This is my most recent certification and one of the most important in demonstrating my committment to practicing and always considering risk in the work I do and in my consultation discussions with clients.
The vendor-neutral CGRC credential certifies advanced skills in GRC and RMF processes including Information System (IS) categorization, authorization and maintenance & Security Control selection, implementation, and assessment. Issued by ISC2, this certification validates that professionals can ensure system security is aligned with an organization's potential risk and asset exposure.
I’ve contributed my knowledge, empathy, new ideas and expertise to help shape the future of cybersecurity certification exams, ensuring that they accurately reflect industry needs and standards. This role has allowed me to stay at the forefront of emerging trends and best practices in the field providing on-the-job insights that improve the relevance and rigor of CompTIA certification content.
Through my nonprofit work, I’ve created curricula in machine learning and educated others on leveraging AWS cloud technologies to build secure, scalable, and resilient IT infrastructures. My experience also includes developing an AI curriculum accessible to high school students interested in data science and AI by utilizing the AWS Cloud Academy platform, mentors from Deloitte, an AI sandbox through AWS, and a data visualization platform through Qlik to provide hands-on application opportunities for learners.
As a badge holder for this certificate, I gained hands-on experience with AWS services like Amazon SageMaker, which enabled me to build, train, and deploy scalable machine learning models in the cloud.
I'm remain fascinated by Jupyter Notebooks for data analysis, and I'm determined to learn more about using it to apply various algorithms to real-world datasets. This credential helped me develop a solid understanding of machine learning workflows, from data preparation to model optimization and deployment, equipping me with the skills needed to tackle complex data challenges and contribute to AI-driven projects in diverse industries.
I’ve been able to bring structure and clarity to complex projects using PRINCE2 methods. From planning and risk management to keeping everyone on the same page, I enjoy making sure projects run smoothly and goals are met. I’ve used tools like Microsoft Project and Trello to track progress, manage timelines, and collaborate with teams effectively.
I’ve helped teams and organizations get the most out of their resources by focusing on what truly matters. Whether it’s making tough decisions or prioritizing tasks, I’ve been able to ensure that projects deliver real value. I’ve utilized the FAST (Function Analysis System Technique) diagram to break down and analyze project functions, ensuring optimal resource allocation and value delivery.
I’ve got a solid grasp of the basics when it comes to cybersecurity, like keeping networks and systems secure. I’ve used these skills to support and protect IT environments effectively, making sure everything stays safe and sound. I’ve worked with tools like Windows Defender, basic PowerShell scripts, and network monitoring software to ensure secure and smooth operations.
This was my very FIRST and FAVORITE certification. Since obtaining it, I’ve dug deep into network behavior to spot and respond to security threats. It’s been exciting to use advanced techniques to safeguard systems and keep potential risks at bay. I’ve leveraged tools like Wireshark for network analysis, Nessus for vulnerability scanning, and dabbled a bit in Splunk for security information and event management (SIEM).
I’m well-versed in the essentials of cybersecurity, from managing risks to protecting networks. I’ve used these skills to identify and tackle security issues, helping organizations stay secure and resilient. I’ve worked with tools like Kali Linux to assess, test, and manage vulnerabilities.
I’ve enjoyed diving into data to uncover insights that guide smart marketing decisions. Designing surveys, conducting focus groups, and analyzing trends have been key parts of my work to better understand what customers really want. I’ve used tools like SurveyMonkey for survey creation, SPSS for data analysis, and Google Analytics to track and interpret online behavior.
Used in conjunction with my PRINCE2 knowledge and skills, I’ve taken charge of defining project goals and managing the product backlog. It’s been rewarding to align the team’s efforts with business needs and make sure we’re always working on what’s most valuable. I’ve relied on tools like Jira for backlog prioritization, Mural for roadmap planning, and Trello for collaborative user story mapping.
I’ve enjoyed supporting teams by guiding them through Scrum practices and removing roadblocks. It’s fulfilling to see how Agile principles can boost productivity and create a positive working environment. I’ve used tools like Trello for visualizing workflows, Zoom and Slack for remote team communication, and Mural for interactive retrospective sessions.
While pursuing my Master’s of Science in Quality Systems Management, I earned my Six Sigma Yellow Belt certification during my tenure at the White House Communications Agency.
This experience blended rigorous academic training with the real work application of process improvement principles in a high-stakes environment.
The certification underscored my ability to analyze workflows, identify inefficiencies, and support initiatives that enhanced operational quality and performance within one of the most demanding organizations in the world.
With my background in Quality Systems Management, I bring a structured approach to cybersecurity, focusing on continuous improvement and risk management. I’ve applied this knowledge to design and implement robust security processes that reduce vulnerabilities and enhance system reliability. Tools like Six Sigma methodologies and root cause analysis have enabled me to systematically address security issues, ensuring high-quality outcomes for cybersecurity initiatives.
My Master of Social Work has equipped me with the skills to understand and address human behavior, which is crucial when navigating cybersecurity challenges related to phishing and social engineering. I use this background to develop training programs, inform conversations, & suggest solutions that raise awareness and change behaviors, helping individuals recognize, resist and become resilient against cybersecurity attacks. Techniques from social work, such as empathy, communication, and conflict resolution, have been invaluable in working with diverse teams and educating users about the human and psychological aspects of cybersecurity.