01 / Index Remote-first

Let's make it boring,
in the best way possible.

I'm a freelance IT Systems Engineer working with modern teams on Microsoft 365, Zero Trust endpoint management, and resilient network architectures. I turn messy tenants and ad-hoc networks into auditable, automated, observable systems.

§ Writing

Field notes.

Practical posts from real engagements — endpoint management, identity, networking, observability. Opinions, numbers, and the occasional config snippet.

Filter
§ Capabilities

What I do.

Focused engagements across Microsoft 365, identity, security and network infrastructure. For role history and past engagements, see my LinkedIn.

Services
S·01 Endpoint · Identity
Microsoft 365 / Zero Trust

M365 tenant hardening

Tenant audits, Conditional Access design, Intune enrollment at scale, Autopilot provisioning, and privileged access with PIM. I bring tenants from ad-hoc to auditable — with a documented baseline your internal team can keep running.

AuditTenant review & gap analysis
MigrateLegacy MDM / SCCM → Intune
HardenCA policies, device compliance, PIM
DocumentRunbooks for handoff
S·02 Network
LAN / WAN / Perimeter

Network design & multi-site fabric

SLA-backed, highly-available networks for offices and small datacenters. VLAN segmentation that actually maps to policy, DPI-enabled perimeter, remote-access portals for contractors, and a boring day-to-day that stays boring.

DesignTopology, VLAN, SSID plan
DeployMeraki / UniFi fabrics
SecurePerimeter & remote access
OperateSLA-backed ongoing support
S·03 Observability
Monitoring & SIEM

Centralized logging, monitoring & SIEM

Right-sized monitoring for small and mid-sized IT teams. Zabbix for infrastructure health, Graylog or Wazuh for security-relevant logs, and reports when leadership needs numbers. Alerts tuned to be actionable, not noisy.

InstrumentServers, network, endpoints
IngestWindows / Linux / FW logs
AlertActionable thresholds & SLOs
ReportExecutive-ready dashboards
S·04 Security
EDR / Vulnerability mgmt

Endpoint detection, response & vuln management

Select, deploy and standardize EDR across Windows and macOS fleets. Vulnerability scanning, DNS-layer protection, and a response playbook the team can follow at 3am without paging me.

SelectEDR / vuln tooling fit-check
DeployFleet-wide rollout
RespondPlaybooks & triage runbooks
TrainInternal-team handoff
§ Contact

Start an engagement.

Quick note on scope, timelines, and the tenant or environment you need looked at. I'll reply within one business day — usually faster.