System Administration & Infrastructure Security
Building, Securing, and Troubleshooting Real-World Systems
Portfolio Overview
This portfolio follows a proof of work approach, where each security concept is tested through hands-on implementation and technical analysis. Projects include system hardening, network security configuration, incident troubleshooting, and infrastructure protection aligned with industry frameworks. The goal is to convert security theory into practical controls that work in real-world environments.
Security Engineering & Control Enforcement
System Hardening
- CIS benchmark policies
- Least privilege enforcement
- Registry hardening
- Group policy controls
- IP access restrictions
Network Security & Defense
- Firewall rule enforcement
- pfSense configuration
- IPsec VPN troubleshooting
- DNS traffic analysis
- Misconfiguration identification
- Access control validation
GRC & Resilience
- NIST aligned controls
- Risk register mapping
- Policy enforcement
- Technical safeguard implementation
- Post breach remediation
- Audit readiness maintenance
Foundational Mentorship

George H. Ross
NBC’s ‘The Apprentice’ Judge & Mentor
Instilled a disciplined evaluation of risks and thorough investigative practices essential for proactive threat hunting and forensic accuracy.

Wahida Clark
4x NYT Bestselling Author & Mentor
Reinforced the importance of clear communication and technical storytelling to translate critical risks into actionable business insights.
A structured collection of security reports, standard operating procedures, and technical investigations demonstrating applied cybersecurity skills across real-world scenarios.
REPORT – Operating System Fundamentals and System Operations – v1.0.0
Technical analysis of core operating system components, focusing on kernel operations, memory management, and system interaction.
REPORT – BIOS, UEFI, and System Boot Architecture – v1.0.0
Overview of how a computer starts from power on, including firmware execution, hardware checks, boot sequence, and operating system loading.
REPORT – Computer Hardware and Power Infrastructure – v1.0.0
Overview of computer hardware components, focusing on motherboard communication, power supply safety, and connector usage.
REPORT – Storage Systems and Data Management – v1.0.0
Technical analysis of storage systems, data size standards, and backup methods to keep data safe and available.
REPORT – Memory Architecture and RAM Technologies – v1.0.0
Simple analysis of how RAM works, including DRAM basics, DDR evolution, and how memory affects system performance.
REPORT – Binary Systems, Data Representation and Logic Gates – v1.0.0
Explains how computers use binary, character encoding, and logic gates to process and display data.
REPORT – Windows Disk Management with CHKDSK and FSUTIL – v1.0.0
Using Windows tools to check disk health, fix errors, and keep data reliable.
REPORT – USB Storage Failure Analysis and Disk Validation – v1.0.0
Investigation of a hardware-level USB storage failure, distinguishing between logical filesystem issues and physical I/O failure.
REPORT – USB Filesystem Corruption Due to Improper Removal – v1.0.0
Investigation of a corrupted external USB device following improper removal, focusing on isolating logical filesystem failure from physical hardware damage.
REPORT – USN Journal Analysis – v1.0.0
Analysis of the NTFS USN Journal for tracking file activity and building forensic timelines.