I engineer AI-powered security systems that think, detect, and respond — so humans don't have to chase every alert.
I sit at the intersection of Software Engineering, Agentic AI, Cybersecurity, Compliance Engineering, and Mainframe Development. My work focuses on four core areas:
🤖 AI Security — Hardening LLMs and multi-agent systems against prompt injection, model poisoning, and adversarial attacks using the OWASP LLM Top 10 as the playbook.
🛡️ GRC Automation — Writing the pipelines that replace manual audit busywork with continuous control monitoring, automated evidence harvesting, and real-time compliance drift detection — across NIST, SOC 2, ISO 27001, GDPR, HIPAA, PCI-DSS, and CMMC.
⚙️ Security Engineering — Writing the automation that patches vulnerabilities, hunts threats, and locks down cloud environments — using Python, Go, PowerShell, and Bash.
🖥️ Mainframe Engineering — Programming IBM z/OS at the metal level — COBOL, Assembler, JCL, REXX, and Python on Z — on the platform that quietly processes over $10 trillion in transactions every day. While most engineers debate frameworks, I'm in the registers.
- Email Triage Agent — Inbox zero, finally — an autonomous email agent that handles the noise so you can focus on what matters.
- TaxFlow AI — AI-powered tax document analysis that automatically processes, analyzes, and extracts insights from financial documents.
- MindBridge AI Operations Hub — Automating the busywork of mental healthcare — so clinicians can focus on people, not paperwork.
- Attack Surface Monitor — Real-time AI agent that continuously maps and scores attack surfaces before attackers find them
- VaultHound — Autonomous credential and secrets leak hunter across git repos, CI/CD pipelines, and cloud configs
- PhishSentinel — LLM-powered phishing detection engine with automated threat classification and triage
- BountyOps — Agentic assistant that accelerates bug bounty operations with intelligent vulnerability triage
- Cyber AI Log Analyst — AI agent that parses, correlates, and surfaces behavioral anomalies buried in security logs
- Prompt Injection Scanner — OWASP LLM01:2025 — Automated red-team scanner for LLM prompt injection vulnerabilities
- NIST RAG Compliance Assistant — Ask NIST 800-53 anything. Get answers, not hallucinations.
- AWS Least Privilege Compliance Checker — Audit AWS IAM policies to enforce least-privilege access
- AWS GRC Evidence Collector — Automate compliance, cut costs, and stay audit-ready 24/7.
- AWS Inactive Key Rotation Auditor — Tool that finds your stale AWS keys before an attacker does.
- AWS Password Policy Auditor — Compliance isn't a checklist — it's a system I engineer.
- AWS Automated Access Review — Automated IAM access reviews, AI-powered reports, deployed in one command.
- AWS Cloud Encryption Evidence — Turning a 3-day audit scramble into a 5-minute command.
- Card Guardian — Award-winning PCI DSS compliance toolkit - Don't let auditors cry (by passing quickly)
- CyberGRC Hub - TOYOTA — TISAX-ready. Risk-aware. Production-grade.
- TrailWarden - CloudTrail Validator — Because bad logs are the blue pill.
- AuditCTL — AuditCTL turns your security policies from PDFs nobody reads into automated rules that run on every git push.
- Trust Ledger - 1Password — Continuous Compliance Engine for Modern Infrastructure
- HIPAA Sentinel — Automated HIPAA Security Rule (§164.312) gap assessments for AWS environments
- CCM Engine — Continuous Control Monitoring system with AI-driven alerts when compliance posture drifts
- IAM Org Sync — Intelligent IAM access sync engine with real-time drift detection across org boundaries
- Compliance Harvester — GDPR & SOC 2 evidence harvesting pipeline built for audit-readiness at enterprise scale
- NIST CSF Dashboard — Cloud-native compliance posture dashboard mapped across all NIST CSF domains
- Vulnerability Management Program — End-to-end risk-based vulnerability lifecycle management framework built for enterprise environments
- Programmatic Vulnerability Remediations — PowerShell & Bash scripts for automated, repeatable vulnerability patching at scale
- Threat Hunt: Tor Browser Usage — SIEM-driven hunt detecting dark web tool usage across corporate endpoints
- Threat Hunt: Cargo Hold — Advanced behavioral detection simulation designed to expose lateral movement patterns
- IBM Z/OS COBOL Flyer — I write the code that runs your bank — and I built proof.
- IBM Z/OS ASM TSO Debugger — <1% of engineers can do this. Now you've found one.
- IBM Z/OS Fibonacci Assembler — I wrote code that speaks directly to a $10-billion IBM mainframe. While most devs argue about frameworks, I'm in the registers.
- IBM Z/OS PDS Advanced Datasets — While everyone else learned Docker, I learned to run the computers that run the world." 🖥️🌍
- IBM Z/OS Mainframe Scripting — While everyone else learned the cloud, I learned what the cloud runs on.
- IBM Z/OS JCL Debugger — From CC 0008 to CC 0000 — debugging enterprise JCL on IBM z/OS so production never stops.
- IBM Z Xplore REXX — Most engineers avoid mainframes. I ran interactive REXX programs on one from my laptop.
- IBM Z Xplore CODE1 — Python on IBM z/OS Mainframe — Enterprise Python development on the platform that runs the world — because cloud isn't the only game in town.
- IBM Zxplore USS1 — Navigating a $10 trillion-a-day platform through a terminal — one command at a time.
- IBM Zxplore Files1 Mainframe Datasets — From VS Code to IBM Z — mastering z/OS dataset management, JCL automation, and enterprise data operations. CC 0000 ✅
- IBM Z Mainframe Dev Environment — Connecting modern DevOps tooling to enterprise IBM Z infrastructure — VS Code · Zowe Explorer · z/OSMF · JCL · TLS · z/OS
- Offer Negotiation Simulator — Negotiate like a boss. Walk away with more.


