When I was younger, I had one career goal: to become a Texas State Trooper and, one day, earn a place among the Texas Rangers. The mission was clear—protect citizens, investigate crime, uphold the law, and serve something bigger than myself.
Life took me down a different path—starting in helpdesk and desktop support, building infrastructure, owning an IT services firm for over a decade, and ultimately leading enterprise information security programs. Yet the original calling never left. Today, I investigate digital crimes instead of physical ones, reverse-engineer systems instead of evidence, and protect organizations and their people from threats that can destroy reputations, finances, and futures just as surely as any violent crime.
Professional Experience Highlights
Architected and engineered resilient, high-availability infrastructures for organizations of all sizes
Led threat intelligence, incident response, and cloud security
Designed and executed security programs that achieved HITRUST certification and multiple SOC 2 attestations
Conducted technical investigations and forensic analysis during active breaches
Translated complex cyber risk into financial and reputational impact for executives and boards
Owned full P&L responsibility as an IT business owner—ensuring every recommendation is pragmatic and business-justified
Education & Certifications
Master of Science in Management and Leadership – Western Governors University
Bachelor of Science in Cybersecurity and Information Assurance – Western Governors University
Certified Information Systems Security Professional (CISSP)
Certified Information Security Manager (CISM)
Advanced A.I. Security Manager (AAISM)
I approach cybersecurity the same way a Texas Ranger approaches an investigation: methodical, evidence-driven, no shortcuts, and always focused on protecting the innocent and holding the guilty accountable. The battlefield moved from Texas highways to global networks, but the mission remains unchanged—uphold the law (and policy) for the greater good.
Organizations facing regulatory scrutiny, mergers and acquisitions, or evolving threat landscapes need leadership that combines investigative rigor with board-level communication. If that aligns with your needs, I welcome the opportunity to serve.
"Cybersecurity is the technical, Information security is the glue of people, processes and technology to protect the organization. Without cohesive relationships with other business segments, one can not improve maturity." - Erich Horst