Cybersecurity Expertise: Securing and Optimizing IT Environments for Resilience

Passionate about Defending Against Evolving Cyber Threats and Challenges

Cybersecurity Projects

Showcasing my expertise in securing IT environments and networks.

A padlock sits on a laptop keyboard with glowing red, green, and blue light trails swirling around, creating a sense of security and cyber awareness.
A padlock sits on a laptop keyboard with glowing red, green, and blue light trails swirling around, creating a sense of security and cyber awareness.
Network Fortification

Implementing robust security measures to protect against evolving cyber threats.

A padlock sits atop a stack of credit cards on a keyboard, with a bluish hue and digital streaks in the background, suggesting themes of digital security and privacy.
A padlock sits atop a stack of credit cards on a keyboard, with a bluish hue and digital streaks in the background, suggesting themes of digital security and privacy.
System Optimization

Enhancing system performance while ensuring compliance and resilience in operations.

Cybersecurity Expertise

Dedicated to securing IT environments and optimizing system performance against evolving threats.

Passionate about technology.

Experience

IT Security Role

Cyber Solutions

June 2020 - Present

Focused on fortifying networks and ensuring compliance for resilient business operations.

Systems Administration

Tech Innovator

Jan 2018 - May 2020

Managed system infrastructures while enhancing performance and defending against cyber threats.

A dimly lit desk setup featuring a computer monitor displaying a document titled 'General Hardening Guideline'. The desk has a mechanical keyboard with blue and red keys, a lamp providing light on the right side, and various small items including notes pinned to the wall, a notebook, and a cup. There is a mesh office chair in front of the desk.
A dimly lit desk setup featuring a computer monitor displaying a document titled 'General Hardening Guideline'. The desk has a mechanical keyboard with blue and red keys, a lamp providing light on the right side, and various small items including notes pinned to the wall, a notebook, and a cup. There is a mesh office chair in front of the desk.

Your trusted cybersecurity partner.

As a cybersecurity officer, I specialize in securing IT environments, fortifying networks, and ensuring compliance to protect businesses against evolving threats while optimizing system performance and resilience.

A closed padlock rests on top of a computer keyboard, symbolizing security. The image incorporates a motion blur effect, suggesting speed or data movement.
A closed padlock rests on top of a computer keyboard, symbolizing security. The image incorporates a motion blur effect, suggesting speed or data movement.
Passionate about technology.
Strategic IT security solutions.

I thrive on solving complex security challenges, streamlining operations, and future-proofing infrastructure, bringing a proactive approach to IT security and administration for enhanced business resilience.

Client Feedback

Hear from our satisfied clients about their experiences with us.

Jared's expertise in cybersecurity transformed our IT environment and enhanced our security.

Alex Johnson
Signage on a wall reads 'Cybercrime Analysis & Research Alliance @ NTU (CARA)' in bold, white letters against a dark, textured surface. A corridor with partial ceiling panels is visible, and there's some greenery in the background.
Signage on a wall reads 'Cybercrime Analysis & Research Alliance @ NTU (CARA)' in bold, white letters against a dark, textured surface. A corridor with partial ceiling panels is visible, and there's some greenery in the background.

New York

Working with Jared was a game changer; his proactive approach improved our security posture significantly.

A chaotic chalkboard filled with various symbols, numbers, and text related to hacking. Words like 'HACKER', 'ATTACK', and 'UPLOAD' are prominently visible amidst a jumble of codes and cryptic symbols. The board conveys an atmosphere of mystery and complexity, reminiscent of a hacker's workspace.
A chaotic chalkboard filled with various symbols, numbers, and text related to hacking. Words like 'HACKER', 'ATTACK', and 'UPLOAD' are prominently visible amidst a jumble of codes and cryptic symbols. The board conveys an atmosphere of mystery and complexity, reminiscent of a hacker's workspace.
Maria Smith

Los Angeles

★★★★★
★★★★★