Core Competencies
Cloud & Application Security
DevSecOps
Governance & Compliance
Technical & Analytical
Experience Highlights
Led and mentored multi-disciplinary teams focused on cloud and application security for business units generating multi-billion dollar revenues. Drove enterprise-wide adoption of advanced security tools and best practices, significantly reducing false positives and enhancing threat detection.
Spearheaded the ISO 27001 certification for a core Identity and Access Management product by directing detailed threat models and risk analyses with internal security and control groups. Simultaneously, drove crucial updates to information security policy to enable 3rd party identity federation, directly supporting sales and marketing efforts to onboard large clients requiring single sign-on (SSO) capabilities.
Projects & Demonstrations
A hands-on walk-through of identifying security threats on a sample E-Commerce API using the STRIDE framework.
View the Case StudyA tool to generate tailored security checklists for various project types and technologies, helping to standardize security posture.
Use the GeneratorAn interactive tool to decode and verify JSON Web Tokens (JWTs) securely in your browser.
Try the JWT DecoderA hands-on demonstration of browser fingerprinting techniques, explaining how they are used for fraud and bot detection.
View the DemoAn interactive tool to compare CVSS severity with EPSS exploitability, helping prioritize vulnerabilities.
Try the ComparatorA tool for decoding the complex model codes (MODCATs) used by Paul Reed Smith Guitars.
Try the DecoderA live dashboard that pulls the latest CVEs from the NVD API to visualize the current threat landscape.
View DashboardA practical guide on investigating SAST findings, using statistical analysis and file path context to triage alerts at scale.
Read the GuideA hands-on guide to common cloud security pitfalls. Click a component in the diagram to analyze a potential misconfiguration.
Explore the Diagram