Security Portfolio

CompTIA Security+ certified cybersecurity analyst with hands-on bootcamp training in incident response, digital forensics, and vulnerability management, plus practical IT and security experience from a small business role.

Professional Experience

Practical security and IT experience combined with intensive bootcamp training

Web Developer & IT Support

Accessible Places
Sept 2022 – Jan 2024

Sole technical resource for a small assistive-device ecommerce business (~5 people), handling web development, IT support, security hardening, social media management, and accessibility advocacy. Security work was self-directed using LLM-guided research prior to formal Lighthouse Labs training.

🌟 Accessibility-Integrated Security

  • Created security documentation and training materials with accessibility in mind for a team serving people with disabilities
  • Structured documentation with heading hierarchy for screen reader navigation, keyboard-accessible checklists, and clear language
  • Ensured security controls (MFA, Malwarebytes, firewall rules) were usable alongside assistive technologies used by team members
  • Built awareness that security and accessibility reinforce each other — security controls must work for all users
What I Did:
  • Password & Account Security: Migrated owner from plaintext Word document of passwords to Bitwarden password manager. Set up multi-factor authentication on business accounts.
  • Endpoint Protection: Deployed Malwarebytes anti-malware across business devices. Prior to deployment, the business had experienced malware and security issues.
  • Firewall Configuration: Configured Windows Firewall rules on business endpoints to harden against unauthorized access.
  • Security Reviews: Conducted 3 security reviews (website, business operations, social media) using LLM-guided checklists.
  • Compliance Awareness: Reviewed PIPEDA and GDPR requirements relevant to the ecommerce business and created privacy and cookie policies.
Additional Responsibilities:
  • Managed WooCommerce e-commerce storefront, product listings, and WordPress site maintenance
  • Managed social media presence across 9+ platforms (LinkedIn, Instagram, Facebook, Twitter, Pinterest, and more)
  • Led open-source migration: replaced Chrome with Waterfox/Brave, MS Office with LibreOffice, Evernote with Obsidian
  • Set up remote access (RustDesk, RealVNC) for technical support; performed hardware upgrades including RAM and Linux installations
  • Coordinated EVAC+ chair accessibility advocacy, including building audits and promotional outreach

Freelance IT Support Technician

Self-Employed
2012 – Present

Providing on-site and remote technical support to seniors, families, and community members for Windows/macOS systems, home networking, and mobile device troubleshooting. Delivering clear technical explanations using non-technical language with a focus on patient, accessible communication.

Board Member & Volunteer

VanLUG (Vancouver Linux Users Group)
Nov 2025 – Present

Board member (elected Dec 2025) of one of Canada's largest Linux user groups (2,200+ members). Supporting open-source education, right-to-repair advocacy, and sustainable technology practices. Organizing community meetups on Linux, privacy, and secure operating practices.

Featured Cybersecurity Projects

Incident response, digital forensics, threat analysis, and accessibility-integrated security

🚨
Incident Response & DFIR

Premium House Lights: The Heist

Full-scope incident response and digital forensics investigation

Led end-to-end DFIR investigation of a simulated ransomware/extortion attack as Lighthouse Labs capstone project. Analyzed system logs, memory dumps, and network traffic to reconstruct complete attack timeline. Identified root causes (unrestricted file upload, flat network architecture, excessive privileges). Delivered report with actionable security recommendations.
Tools & Methodologies
Volatility Autopsy Wireshark Splunk MITRE ATT&CK NIST Framework
Accessibility & Security

Accessible Incident Response Procedures

Accessibility-integrated IR documentation and procedures

Created incident response procedures with accessibility built in, informed by experience at Accessible Places (an assistive-device business). Documentation structured with proper heading hierarchy for screen reader navigation. Security diagrams include descriptive alt text. Interactive elements designed for keyboard accessibility. Demonstrates that security and accessibility reinforce each other.
Standards & Implementation
WCAG 2.1 AA Screen Reader Testing Keyboard Navigation NIST 800-61 Inclusive Design
🔍
Digital Forensics

Intellectual Property Theft Investigation

Complete forensic investigation of data exfiltration

Conducted comprehensive digital forensics investigation of simulated IP theft as a Lighthouse Labs bootcamp assignment. Used memory analysis to identify running malware, brute-force attacks, and malware deployment. Examined file system artifacts and event logs to establish timeline. Analyzed network traffic to track data exfiltration paths. Delivered forensic report with step-by-step methodology and remediation plan.
Tools & Methodologies
Memory Forensics Disk Forensics Network Analysis Timeline Analysis
🔐
Security Automation

LogHawk – Security Log Monitoring Tool

Custom Python/Bash automation for log analysis

Developed custom log monitoring tool for automated anomaly detection in log files. Built log parsing engine with regex pattern matching for threat identification. Implemented alert generation and report formatting. Published as open-source tool demonstrating secure coding practices. Coursework project from Lighthouse Labs bootcamp.
Tools & Methodologies
Python Bash Log Parsing Regex Open Source
📋
Security Framework

