Security Systems Specialist
Secure Infrastructure | System Hardening | GRC to Enforced Controls
Security Control Implementation Portfolio
I implement practical security controls that harden enterprise systems, investigate operational issues, and reduce organizational risk. As an ISC² Certified Cybersecurity Professional (CC) with 100+ documented technical labs and reports, my work focuses on securing real IT environments through repeatable system administration and defensive security practices.
My portfolio follows a Proof of Work methodology, where every security concept is demonstrated through hands-on implementation and documented technical analysis. These projects include system hardening, network security configuration, incident troubleshooting, and infrastructure protection using industry-aligned security frameworks.
The goal is simple: convert security theory into operational controls that are measurable, defensible, and ready for real-world environments.
This portfolio is continuously updated as new labs, projects, and troubleshooting scenarios are completed. It serves as a working reference of applied security practices, documenting both implementation and problem resolution across systems, networks, and security operations.
What I Bring to an Organization
System Hardening & Control Enforcement
- CIS benchmark policies
- Least privilege enforcement
- Registry hardening
- Group policy controls
- IP access restrictions
Network Security & Defense
- Firewall rule enforcement
- pfSense configuration
- IPsec VPN troubleshooting
- DNS traffic analysis
- Misconfiguration identification
- Access control validation
GRC Implementation & Operational Resilience
- NIST aligned controls
- Risk register mapping
- Policy enforcement
- Technical safeguard implementation
- Post breach remediation
- Audit readiness maintenance
Explore Key Career Milestones & Certifications
Foundational Mentorship

George H. Ross
NBC’s ‘The Apprentice’ Judge & Mentor
Instilled a disciplined evaluation of risks and thorough investigative practices essential for proactive threat hunting and forensic accuracy.

Wahida Clark
4x NYT Bestselling Author & Mentor
Reinforced the importance of clear communication and technical storytelling to translate critical risks into actionable business insights.
See My Real-World Technical Experience

REPORT – pfSense APIPA Failure – v1.0.0
Loss of pfSense WebGUI access caused by APIPA addressing on the client system, resolved through static IP reconfiguration and connectivity validation.
SOP - Access Control Incident & NIST Alignment - v1.2.1
Analysis of a data exposure incident caused by weak access controls and lack of enforced security policies.
REPORT – Enterprise Hybrid-Cloud Migration – v1.2.0
A practical troubleshooting case study on migrating VMware virtual machines to AWS EC2 and resolving kernel driver removal issues from the AWS Application Migration Service.
GUIDE – vSphere 8 Nested Lab on AMD Ryzen 6000 – v1.0.0
A technical deep-dive into enabling nested virtualization on restricted AMD mobile platforms by bypassing OEM firmware locks and Windows 11 VBS.
REPORT – AD Disaster Recovery & Identity Restoration – v1.0.2
Successful restoration of an Active Directory environment using Bare-Metal Recovery (BMR) and System State restoration on Windows Server 2016.
GUIDE – Backup and Restore Using Duplicati CLI – v1.0.1
Execution and validation of command-line based backup and recovery workflows using Duplicati to ensure data recoverability and integrity.
REPORT – SAR Performance Monitoring on Ubuntu – v1.0.1
Implementation and analysis of system performance monitoring on Ubuntu using the System Activity Reporter (SAR) to identify resource bottlenecks and abnormal activity.
SOP – Secure Linux Management with Cockpit – v1.0.1
Using Cockpit to manage and secure multiple Linux systems from a single web interface.
REPORT – Webmin Secure Administration (Dual-Homed) – v1.1.0
Securing a dual-homed Webmin administration server through PAM-based authentication, interface mapping, and IP-based firewall hardening.
REPORT – OpenVPN Remote Access VPN Deployment and Validation – v1.0.0
Deployment and validation of an OpenVPN remote access solution to provide secure encrypted tunneling for remote clients over untrusted networks.