Skills
Skill 1: Endpoint & System Management
Description
This skill reflects my ability to manage and maintain enterprise endpoint environments using Microsoft technologies such as Azure, Active Directory, and Microsoft Intune. Through hands-on experience in a government contracting environment, I have developed the ability to troubleshoot device enrollment issues, enforce configurations, and ensure systems remain compliant and operational.
Artifact 1: Hybrid Azure AD Join Troubleshooting
This artifact demonstrates my ability to troubleshoot and resolve device enrollment issues in a hybrid Azure Active Directory environment. Several domain-joined machines were failing to properly register and enroll into Microsoft Intune, preventing them from receiving required policies and configurations.
To resolve this issue, I used command-line tools such as dsregcmd /leave followed by dsregcmd /join to force the device to re-register with Azure AD. This restored proper device registration and triggered successful enrollment into Intune.
Through this process, I developed a deeper understanding of identity management, device registration, and how hybrid environments interact with cloud-based management systems.
Artifact 2: Microsoft Intune Device Management and Policy Enforcement
This artifact highlights my experience managing devices within Microsoft Intune. I have worked with device enrollment, compliance policies, and configuration profiles to ensure endpoints meet organizational security requirements.
My responsibilities included reviewing device status, monitoring enrollment success, and ensuring that systems received appropriate policies for updates, security baselines, and access control. This work was performed within a GCC High environment, which requires additional awareness of platform limitations and compliance standards.
This experience strengthened my ability to manage enterprise devices at scale while maintaining alignment with security requirements.
Artifact 3: Cisco VPN Profile Remediation Automation
This artifact demonstrates my ability to automate endpoint configuration using scripting in an enterprise environment. I developed a remediation process to standardize Cisco Secure Client VPN profiles across multiple systems, ensuring that all devices used a single approved configuration file.
The solution involved identifying and removing any unauthorized or outdated XML configuration files located in the VPN profile directory, then replacing them with a single approved profile to enforce consistency across all endpoints.
To ensure reliable deployment, I embedded the approved VPN profile directly into the remediation script using Base64 encoding. This approach eliminated the need for external file transfers and allowed the configuration to be recreated locally on each device.
The process involved converting the original XML configuration file into a Base64 string, storing it within the script, and then decoding it during execution to regenerate the file in the correct directory. For example:
$base64 = "PHhtbD4uLi48L3htbD4="
$xml = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($base64))
$xml | Out-File "C:\ProgramData\Cisco\Cisco Secure Client\VPN\Profile\DelphinusVPN.xml"
This method ensured that every device received the exact same approved configuration while preventing unauthorized profiles from persisting on the system.
Through this project, I strengthened my understanding of scripting, automation, and secure configuration management, while improving consistency and control across enterprise endpoints.
Skill 1: Endpoint & System Management
Description
This skill reflects my ability to manage and maintain enterprise endpoint environments using Microsoft technologies such as Azure, Active Directory, and Microsoft Intune. Through hands-on experience in a government contracting environment, I have developed the ability to troubleshoot device enrollment issues, enforce configurations, and ensure systems remain compliant and operational.
Artifact 1: Hybrid Azure AD Join Troubleshooting
This artifact demonstrates my ability to troubleshoot and resolve device enrollment issues in a hybrid Azure Active Directory environment. Several domain-joined machines were failing to properly register and enroll into Microsoft Intune, preventing them from receiving required policies and configurations.
To resolve this issue, I used command-line tools such as dsregcmd /leave followed by dsregcmd /join to force the device to re-register with Azure AD. This restored proper device registration and triggered successful enrollment into Intune.
Through this process, I developed a deeper understanding of identity management, device registration, and how hybrid environments interact with cloud-based management systems.
Artifact 2: Microsoft Intune Device Management and Policy Enforcement
This artifact highlights my experience managing devices within Microsoft Intune. I have worked with device enrollment, compliance policies, and configuration profiles to ensure endpoints meet organizational security requirements.
My responsibilities included reviewing device status, monitoring enrollment success, and ensuring that systems received appropriate policies for updates, security baselines, and access control. This work was performed within a GCC High environment, which requires additional awareness of platform limitations and compliance standards.
This experience strengthened my ability to manage enterprise devices at scale while maintaining alignment with security requirements.
