CASE STUDIES

Real Stories, Real Solutions

These case studies showcase how I tackled cybersecurity threats, IT issues, and infrastructure challenges with clear, practical solutions throughout my career

A clean, minimalistic workspace with a laptop displaying code and network diagrams, softly lit to emphasize focus.
A clean, minimalistic workspace with a laptop displaying code and network diagrams, softly lit to emphasize focus.
  • +8 years

IT Skillset

Experience

  • Unique

A close-up of a high-resolution screen displaying PowerShell code with cyan syntax highlighting, reflecting a modern and technical workspace.
A close-up of a high-resolution screen displaying PowerShell code with cyan syntax highlighting, reflecting a modern and technical workspace.
Infrastructure - Platform & Compute
  • PowerShell Automation

  • VMware, Hyper-V, Nutanix

  • Sophos & Fortinet Firewalls

  • Linux LMS Hosting

Leveraging PowerShell automation and virtualization technologies like VMware and Nutanix to optimize infrastructure.

A sleek, professional representation of cloud infrastructure and network nodes using #00BCD4 and #1F314C. Modern, minimalist technical design conveying reliability.
A sleek, professional representation of cloud infrastructure and network nodes using #00BCD4 and #1F314C. Modern, minimalist technical design conveying reliability.
IT Support
  • Microsoft 365 & Azure Admin
  • Active Directory
  • Endpoint Support
  • Patch Management

Enterprise IT support, cloud migrations, and infrastructure management with over 8 years of professional experience.

A high-tech, minimalist digital security interface showing data streams and a shield icon glowing in #00BCD4 cyan against a deep #0F1C2E background. Professional, secure, and technical atmosphere.
A high-tech, minimalist digital security interface showing data streams and a shield icon glowing in #00BCD4 cyan against a deep #0F1C2E background. Professional, secure, and technical atmosphere.
Cybersecurity
  • Incident Response & Threat Analysis

  • Microsoft Defender & Threat Hunting

  • SOC Operations

Hands-on incident response and threat hunting to secure enterprise environments and improve security posture.

Open for Work

Open to Cybersecurity, SOC, and IT Infrastructure roles.