Professional Summary
Software Developer with nearly four years of experience transitioning into Application Security. Eager to leverage a deep understanding of the SDLC to build secure applications and automate security processes. Proficient in integrating security tools and AI-driven solutions into CI/CD pipelines to proactively identify vulnerabilities. Proven ability to analyze complex systems and remediate bugs, now with a focus on enhancing application resilience through security automation and threat modeling.
Skills
Security Tools & Concepts
- OPNsense Firewall
- Network Segmentation (VLANs)
- Access Control (IAM)
- Threat Modeling
- Principle of Least Privilege
- DNS over HTTPS (DoH)
- Vaultwarden
- AdGuard Home
Languages & Automation
- JavaScript
- Python
- SQL
- Bash
- PowerShell
- HTML/CSS
Platforms & Virtualization
- UnRAID OS
- Docker
- Linux
- SAP
Networking & Protocols
- TCP/IP
- DHCP
- SSH
- NFS
- SMB
- 802.1q VLAN Tagging
Experience
Columbus McKinnon Corp, Charlotte — SAP VC Developer
July 2021 - July 2022
- Ensured the integrity and security of hundreds of highly configurable product models within the SAP Variant Configuration environment.
- Identified, triaged, and remediated software bugs and potential vulnerabilities based on severity, reducing system risk.
- Strengthened data integrity across departments by validating product specifications to ensure system consistency.
- Developed automation scripts using Microsoft Power Automate to reduce manual data entry, minimizing the risk of human error.
Trilogy Education Services, Remote — Senior Web Development Tutor
November 2018 - July 2021
- Trained aspiring developers in full-stack technologies including HTML, CSS, JavaScript, and MySQL.
- Mentored students on secure coding best practices and effective debugging techniques to identify and resolve software flaws.
- Explained complex web development concepts.
Security Projects
Home Lab: Design and Implementation of a Secure Segmented Network
February 2025 - Present
- Architected and deployed a multi-VLAN network (Trusted, IoT, Lab) to isolate hardware and reduce the internal attack surface.
- Installed and configured OPNsense, an open-source firewall, on dedicated hardware to gain granular control over network security policies.
- Authored a "block by default" firewall ruleset to create a "digital cage" for the IoT VLAN, strictly prohibiting access to internal networks.
- Deployed a self-hosted application stack on a custom UnRAID server, utilizing Docker to run containerized services including Vaultwarden and Jellyfin.
- Hardened remote server access by disabling password-based logins in favor of key-based authentication for SSH.