Elevator Speech

Just a little bit about me

Growing up, my father introduced me to computers at an early age. Our first computer was a Tandy 1000HX. Not long after, I started to dig into BASIC, and eventually was able to make a rocket fly across the screen. You can only imagine how exciting that was for 8 year old me. 

In 2018 I took the role of Director of Technology for a rural school district, I have had a heavy focus in Networking and System Administration. With the security and privacy of the students being my primary focus.

Experience

Stary sky with text that says Weld County School District Re-3J Technology

Director of Technology -- 05/2018 - present System administrator -- 01/2017 - 05/2018 Technology Technician III -- 09/2015 - 01/2017

Denver Tech Center skyline with a full moon and the mountains at sunrise and the logo for the Breakaway Group, a Xerox Company

Multimedia Developer -- 07/2013 - 09/2015

Photograph of an F-16 Falcon and an image of the Air National Guard Logo

Interim Multimedia Manager -- Air Force Still Photographer -- 07/2009 - 08/2013 C-130 Crew Chief -- 08/2007 - 07/2009

An aircraft maintainer working on a jet with the image of the Air Force logo

F-15 Crew Chief -- 11/2001 - 08/2007   

Certifications & Courses

Comptia Network Plus Certification logo

Comptia Network+

Completed: November 2019

Earners of the CompTIA Network+ certification have the skills needed to troubleshoot, configure, and manage wired and wireless networks found in companies around the world. CompTIA Network+ professionals have demonstrated the ability to design and implement functional networks, configure, manage, and maintain essential network devices, implement network security, and troubleshoot network problems.

Comptia Security Plus Certificaton logo

Comptia Security+

Completed: July 2021

Earners of the CompTIA Security+ certification have the knowledge and skills necessary to perform core security functions required of any cybersecurity role. CompTIA Security+ professionals know how to identify and address potential threats, attacks and vulnerabilities and they have established techniques in risk management, risk mitigation, threat management and intrusion detection.

Get in touch with me