Candidate Name
I break systems before the bad guys do.
From the start, I’ve been obsessed with how things work and how they fail. What began as a kid staying up too late fixing crashed computers turned into a career focused on outsmarting attackers and protecting what matters most in a digital-first world.
At BYU-Idaho, I immersed myself in how hackers think and how to stay ten steps ahead. But I didn’t stop at theory. I went hunting. In the field, I learned what no classroom can teach—how to find threats before they strike.
At iZOOlogic, I became a full-time threat hunter—tracking over 50 live incidents monthly, from phishing and malware to brand abuse and dark web activity. I coordinated takedowns, exposed threat actors, and cut client exposure by 75%. It wasn’t just research—it was war games in real time.
Now, at NCC Group, I dig even deeper. I don’t just run tools and report scan results—I think like an attacker. I find the cracks others miss, translating complex risks into clear business impact. I’ve led 20+ assessments annually, each one a custom blueprint to prevent real-world loss in money, reputation, and trust.
Penetration testing isn’t about breaking things. It’s about being the controlled explosion that prevents catastrophe. Every exploit I uncover is a disaster avoided. Every report I write is a strategy for resilience.
My credentials—BSCP, CAPenX, PMPA—are earned from pushing myself to stay ahead in a field that evolves daily. But my edge goes beyond the technical. Two years of mission service taught me how to make the complex simple. I speak human, not just hacker—whether I’m talking to developers or stakeholders.
If you want to stop worrying about what might be lurking in your network and start turning your security into a strategic asset—let’s talk.
Because attackers don’t rest. Neither do I.
26/08/2027
20/04/2025
05/01/2024
15/12/2025