Cybersecurity Student · System Administrator · Web Design Learner

Security officer by day, cybersecurity student & systems tinkerer by night — building secure systems, deploying defenses, and learning how things work (and break).

🛡️ Security Officer

Museum of Fine Arts, Boston

💻 System Administrator

Freelance · light scripting & web setup

📚 Studying Cybersecurity

BHCC & UMass Global Bootcamp

About

I'm fascinated by how something as simple as a blank HTML file can become powerful — and how that power comes from the builder's intent, discipline, and curiosity. That mindset drives how I approach everything I do, from web development to cybersecurity and systems administration, where good design and strong security go hand in hand.

That curiosity pushed me beyond the browser and into how applications are deployed, how networks support them, and how security protects them. I build hands-on across web interfaces, self-hosted services, home lab environments, and real-world system administration projects, always focused on creating systems that work, stay secure, and scale.

I come from a background where nothing was guaranteed. Growing up with limited resources taught me to be resourceful, disciplined, and hungry for opportunity. I don't take access lightly, and I don't waste chances to learn or build. I move with urgency, learn by doing, and take ownership of the work in front of me.

I'm early in my career, but deeply driven — and I'm looking for an opportunity where responsibility, trust, and challenge turn into momentum.

The ceiling here is higher than my title suggests.

Skills & Tools

Security & Networking

  • Network fundamentals (IP, subnetting, VLAN basics)
  • WiFi hardening & router config
  • Threat modeling (medium environments)
  • Attack surface mapping (home/small biz)
  • Log review & basic SIEM concepts
  • IDS/IPS deployment (lab environments)
  • Signature-based detection tuning
  • False positive analysis & alert refinement
  • Traffic inspection & protocol analysis
  • North–south vs east–west traffic awareness
  • Rule-based detection logic (Snort/Suricata concepts)
  • Network visibility & monitoring
  • Attack simulation & detection validation (port scans, brute force tests)
  • Baseline traffic analysis

Systems & OS

  • Linux (Ubuntu, Arch, Kali basics)
  • Command line & shell scripting
  • SSH & remote access
  • File permissions & user management
  • Basic system hardening
  • Linux service management (systemd)
  • User/group management & permissions
  • File system permissions & ownership
  • Process monitoring & resource usage
  • System updates & patching
  • Basic system hardening
  • Log analysis (auth, syslog, application logs)
  • Remote troubleshooting
  • Disk & storage basics

Security, Forensics & Operations

  • Packet capture & traffic reconstruction
  • Basic network forensics
  • Disk imaging & verification
  • Memory artifact analysis
  • Timeline analysis (basic)
  • IOC identification
  • Suspicious process & persistence detection
  • Credential hygiene enforcement
  • Security alert triage
  • Wireshark & packet analysis
  • Basic malware analysis concepts
  • Incident response procedures
  • Security tool deployment & configuration
  • SIEM-style log ingestion & correlation
  • Endpoint monitoring
  • Alert triage & severity handling
  • MITRE ATT&CK–mapped detections
  • File Integrity Monitoring
  • Vulnerability detection
  • Security operations workflows

Web, Security & Dev

  • HTML/CSS/JavaScript
  • React (Components, State Management)
  • C# (.NET Development)
  • Security-first web development
  • OWASP Top 10 mitigation
  • Authentication flows (basic)
  • Session management awareness
  • Form validation & input handling
  • Secure configuration of web services
  • Deployment of web services on Linux
  • Basic API interaction
  • Version control workflows
  • Responsive web design
  • Web application security testing
  • Database security basics

Operational & Real-World Skills

  • Troubleshooting under time pressure
  • Root cause analysis
  • Independent problem-solving
  • Prioritization of issues
  • Customer-facing technical support
  • Clear documentation
  • Task ownership
  • Working with incomplete information
  • Communication with non-technical users
  • Project management basics
  • Time management & deadline handling
  • Adaptability to new technologies

Languages & Communication

  • English
  • Spanish (native)
  • Communication & customer support
  • Writing basic reports & documentation
  • Technical writing for non-technical audiences
  • Presentation skills
  • Team collaboration
  • Stakeholder communication

Projects

CleanSweep

Modern Web Application · Client Project

Developed and deployed CleanSweep, a modern web application on Vercel. Implemented full-stack functionality including user interfaces, backend services, and deployment pipelines. Gained experience with cloud deployment, CI/CD, and production web application management.

Web App Full Stack Vercel CI/CD Client Work

Click the name to view the website • Completed

SnackHub Dashboard

Admin Dashboard & Data Visualization

Built SnackHub dashboard with advanced admin features and data visualization. Implemented responsive design, user authentication, and real-time data management. Successfully deployed to Vercel with optimized performance and scalability.

Admin Access: Pin/Passcode: 091231@@ - Secure authentication system for admin dashboard access with role-based permissions and session management.

