
Projects
I’d love to be able to share some of my larger projects with you, but unfortunately, they are not in the public domain. However, I can share various work from my presentations, technical writing, and my IT home lab projects and coursework.
Information Systems:
Safety, Security & Compliance

Performing Incident Response and Forensic Analysis
Analyzed network packet logs and the disk image for evidence; prepared findings in an incident report.
​
Tools: NetWitness, Autopsy, The Sleuth Kit

Assessing Common Attack Vectors
Investigated and conducted injection-based attacks, malware-based attacks, DOS attacks and social engineering techniques.
​
Tools: OWASP Juice Shop, Metaspoit Framework Firefox, Web Developer Tools, Irssi, Social Engineering Toolkit (SET), Thunderbird

Implementing Security Monitoring and Logging
Configured and deployed an IDS to monitor file integrity/track changes and suspicious network traffic in a Linux and Windows environment; configured and deployed pfSense firewall using rules and a passlist; configured Snort as an IPS.
​
Tools: Snort, Tripwire, Windows Event Viewer, pfSense firewall

Performing Packet Capture and Traffic Analysis
Tools: Wireshark, PuTTy, FileZilla, Mininet-WiFi, Airodump-ng, Aireplay-ng

Using Encryption to Enhance Confidentiality and Integrity
Tools: Kleopatra, OpenSSL

Configuring Backup and Recovery Functions
Tools: NFS, Wbadmin, pfSense, Vi Editor, WindowsServer Backup

Performing Vulnerability Assessment
Used Nessus to conduct a vulnerability assessment and identify high-risk vulnerabilities; Nmap commands within Zenmap to scan the virtual network and identify devices on the network and the operating systems and services running them. Conducted an approved penetration test as an external auditor using Nmap and OpenVAS, prepared a formal penetration test report
​
Tools: Zenmap, Nmap, Nessus, OpenVAS/Greenbone Security Manager

Implementing an IT Security Policy
Tools: Windows Defender, Security Compliance Toolkit (SCT), Group policy Management Console, Active Directory Users and Groups,
​

Applying User Authentication and Access Controls
Tools: PowerShell, TrueNAS, Active Directory
Marketing
Lead Magnet
This is a sample of a lead magnet for a home improvement company branching into the solar industry. I also ran and managed the company's social media ads using this and similar documents: increasing website traffic, strong leads, and their bottom line. The sample was created using Canva.
​
Curriculum & Instruction
Here are a few samples of curriculum and instructional materials I have created for college board and honors courses, such as AP Biology, AP Environmental Science, Honors Physics.
​
​
Presentations
Here are a few samples from presentations I have created and presented over the course of my career.
​
​
​
Proposals & Grants
Here are two proposal writing samples.
Sample 1 is of a research proposal for a PhD program using various quantitative and qualitative methods (Root-Cause Analysis, Ishikawa Analysis). The problem of practice covered student engagement, achievement, and motivation in secondary stem-related classes.
​
Sample 2 is the aims page of an awarded NIH research grant.
​
​