Skip to content

About Pharns

GRC engineer, cloud security practitioner, and AAM cybersecurity specialist. I build and secure systems end-to-end: cloud governance frameworks, compliance automation, endpoint hardening, detection tuning, and evidence-ready workflows.

Core proof (7-second scan): - Built and secured production infrastructure for a drone logistics startup; CIS v8 (IG1-IG2) mapped to NIST CSF/SOC 2 - Delivered client compliance wins in healthcare, financial services, and legal services (HIPAA, SOC 2, PCI-DSS) - AAM/UAS depth with patents and operational experience; FAA Part 107, RF/SDR research

Credentials: WGU B.S. Cybersecurity (Feb 2026) · Security+/Net+/A+ · ITIL4 · ISC² CC/SSCP (Assoc.) · LPI · FAA Part 107 · HAM/GMRS
Earned (Feb 2026): CySA+ · CSAP · Pending: PenTest+ · Planned: AWS CP/CCSP (Q1 2026)

Links: Patents · GitHub · Credly


Professional experience

AAM Cyber — Founder/Operator

2024 – Present · GRC Consulting

Security consulting practice focused on compliance automation and GRC engineering for SMBs:

  • Healthcare MSP — HIPAA + SOC 2 readiness assessment, 12 control gaps identified, 90-day remediation roadmap
  • Financial Services — PCI-DSS Windows 11 endpoint hardening, 47 controls mapped, <48-hour delivery
  • Law Firm — Comprehensive security assessment, high-volume vulnerability remediation, M365 hardening
  • Mortgage Company — Windows 11 baseline hardening for regulatory compliance

Built GIAP™ governance automation platform (CISO Assistant + n8n + Nextcloud) for scalable client delivery.

USOG — CEO & Systems Administrator

2018 – 2025 · Drone Logistics & Operations (Winding Down)

Led $5.6M revenue drone logistics company with 18 employees. As a startup, served as both executive and hands-on sysadmin — built the entire IT security infrastructure from a single email address to production-grade systems:

  • Built enterprise infrastructure from scratch — Self-hosted email, file storage (Nextcloud), remote access, backup systems, and security monitoring
  • Implemented CIS Controls v8 (IG1-IG2) — Mapped security baseline to NIST CSF and SOC 2 trust criteria
  • Managed vulnerability remediation — 15,000+ issues identified and resolved across multi-year infrastructure
  • Deployed security stack — Dark web monitoring, threat intelligence feeds, endpoint protection, access controls
  • Maintained compliance posture — Documentation, evidence collection, and audit-ready configurations

This wasn't delegated — I architected, deployed, hardened, and maintained every system. Real-world GRC implementation at scale.

Currently winding down operations; transitioning fully to cybersecurity.

United States Air Force — Aeromedical Evacuation Technician

1990 – 2007 · Military Career

Flight nurse with mission-critical operations experience:

  • High-pressure medical operations with strict protocols and documentation
  • Security clearance experience (eligible for reinstatement)
  • Disciplined execution in life-safety environments
  • Service-disabled veteran status

MiraCosta College — Adjunct Educator

UAS/Drone Technology

Taught drone technology courses, demonstrating communication skills and subject matter expertise in aviation systems.


Career journey: Mission-critical → Builder → Defender

Each phase built capabilities that compound in cybersecurity:

Phase Role What I Learned How It Applies
USAF (career) Aeromedical Evacuation Mission-critical operations, protocols, documentation, clearance experience Disciplined execution, compliance mindset, audit culture
USOG (7 years) CEO + Sysadmin Built IT infrastructure for $5.6M company from scratch Hands-on implementation, vulnerability management, production security
AAM Cyber (current) GRC Consultant Client delivery across HIPAA, PCI-DSS, SOC 2 Framework expertise, evidence pipelines, compliance automation

The thread: I've operated in environments where failure has consequences — medical missions, business operations, client compliance. That operational discipline carries into how I approach security: systematic, documented, evidence-ready.

What this means for hiring managers: I'm not learning on the job. I've managed production systems, delivered under deadlines, and maintained compliance across years of operations. The cybersecurity certifications formalize experience I already have.


