Profile

Security-focused Technical Service Engineer with experience supporting healthcare integrations, databases, and secure application environments. Background in red cell vulnerability assessment and OSINT investigations. Focused on threat intelligence and security engineering.

Key Strengths

  • Investigative mindset
  • Production system troubleshooting
  • Threat modeling
  • OSINT research
  • Security focused engineering

Experience

Technical Service Engineer

Monarch Medical Technologies | 2024 - Present

  • Support healthcare integrations using HL7 (ADT, ORM, ORU)
  • Troubleshoot Mirth Connect and Rhapsody interface engines
  • Work with SQL Server and PostgreSQL databases
  • Deploy and maintain Docker-based application environments
  • Investigate authentication issues involving Active Directory and LDAP
  • Perform root cause analysis on production system incidents
  • Collaborate with engineering, QA, and client IT teams

Teaching Associate (Technical Support)

Bottega University | 2023

  • Assisted students learning Python, JavaScript, HTML, and CSS
  • Provided technical troubleshooting for coding environments
  • Reviewed capstone projects and guided problem solving
  • Explained technical concepts to non-technical learners

Military Red Cell & Reconnaissance Experience

USMC / Army National Guard

  • Performed vulnerability-focused reconnaissance exercises
  • Simulated adversary tactics to evaluate defensive readiness
  • Developed threat scenario planning mindset
  • Conducted structured observation and reporting
  • Applied disciplined investigative thinking under pressure

Technical Training Instructor (Contract)

USAF EOD Training Support

  • Delivered instruction in tactical movement and situational awareness
  • Helped develop structured training scenarios
  • Evaluated performance and provided improvement feedback
  • Communicated complex concepts clearly and concisely

Law Enforcement Special Reaction Team

Kingsland Police Department

  • Participated in high-risk response planning
  • Maintained operational readiness and situational awareness
  • Worked within structured team decision environments
  • Documented incidents with accuracy and clarity

Technical Skills

Alignment

    Skill Match

    Certifications

    ISC2 Certified in Cybersecurity (CC)

    Foundational cybersecurity certification covering security principles, risk management, networking, and incident response.

    Google Cybersecurity Professional Certificate

    Covers security operations concepts, SIEM tools, incident response processes, and threat detection fundamentals.

    Open-Source Intelligence (OSINT) – Basel Institute

    Investigative research methods using public data sources. Focus on evidence collection, validation, and structured analysis.

    PURSUIT Intelligence Training

    Practical investigative exercises focused on identifying online indicators and structured intelligence gathering techniques.

    Projects

    CyberScout Labs (Still in Development)

    Overview

    OSINT training platform designed to simulate real-world investigative workflows. Focuses on ethical intelligence collection, analysis, and documentation.

    Skills demonstrated
    • OSINT methodology
    • Threat research
    • scenario design
    • investigative workflows
    Tools

    Linux, Python, structured research techniques

    Micro OSINT Toolkit (In Progress)

    Overview

    Browser-based toolkit concept for performing structured open source investigations. Designed for quick pivoting between data sources and documentation of findings.

    Skills demonstrated
    • OSINT workflow design
    • web application structure
    • investigation logic
    Tools

    HTML, JavaScript, investigative methodology

    TED Encryption Device (Past Project)

    Overview

    Hardware-assisted encryption key generator using Raspberry Pi Pico. A modified 4-port USB switch device was disassembled and repurposed as a binary input interface. Each switch was soldered to GPIO pins, allowing physical toggle states to generate binary key values for secure communication experiments.

    Skills demonstrated
    • hardware security concepts
    • Python scripting
    • serial communication
    • encryption workflows
    Tools

    Python, Raspberry Pi Pico, USB serial

    HL7 Message Generator

    Overview

    Python tool that generates structured HL7 messages for integration testing. Allows controlled creation of valid and intentionally flawed messages.

    Skills demonstrated
    • HL7 structure understanding
    • test data generation
    • integration troubleshooting
    Tools

    Python, HL7 standards

    Windows Security Hardening Project

    Overview

    Security-focused Windows configuration project aligned to CIS recommendations. Includes automation using PowerShell scripts.

    Skills demonstrated
    • system hardening
    • security configuration
    • PowerShell automation
    Tools

    Windows, PowerShell

    Contact

    Portfolio:
    jpsportfolio.com

    Secure Portal:
    secure.jpsportfolio.com

    X