Work Experience

Cybersecurity Engineer (DFIR)
Dataprise
Jan 2025 - Present
Remote
- •Contribute to ransomware incidents by spinning up secure jump boxes, isolating systems, performing forensics, rebuilding and decrypting servers, and applying hardening controls.
- •Monitor thousands of endpoints with CrowdStrike Falcon & SentinelOne, triaging anomalies in real time and driving rapid remediation.
- •Deploy MFA enterprise-wide and improve SonicWall and FortiGate configurations after incidents, tightening network and identity defenses.
- •Perform disk & memory forensics on compromised hosts, delivering evidence that guides remediation actions and future preventive strategy.

Cyber Forensics Analyst (Co-op)
MIT Lincoln Lab
Feb 2024 - Aug 2024
Lexington, MA
- •Conduct forensic imaging, remote data collection, and analysis on over 200+ lab devices to support investigations.
- •Insider Threat Program: Continuously monitor activities of employees and conduct detailed 90-day reviews via Splunk for departing employees, enhancing security and compliance.
- •Research and compile Cyber Threat Analysis reports for executive leadership, highlighting key vulnerabilities and risks specific to the industry.

Jr. System Administrator
Minnesota Computer System, Inc.
Apr 2022 – Jan 2024
St. Cloud, MN
- •Accomplished a 15% reduction in system downtime as measured by incident tracking, by diagnosing and resolving complex hardware and software issues.
- •Configured and managed Active Directory and Office 365, including provisioning 100+ user accounts and implementing role-based access controls.
- •Mitigated malware and other security threats by rapidly implementing containment & cleanup procedures.
Volunteer OSINT Analyst
Trace Labs
Mar 2020 – May 2020
Remote
- •Utilized advanced OSINT tools to gather critical intelligence on real‑world missing persons cases.
- •Demonstrated the ability to work independently with minimal oversight and direction.