
Nov 2020 - May 2022
Senior Security Architect/Engineer
H&R Block - Remote
Secured multiple enterprise level applications through the implementation and testing of numerous controls within Microsoft Purview. Developed an Azure cloud security architecture that focused on delivering high availability Microsoft services while addressing security concerns by identifying risks and attack vectors then implementing controls to remediate them.
Managed assets such as clusters, nodes, pods, and containers deployed within the Azure Kubernetes environment.
Led the AKS container security initiative to implement Lacework, coordinating with application development, container management, image management, vulnerability management, security architecture, and SOC teams to integrate Lacework’s capabilities into each team's processes.
Led H&R Block through the continuous process of maintaining PCI DSS compliance for the traditional enterprise environment and led the initiative that achieved PCI compliance for the Azure Kubernetes Environment including deploying and auditing a significant amount of security controls in and around the AKS environment.
Achieved STIG compliance for the Azure Kubernetes Environment through the processes of working with multiple teams to assess the environment, developing Plans of Actions and Milestones (POA&Ms) for each finding, implementing remediations, and guiding teams through the exception process as needed.
Evaluated current data loss prevention architecture to identify gaps, inefficiencies, and design flaws that created strain on both the workforce and the infrastructure and drafted multiple plans of action and milestones to address these issues.
Collaborated with cross-enterprise teams to develop role and responsibilities documentation including RACI matrixes to address the variances in container management responsibilities.
Drafted one-year and three-year roadmaps for the data loss prevention program, incorporating growth requirements, organizational impact, and ensuring that timeframes, alert volume, and DLP policies caused minimal disruption.
Wrote policies and standards as well as technical procedures and playbooks for security implementation, assessment, and remediation for the Azure Kubernetes environment.