Security Systems Administrator
Secure Infrastructure | System Hardening | GRC → Enforced Controls
Security Control Implementation Portfolio
I implement practical security controls that harden enterprise systems, investigate operational issues, and reduce organizational risk. As an ISC² Certified Cybersecurity Professional (CC) with 100+ documented technical labs and reports, my work focuses on securing real IT environments through repeatable system administration and defensive security practices.
My portfolio follows a Proof of Work methodology, where each security concept is validated through hands-on implementation and documented technical analysis. Projects include system hardening, network security configuration, incident troubleshooting, and infrastructure protection aligned with industry security frameworks.
The goal is simple: convert security theory into measurable, defensible controls that operate effectively in real-world environments.
This portfolio is continuously updated with new labs, projects, and troubleshooting scenarios. It serves as a working reference of applied security practices, covering both implementation and problem resolution across systems, networks, and security operations.
Security Engineering & Control Enforcement
System Hardening & Control Enforcement
- CIS benchmark policies
- Least privilege enforcement
- Registry hardening
- Group policy controls
- IP access restrictions
Network Security & Defense
- Firewall rule enforcement
- pfSense configuration
- IPsec VPN troubleshooting
- DNS traffic analysis
- Misconfiguration identification
- Access control validation
GRC Implementation & Operational Resilience
- NIST aligned controls
- Risk register mapping
- Policy enforcement
- Technical safeguard implementation
- Post breach remediation
- Audit readiness maintenance
Foundational Mentorship

George H. Ross
NBC’s ‘The Apprentice’ Judge & Mentor
Instilled a disciplined evaluation of risks and thorough investigative practices essential for proactive threat hunting and forensic accuracy.

Wahida Clark
4x NYT Bestselling Author & Mentor
Reinforced the importance of clear communication and technical storytelling to translate critical risks into actionable business insights.
A structured collection of security reports, standard operating procedures, and technical investigations demonstrating applied cybersecurity skills across real-world scenarios.
REPORT – Workstation Power Failure Investigation – v1.0.0
Investigation of sudden workstation shutdowns at a law firm, identifying and remediating a physical layer failure caused by insufficient power supply capacity.
REPORT – pfSense APIPA Failure – v1.0.0
Loss of pfSense WebGUI access caused by APIPA addressing on the client system, resolved through static IP reconfiguration and connectivity validation.
SOP - Access Control Incident & NIST Alignment - v1.2.1
Analysis of a data exposure incident caused by weak access controls and lack of enforced security policies.
REPORT – Enterprise Hybrid-Cloud Migration – v1.2.0
A practical troubleshooting case study on migrating VMware virtual machines to AWS EC2 and resolving kernel driver removal issues from the AWS Application Migration Service.
GUIDE – vSphere 8 Nested Lab on AMD Ryzen 5 6600H – v1.0.1
A technical deep-dive into enabling nested virtualization on restricted AMD mobile platforms by bypassing OEM firmware locks and Windows 11 VBS.
REPORT – AD Disaster Recovery & Identity Restoration – v1.0.2
Successful restoration of an Active Directory environment using Bare-Metal Recovery (BMR) and System State restoration on Windows Server 2016.
GUIDE – Backup and Restore Using Duplicati CLI – v1.0.1
Execution and validation of command-line based backup and recovery workflows using Duplicati to ensure data recoverability and integrity.
REPORT – SAR Performance Monitoring on Ubuntu – v1.0.1
Implementation and analysis of system performance monitoring on Ubuntu using the System Activity Reporter (SAR) to identify resource bottlenecks and abnormal activity.
SOP – Secure Linux Management with Cockpit – v1.0.1
Using Cockpit to manage and secure multiple Linux systems from a single web interface.
REPORT – Webmin Secure Administration (Dual-Homed) – v1.1.0
Securing a dual-homed Webmin administration server through PAM-based authentication, interface mapping, and IP-based firewall hardening.