Dashboard Admin Data Viz Vercel Authentication Security

Click the name to view the website • Completed

Pain Journal

Medical Tracking Application

Created a comprehensive pain journal application for medical tracking and analysis. Developed user-friendly interfaces for data entry, visualization tools for health trends, and secure data management systems. Deployed successfully on Vercel platform.

Medical App Health Tech Data Viz Vercel

Click the name to view the website • Completed

Linux System Administration Practice

Multi-distro lab environment

Deployed and maintained multiple Linux distros (Ubuntu, Arch, Kali) for hands-on learning. Configured SSH access, automated updates with cron jobs, set up user permissions, and practiced security hardening and basic scripting to manage systems more efficiently.

Linux System Admin Bash Automation

🤖 AI-Sec: Local AI Security Copilot

AI-Assisted Detection, Triage & Decision Support

Advanced Personal Project • In Progress

Project Overview

AI-Sec is a local-first AI security copilot designed to support security operations in home and small-business environments. Instead of attempting to replace analysts or fully automate decisions, AI-Sec focuses on contextual analysis, alert explanation, and decision support, keeping humans firmly in the loop.

The system ingests security alerts, logs, and system events from monitoring tools (e.g., SIEM, endpoint logs, DNS activity) and uses a locally hosted language model to correlate events, explain potential risk, and recommend next steps. All processing is performed locally to preserve privacy, control, and data ownership.

What It Does (Strong, Real Capabilities)

  • Alert Contextualization - Translates raw security alerts into clear, human-readable explanations (what happened, why it matters, what to check next).
  • Event Correlation - Analyzes multiple related signals (authentication logs, DNS activity, endpoint events) to surface patterns that may indicate misuse or intrusion.
  • Severity & Risk Reasoning - Assists in distinguishing normal behavior from suspicious activity using baseline awareness and contextual clues — without making autonomous enforcement decisions.
  • Human-in-the-Loop Response - Provides recommended actions (review, isolate, monitor, ignore) while leaving final decisions to the operator.
  • Local-Only Processing - Runs entirely on local infrastructure using self-hosted AI models, avoiding cloud dependency and protecting sensitive data.

Example Use Case

A spike in failed SSH login attempts is detected on a Linux host. AI-Sec correlates the alert with recent network scans and DNS activity, summarizes the behavior, explains likely attack patterns, and recommends reviewing access controls or temporarily restricting access — while preserving logs for investigation.

Architecture (Conceptual)

  • Log & alert sources (SIEM, endpoints, DNS, network devices)
  • Centralized log ingestion
  • Local AI engine (self-hosted LLM)
  • Analysis & summarization layer
  • Human review interface (CLI or web UI)

Design Principles

  • Explainability over automation
  • Privacy-first, local execution
  • Security judgment over AI hype
  • Designed for real operators, not demos

Current Focus

  • Local model deployment and performance testing
  • Prompt engineering for security reasoning and clarity
  • Structured alert input and summarization output
  • Defining safe boundaries and limitations for AI recommendations

Planned Enhancements

  • Web-based review dashboard
  • Custom alert templates for different event types
  • Integration with automation workflows (notify, log, restrict access — never fully autonomous)
  • Improved correlation across time-based events

Limitations (Important & Impressive)

  • Not designed to replace SOC analysts
  • Not intended for enterprise-scale environments
  • Relies on quality of upstream logs and alerts
  • Recommendations require human validation
  • (Including this section increases credibility significantly.)
AI Security Local AI SIEM Alert Triage Log Analysis Privacy-First Human-in-the-Loop Security Engineering

🔥 One-Line Closer: AI-Sec explores how artificial intelligence can support security decisions without replacing human judgment — focusing on clarity, control, and real operational value.

🛡️ FSS Fortified Security Services

Founder · Security & Systems Services

Startup — In Progress

Founded Fortified Security Services (FSS), a startup focused on delivering practical, local-first security and IT solutions for homes and small businesses. FSS develops and deploys a Home Assistant–based security and monitoring platform designed to centralize visibility, automation, and control across networks, devices, and services.

The platform leverages Home Assistant as the core orchestration layer, integrating network telemetry, system logs, alerts, and automation workflows to help users understand activity in their environment and respond quickly to security or operational issues. The architecture emphasizes local processing, privacy-first design, and zero-trust-style access controls, reducing reliance on cloud-only solutions while improving security posture.

This project combines security engineering, systems administration, and user-focused interfaces, serving as a real-world application of defensive security concepts tailored for non-enterprise environments.

Startup Home Assistant Security Platform Local-First Privacy-First Zero Trust Systems Integration Security Engineering

Click the name to view the website • In Progress

Personal Portfolio Website

Cybersecurity-focused web design

Designed and built this responsive portfolio showcasing cybersecurity projects and technical skills. Implemented a dark/light theme toggle, semantic HTML for accessibility, and a layout that stays clean and readable on desktop and mobile.

