Help-desk support | Pen-tester | IT Nerd
Since a very early age I was gamer. Living with my uncles who were both IT nerds, and watching them play their console and PC games, or tinker with their custom rigs doing what they could to improve their devices and make them faster and more reliable. IT was calling to me, dragging me in. It started with games like Doom, Zelda, Starfox, the ones I would consider to be the classics.
Often times I would do something that would break or mess up their systems and to this day I still here them yelling, "You and technology don't mix." This just drew me closer and eventually I would take the plunge.
With that plunge I would find myself diving deeper into the security side of IT. Learning how to break websites or apps to do things the were not designed to do. A huge influence of that was the movie Hackers.
We all know that is not what hacking or pen-testing is like, but man did it build a culture of Hackers and nerds alike. Once I learned what hacking actually was, I was locked in. After spending a good portion of my life studying Martial arts, training with well known fighters and being a fitness coach, and even being a successful tattoo artist. I knew nothing would stop me from accomplishing this goal... Or should I say dream?
I still have a lot to learn but that comes with the territory, you will ALWAYS be learning new concepts and growing in Cybersecurity which honestly draws from a Martial Artist mindset, and THAT is why I am so drawn to the art of Pen-testing.
Hacking, Ethical Hacking... Whatever you want to call it resembles that of the Bushido code. The code of the Samurai. Seeking perfection in everything we do. Learning and growing with every swing of our sword, or in our case the stroke of our keys.
Never settling for anything less than perfection. Diving deeper into the source code of who you are and realizing that your imperfections are what make you perfect. We are Keyboard Samurai...
"独行道"
The Way of Walking Alone - Dokkōdō
I will not name my current employer as to protect theirs and my self interest and identity. In this role I provide tier 1 and tier 2 support and the occasional tier 3 support to users who are and are not apart of the PD force for the city of REDACTED.
This includes but not limited to device imaging for new devices through Autopilot, script creation to automate tasks, as well as working with Infrastructure to insure network Security and stability. Using tools like Crowdstrike and M365 admin Center, as well as Microsoft Defender for Endpoint to monitor User endpoints and even quarantine devices if need be seperating them from the network.
I will very soon be transitioning to a more Security based role to build upon my knowledge further as a Cybersecurity expert. Responded to tickets using Service Now.
Assisted users with day-to-day technical issues within M365 admin center, using Intune, Defender for Endpoint. Responded to ticket using Fresh service ticketing. Assisted Cybersecurity in deployment of Tenable endpoints on the network to ensure security standards were properly met on the network, this included configuration of the Tenable endpoints.
Onboarded and managed user accounts using Microsoft 365. Deployed Cloud based RDP environments to over 180 users. Successfully onboarded user devices to a domain using Intune, Microsoft Entra ID, and Defender for Endpoint. Worked with a team to complete all-reported issues ensuring end user functionality.
Use the form below to send me a message:
Connect on LinkedIn:
© 2025 David D. All rights reserved.
OS: Windows 98
Computer Name:R2D2
Owner:David D.
💾 (C:) Local Disk - 2.1 GB free
📀 (D:) CD-ROM Drive
💿 (A:) 3½ Floppy Drive
Recycle Bin is empty.
Deleted items will be stored here until you permanently delete them.