focus and persistence to my work.
I'm actively seeking entry-level roles in IT support, cybersecurity, or technical operations, where I can continue learning, contribute to a team, and grow into a security-focused professional.To learn more about my work history, check out my resume. Thanks for stopping by!
Authenticity is essential in every aspect of cybersecurity and IT.
This principle drives clear, ethical decision-making and ensures that every recommendation, configuration, and safeguard reflects the integritty and real-world needs--not shortcuts or assumptions., ensuring that design choices align with values and vision.
Curiosity is a key asset in security and technology.
Threats evolve, systems change, and effective defense requires a mindset that constantly explores, questions, and learns.
Curiosity fuels deeper problem-solving, reveals hidden vulnerabilities, and opens the door to innovative solutions to protect systems and empower users.
Empathy is the foundation of meaninful cybersecurity.
True security begins with understanding people--their concerns, their habits, their challenges, and their goals. By listening carefully, we create an environemnt where collaboration thrives and security becomes accessible, not intimidating.
Without empathy, trust erodes, and even the strongest technical controls fall short. With t, we build safer, more human-centered systems that truly support the people who rely on them.