HTML/CSS JavaScript Responsive design Web design

Coming Soon Projects

Boutique Website — Client Project

Web Design & Development for a Local Business

Professional web design and development for a local boutique, creating a modern e-commerce website with custom branding and optimized user experience.

HTML CSS JavaScript UI/UX Client Work

Status: In Progress

Local AI Lab — Custom AI & Automation

Local-First AI Development & Customization

Developing privacy-focused AI systems with local infrastructure. Building custom AI models and automation workflows that run entirely on local systems.

Local AI Automation Privacy-First Security-Aware

Status: In Progress

Roles I'm a Fit For

SOC Analyst

Security operations professional with hands-on SIEM deployment, log analysis, and incident response experience in home lab environments.

What I bring

  • SIEM deployment and configuration (Wazuh)
  • Alert triage and severity-based prioritization
  • Log correlation and threat analysis
  • MITRE ATT&CK framework mapping
  • Incident response documentation and workflows

Best-fit titles: SOC Analyst I, Security Operations Center Analyst, Threat Monitoring Analyst

SIEM Wazuh Log Analysis Alert Triage MITRE ATT&CK Incident Response

Security Engineer

Security-focused engineer with experience in network defense, vulnerability detection, and security architecture implementation.

What I bring

  • Network hardening and segmentation
  • Vulnerability detection and analysis
  • Security tool deployment and configuration
  • Zero-trust architecture principles
  • Security automation and workflow development

Best-fit titles: Security Engineer I, Associate Security Engineer, Information Security Engineer

Network Security Vulnerability Management Zero Trust IDS/IPS Security Architecture Automation

Systems Administrator (Security-Focused)

Linux systems administrator with security-first approach to system management, monitoring, and hardening.

What I bring

  • Linux system administration and service management
  • Security hardening and patch management
  • User permissions and access control
  • System monitoring and log analysis
  • Remote troubleshooting and maintenance

Best-fit titles: Systems Administrator I, Linux Administrator, Security Systems Administrator

Linux System Administration Security Hardening Bash Systemd Log Analysis

Security-Focused Full-Stack Developer

Full-stack developer with security-first mindset, experienced in building secure web applications and deploying them safely.

What I bring

  • Secure web application development
  • OWASP Top 10 mitigation implementation
  • Authentication and session management
  • Secure deployment and configuration
  • API security and input validation

Best-fit titles: Full Stack Developer I, Security Developer, Application Security Developer

HTML CSS JavaScript OWASP Authentication Secure Development

Experience

Work Experience

Security Officer

Museum of Fine Arts, Boston

2024 – Present

Monitor facility security, respond to incidents, and coordinate with staff and law enforcement. Developed strong situational awareness, communication, and report-writing skills while protecting high-value assets in a high-traffic environment.

Independent System Administrator / IT Support

Freelance

2024 – Present

Setting up and maintaining Linux systems, Windows PCs, laptops, WiFi networks, and small-device services for personal and small/medium environments. Includes secure configurations, troubleshooting, software installation, light scripting/programming, and basic web setup for simple sites and dashboards, while helping people understand and manage their own systems.

Server & Host

Fire + Ice · Pho Pasteur

2022 – 2024

Worked in fast-paced restaurants, balancing customer experience, communication, and teamwork — skills that translate well into security and IT when working with non-technical people and clients.

Education

A.S. Cybersecurity

Bunker Hill Community College

2024 – Present

Building foundations in networking, security, and systems with a plan to continue into a bachelor's program focused on cybersecurity and related fields.

Planned Transfer · Cybersecurity / Computing

Northeastern University

Planned · Spring 2026

Intend to transfer in Spring 2026 to deepen my studies in cybersecurity, networks, and possibly AI-related systems, combining hands-on labs with advanced coursework.

Cybersecurity Bootcamp

UMass Global (Springboard)

2024 – Present

Hands-on labs around the OWASP Top 10, data classification, monitoring, and security tools, with a goal of preparing for industry certifications and practical defensive skills. Included guided labs on defending and attacking lab systems in safe environments — testing web vulnerabilities, analyzing logs, and walking through basic incident response workflows from detection to containment and lessons learned. Includes Security+-style content where I'm currently scoring around 90% in prep material.

Why Work With Me

🔧 Hands-On Builder

I don't just study security—I build and deploy real solutions, from SIEM systems to secure web applications. My home security lab demonstrates practical implementation of enterprise-grade security tools.

🛡️ Security-First Mindset

Every project I work on incorporates security best practices from the ground up. From OWASP mitigation in web development to zero-trust principles in system architecture.

🚀 Startup Founder

I'm actively building FSS Fortified Security Services to solve real security problems for homes and small businesses. This shows initiative, business acumen, and practical problem-solving skills.

Contact

The easiest way to reach me is directly by email. I'm open to discussing cybersecurity opportunities, IT projects, or collaborations that align with my skills and interests.

Open to:

Any cybersecurity / IT projects

Cybersecurity / CS jobs

Security-focused development work