Tech Portfolio

blue and white abstract art
blue and white abstract art
Cloud Architect & Cybersecurity Engineer

🔹 Professional Summary

Cloud-first strategist and results-driven Information Systems Engineer with a strong emphasis on cloud architecture and enterprise security. I bring proven expertise in designing and deploying secure, scalable cloud environments across Microsoft Azure, Microsoft 365, and Amazon Web Services. With a background in cybersecurity, systems engineering, and automation, I transform complex IT infrastructures into secure, efficient, and modernized ecosystems.

🔹 Core Competencies

  • Cloud Architecture & Engineering
    Architect and optimize cloud infrastructure using Azure and AWS—ensuring availability, scalability, and cost-efficiency. Specialized in hybrid environments and secure deployments across Azure IaaS/PaaS offerings and Microsoft 365 cloud suite.

  • Enterprise Security & Compliance
    Skilled in threat mitigation, penetration testing, identity protection, and compliance auditing. Deploy layered security solutions aligned with industry standards and frameworks. Hands-on with Metasploit, Nmap, Kali Linux, and Azure-native security tools.

  • Infrastructure & Networking
    Designed and managed enterprise-grade networks, virtualized environments (VMware, Hyper-V), and secure on-prem/cloud integrations. Managed firewalls (Cisco ASA), VLANs, VPNs, and implemented DNS-layer protection with Cisco Umbrella.

  • Automation & Scripting
    Expert in PowerShell and Python scripting to automate provisioning, configuration management, reporting, and compliance checks. Built custom tools to simplify IT operations, improve system visibility, and enhance audit readiness.

  • Modern Workplace Deployment
    Deep experience deploying and managing Microsoft 365 services—Exchange Online, SharePoint, OneDrive, Teams, Entra ID. Delivered secure, user-focused environments across distributed teams using Endpoint Manager and conditional access strategies.

  • Technical Documentation & System Design
    Adept at producing precise, actionable technical documentation, architectural diagrams, SOPs, and compliance workflows. Translate business needs into robust infrastructure blueprints and IT roadmaps.

🔹 Highlight Projects

  • Architected and deployed secure Azure environments for enterprise-grade applications, integrating Virtual Networks, VPN Gateways, and Role-Based Access Control (RBAC).

  • Automated user provisioning and audit reporting using custom PowerShell scripts.

  • Hardened hybrid infrastructure for clients by applying Zero Trust principles, implementing Multi-Factor Authentication, and auditing Entra ID conditional access policies.

  • Led the configuration of VMware ESXi clusters, provisioning virtual servers and optimizing storage and networking using vCenter and vSwitches.

  • Secured school district networks with Cisco ASA firewall rules, Umbrella DNS protection, and network segmentation using VLANs.

  • Managed Apple devices using JAMF, deployed policies via Group Policy Objects (GPOs), and handled Chromebook compliance through Google Admin Console.

🔹 Technical Toolbox

Platforms & Cloud: Microsoft Azure, AWS, Microsoft 365, VMware, JAMF, Google Workspace
Security & Tools: Cisco Umbrella, Entra ID (Azure AD), Metasploit, Nmap, Snort, Kali Linux, pfSense
Scripting: PowerShell, Python, Bash, Shell Scripts
Systems & Networking: Windows Server, Active Directory, Cisco ASA, VLANs, VPNs, Hyper-V, ESXi
Monitoring & Management: Intune, Microsoft Endpoint Manager, System Center, Azure Monitor

🔹 Certifications

  • Microsoft Certified: Azure Network Engineer | Azure Administrator | Designing Microsoft Azure Infrastructure Solutions | Azure Security Engineer Associate

  • Microsoft 365: Endpoint Administrator Associate

  • Amazon Certified: AWS Certified Cloud Practitioner

  • CompTIA Certified: Security+ | Network+ | A+ | Linux Essentials

  • Cisco Certified: CCNA

Cybersecurity Solutions

Offering expert services in cloud security, network design, and IT project management for diverse needs.

A white mask with distinct black features is placed on an open server tray in a data center or server room. The server is equipped with various LED indicators and network ports, suggesting an active setup.
A white mask with distinct black features is placed on an open server tray in a data center or server room. The server is equipped with various LED indicators and network ports, suggesting an active setup.
Three people are standing in front of a backdrop with Microsoft branding and the text 'Cloud stories from Norway.' Each person is positioned behind a tall round table. One table has a laptop covered in various tech-related stickers. The setting appears to be a professional or tech-related event with lights on either side.
Three people are standing in front of a backdrop with Microsoft branding and the text 'Cloud stories from Norway.' Each person is positioned behind a tall round table. One table has a laptop covered in various tech-related stickers. The setting appears to be a professional or tech-related event with lights on either side.
Cloud Security

Specializing in securing cloud environments, ensuring data protection and compliance for your business operations.

Network Design

Creating robust network architectures tailored to enhance performance, security, and scalability for your organization.

woman wearing yellow long-sleeved dress under white clouds and blue sky during daytime

Cyber Nexus Tech transformed our IT infrastructure with exceptional service and cutting-edge cybersecurity solutions. Highly recommended!

Samantha J.

A building with the word 'Cognizant' prominently displayed on it is framed by green tree leaves. The sky is a clear blue, creating a contrast against the foliage and the building.
A building with the word 'Cognizant' prominently displayed on it is framed by green tree leaves. The sky is a clear blue, creating a contrast against the foliage and the building.

The knowledge and expertise at Cyber Nexus Tech are unparalleled. Their support elevated our project to success.

Mark L.

A person wearing a white mask is interacting with a network server, handling blue cables. The setup is illuminated with blue lights, suggesting a technological environment.
A person wearing a white mask is interacting with a network server, handling blue cables. The setup is illuminated with blue lights, suggesting a technological environment.
★★★★★
★★★★★