Skills snapshot

GRC & Compliance: Risk Assessment · Vendor Risk Management · Privacy Policy Analysis · Security Architecture · Compliance Audit · Control Implementation · Evidence Collection · Policy Development · Third-Party Risk · Compliance Exception Management

Frameworks: NIST CSF · CIS Controls v8 · PCI-DSS v4.0 · SOC 2 · ISO 27001 · FedRAMP (foundational) · IoT/PropTech Privacy

Cloud Security: AWS (IAM, GuardDuty, CloudTrail, S3) · Cloud Governance · Secure Defaults · Logging Pipelines

Detection & IR: SIEM Tuning · Incident Response · Detection Engineering · Log Analysis · Threat Hunting · RF/Wireless Security

Tools: Security Onion · TheHive/Cortex · Nessus · Terraform · n8n · Proxmox · Nextcloud · HackRF · RTL-SDR


What I deliver

Cloud governance & control implementation: - AWS Control Pack: S3 default-deny, GuardDuty findings export with scoped IAM, CIS/NIST mapping — architecture designed, implementation Q1 2026. - IAM least privilege, logging foundations, secure defaults with audit trails.

Compliance automation & evidence: - GIAP™ governance automation: structured intake workflows with consent management, retention policies, and control mapping. - Windows 11 PCI-DSS hardening with evidence pack delivered in under 48 hours. - Baseline Evidence Drop: agentless Windows evidence collector with hashes and manifest.

Detection engineering & systems: - Detection/IR lab with Security Onion, TheHive/Cortex, custom SIEM rules, and authored detections. - TraceLock™ RF/SDR telemetry pipeline: evidence-grade wireless surveillance detection with logging architecture. - Built and secured multi-component stacks (Proxmox, Nextcloud, Nginx reverse proxy, SuiteCRM + remote MySQL, SMTP/DNS/certs) with hardened access.

AI-assisted delivery: - LLM workflows for policy drafting, control mapping, detection tuning, and documentation generation - Faster turnaround on complex projects with thorough human review and validation


Open to roles

Primary focus:

  • GRC Engineer (technical implementation)
  • Cloud Security Engineer (compliance/governance focus)
  • Security Controls Implementation Specialist
  • Detection Engineer

Specialized depth:

  • AAM/UAV Security — hands-on drone engineering + security
  • RF/Wireless Security — SDR, spectrum analysis, TraceLock™
  • Cyber-Physical Systems — hardware + software security integration

Growth trajectory:

  • Penetration Testing · Offensive Security (active lab, CySA+ earned Feb 2026, PenTest+ pending)

Actively seeking international opportunities. Remote-first with async collaboration experience across US/EU/LatAm time zones. Contractor/consulting available for non-US companies; visa sponsorship required for relocation.


AI-assisted GRC workflows

Traditional GRC work is documentation-heavy: control matrices, policy drafting, evidence collection, runbooks. I use LLM tools to accelerate delivery:

  • Draft policy and control mapping faster with thorough human review
  • Generate structured evidence documentation from logs and screenshots
  • Produce audit-ready runbooks with consistent formatting
  • Maintain living documentation that evolves with infrastructure

Result: Same rigor and quality as traditional approaches, with faster turnaround. More time for high-value work: architecture, implementation, and validation.


Rare combination

Where most GRC engineers stop at policy, I continue through implementation: - GRC discipline: Frameworks (NIST, CIS, PCI-DSS), evidence collection, control matrices - Cloud security: AWS IAM/GuardDuty/CloudTrail, secure defaults, logging pipelines - Systems engineering: Endpoint hardening, network segmentation, access controls - Detection & telemetry: SIEM tuning, RF/wireless detection, evidence logging - AI acceleration: Multi-agent workflows for compliance content generation

This combination enables me to audit, design, implement, and document security controls — not just check boxes.


AAM cybersecurity: from builder to defender

I don't just study drone security — I've designed, built, and fielded operational UAV systems.

Hands-on engineering background:

  • Designed and deployed small UAS (SUAS) for real-world missions, including beyond-visual-line-of-sight (BVLOS) operations
  • Developed swarm-deployable payload systems with custom avionics integration
  • Authored USPTO patents for UAV delivery and payload mechanisms
  • Built RF telemetry and command/control systems from the ground up

Why this matters for cybersecurity:

When I assess drone security, I understand the attack surface from the inside: firmware vulnerabilities, RF link exploitation, GPS spoofing vectors, and payload tampering. This operational experience — combined with SDR/RF research (TraceLock™) and FAA Part 107 certification — positions me to secure the systems I once built.

Advanced Air Mobility (AAM) is an emerging domain where few practitioners have both engineering depth and security discipline. I bring both.


Connect: LinkedIn | View Resume | Contact