As an experienced IT professional with a distinguished United States Marine Corps background, I specialize in cloud architecture, security, and systems engineering. My expertise is centered on enhancing system and network performance, reinforcing security measures, and improving user satisfaction. I have a proven track record in configuring and managing extensive computing environments across various industries, ensuring optimal functionality, performance, and security.
Beyond my technical expertise, I am deeply committed to expanding my professional network and seeking opportunities to aid others in their personal and career pursuits.
[Block Device Code Phishing in Entra Without Breaking Legit Workflows](https://nineliveszerotrust.com/blog/entra-device-code-phishing-sentinel/) - Device code phishing is nasty because the user does not hand over a password. They hand over a session.
The lure sends t...Agent 365 Ships May 1. I Tested the Defender Playbook for AI Agent Attacks. - Microsoft Agent 365 goes generally available on May 1, 2026. Most launch-week posts will explain what it is. I wanted to...Scan Every Blob, Trace Every Read: Defender for Storage + Sentinel - Storage is where malware waits. A blob uploaded to ingest/ by a pipeline step, a partner’s SFTP connector, or a misconfi...Detecting Infostealer Session Hijacking with Microsoft Sentinel - Nearly 70% of incidents in the Americas now begin with stolen or misused accounts. Infostealers are the engine behind th...Investigate Hidden Privilege Paths with Microsoft Sentinel Data Federation and Custom Graphs - After a compromised service principal incident, the first triage question is always the same: “What else can this identi...
▶ ...more posts on nineliveszerotrust.com



