Top Skills & Supporting Artifacts

This page highlights my top three marketable skills and the artifacts that demonstrate them. Each artifact is either embedded on this page or linked as a PDF/website so viewers can explore the full work.

Skill 1: Cyber Risk & Compliance

CYSE 430 Final Exam – Risk Mitigation Strategies

In this capstone exam essay, I combine risk assessment, business impact analysis, business continuity, disaster recovery, and incident response into a coherent strategy for organizational resilience. This artifact shows my ability to think about risk at a program level and communicate how technical controls support business goals.

CYSE 430 – Planning Risk Mitigation Throughout an Organization

This reflection discuesses risk mitigation across all seven IT infrastructure domains. I connect assets, threats, vulnerabilities, and controls and explain how frameworks like NIST SP 800-53 helped me think about prioritization and cost-benefit decisions.

CYSE 430 – Understanding and Maintaining Compliance

In this reflection, I explore how FISMA, HIPAA, PCI DSS, and the NIST Cybersecurity Framework shape organizational obligations. I also reflect on why compliance alone is not enough and why organizations need ongoing monitoring and a strong security culture.

Skill 2: Critical Thinking & Problem Solving

Innovate Cyber 2024 – EncryptX Prototype Website

My team built a prototype website to address secure communication challenges while keeping the interface simple enough for real users. I helped identify core user problems, narrow down features, and test assumptions, showing my ability to break complex challenges into manageable design decisions.

Innovate Cyber 2025 – Internet Explorers Prototype Website

Building on lessons from 2024, we improved our design by mapping prior failure points, ranking changes by impact and effort, and refining navigation and flow. This artifact demonstrates iterative problemsolving and user-centered thinking.

Innovate U-OVN K–12 AI Assistant Pitch Canvas

This pitch canvas outlines a concept for an AI classroom assistant, focusing on equity, accessibility, classroom realities, and privacy. It shows how I use structured frameworks—problem statements, assumptions, tests, and success criteria—to move from an idea to a testable solution.

Skill 3: Research & Cyber Policy Analysis

CISA: A Policy Analysis Review

This paper explains the Cybersecurity Information Sharing Act (CISA) in accessible language, examines its context, and connects the law to broader U.S. cybersecurity strategy. It demonstrates my ability to synthesize scholarly research, legislation, and policy debates.

Ethical Implications of CISA

Here I evaluate CISA through an ethical lens, considering who benefits, who might be put at risk, and how the law affects the balance between national security and privacy. I draw on ethics and political science concepts alongside cybersecurity concerns.

Social Implications of CISA

This paper discusses how CISA influences public trust, organizational behavior, and social attitudes toward data sharing and surveillance. It shows my ability to think beyond technical details and analyze the wider social impact of cybersecurity laws.