Incident Response Plan, Playbooks & Policy

Complete incident response framework

Developed comprehensive incident response framework following NIST 800-61 guidelines as a bootcamp coursework project. Created complete IR plan with roles, responsibilities, and escalation paths. Built detailed playbooks for phishing and ransomware incidents. Documented TLP classification and external reporting procedures.
Frameworks & Standards
NIST 800-61 CISA Guidelines TLP Playbook Design
🌐
Network Administration

P1: Network Security Baseline

Network analysis, topology documentation, security configuration

Analyzed network traffic and infrastructure to establish security baseline. Used Nmap for network reconnaissance and asset discovery. Conducted traffic analysis with Wireshark to identify protocols and potential vulnerabilities. Documented network topology and security controls for audit compliance.
Tools
Nmap Wireshark Network Analysis Documentation
🛡️
Architecture & Design

P11: Secure Architecture Report

Defense-in-depth network architecture design

Designed network architecture aligned with NIST 800-53 and defense-in-depth principles as a Lighthouse Labs coursework assignment. Documented security controls, network segmentation strategy, and attack surface mitigation. Provided recommendations for access controls, monitoring, and incident response capabilities.
Frameworks
NIST 800-53 CIS Controls Defense-in-Depth
📊
Vulnerability Assessment

P6: Vulnerability Assessment & Prioritization

CVE identification, CVSS scoring, remediation roadmap

Conducted vulnerability assessment across infrastructure. Identified CVEs and assigned CVSS scores based on business impact. Created prioritized remediation roadmap considering risk, exploitability, and implementation complexity. Recommended specific controls and configurations to directly reduce exposure to known exploits.
Tools & Methodologies
OpenVAS CVSS Scoring CVE Research Risk Prioritization
🔑
Application Security

TinyApp – Secure URL Shortener

OWASP A07: Authentication & Authorization

Built full-stack URL shortener with robust authentication and authorization controls. Implemented bcrypt password hashing and secure session management. Enforced principle of least privilege for resource access. Demonstrates secure user management and data protection compliant with OWASP standards.
Technologies
Node.js bcrypt Session Management OWASP A07

Technical Capabilities Demonstrated

Skills developed through bootcamp labs, coursework projects, and professional IT experience

Incident Response & Forensics

Complete DFIR lifecycle execution: preparation, detection, analysis, containment, eradication, recovery. Memory analysis (Volatility), disk forensics (Autopsy), network analysis (Wireshark). Chain-of-custody procedures. NIST 800-61 framework implementation.

SIEM & Log Analysis

Splunk and QRadar experience from Lighthouse Labs bootcamp labs. Alert triage, detection rule development, log correlation, and dashboard creation in lab environments. Seeking to build production SIEM experience.

Vulnerability Management

OpenVAS vulnerability scanning in lab environments. CVE identification and CVSS scoring. Remediation planning and prioritization. Risk assessment methodology from bootcamp coursework. Conducted informal security reviews at Accessible Places using LLM-guided checklists.

Network Security

Windows Firewall rule configuration on business endpoints. Nmap for network reconnaissance (lab). Wireshark for traffic analysis (lab). TCP/IP fundamentals, VPN, routing & switching, Wi-Fi security. LAN administration experience from small business and freelance IT.

Application Security

OWASP Top 10 vulnerability identification and mitigation through bootcamp projects. Secure code review practices. Authentication and authorization implementation. Input validation and output encoding. SQL injection prevention (parameterized queries). XSS attack mitigation. BurpSuite and OWASP ZAP experience from lab exercises.

Security Frameworks & Compliance

NIST 800-53 control mapping (coursework). ISO 27001 risk management (coursework). Created PIPEDA-aligned privacy policies for small business. GDPR awareness for ecommerce. Security policy development. MITRE ATT&CK threat mapping.

Programming & Automation

Python and Bash scripting for security automation. Node.js and Express backend development. React frontend security. PostgreSQL database security and query design. Git version control. Docker containerization. APIs (REST/JSON). CI/CD integration with automated testing.

Systems & Infrastructure

Linux (Debian/Kali) system administration. Windows and macOS management. Malwarebytes endpoint protection deployment. Docker containerization. Multi-platform support experience. Microsoft 365 and remote support tools (RustDesk, RealVNC).

♿ Accessibility & Inclusive Security

Accessibility-integrated security approach: WCAG 2.1 AA compliant security documentation and training materials. Awareness of screen reader compatibility needs (JAWS, NVDA). Keyboard-accessible security controls. Experience ensuring security tools (MFA, Malwarebytes, firewall) work alongside assistive technologies. Proper heading hierarchy, alt text for diagrams, 4.5:1+ contrast ratios. Informed by experience at Accessible Places, an assistive-device business serving people with disabilities.

Let's Connect

Interested in discussing cybersecurity, incident response, or accessibility-integrated security?