Professional audio engineer turned IT professional, leveraging the keen attention to detail, swift adaptability, collaborative spirit, and client orientation necessary to flourish in the audio industry. Holding Microsoft Azure Administration and CompTIA Security+ certifications, I've expanded my expertise through various personal projects and Azure Cloud implementations, all documented on my Github.
March 2024
- Identity Management and Governance: Manage Azure Identities and governance, including managing access and privileges for users and groups, as well as integration with external directories
- Implement and Manage Storage: Implement storage solutions such as blob storage, file storage, and configuring access policies for cloud, and hybrid scenarios
- Deploy and Manage Compute Resources: Deploy, configure, and manage virtual machines to meet the needs of various applications, workloads, and budgets
- Implement and Manage Virtual Networking: Implement and manage virtual networking including virtual networks, subnets, and network security groups to ensure secure and efficient network infrastructure
- Monitor and Maintain Azure Resources: Use various Azure tools to monitor and maintain Azure resources to track and maintain performance, monitor resources, and troubleshoot issues
July 2023
- Cloud Concepts: Describe cloud computing including its benefits, limitations, types, and cloud service models.
- Core Azure Services: Gain knowledge of Azure architectural components and Azure services like compute, networking, storage, and database services.
- Privacy, Security, and Compliance: Learn about Azure's identity services, security tools and compliance policies to protect data and manage resources securely.
- Pricing, Support, and Service Level Agreements (SLAs): Understanding of Azure's pricing structure, cost management techniques, and available support options to optimize and manage cloud expenditures effectively.
May 2023
Verify with code RZZK3GHSHJB41YGR
- Identify Security Threats and Vulnerabilities: Understand and identify various types of attacks, threats, and vulnerabilities, as well as the steps necessary to mitigate them
- Implement Network Security: Configuring and managing network infrastructure using technology and devices such as firewalls, VPNs, virtual networks, load balancers, and wireless security protocols, etc.
- Cryptography: Knowledge of cryptographic standards, practices, and use cases for securing and authenticating communication and data
- Identity and Access Management: Ability to implement access control policies and identity
Los Angeles Recording Connection
December 2019
A collection of projects I've undertaken in my free time
The writeup can be found on my Github.
The writeup can be found on my Github.
The writeup of this project can be found on my Github.
The writeup can be found on my Github.
An offensive security playground
Sales Associate • January 2022 - January 2024
Audio Engineer/ Video Editor • September 2020 - January 2022
Audio Engineer/ Stagehand • September 2019 - March 2020
June 2017 - Present
Extensive experience providing one-on-one guidance and support within the framework of confidential recovery programs, offering personalized assistance to individuals navigating the path of recovery and fostering a supportive and non-judgmental environment to promote personal growth and adherence to the principles of anonymity.