When I was younger, I had one career goal: to become a Texas State Trooper and, one day, earn a place among the Texas Rangers. The mission was clear—protect citizens, investigate crime, uphold the law, and serve something bigger than myself.
Life took me down a different path—starting in helpdesk and desktop support, building infrastructure, owning an IT services firm for over a decade, and ultimately leading enterprise information security programs. Yet the original calling never left. Today, I investigate digital crimes rather than physical ones, reverse-engineer systems rather than evidence, and protect organizations and their people from threats that can destroy reputations, finances, and futures just as surely as any violent crime.
Professional Experience Highlights
Architected and engineered resilient, high-availability infrastructures for organizations of all sizes
Led threat intelligence, incident response, and cloud security
Designed and executed security programs that achieved HITRUST certification and multiple SOC 2 attestations
Conducted technical investigations and forensic analysis during active breaches
Translated complex cyber risk into financial and reputational impact for executives and boards
Owned full P&L responsibility as an IT business owner—ensuring every recommendation is pragmatic and business-justified
Education & Certifications
Master of Science in Management and Leadership – Western Governors University
Bachelor of Science in Cybersecurity and Information Assurance – Western Governors University
Certified Information Systems Security Professional (CISSP)
Certified Information Security Manager (CISM)
Advanced A.I. Security Manager (AAISM)
I approach cybersecurity the same way a Texas Ranger approaches an investigation: methodical, evidence-driven, no shortcuts, and always focused on protecting the innocent and holding the guilty accountable. The battlefield moved from Texas highways to global networks, but the mission remains unchanged—uphold the law (and policy) for the greater good.
Organizations facing regulatory scrutiny, mergers and acquisitions, or evolving threat landscapes need leadership that combines investigative rigor with board-level communication. If that aligns with your needs, I welcome the opportunity to serve.
To lead and innovate in information security by driving proactive threat mitigation, regulatory compliance, and business-aligned defense strategies. I leverage deep technical expertise, strategic leadership, and sharp business insight to elevate security standards, protect what matters, and build lasting trust. My mission is to enable organizations—from startups to global enterprises—to operate with confidence, agility, and resilience in an ever-evolving digital landscape.
To be a transformative force in Information Security—setting the benchmark for innovation, resilience, and ethical leadership. I envision a digital world where organizations of all sizes operate with confidence, shielded from evolving threats by forward-thinking strategies, cutting-edge technology, and a culture grounded in integrity. Through relentless improvement and a deep respect for personal freedom and global progress, my vision is to build a safer, smarter, and more secure future for all.
ISC2 Code of Ethics Canon's
Protect society, the common good, necessary public trust and confidence, and the infrastructure.
Act honorably, honestly, justly, responsibly, and legally.
Provide diligent and competent service to principals.
Advance and protect the profession.
Leadership – I lead with vision, strategy, and empathy—empowering teams and fostering a culture of collaboration and accountability.
Proactive Defense – I anticipate threats, not just react to them. Compliance, risk mitigation, and resilience start with foresight.
Integrity – I operate with honesty, transparency, and ethical rigor—always doing what’s right, even when it’s not easy.
Confidentiality – I safeguard sensitive information with unwavering discipline, knowing trust is the cornerstone of security.
Innovation – I embrace change, continuously pursuing advanced solutions to stay ahead of emerging threats and adversaries.
Excellence – I hold myself to elite standards, ensuring every action reflects precision, professionalism, and pride.
Communication – I prioritize clear, effective communication across all levels of business to drive alignment, action, and results.
Commitment – I am dedicated to lifelong learning and continuous improvement—refining both craft and character in the pursuit of cybersecurity excellence.
"Strong cybersecurity leadership builds trust through vigilance, empowers teams with clarity, and secures the future with unwavering commitment." - Erich Horst