About & Experience

The operator behind Biohazard Industries

Download Resume

Cybersecurity professional operating at the intersection of offensive security and operational project leadership.

Background spans penetration testing, security-aligned program management, and hands-on infrastructure engineering. Security work is approached with defined scope, deliberate execution, and findings that translate into action rather than noise.

The differentiator is the integration of adversarial thinking with structured delivery. Offensive security doesn't exist in isolation. It intersects with engineering timelines, stakeholder priorities, and organizational risk. That intersection is managed: clear objectives established, risk tracked through remediation, accountability maintained from kickoff through verified resolution.

Biohazard Industries is the operating entity behind this work, built to deliver focused security capability with the discipline and communication that technical and non-technical stakeholders both require.


Core Competencies

Offensive Security

Adversarial testing, vulnerability discovery, exploit validation, and actionable remediation guidance across web applications, APIs, and network infrastructure.

Project Leadership

Security-aligned planning, Agile/Kanban execution, milestone governance, stakeholder communication, and disciplined delivery oversight.

Infrastructure Engineering

Purpose-built lab environments, secure system configuration, remote assessment infrastructure, and operational tooling.

Operational Systems & Tooling

CRM configuration and deployment, workflow automation, engagement tracking systems, and operational infrastructure built for repeatable, scalable security delivery.

Technical Documentation

Structured reporting for offensive security engagements, process standardization, playbook development, and findings documentation with executive and technical clarity.

Stakeholder Communication & Management

Cross-functional coordination across technical and non-technical stakeholders, client relationship management, expectation setting, and clear communication throughout engagement lifecycles.


Selected Projects

CRM Configuration and Implementation

Enterprise CRM deployment and operational integration

Configured and deployed Zoho CRM for company-wide use, including user roles, pipelines, workflow automation, and standardized reporting dashboards. Integrated CRM with existing operational processes to centralize client relationships, engagement tracking, and project data.

Impact: Enabled scalable client relationship management, improved data visibility, and supported operational efficiency across teams.

Secure Remote Assessment Infrastructure

Secure dropbox design, deployment, and lifecycle management

Configured and managed Raspberry Pi 5 devices as hardened assessment dropboxes for deployment into client environments. Deployed Tailscale for encrypted remote access and Tailnet administration. Standardized the full device lifecycle: build, secure transport, client deployment, and retrieval. Documented repeatable processes for consistency across engagements.

Impact: Delivered a scalable, operationally sound solution that streamlined internal penetration testing operations and reduced deployment friction.

Engagement Tracking System

Offensive security project management infrastructure

Designed and maintained Microsoft Planner boards to manage offensive security engagements end-to-end, from planning through reporting. Standardized workflows and task structures for technical testers and management, enabling Agile/Kanban execution with clear progress tracking. Built reporting dashboards for leadership visibility into engagement status, dependencies, and resource allocation.

Impact: Streamlined engagement tracking, improved team coordination, and delivered consistent transparency for clients and leadership throughout active engagements.

Active Directory Homelab

Controlled enterprise environment simulation for adversarial research

Engineered a Windows Server 2019 homelab using VMware virtualization, simulating a full enterprise AD environment. Configured domain structure, Organizational Units, Group Policy Objects, user and group hierarchies, and permission tiers. Used as a controlled target environment for practicing privilege escalation, lateral movement, and domain compromise techniques.

Impact: Deepened Active Directory exploitation knowledge and established a repeatable internal research environment for offensive security skill development.


Operating Philosophy

The name Biohazard Industries reflects the nature of cybersecurity work: potentially dangerous threats handled with structured precision.

Security work requires calm execution under pressure. It requires technical depth paired with operational discipline. It requires treating risk seriously without creating noise.

The objective is not visibility.
The objective is control.