Academic Profile & Credentials
Master of Science in Cybersecurity Management (MSCM)
Institution: The University of Utah Salt Lake City, UT - Expected Graduation: July 2026
- Specialization: Agentic AI in SecOps & Security Automation
Academic Focus & Applied Research
This program synthesizes enterprise defense strategies with advanced systems integration, focusing heavily on automating incident response through localized AI inference and strict programmatic governance.
Security Automation & Systems Integration
- Programming for Security (IS 6495): Engineered advanced Python architectures, moving beyond basic scripting to develop RESTful APIs (FastAPI), regex-driven telemetry bridges, and deterministic execution logic for automated defense.
- Web-Based Applications (IS 6465): Focused on securing application architecture, backend API endpoints, and data pipelines against both traditional and automated exploitation.
Advanced Defensive Strategy & Infrastructure
- Secure Networking Operations (IS 6572): Conducted deep dives into network defense configurations, including Linux kernel networking (
iptables), containerized network namespaces, and dynamic threat isolation. - Vulnerability Management (IS 6573): Implemented continuous analysis and automated remediation strategies mapped to modern threat intelligence frameworks.
Governance, Risk & AI Compliance
- Cybersecurity Management (IS 6570): Developed organizational security policies and risk assessment frameworks, specifically focusing on the compliance requirements and operational risks of deploying unconstrained AI in enterprise environments.
- MSCM Career Development (IS 6821): Focused on professional alignment with emerging technical roles in AI-driven security operations.
Bachelor of Science in Information Technology
Institution: Utah Valley University Orem, UT - Graduation: December 2022
Core Infrastructure & Resilience Expertise
Foundational Architecture
- Specialization: Network Security and Systems Administration.
- Built a rigorous foundation in Active Directory management, access control, and core routing protocols—the essential prerequisites for understanding and automating modern enterprise networks.
Capstone Deliverables
- Secure Infrastructure Deployment: Designed and deployed a hardened local area network (LAN) environment, applying strict access control lists (ACLs), perimeter defense principles, and secure access protocols.
- Business Continuity & Incident Response: Authored comprehensive Business Continuity Plans (BCP) detailing risk assessment matrices, precise Recovery Time Objectives (RTO), and crisis management workflows to ensure organizational resilience.
