“Putting things off is the biggest waste of life: it snatches away each day as it comes, and denies us the present by promising the future.”

As I embark on the PhD program at UDC, I am under the guidance of Dr. Antenah Girma and Dr. Nian Zhang, focusing my research and projects on cybersecurity and artificial intelligence (AI). With the combination of AI in cybersecurity, its application of AI technologies such as machine learning and data analytics to protect digital systems and networks from cyber threats; as a result, it provides significant advantages such as enhanced threat detection and response, which allows organizations to stay ahead of cyber threats, enabling proactive defenses and reducing response times. Conversely, integrating AI presents challenges and new vulnerabilities in cybersecurity, such as technical and operational challenges, security and privacy concerns, ethical and bias issues, and skills and knowledge gaps.

I am motivated to pursue a career as a subject matter expert (SME), sustainable development, and academic researcher of AI applications in cybersecurity. I am skilled in designing risk management policies, implementing risk assessments, and monitoring and evaluating ISs. My research interests include machine learning algorithms, data analytics, pattern recognition, complexity and interoperability, integration challenges, security of AI systems, regulatory and ethical issues, and false positives/negatives.

I am a dedicated IT professional with over 20 years in Information Technology and over 17 years in network and cybersecurity operations in the government and private industries. I am pursuing a Doctoral degree in Computer Science and Engineering at the University of the District of Columbia in Washington, District of Columbia. Concurrently, I am an Information System Security Officer and Enterprise Security Auditor. I protect critical data deployed on-premises and across the cloud environment using processes and security controls that assist in identifying, classifying, managing, retaining, and destroying them.

I prevent malicious actors from exploiting vulnerabilities in network services and access points and manage operating systems and applications deployed to prevent unauthorized software from being installed and operated. I am also responsible for maintaining the security posture of an information system (IS) within an organization, overseeing all IT risk management activities, and acting as the primary point of contact for security concerns related to that system, essentially ensuring the confidentiality, integrity, and availability of data within their designated system.

CORE PROFESSIONAL AREAS

  • Inventory and Control of Enterprise Assets

  • Access Control Management

  • Continuous Vulnerability Management

  • Secure Configuration of Enterprise Assets and Software

  • Network Monitoring and Defense

  • Web and Web Browser Protection

  • Security Awareness and Skills Training

  • Service Provider Management

  • Incident Response Management

  • Application Software Security

  • Network Infrastructure Manaegement

  • Malware Defenses

  • Audit Log Management

  • Problem-Solving

  • Communication

  • NIST Risk Management Framework (RMF)

  • Attention to Detail

  • Critical Thinking

  • Network Troubleshooting

  • TCP/IP Model

  • Network and System Security

  • FISMA

EDUCATION

SKILLS

    • Cisco iOS

    • Windows 10

    • Windows 11

    • Windows Server 2016

    • LAN/WAN

    • DNS

    • SSH

    • POP3

    • SMTP

    • TELNET

    • VPN

    • ICMP

    • OSPF

    • EGRP

    • SNMP

    • RADIUS

    • WPA2

    • Ethernet

    • OSI Model

    • 802.11x

    • 802.15

    • Nessus

    • Trellix

    • Proofpoint

    • XACTA 360

    • eMASS

    • Splunk

    • STIGs

    • STIGviewer

    • Office 365

    • BMC Remedy ITSM 5.0

    • Adobe Acrobat

    • Microsoft Visio

    • CompTIA A+

    • CompTIA Network+

    • CompTIA Security+

    • CASP

    • ITILv3 Foundation

    • ITILv4

    • CYSA+

My technical skills encompass a wide range of specialized knowledge and abilities crucial for effectively performing specific industry tasks and roles in network operations and cybersecurity. These attributes involve applying tools, techniques, and technologies, encompassing programming, data analysis, software proficiency, and technical writing. They are essential for driving innovation, problem-solving, and efficiency in diverse professional settings, from software development and engineering to healthcare and project management. 

ORGANIZATIONS