About Pharns¶
GRC engineer, cloud security practitioner, and AAM cybersecurity specialist. I build and secure systems end-to-end: cloud governance frameworks, compliance automation, endpoint hardening, detection tuning, and evidence-ready workflows.
Evidence-first methodology (controls, logs, screenshots), plain-English reporting, AI-assisted with human review, rapid iterations and clear handoffs.
Credentials: WGU B.S. Cybersecurity (Feb 2026) · Security+/Net+/A+ · ITIL4 · ISC² CC/SSCP (Assoc.) · LPI · FAA Part 107 · HAM/GMRS Scheduled: CySA+/PenTest+ (Jan 2026) · AWS CP/CCSP (Q1 2026)
- Service-disabled veteran (USAF) — security clearance eligible
- Patent holder in UAV systems — View patents
- Active GitHub with public repos — View code
- Credly-verified certifications — View badges
Professional experience¶
AAM Cyber, LLC — Founder/Operator¶
2024 – Present · GRC Consulting
Security consulting practice focused on compliance automation and GRC engineering for SMBs:
- Healthcare MSP — HIPAA + SOC 2 readiness assessment, 12 control gaps identified, 90-day remediation roadmap
- Financial Services — PCI-DSS Windows 11 endpoint hardening, 47 controls mapped, <48-hour delivery
- Law Firm — Comprehensive security assessment, 15,000+ vulnerabilities remediated, M365 hardening
- Mortgage Company — Windows 11 baseline hardening for regulatory compliance
Built GIAP™ governance automation platform (CISO Assistant + n8n + Nextcloud) for scalable client delivery.
USOG — CEO & Systems Administrator¶
2018 – 2025 · Drone Logistics & Operations (Winding Down)
Led $5.6M revenue drone logistics company with 18 employees. As a startup, served as both executive and hands-on sysadmin — built the entire IT security infrastructure from a single email address to production-grade systems:
- Built enterprise infrastructure from scratch — Self-hosted email, file storage (Nextcloud), remote access, backup systems, and security monitoring
- Implemented CIS Controls v8 (IG1-IG2) — Mapped security baseline to NIST CSF and SOC 2 trust criteria
- Managed vulnerability remediation — 15,000+ issues identified and resolved across infrastructure
- Deployed security stack — Dark web monitoring, threat intelligence feeds, endpoint protection, access controls
- Maintained compliance posture — Documentation, evidence collection, and audit-ready configurations
This wasn't delegated — I architected, deployed, hardened, and maintained every system. Real-world GRC implementation at scale.
Currently winding down operations; transitioning fully to cybersecurity.
United States Air Force — Aeromedical Evacuation Technician¶
1990 – 2007 · 18 Years Active Duty
Flight nurse with mission-critical operations experience:
- High-pressure medical operations with strict protocols and documentation
- Security clearance experience (eligible for reinstatement)
- Disciplined execution in life-safety environments
- Service-disabled veteran status
MiraCosta College — Adjunct Educator¶
UAS/Drone Technology
Taught drone technology courses, demonstrating communication skills and subject matter expertise in aviation systems.
Skills snapshot (ATS keywords)¶
GRC & Compliance: Risk Assessment · Vendor Risk Management · Privacy Policy Analysis · Security Architecture · Compliance Audit · Control Implementation · Evidence Collection · Policy Development · Third-Party Risk · Compliance Exception Management
Frameworks: NIST CSF · CIS Controls v8 · PCI-DSS v4.0 · SOC 2 · ISO 27001 · FedRAMP (foundational) · IoT/PropTech Privacy
Cloud Security: AWS (IAM, GuardDuty, CloudTrail, S3) · Cloud Governance · Secure Defaults · Logging Pipelines
Detection & IR: SIEM Tuning · Incident Response · Detection Engineering · Log Analysis · Threat Hunting · RF/Wireless Security
Tools: Security Onion · TheHive/Cortex · Nessus · Terraform · n8n · Proxmox · Nextcloud · HackRF · RTL-SDR
What I deliver (GRC focus)¶
Cloud governance & control implementation: - AWS Control Pack: S3 default-deny, GuardDuty findings export with scoped IAM, CIS/NIST mapping — architecture designed, implementation Q1 2026. - IAM least privilege, logging foundations, secure defaults with audit trails.
