Team lead and sole developer for the 3d Network Battalion Vulnerability Remediation Team for Leidos, based in Japan. I write all the code, manage the database, and design the internal tooling and GUIs.
I've been supporting the Marine Corps Enterprise Network (MCEN) as an IT contractor since 2017, wearing the hat of SysAdmin, Cyber Specialist, IT Specialist, and NetOps along the way. The titles changed but the work has been automation and integration throughout.
Most of my work lives on US Government networks and doesn't show up on GitHub, which is what the quiet contribution graph here is about.
Automation and integration across the Microsoft ecosystem. My production depth is in PowerShell (years of daily work; the featured project below is the visible example). Power Automate, Power Apps, Power BI, SharePoint, and Microsoft Access round out the stack. What I aim for, regardless of tech or platform: tools an operator can use without training, output that reads at a glance, and reusable building blocks so the next automation is easier to write.
enterprise-patch-toolkit -- Sanitized copy of a PowerShell 5.1 toolkit I built and maintain in production on MCEN. Runs across a multi-thousand-endpoint Windows fleet with over 800,000 documented remediations to date. The implementation happens to be PowerShell, but the design concerns generalize to any automation work: a reusable concurrent-execution engine, a content-aware three-way merge for a shared config catalog, clean config-vs-code separation for dropping into new environments, and a hardening pattern for the platform boundary that bites most concurrent-remoting code sooner or later.
Power Automate · Power Apps · Power BI · SharePoint · PowerShell 5.1 / 7 · Microsoft Access · Windows endpoint management
Claude Code is a daily collaborator. I make the architecture and design calls. Claude handles a lot of the drafting, refactoring, and documentation polish.
