Atlanta, GA
Technology Leader | AI Transformation | Cybersecurity Strategist
Turning Emerging Technology into Enterprise Outcomes
About Me
With over 15 years working in the financial services industry, I lead global IT teams spanning the US, Europe, and India. My work sits at the intersection of enterprise leadership and hands-on technical development — from architecting Zero Trust security transformations and cloud identity modernization to building AI agents and automation tools in Python.
I've led 20+ M&A integrations, managed IT budgets, and earned certifications including CISSP, CISM, and OSCP. In 2026 I completed a Post Graduate Program in AI & Machine Learning at UT Austin McCombs School of Business, where I built real tools using Python, LangChain, RAG pipelines, LLMs, and computer vision — because I believe the best IT leaders don't just oversee technology, they build it.
By the Numbers
Writing & Insights
Perspectives on leadership, technology, and the journey of building at the enterprise edge.
Reflecting on the IT internship that started it all — and the career that grew from it.
Read on LinkedInWhat I learned building real AI tools in Python, LangChain, and LLMs as a practicing IT executive.
Read on LinkedInBuilding with AI
Production AI systems built to eliminate manual work, accelerate resolutions, and put intelligence where it counts.
An autonomous Python agent that monitors the ServiceNow queue, analyzes ticket bodies with an on-prem LLM, and generates responses using skill files matched to each request type. Integrates a RAG knowledge base and executes tools for specific workflows — resolving tickets without human touch, or ensuring all required information is captured before engineer handoff.
An org-wide Microsoft Teams chatbot powered by the Microsoft Agent SDK, Azure AI Foundry, and Azure AI Search as a vector database. Uses hashtag-based routing to dynamically handle task categories — answering IT questions via RAG, querying ServiceNow for ticket status, and executing additional workflows — putting enterprise knowledge at every employee's fingertips.
Monitors the software request ticket queue, extracts the package name, and queries NIST NVD, CISA, and other vulnerability databases for recent CVEs. Findings are passed to an LLM with internal approval rules to generate an allow/deny recommendation. The full assessment report is written back to the ticket for human final review.
Credentials
Validated expertise across security, leadership, and applied machine learning.
Certified Information Systems Security Professional
Certified Information Security Manager
Offensive Security Certified Professional
Kennesaw State University · 2008
UT Austin McCombs School of Business · 2026
The Ken Blanchard Companies · 2026
Microsoft · View Credential ↗
Microsoft · View Credential ↗
Microsoft · View Credential ↗
Projects
A selection of tools I've engineered — from enterprise security GUIs to IoT infrastructure.
A PowerShell-based GUI for launching CyberArk applications, streamlining privileged access workflows for enterprise environments.
View on GitHubA C# implementation of the CyberArk Application Launcher GUI, built for performance and enterprise deployment.
View on GitHubIoT motion detection using Arduino MKR WiFi 1010 with a PIR sensor publishing events over MQTT — an early exploration of connected infrastructure.
View on GitHubGet in Touch
Whether you're exploring collaboration, looking for a strategic IT perspective, or just want to talk about AI and cybersecurity — I'd love to hear from you.