Compliance automation & evidence: - GIAP™ governance automation: structured intake workflows with consent management, retention policies, and control mapping. - Windows 11 PCI-DSS hardening with evidence pack delivered in under 48 hours. - Baseline Evidence Drop: agentless Windows evidence collector with hashes and manifest.
Detection engineering & systems: - Detection/IR lab with Security Onion, TheHive/Cortex, custom SIEM rules, and authored detections. - TraceLock™ RF/SDR telemetry pipeline: evidence-grade wireless surveillance detection with logging architecture. - Built and secured multi-component stacks (Proxmox, Nextcloud, Nginx reverse proxy, SuiteCRM + remote MySQL, SMTP/DNS/certs) with hardened access.
AI-assisted delivery: - LLM workflows for policy drafting, control mapping, detection tuning, and documentation generation - Faster turnaround on complex projects with thorough human review and validation
Open to roles¶
Primary focus (what I'm targeting):
- GRC Engineer (technical implementation)
- Cloud Security Engineer (compliance/governance focus)
- Security Controls Implementation Specialist
- Detection Engineer
Specialized depth (differentiators, not distractions):
- AAM/UAV Security — hands-on drone engineering + security
- RF/Wireless Security — SDR, spectrum analysis, TraceLock™
- Cyber-Physical Systems — hardware + software security integration
Growth trajectory:
- Penetration Testing · Offensive Security (active lab, CySA+/PenTest+ Jan 2026)
Remote-first; open to international collaboration (US/EU/LatAm time zones) and relocation for the right opportunity.
AI-assisted GRC workflows¶
Traditional GRC work is documentation-heavy: control matrices, policy drafting, evidence collection, runbooks. I use LLM tools to accelerate delivery:
- Draft policy and control mapping faster with thorough human review
- Generate structured evidence documentation from logs and screenshots
- Produce audit-ready runbooks with consistent formatting
- Maintain living documentation that evolves with infrastructure
Result: Same rigor and quality as traditional approaches, with faster turnaround. More time for high-value work: architecture, implementation, and validation.
Rare combination¶
Most GRC engineers focus on policy and documentation. I implement the technical controls being documented: - GRC discipline: Frameworks (NIST, CIS, PCI-DSS), evidence collection, control matrices - Cloud security: AWS IAM/GuardDuty/CloudTrail, secure defaults, logging pipelines - Systems engineering: Endpoint hardening, network segmentation, access controls - Detection & telemetry: SIEM tuning, RF/wireless detection, evidence logging - AI acceleration: Multi-agent workflows for compliance content generation
This combination enables me to audit, design, implement, and document security controls — not just check boxes.
AAM cybersecurity: from builder to defender¶
I don't just study drone security — I've designed, built, and fielded operational UAV systems.
Hands-on engineering background:
- Designed and deployed small UAS (SUAS) for real-world missions, including beyond-line-of-sight (BLOS) operations
- Developed swarm-deployable payload systems with custom avionics integration
- Authored USPTO patents for UAV delivery and payload mechanisms
- Built RF telemetry and command/control systems from the ground up
Why this matters for cybersecurity:
When I assess drone security, I understand the attack surface from the inside: firmware vulnerabilities, RF link exploitation, GPS spoofing vectors, and payload tampering. This operational experience — combined with SDR/RF research (TraceLock™) and FAA Part 107 certification — positions me to secure the systems I once built.
Advanced Air Mobility (AAM) is an emerging domain where few practitioners have both engineering depth and security discipline. I bring both.