I'm a Computer Science graduate with a Master's in Information Security & Digital Forensics with 5+ years of hands-on IT experience across technical support, systems administration, and web operations. Now I'm transitioning into data analytics because the ability to turn raw data into clear, actionable insight is one of the most valuable skills in any organization. The path from IT and security to data isn't a pivot; it's a progression. Understanding how systems are built and protected taught me to think critically about the data flowing through them. This page is a living record of what I know, what I've built, and what I'm learning because it never stops.
I started in Computer Science because I wanted to understand how systems work. Then I pursued a Master's in Information Security & Digital Forensics because I realized understanding how they break and how to protect them was even more valuable. My thesis on ransomware wasn't an academic exercise; it was a deep dive into real-world attacker behavior that still shapes how I approach every system I touch.
My time in Huntington University's IT department taught me how everything in a real-world environment works together: systems, users, infrastructure, and processes. Being part of that team early on gave me a foundation I couldn't have gotten any other way. It's where I learned how to write automation scripts, troubleshoot fast, communicate clearly, and document everything because good IT is only as good as the knowledge it leaves behind.
Data genuinely fascinates me, specifically how it drives real decisions. I committed to building structured analytics skills through the Alex the Analyst Bootcamp, the AnalyticsMentor.io Data Analytics Program, and an EdX Professional Certificate in Business & Data Analysis all in 2025. I work actively in SQL, Excel, Python/Pandas, Tableau, and Power BI, building real projects. AI tools like Claude, ChatGPT, and GitHub Copilot are part of my daily workflow, tools I use to move faster and think more clearly.
A deliberate pivot into data analytics structured bootcamps, certifications, and hands-on projects building real skills in SQL, Python, Tableau, and Power BI. Ongoing.
Managed all technology operations for a sound production business remotely from the ground up. Built and maintained the company website, handled all infrastructure, and kept everything running without downtime.
Served as the sole IT and customer support resource for a small e-commerce business across four platforms, owning all troubleshooting, data management, and operational continuity.
My first real IT environment supporting a 1,300-person university community while still in school. This is where I built my technical foundation, developed troubleshooting instincts, and learned that great IT is as much about communication as it is about technical skill.
These aren't hypothetical scenarios. Every ticket below represents actual work I did — the problem, how I solved it, and what it taught me. This is how I built my IT foundation.
Identity & Access Management is the framework of policies, processes, and technologies that ensures the right people have access to the right resources, at the right time and for the right reasons. It governs how identities are created, managed, and removed across an organization, and controls what each identity is permitted to do.
IAM spans the full identity lifecycle, provisioning new users, adjusting access as roles change, and deprovisioning when someone leaves. It governs authentication (verifying identity), authorization (granting permissions), and governance (auditing and certifying access). Tools and protocols involved include Active Directory, SAML, OAuth 2.0, OIDC, MFA, and SSO, all underpinned by frameworks like NIST SP 800-63 and NIST SP 800-207 for Zero Trust.
My IT support work was, in many ways, applied IAM before I had that label for it. I managed Active Directory users, enforced Group Policy, handled account lockouts, and maintained the principle of least privilege across a 1,300-person environment.
My MS thesis on ransomware deepened my understanding of why access control matters — most attacks succeed because someone had access they shouldn't have had. I'm now building on that foundation with IAM self-study and hands-on lab work.
Deepening my knowledge of SSO, SAML federation, identity governance, and cloud IAM (Entra ID / Okta). Exploring SailPoint and CyberArk fundamentals.
These are the steps I run through when something breaks. Every entry reflects real scenarios I've worked through.
I use AI tools the way a good analyst uses a calculator — to move faster and think more clearly, not to replace knowing how things work. I write better SQL with Copilot, research security topics with Claude, and draft documentation with ChatGPT. The output still needs judgment.
5+ years of hands-on IT experience, active data analytics projects in SQL, Tableau, and Python. I'm ready to bring an analytical, systems-minded perspective to a data analyst role.