Artifact 3: Cisco VPN Profile Remediation Automation
This artifact demonstrates my ability to automate endpoint configuration using scripting. I worked on a remediation process to standardize Cisco Secure Client VPN profiles across multiple systems.
The solution involved removing unauthorized or outdated XML configuration files and replacing them with a single approved configuration. The approved profile was embedded in a script using Base64 encoding and deployed to endpoints.
This project improved consistency across devices and reinforced my ability to automate administrative tasks while enforcing configuration standards.
Skill 2: Technical Problem Solving and Troubleshooting
Description
This skill represents my ability to analyze, diagnose, and resolve complex technical issues across systems and environments. Through both academic work and real-world IT support experience, I have developed a structured approach to troubleshooting that focuses on identifying root causes and implementing effective solutions.
Artifact 1: Mobile Authentication Issue (403 Forbidden Error)
This artifact demonstrates my ability to troubleshoot authentication issues affecting mobile devices. Users experienced a “403 Forbidden” error when attempting to access Microsoft applications such as Teams and Outlook on both iOS and Android devices.
After investigating the issue, I determined that the problem was caused by a conflict between Microsoft Authenticator and Duo Mobile, which were both attempting to act as authentication brokers. This resulted in login loops and failed authentication attempts.
By analyzing the authentication flow, I was able to identify the root cause and recommend removing the conflicting application and reviewing Conditional Access policies. This experience strengthened my understanding of authentication systems and mobile device management.
Artifact 2: Windows 10 to Windows 11 Upgrade Deployment Strategy
This artifact highlights my ability to plan and manage system upgrades across an organization. I worked with Windows Update for Business policies in Intune to deploy Windows 11 upgrades to devices currently running Windows 10.
The process involved configuring feature update policies, defining deployment timelines, and adjusting deadlines to meet organizational expectations while minimizing disruption to users. I also considered device readiness and compatibility when planning the rollout.
This experience demonstrated my ability to approach technical changes strategically and balance operational impact with implementation requirements.
Artifact 3: McAfee Endpoint Removal Without ePO Access
This artifact demonstrates my ability to adapt when standard tools are unavailable. I was tasked with removing legacy McAfee endpoint software from multiple systems, but the organization no longer had access to the ePolicy Orchestrator environment.
I attempted to use the Endpoint Product Removal tool, but it required active licensing and credentials that were not available. This required me to explore alternative removal methods and reassess the approach to solving the issue.
This experience strengthened my ability to troubleshoot under constraints and reinforced the importance of flexibility in technical problem solving.
Skill 3: Security Awareness and Risk Management
Description
This skill reflects my understanding of cybersecurity principles and my ability to identify, evaluate, and address risks within enterprise systems. Through both academic coursework and real-world IT experience, I have developed an awareness of access control, system compliance, and security policy enforcement. I apply this knowledge to analyze potential vulnerabilities and ensure systems operate within secure and controlled environments.
Artifact 1: Conditional Access Policy Evaluation (Unmanaged Device Access)
This artifact demonstrates my ability to identify and analyze gaps in access control policies. While testing Microsoft Teams access on non-domain Windows devices, I observed that users were receiving warnings indicating the device was not compliant, but were still ultimately granted access.
This behavior revealed that Conditional Access policies were not being fully enforced. I evaluated the situation and determined that additional enforcement conditions, such as requiring compliant or hybrid Azure AD-joined devices, were necessary to properly restrict access.
This experience strengthened my understanding of access control mechanisms and highlighted the importance of properly configured Conditional Access policies in protecting enterprise resources.
Artifact 2: Cybersecurity Ethics and Surveillance Analysis
This artifact represents my academic work analyzing cybersecurity ethics, specifically focusing on government surveillance and the actions of Edward Snowden. In this assignment, I evaluated the issue from both utilitarian and duty-based perspectives, considering the balance between national security and individual privacy.
This project helped me develop critical thinking skills related to cybersecurity decision-making and reinforced the importance of ethical considerations in security practices. It also demonstrated how disciplines such as ethics and political science intersect with cybersecurity.
Artifact 3: Security+ Certification Preparation and Knowledge Development
This artifact highlights my ongoing effort to build foundational cybersecurity knowledge through preparation for the CompTIA Security+ certification.
Through studying topics such as risk management, identity and access management, network security, and threat analysis, I have strengthened my understanding of how to secure systems and respond to potential threats.
This process reflects my commitment to continuous learning and professional development as I work toward transitioning into a security-focused role.