System Administration & Infrastructure Operations
Secure Windows & Linux infrastructure through administration, troubleshooting, and monitoring.
Infrastructure Operations Portfolio
This portfolio demonstrates hands-on systems administration, infrastructure security, and operational troubleshooting in Windows and Linux environments. Projects focus on server hardening, monitoring deployment, backup and recovery operations, network security, and technical problem resolution using structured validation and root-cause analysis methods.
Each project follows a proof-of-work approach, where infrastructure concepts are tested through practical implementation, troubleshooting, documentation, and security validation aligned with industry frameworks and operational best practices.
Focused on operational reliability, infrastructure security, monitoring visibility, and structured troubleshooting across enterprise-style lab environments.
Available Infrastructure Services
Systems Administration
- Windows Server administration
- Linux system administration
- User and permission management
- System troubleshooting
- Service management
- Operational maintenance
Infrastructure Hardening
- Windows Server hardening
- Linux security baselines
- Least privilege enforcement
- Registry and access control configuration
- RDP and SMB security controls
- Firewall rule implementation
Monitoring & Logging
- Wazuh deployment and monitoring
- Centralized logging
- Sysmon integration
- Security event analysis
- File integrity monitoring
- Resource monitoring
Network Defense
- pfSense firewall configuration
- Firewall rule troubleshooting
- IPsec VPN troubleshooting
- DNS traffic analysis
- Access control validation
- Network misconfiguration remediation
Backup & Recovery Operations
- Backup validation testing
- Recovery workflow development
- System state backup configuration
- Snapshot and restore operations
- Disaster recovery planning
- Business continuity support
Security Governance
- NIST aligned controls
- Risk-based security validation
- Technical safeguard implementation
- Operational security reviews
- Audit readiness support
- Incident remediation documentation
Explore Technical Portfolio View Certifications
Tools & Platforms
Professional Influence

George H. Ross
NBC’s ‘The Apprentice’ Judge & Mentor
Reinforced structured decision-making, operational discipline, and risk evaluation principles used when analyzing infrastructure issues, system reliability, and security controls.

Wahida Clark
4x NYT Bestselling Author
Strengthened professional communication and documentation skills used to translate technical findings, operational risks, and troubleshooting outcomes into clear, business-focused reports.

Stedman Graham
Author, Educator & Business Strategist
Participated in a professional virtual engagement focused on leadership, personal development, and strategic thinking skills. The discussion reinforced structured goal-setting, identity-based leadership principles, and disciplined professional growth frameworks.
A structured collection of infrastructure troubleshooting reports, hardening procedures, monitoring deployments, recovery operations, and security investigations demonstrating applied systems administration and infrastructure security practices in real-world environments.
REPORT – Persistent Terminal Management with Tmux – v1.0.0
Technical implementation of persistent terminal session management using Tmux to support multi-tasking and continuous terminal workflows in Linux.
REPORT – Linux System Resources Monitoring (CPU & Memory) – v1.0.0
Technical implementation of Linux system resource monitoring using native command-line utilities to analyze CPU, memory, and swap usage.
REPORT – Linux Automation: ClamAV Security & System Maintenance – v1.0.0
Technical implementation of automated security scanning and system maintenance on Ubuntu Server using ClamAV and the Cron daemon.
REPORT – Troubleshooting pfSense DNS Resolution – v1.0.0
Resolution of DNS failures in a hardened pfSense environment by implementing controlled, explicit DNS access under a default-deny policy.
REPORT – USB Passthrough Instability in VirtualBox (Kali Linux) – v1.0.0
Analysis of USB I/O failures during virtualization, with secure Linux filesystem configuration and execution control.
REPORT – Hardware Integrity Investigation: 2TB USB I/O Failure – v1.0.0
Forensic investigation into a persistent I/O failure of a 2TB USB storage device, isolating hardware controller degradation from software-level drivers.
REPORT – AWS RDP Access Resolution Summary – v1.0.0
Resolution of Remote Desktop Protocol (RDP) access failures on an AWS-hosted Windows instance through group membership and policy validation.
REPORT – Operating System Fundamentals and System Operations – v1.0.0
Technical analysis of core operating system components, focusing on kernel operations, memory management, and system interaction.
REPORT – BIOS, UEFI, and System Boot Architecture – v1.0.0
Overview of how a computer starts from power on, including firmware execution, hardware checks, boot sequence, and operating system loading.
REPORT – Computer Hardware and Power Infrastructure – v1.0.0
Overview of computer hardware components, focusing on motherboard communication, power supply safety, and connector usage.