15+ years where security is not theoretical — operational, measurable, and continuously tested.
Fifteen-plus years designing and securing infrastructure across regulated, high-stakes, and adversarial environments.
A Senegalese-born U.S. citizen holding U.S. Government Top Secret / SCI clearance, with studies in Network Administration and Security at Advanced Software Analysis College in Brooklyn, NY, and in Cybersecurity at Pace University in New York, NY. Work spans defensive security, offensive security, AI security, infrastructure security, security automation, and autonomous machine security — with software engineering depth and senior technical leadership experience covering architectural design, advanced escalation support, cryptography, and risk-informed decision-making.
My work sits where identity, authorization, and execution meet: the layer where access decisions actually become actions in production systems. Most security architectures stop at who and whether. The harder question is what happens next — whether each operation is verifiable, constrained, and governed in real time, under evidence an independent party can reproduce.
That problem has shaped my career, and it is the focus of current research into a new protocol category for governance of autonomous systems in the post-quantum era.
Expertise
- Cybersecurity Architecture Zero Trust, IAM, enterprise perimeter, hybrid cloud, and identity federation across administrative domains.
- Automation & Security Operations SOAR, threat hunting, incident response, and operational security at scale.
- Applied Cryptography Enterprise PKI, protocol design, post-quantum readiness, and HSM- and TEE-backed key management.
- AI & Autonomous Machine Security Execution-time authorization, autonomous workload governance, and adversarial robustness for AI and agentic systems — including runtime governance research aligned with the Execution Authority protocol category.
Engagements have covered security architecture, penetration testing, threat hunting, IAM and Zero Trust implementations, cloud computing, email and data security, large-scale migrations, secure software development, distributed systems, and enterprise encryption services.
Experience built where security is not theoretical; it is operational, measurable, and continuously tested against real-world threats.
Credentials
U.S. Government Top Secret / SCI clearance.
CompTIA Secure Infrastructure Expert (CSIE) — stacked from CompTIA Security+, CySA+, PenTest+, and SecurityX (formerly CASP+).
Active Research
Current research focuses on a new protocol category — Execution Authority — for runtime governance of autonomous machines in the post-quantum era. The work addresses what happens after access is granted: whether each operation is verifiable, constrained, and governed in real time, under evidence an independent party can reproduce.
Adjacent work explores adversarial governance integrity verification and the emerging capability-governance gap for highly sophisticated autonomous AI operating above current detection ceilings — where conventional monitoring assumptions no longer hold.
Patent applications pending. Research handled through Yandeh Holdings Inc. Available for discussion under NDA with qualified parties.
Conversations Welcome
Open to conversations on execution-time security, verifiable authorization, autonomous system governance, and related research.