About Me

My official title has been System Administrator, but my responsibilities have been security-focused for years. I operate and secure production environments with an emphasis on identity controls, endpoint protection, security monitoring, and incident escalation while balancing risk reduction with system availability.

My background is grounded in real, day to day infrastructure work. I have spent years managing and securing Microsoft 365, Active Directory and Entra ID environments, Windows servers and endpoints, and enterprise networks that people rely on to get their jobs done. That experience shaped how I think about security. I have seen what breaks, what gets ignored, and what actually reduces risk in production.

Because of that foundation, I approach security as an operational discipline rather than a theoretical one. Security is not something layered on after the fact. It is built into how access is granted, how systems are monitored, how alerts are investigated, and how incidents are handled without disrupting the business. My focus is always on practical controls that improve visibility, limit blast radius, and hold up under real world conditions.

This site is where I document practical security patterns, workflows, and lessons learned. The goal is clarity. Everything shared here is designed to be understandable, repeatable, and grounded in real-world environments.

What I Work On

  • Security Operations
    Detection logic, alert triage, incident escalation, and post-incident improvements focused on reducing risk and improving visibility.

  • Identity & Access Security
    MFA enforcement, role-based access control (RBAC), conditional access decisions, and account lifecycle automation.

  • Platform & Infrastructure Security
    Windows and Microsoft 365 hardening, patching and backup strategies, and network segmentation to limit blast radius.

Credentials & Background

I hold certifications including SSCP, CySA+, Security+, and Network+, and bring over seven years of experience supporting and securing enterprise environments in highly availability-sensitive organizations.

If you’re interested in practical security engineering, identity-first defense, or security operations that actually scale, you’re in the right place.

Hi, I am John