Professional Experience

Cybersecurity Professional
Identity Access Management Specialist
Data Analyst

Welcome to my online portfolio.
Please feel free to explore to see my resume, learn about my specialties, and see examples of my work.

Areas of Expertise

Vulnerability Scans and Remediation

My role as a Security Engineer involved scanning a enterprise level healthcare network for vulnerabilities, researching the issue and potential solutions, and implementing solutions, escalating to cybersecurity leadership for approval when necessary.

Identity Access Management

I have managed healthcare environments of up to 50,000 team members. This involves creating, maintaining, auditing, and reporting on RBAC access. The has included manual and automated work using Active Directory, Exchange, Entra ID, SailPoint and Saviynt.

Data Analytics

For the purposes of improving security, safety, and efficiency I have completed audits and analysis of data of over 100,000 records at a time. Analysis has used Excel and SQL, and has then been presented to leadership using PowerBI and Visio.

Experience in Healthcare

My security and data roles in three separate healthcare organizations have given me a wide range of experiences and knowledge that can be applied anywhere.

Highlights of my healthcare industry experience include:

High Pressure and Critical Work Environments

With patient care and safety as the constant priority, cybersecurity and IAM in healthcare requires high speed, efficiency, and service at all times. Ensuring doctors, nurses, and other carers always have the access and security they need to treat patients is of critical importance.

Increasingly Targeted Cybersecurity Landscape

Over the last few years the healthcare industry has become targeted by threat actors more and more. As a result, my cybersecurity teams in healthcare have had to constantly assess and adapt to new challanges and risks

Sophisticated Identity and Workflow Needs

The complexities of healthcare require equally complex solutions. A provider wearing multiple hats means a single identity with multiple roles. A nurse that floats to other departments means concatenated access. A physician credentialed in one area but learning a new specialty means completely different access profiles depending on the department they log into. Unique situations require unique solutions and constant adaptation.

Working with Stakeholders at All Levels

Whether it's medical assistants at a patient's bedside, the CISO at the Security Operations Center, or physician directors in a hospital conference room, I have had to work will all levels of team members in the hospital. This includes being able to assist technical and non-technical staff and articulate security risks and requirements to medical leadership.

Strict Security Framework and Regulatory Requirements

Healthcare is a highly regulated industry, meaning that strict adherence to policy and framework is required at all times. My roles required HIPAA and compliance being prioritized with any security, IAM, or data analytics work being done, as well as strict change control and version control.

Complex and Vital Data Requirements

The constant need to audit for security risks and process inefficiencies in healthcare requires the ability to find, clean, and analyze the complex data of the organization. The ability to report and present this data to technical and non-technical leadership is the only way to effectively improve patient care and safety from an IS perspective.

If you would like to learn more about security and data in healthcare, I strongly recommend the CISA page on the topic.