Work Experience

Cybersecurity Engineer (DFIR)

Dataprise

Jan 2025 - Present
Remote
  • Contribute to ransomware incidents by spinning up secure jump boxes, isolating systems, performing forensics, rebuilding and decrypting servers, and applying hardening controls.
  • Monitor thousands of endpoints with CrowdStrike Falcon & SentinelOne, triaging anomalies in real time and driving rapid remediation.
  • Deploy MFA enterprise-wide and improve SonicWall and FortiGate configurations after incidents, tightening network and identity defenses.
  • Perform disk & memory forensics on compromised hosts, delivering evidence that guides remediation actions and future preventive strategy.

Cyber Forensics Analyst (Co-op)

MIT Lincoln Lab

Feb 2024 - Aug 2024
Lexington, MA
  • Conduct forensic imaging, remote data collection, and analysis on over 200+ lab devices to support investigations.
  • Insider Threat Program: Continuously monitor activities of employees and conduct detailed 90-day reviews via Splunk for departing employees, enhancing security and compliance.
  • Research and compile Cyber Threat Analysis reports for executive leadership, highlighting key vulnerabilities and risks specific to the industry.

Jr. System Administrator

Minnesota Computer System, Inc.

Apr 2022 – Jan 2024
St. Cloud, MN
  • Accomplished a 15% reduction in system downtime as measured by incident tracking, by diagnosing and resolving complex hardware and software issues.
  • Configured and managed Active Directory and Office 365, including provisioning 100+ user accounts and implementing role-based access controls.
  • Mitigated malware and other security threats by rapidly implementing containment & cleanup procedures.

Volunteer OSINT Analyst

Trace Labs

Mar 2020 – May 2020
Remote
  • Utilized advanced OSINT tools to gather critical intelligence on real‑world missing persons cases.
  • Demonstrated the ability to work independently with minimal oversight and direction.