Professional Experience
Litigation Technology, eDiscovery & Project Management Professional
January 2016 – Present
As a litigation technology and eDiscovery professional, I handle all aspects of video editing, 3D, motion graphics & synchronizing deposition videos. Instrumental in the design, presentation, and set up of legal and courtroom technologies. Skilled use of Trial Director and Adobe Media Suite to display evidence and develop engaging videos and documentation to tell compelling stories at trial. Performs thorough collection of electronic evidence and Summation database administration. Contracted by legal establishments to implement dictation systems, network management, document management, and end-user helpdesk support.
AWS Cloud Architect & Cyber Security Project Manager
January 2018 – Present
As a Cloud Solutions Architect and Project Manager, I help companies understand how to transform their IT infrastructure, operations & applications to make the most of the scalability, innovation & cost efficiency of the Amazon Web Services platform. Design and build core platforms, automate deployments, migrate key systems from on-prem hosting to cloud environments, and perform Functional and non-functional performance testing of key systems before cutover to AWS. Configure auto-scaling website platform with peak visitors per minute capacity planning and bottleneck identification monitoring. Manage the development and test environments. As a security professional, I perform network penetration testing, exploit hacking, security audits, remediations, and education. I utilize various technologies and tools to ensure clients are within industry security compliance, regulations, and mandates.
Network Engineer/Manager of Information Systems
October 2005 – November 2016
As a manager of information systems, I was responsible for the day-to-day Network operations of a large Mississippi law firm. Accountable for analyzing, troubleshooting, and reconfiguring servers, PCs, and laptops for the three-office Insurance defense law firm. Concurrently responsible for managing IT projects, administering, optimizing, and supporting internal LAN/WAN infrastructure consisting of Cisco Routing, eDiscovery platforms, Windows Active Directory, VOIP, and more than 130 Windows End-users. Researched, recommended, and implemented new hardware and software into the environment to increase efficiency. Monitored and supported internal network security, including adding/deleting users and shared permissions. Analyzed and resolved network and server connectivity issues. Administered, configured, and maintained Document management server and Polycom Voice and video conferencing equipment; managed and budgeted the firm’s information technology systems.
Field Service Technician
January 2004 – October 2005
As a Field Service Technician, I was responsible for testing, maintaining, troubleshooting, and installing Windows-based Law Enforcement and Communications software applications…assisted Engineering and Technical Support personnel…Extensive travel servicing NCIC systems for law enforcement agencies within the state… Comprehensive experience with MS Windows XP/2000/NT/98 operating systems and strong knowledge in networking and database technologies…Troubleshoot and deployed hardware /software upgrades to law enforcement systems…Built and repaired computer systems and printers…Maintained an extensive database of Mississippi law enforcement agencies and their computer systems, along with repairs, replacements, and upgrades.
Certifications
AWS Security Specialty
Specialty Level
May 2019
The AWS Certified Security Specialty – exam validates technical expertise in securing workloads on the AWS platform. Exam concepts that should be understood for this exam include:
- An understanding of specialized data classifications and AWS data protection mechanisms
- An understanding of data encryption methods and AWS mechanisms to implement them
- An understanding of secure Internet protocols and AWS mechanisms to implement them
- Working knowledge of AWS security services and features of services to provide a secure production environment
- Competency gained from two or more years of production deployment experience using AWS security services and features
- The ability to make tradeoff decisions concerning cost, security, and deployment complexity is given a set of application requirements
- An understanding of security operations and risk
- Recommended Knowledge
- At least two years of hands-on experience securing AWS workloads
- Security controls for workloads on AWS
URL: https://www.certmetrics.com/amazon/public/badge.aspx?i=7&t=c&d=2019-05-20&ci=AWS00742212
Certificate Number: G481KJ7CJFQ41NC3
AWS Certified Solutions Architect
Associate Level
January 2019
The AWS Certified Solutions Architect – Associate exam validates advanced technical skills and experience designing distributed applications and systems on the AWS platform. Key concepts that should be understood for this exam include:
- Designing and deploying dynamically scalable, highly available, fault-tolerant, and reliable applications on AWS
- Selecting appropriate AWS services to design and deploy an application based on given requirements
- Migrating complex, multi-tier applications on AWS
- Designing and deploying enterprise-wide scalable operations on AWS
- Implementing cost control strategies
URL: https://www.certmetrics.com/amazon/public/badge.aspx?i=1&t=c&d=2019-01-09&ci=AWS00742212
Certificate Number: Z6RNPQP212VQ1G3C
Certified Ethical Hacker
V11
June 2022
The Certified Ethical Hacker –exam is a qualification obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems, using the same knowledge and tools as a malicious hacker, but lawfully and legitimately to assess the security posture of a target system. This knowledge is assessed by answering multiple-choice questions regarding various ethical hacking techniques and tools.
- Performs network penetration examinations to ascertain the technical weaknesses existing in information systems
- Researching effective ways of manipulating the vulnerable domains of network systems
- Maintaining a high level of security of information is crucial for the business growth of organizations
- Assessing software environments and examining the level of risk they can pose to network systems.
- Performing the latest assessments to remediate network-related vulnerabilities
URL: http://eccouncil.org
Certificate Number: ECC4890215736
Certified Computer Forensic Examiner
Information Assurance Certification Review Board
February 2018
The Certified Forensic Computer Examiner (CFCE) – credential was the first certification demonstrating competency in computer forensics with Windows-based computers. The CFCE training and certification are conducted by the International Association of Computer Investigative Specialists (IACIS), a non-profit, all-volunteer organization of digital forensic professionals.
- Acquiring computers and networking devices/seizing evidence in a forensically sound manner
- Examining systems for points of intrusion and recreating storylines
- Evaluate highly complex security systems according to industry best practices to safeguard internal information systems and databases
- Communicate with co-workers and management regarding case developments
- Consulting with clients on high-level strategic initiatives as well as highly technical and detailed regulatory compliance projects
- Blogging about your new security finds
- Designs audits of computer systems to ensure they are operating securely and that data is protected from internal and external attacks. Makes recommendations for preventive measures as necessary
URL: http://www.iacertification.org/
Candidate Number: IARCB1689959