Senior Cybersecurity Engineer focused on IAM & PAM at enterprise scale. I design and run identity programs that cut standing privilege, harden high‑value systems, and keep developer/user experience smooth. Hands‑on with CyberArk, ForgeRock, Okta, Azure Entra, and PingFederate; experienced with legacy‑to‑modern migrations.
Securing Identities Protecting Access Enabling Trust
Award winning Senior Cybersecurity Engineer SME with expertise in PAM, IAM administration, GRC compliance, and security analysis. Skilled in protecting systems and reducing risks with strategic security solutions.
About
CyberDefense Magazine — Expert Spotlight
Pragmatic approaches to IAM/PAM excellence at enterprise scale, published by Gary Miliefsky.
Media
Video Interview (CyberDefense TV)
Audio Streaming
Publications
Automatic Drip Irrigation using Fuzzy Logic and Mobile Technology
An intelligent drip irrigation system optimizing water and fertilizer use for agricultural crops using wireless sensors and fuzzy logic.
Estimation of durability of rice grains using sensors and mobile technology
An ERH-based sensor system developed to measure rice granule moisture content with error, enabling real-time storage monitoring and timely preventive action.
Protecting Web Applications with Privileged Access Management (PAM)
Extending Privileged Access Management (PAM) to web applications safeguards sensitive systems.
CIEM, Practically: How to Make Least Privilege Stick in AWS, Azure, and GCP
Practical strategies for enforcing least privilege in AWS, Azure, and GCP using continuous identity entitlement management and policy automation.
Secrets Sprawl → Resilient Management
Discovery, federation, rotation, and developer experience for large environments.
(Coming Soon) Just-in-Time Privilege by Design
Scoped elevation, impersonation, and monitored break-glass patterns.
(Coming Soon) SAML → OIDC Migration: Hidden Gotchas
Identifiers, audience/issuer drift, and migration strategies that don't break users.
Research Projects
Project IDEAL
Explores how a humanoid robot mediates young children’s collaboration as they adapt to school, generating insights for future embodied learning technologies.
Identity Threat Hunter (ITH)
AI-powered identity threat hunting platform on Google Cloud Run + Vertex AI + Elastic, with honey-identity traps, risk scoring, and real-time detections.Check Github for project details