1st Place — Beyond the Ball
NBA Tech Challenge
Cybersecurity | Infrastructure | Systems
Building secure, automated infrastructure from the ground up.
I've been drawn to technology for as long as I can remember. I started building and taking apart computers as a kid, and that curiosity turned into a habit of understanding how systems work, where they break, and how to make them better.
Today, I focus on solving real technical problems—whether that's automating workflows, securing infrastructure, or helping teams turn messy requirements into working systems. I enjoy the process of diagnosing issues just as much as delivering solutions.
I'm currently a Management Information Systems student with a strong focus on cybersecurity and systems thinking. I'm Security+ certified, and most of my experience comes from hands-on work: building, breaking, and operating real systems.
I treat AI as a force multiplier, not a crutch. I build multi-agent systems with clear separation between planning and execution — a controller decides strategy, specialized workers carry it out. I use AI to accelerate engineering work while keeping security judgment where it belongs: with the engineer. The goal is better output, faster — not less thinking.
NBA Tech Challenge
Technical presentation and demonstration
Federal STEM program achievement
2x President's List · 3x Dean's List
Created and delivered a structured prompt engineering lesson for students participating in the NBA Tech Challenge — bridging the gap between AI capability and practical application.
Mentoring non-technical peers on AI tools, app development fundamentals, and how to approach technical problems — making technology accessible beyond CS majors.
Contributing to cybersecurity program development research at TSU — helping shape curriculum and lab infrastructure for the university's growing cyber initiative.
Active engagement with defense and cybersecurity organizations including MITRE, Lockheed Martin, HII, and Leidos — building connections across the GovTech and defense ecosystem.
Systems I've designed and built. Focus on real problems, clear architecture, and production-grade implementation.
Texas Southern University had no dedicated cybersecurity lab. Students lacked access to enterprise networking equipment for hands-on learning — limiting practical skill development in a field that demands it.
Multi-layer campus network with Cisco Catalyst 9200/8200 core switching, Meraki MS130 access layer, and Firepower 1000 series for threat inspection. UCS C220 rack servers provide compute for lab workloads. Full VLAN segmentation isolates student traffic from production.
Firepower IPS/IDS providing real-time threat inspection. VLAN-based network segmentation enforcing least-privilege access between zones. Dedicated management VLAN for infrastructure administration. Built to support future expansion of the cyber program.
Service contractors manage operations across texts, spreadsheets, and disconnected apps. No visibility into job costs, labor time, or profitability. Off-the-shelf CRMs are too generic or too complex for small teams.
Next.js App Router with TypeScript frontend. Supabase backend (PostgreSQL + Auth) with Row Level Security. Component-based architecture with strict client/server separation. Playwright for E2E testing.
Core CRM complete and E2E tested. Database schema stabilized with migrations. RLS policies configured. UI polish and landing page in progress.
Security workflows involve repetitive analysis across logs, alerts, and documentation. Individual AI models each have strengths, but no single model handles every task well. Needed an orchestration layer that routes work intelligently.
Multi-agent system built on n8n with a controller model that routes tasks to specialized workers. Claude, GPT, and Gemini are selected per-task based on capability fit. VPS-hosted with Docker, designed for clear separation of planning vs execution.
Core orchestration pipeline operational. Controller routing logic handles task classification and model selection. Expanding worker agents for broader security automation coverage. Designed as a tool, not a replacement — AI augments engineering judgment.
The NBA Beyond the Ball Tech Challenge asked teams to build a fan engagement solution for the Houston Rockets. Needed to ship a working product under competition time pressure while leading a team with mixed technical backgrounds.
Next.js frontend with Supabase backend for auth and data persistence. Tailwind for rapid UI development. AI-assisted ideation during the design phase to accelerate user research and feature scoping.
Won 1st place in the NBA Beyond the Ball Tech Challenge. Demonstrated ability to ship under pressure, lead cross-functional teams, and combine technical execution with user-centered design thinking.
Needed a secure, reproducible platform to host web applications and services. Managed solutions too expensive; manual server config too fragile.
Single VPS running containerized services behind Traefik reverse proxy. Cloudflare handles DNS, DDoS protection, and edge SSL. All infrastructure defined in Docker Compose.
Fail2ban for SSH protection. UFW firewall with default-deny policy. Non-root container execution. Secrets in environment files excluded from version control.
Texas Southern University
Apr 2025 - Present
Lead student technician supporting the university's first cybersecurity lab. Configure Cisco networking gear (Catalyst, Meraki, Firepower). Implement network segmentation and security controls.
JosephOne Technologies / CCISD
Aug 2025 - Present
Installed and configured 600+ enterprise UPS systems across district campuses. Enabled centralized monitoring and power redundancy for classrooms and labs.
National Electrification Project
Jun 2022 - Aug 2022
Supported IT infrastructure planning for solar electrification projects impacting 5,000+ households. Maintained secure project databases and collaborated with international engineers.
From bare rack to operational teaching lab — the process, decisions, and lessons from building a university cybersecurity environment on enterprise Cisco gear.
Why treating AI as a force multiplier — not a replacement for judgment — produces better security outcomes.
Lessons from large-scale hardware deployment across a school district — logistics, troubleshooting, and working at scale.
I'm targeting roles in cybersecurity infrastructure, cloud security, and GovTech/defense-adjacent environments. My experience is hands-on — building secure networks with enterprise Cisco gear, shipping production applications with real access controls, and developing AI-powered security tooling that augments human judgment. I want to bring that same build-and-secure mindset to teams protecting critical systems.
Open to internships, co-ops, and full-time opportunities in cybersecurity and infrastructure. Let's connect.