How do you go from being an Editor, to a Colorist, to a Cybersecurity Analyst?
Honestly, it is not a long walk from one to the other. Don't misunderstand me, they are different, but the core processes of each discipline are the same. For both you must analyze and track large amounts of media and its metadata, and then utilize that information for storytelling. You must have an excellent sense of the wider scope while also being able to drill down on the smallest detail to find the nuanced meaning, to understand its implication and then exploit it to its fullest potential. That is the role of an Editor, that is the role of a Colorist, that is the role of a Cybersecurity Analyst. I have always had this mindset and so the pivot to cyber security feels to me more of a lateral move. A new pursuit that simply uses a different vocabulary.

I recently completed a successful one-year engagement with Crum & Forster, where I led the optimization of their Secure Email Gateway (SEG) and incident response efforts. Tasked with enhancing Proofpoint’s Protection Server, Threat Attack Protection (TAP), and Cloud Threat Response (CTR), I drove tool efficiency from 96% to 99.99%, significantly improving detection accuracy and reducing analyst fatigue.

I currently specialize in email threat analysis, phishing investigation, user education, and security automation. I’ve contributed to Phishing Awareness Training, Data Loss Prevention (DLP) programs, and built automated workflows to streamline alert triage and incident response..

What sets me apart is a creative problem-solving mindset, honed from a prior 20-year career in post-production, now focused on protecting users and infrastructure in the cyber domain. I thrive in dynamic environments, collaborate effectively across technical and non-technical teams, and continuously pursue hands-on learning and certifications

Before transitioning to cybersecurity, I spent over two decades as a colorist and finishing editor, collaborating with high-profile clients across film, television, and advertising. That experience sharpened my attention to detail, technical adaptability, and ability to communicate complex workflows to non-technical audiences—skills I now apply to threat analysis, phishing response, and user education in cybersecurity.

Currently open to full-time or contract roles as a Cybersecurity Analyst, Tier 1-2 SOC Analyst, or Email Threat Detection Specialist—especially those requiring strong client-facing communication.
SplunkCrowdstrikeSentinelOneIBM SecurityProofpointVirusTotalInvictiTenable.ioGoogleAWS