Hi, my name is

Charles.

I am a cybersecurity professional

With 7+ years of experience in defending critical infrastructure at the Florida Department of Financial Services and other organizations, I partner with industry-recognized security experts to build resilient, intelligence-driven defenses.

About Me

I am a cybersecurity professional working for the State of Florida, and a graduate student pursuing a MS in Computer Science at Pace University. Here are a few technologies I've been working with recently:
  • Microsoft Entra ID
  • Splunk Enterprise
  • Microsoft Defender for Endpoint
  • BIG-IP
  • Windows Active Directory
  • Powershell

Experience

Windows Systems Analyst - Florida Department of Financial Services
Apr 2022 - present
  • Administer EDR for over 3,900 endpoints; led migration from legacy AV to Microsoft Defender for Endpoint.
  • Subject-matter expert and service owner of Globalscape EFT (critical file ingress/egress); completed multi-phase remediation and hardening for EFT, IIS sites, and BIG-IP load-balanced services. Boosted agency’s BitSight score by over 100 points.
  • Global administrator for the agency’s Microsoft Entra ID tenant; on-call contact for Windows Server, Active Directory, and EFT.
  • Led infrastructure upgrades and migrations (load balancers, SIEM, server in-place upgrades, Windows Hello for Business) — document change management procedures.
  • Perform incident response and SOC reporting; create and maintain playbooks for BEC, PUPs, and other common security incidents; cross-train staff for 24/7 coverage.
Advanced Course in Engineering (ACE) Graduate Assistant - Griffiss Institute and Assured Information Security
June 2020 - Aug 2020 and Nov 2020 - Aug 2021
  • Mentored and supported future leaders of consequence through their progression in the ACE program.
  • Engaged in continuous leadership development through independent study and guided mentorship from government and military leaders.
  • Administrative leader of one of three teams in fictional cyber warfare exercise based on real global events.
  • Collected and analyzed intelligence and software in search of vulnerabilities as part of cyber and kinetic operations in simulated warfare.
  • Document deployment and exploitation of cloud-based virtual servers for purposes of red team exercises.
  • Engaged in intensive cybersecurity bootcamp through rigorous coursework, research, leadership development, and field operations.
  • Participated in team and technical leadership development under mentorship from distinguished leaders in government and military.
  • Solved graduate level challenge problems in malware analysis, code-level attacks, hardware security, etc. after theoretical and hands-on instruction from subject matter experts.
  • Developed a red team targeting and analysis tool utilizing a Python/Django/Postgres/Docker technology stack in accordance with unit testing and continuous integration practices.
  • Created Golang based tooling and executed cyber operational objectives in support of team in large scale, multidomain, and long term training exercise.
Graduate Research Assistant, Undergraduate Teaching Fellow - University of Maryland Baltimore County
Sep 2020 - Aug 2021
  • Researched malware analysis techniques as it pertains to the generalization of malware datasets to unforeseen malware specimens across multiple families.
  • Collaborated with a team of 10 to teach and prepare instruction material for an active cyber defense class.
  • Taught students how to secure common services on Linux machines.
  • Provided instruction on common web vulnerability exploitation techniques such as SQL injection and cross-site scripting.
Tutor - Wyzant
Nov 2020 - present
I provide tutoring services to students on Wyzant, mostly in topics related to Computer Science and Cybersecurity.
Research Assistant - Cyber Pack Ventures
Jan 2020 - May 2021
  • Conduct research on malware analysis in the large.
  • Adopt a data science-driven approach to discovering malicious code.
  • Worked with a team of 3 to write a Ghidra plugin that automates static analysis of raw binaries.
  • Trained a machine learning model to identify and distinguish malicious and benign functions within malware from extracted features.
Junior Security Engineer - Montgomery County Government
Jan 2018 - Dec 2019
  • Performed incident response and penetration testing on the county’s production network (supports a $5B annual budget); collaborated with industry-recognized security experts.
  • Translated penetration-test findings into risk and business-impact analyses and researched exploit paths to improve remediation.
  • Implemented IR procedures via the county SIEM, asset & vulnerability management, and help-desk systems; automated administrative IR tasks.
  • Built real-time SOC displays from IR and VM processes; administered MongoDB for production network traffic monitoring.
  • Conducted malware analysis using OSINT, Wireshark, and multiple sandbox environments; configured Ubuntu servers to collect internal asset data and monitor malicious hosts.
  • Updated and documented the IR plan aligned to NIST SP-800 guidance; wrote Python API scripts to streamline IR workflows.

Get in Touch

My inbox is always open. Whether you have a question or just want to say hi, I’ll try my best to get back to you!