About

Professional Background

U.S. Army Cyber branch insignia

The path here was not a straight line. It started in the infantry, moved through special forces, and eventually led to the cyber domain. Each phase built on the last -- the discipline of an infantry officer, the adaptability of a special forces operator, and the technical depth that cyber demands.

Along the way, the certifications stacked up: CompTIA A+, Security+, and PenTest+, along with the OSCP from Offensive Security. Currently working toward the CCNA and CISSP, because standing still is not an option.

The mission is simple: protect what matters, build what is needed, and stay curious about how things work -- and how they break.

The Family

We are a close-knit crew that keeps things private but lives loud. Here is a quick introduction to the team.

Dad

The one behind the keyboard. When not working in cybersecurity, you will find him on the land, reading, or tinkering with something that probably involves an antenna.

Mom

The heart of the operation. Manages the homeschool, keeps the household running, and somehow makes it all look effortless.

Kiddo 1

Curious, creative, and always asking questions. Currently fascinated by everything and narrowing it down to nothing.

Kiddo 2

The youngest explorer. Full of energy, big on imagination, and never far from an adventure.

The Dog

Chief morale officer and perimeter security specialist. Takes treats as payment and naps as a professional sport.

Reading List

A curated collection of books that have shaped how we think about security, intelligence, privacy, and the world. Organized by category for easier browsing.

Deception & Intelligence

  • Turnabout and Deception: Crafting the Double-Cross and the Theory of Outs by Barton Whaley
  • Active Measures: The Secret History of Disinformation and Political Warfare by Thomas Rid
  • Operation Mincemeat: How a Dead Man and a Bizarre Plan Fooled the Nazis and Assured an Allied Victory by Ben Macintyre
  • Psychology of Intelligence Analysis by Richards J. Heuer

Hacking & Security

  • Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers by Andy Greenberg
  • The Shellcoder's Handbook: Discovering and Exploiting Security Holes (2nd Ed) by Chris Anley et al.
  • Hacking: The Art of Exploitation (2nd Ed) by Jon Erickson
  • Gray Hat Hacking: The Ethical Hacker's Handbook (5th Ed) by Allen Harper et al.
  • Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software by Michael Sikorski, Andrew Honig
  • The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim
  • The Hacker Playbook 2 by Peter Kim
  • The Hacker Playbook 3 by Peter Kim
  • Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You by Christopher Hadnagy

OSINT & Privacy

  • Extreme Privacy: What It Takes to Disappear by Mike Bazzell
  • Open Source Intelligence Techniques by Mike Bazzell
  • Operator Handbook: Red Team + OSINT + Blue Team Reference by Joshua Picolet

Software Defined Radio

  • Field Expedient SDR: Introduction to Software Defined Radio by David Clark, Paul Clark
  • Field Expedient SDR: Basic Analog Radio by David Clark, Paul Clark
  • Field Expedient SDR: Basic Digital Communications by David Clark, Paul Clark

Christian / Theology

Coming soon. This section will be updated with titles that have been meaningful to our faith journey.