Work

Representative projects across infrastructure, networking, security, automation, and platform operations. (We moved all “Selected Work” off the homepage onto this page.)

NetworkingSecurityFortinet

Fortinet Platform Standardization

  • Designed and operated secure network environments with consistent policy templates and reliable cutovers.
  • Built VLANs, routing, NAT, SD-WAN, and IPsec/SSL VPN patterns for repeatable deployments.
  • Implemented HA and standardized configurations to reduce downtime during transitions.
VirtualizationVMwareHyper-VProxmox

Virtual Infrastructure & Migrations

  • Built and maintained Windows/Linux systems in virtualized environments with patching and lifecycle hygiene.
  • Handled migrations, inventory, and standard images to reduce drift and improve consistency.
  • Optimized host capacity and operational stability across multiple platforms.
CloudHybridAzure

Hybrid Cloud Integration

  • Configured Azure AD, network security groups, and hybrid connectivity to improve reliability and scale.
  • Integrated on-prem services with cloud identity and access management workflows.
  • Hardened configurations and implemented practical guardrails for day-2 operations.
AutomationPowerShellRMMImmy Bot

Compliance & Ops Automation

  • Implemented RBAC/MFA/hardening controls with audit-friendly documentation (SOX/CMMC-style).
  • Automated common operational workflows and standardized fixes/runbooks for escalations.
  • Improved monitoring and backup/DR posture with consistent operational patterns.
Flight SimSystemsSupport

Commercial Flight Simulator Operations

  • Serviced flight schools across California and maintained simulator + IT infrastructure.
  • Developed and maintained system documentation, installation procedures, and user guidance.
  • Custom-fit hardware/software based on client needs and supported end-user training.
IdentityADJumpCloud

Identity & Access Foundations

  • Managed directory services and identity workflows across on-prem and cloud environments.
  • Improved access consistency with MFA rollouts and least-privilege patterns.
  • Established repeatable onboarding/offboarding and access review practices.