Professional Journey
Over 20 years of experience in information security, system architecture, and digital transformation, with a focus on AI-powered solutions and secure enterprise systems.
Career Timeline
President and Consultant
Third WAG
Leading AI-powered security and digital transformation initiatives
Developed reference architecture for Sunrun's identity function
Created AI-assisted policy program using Secure Controls Framework
Built AI-assisted Slackbot for self-service threat modeling
Information Security Architect
Integrated DNA Technologies
Led security integration and cloud cost optimization initiatives
Led ArcherDX product security integration into Danaher/IDT
Reduced AWS costs by 30% over three months
Managed security architecture in regulated environments
Security Architecture Engineering Lead
Invitae
Led enterprise security architecture and M&A security initiatives
Restructured security organization implementing compliance as code
Led security M&A evaluations for ~4 companies/year
Maximized ROI at intersection of security, compliance, and privacy
Information Security Architect
AMERGINT Technologies
Built and led comprehensive security program during significant company growth
Grew company security program from $7M to $37M revenue
Implemented NIST 800-171 compliance
Led $8M JTAGS project with 40% margins
Areas of Expertise
Security & Compliance
Technologies
Leadership
Specialized
Key Projects
AI-Powered Security Policy Program
Developed an innovative AI system for generating and managing security policies
Problem
Manual policy creation was time-consuming and often resulted in inconsistent alignment with controls
Solution
Created an AI-assisted program utilizing Secure Controls Framework for automated policy generation
Technologies
Key Outcomes
- • Automated policy generation and mapping
- • Improved alignment with business requirements
- • Significantly reduced policy creation time
Enterprise Security Architecture Transformation
Led complete restructuring of security organization at Invitae
Problem
Traditional security approaches created friction and slowed development velocity
Solution
Implemented compliance as code and decentralized security model
Technologies
Key Outcomes
- • Reduced security friction
- • Increased developer velocity
- • Improved compliance coverage