top of page

About the Author


A hardworking and dedicated cybersecurity professional who enjoys scripting and participating in capture the flags.


I have served over 20 years in the military in various technical and leadership positions.  In my current assignment, I am part of a Cyber Protection Team and serve as the Microsoft Windows Expert.  In my past assignments, I served as the OIC (Officer in Charge) of both the battalion IT shop and brigade logistics IT shop, I was the "technology adviser to the Commander".  I have also served as a systems administrator, helpdesk manager, and classroom support tech.  Some of my additional duties included being an Information Assurance Manager Alternate and Network Admin backup.

I am also working as a SANs Mentor and TrilogyEd TA.  For SANs, I am mentoring SEC505 (Securing Windows and PowerShell Automation) and SEC511 (Continuous Monitoring and Security Operations) and for TrilogyEd, I am TA'ing a Cyber Security Bootcamp


During my career, I have been known as the "go-to guy" for IT questions and problems by my directors, commanders, and peers. I have received numerous awards for my work and knowledge, to include several Meritorious Service Medals and Company Grade Officer of the Year for the state of Arkansas.  I currently have a Bachelors of Science in Management in Information Systems.  I currently hold the following certifications: 


CISSP - Certified Information Systems Security Professional

VCP5-DCV - VMWare Certified Professional - Datacenter Virtualization

GWAPT - GIAC Web Application Penetration Tester

GPYC - GIAC Python

GMON - GIAC Continuous Monitoring
GCWN - GIAC Certified Windows Security Administrator
GPEN - GIAC Penetration Tester
GCIA - GIAC Certified Intrusion Analyst
GCIH - GIAC Certified Incident Handler
GCFA - GIAC Certified Forensic Analyst
GSEC - GIAC Security Essentials
GSNA - GIAC Systems and Network Auditor
SEC + - Security Plus
C|EH - Certified Ethical Hacker


  My Expertise


  • Automating with PowerShell Scripting

  • Leadership

  • Critical Problem Solving

  • Vulnerability Management

  • Intrusion Detection / Threat Hunting

bottom of page