Pattern Recognition
Finds coupling, dependencies, and failure modes that don't show up in documentation. Correlates data across disconnected systems to surface what's actually happening vs. what people think is happening.
Converged Security & Technology Leader
Security Leadership | CMMC | IT/OT | M&A Due Diligence
CISSP | CISM | GCFA | CMMC CCP | Secret-Eligible
Holland, Michigan | Remote-First
"I find the million-dollar risks hiding in plain sight - whether they're buried in systems, processes, or the things people aren't saying."
Manufacturing, automotive, defense-adjacent, PE portfolio companies, tribal enterprises. Scale-agnostic.
Vendor quoted $50K; scripted it in ~20 hours with automation tooling.
Business case for IT internalization across portfolio IT spend documented three years running.
Paper-based tracking to real-time MES. Still in production 10+ years later.
Frameworks connecting HR, production, quality, machine, and financial data.
Equally comfortable troubleshooting with technicians or presenting to PE partners.
Here's why I operate differently - the cognitive architecture that enables the outcomes you just saw.
"The asymmetry is the asset. Rapid holistic pattern detection rather than sequential verbal processing."
Assessment: WAIS-IV cognitive battery, September 2025, Dr. Shannon Connell (licensed neuropsychologist)
Bridging from "interesting cognitive profile" to "here's what I do for your business" - both analytical AND human capabilities.
Finds coupling, dependencies, and failure modes that don't show up in documentation. Correlates data across disconnected systems to surface what's actually happening vs. what people think is happening.
Holds IT, OT, operations, and organizational dynamics in one mental model - sees how changes cascade across technical and human systems.
Bridges systems that don't talk to each other. Work tickets to invoices, production data to quality metrics, CRM to operations. Finds the gaps and the money left on the table.
Detects unvoiced concerns, misalignment, and organizational dynamics before they surface as problems. Figures out what's not being said. Trusted advisor across all levels.
Drives outcomes through trust, expertise, and stakeholder alignment rather than hierarchical authority. Navigates from shop floor to boardroom with equal fluency.
High emotional intelligence applied to organizational dynamics. The person executives bring in when things get tense. Stays clear on priorities while creating space where people can be honest without fear. Incident command mindset.
Identifies risks and opportunities 6-18 months before they surface. Runs scenarios, spots second-order effects.
Walks into unfamiliar territory, gets productive fast, adapts to what's actually needed. Manufacturing, defense-adjacent, PE, tribal enterprises - different contexts, same rapid orientation.
Reads micro-expressions, detects deception, and identifies behavioral threat indicators in real-time. Applies structured assessment frameworks to personnel risk, insider threat, and organizational dynamics, where security meets human psychology.
Find the hidden technical debt, integration risks, and organizational landmines before you close. Deliver investment-committee-ready reports with quantified risk and 100-day action plans.
CMMC readiness assessments, gap analysis, and compliance architecture for defense contractors and their supply chains. CCP-certified with federal Tier 3 adjudication. Supporting C3PAOs, RPOs, and organizations directly through readiness preparation and remediation.
Strategic technology leadership without the full-time overhead. Roadmapping, vendor evaluation, risk oversight, board-ready reporting. A few hours a week, high-impact decisions.
Bridge the gap between automotive/manufacturing operational systems (OT) and IT infrastructure. Most consultants know one side - I speak both languages fluently.
Evaluate physical, cyber, OT, and organizational security posture in a single engagement. Facility vulnerability assessments, behavioral threat analysis, and protective intelligence across domains that most consultants treat as separate specialties.
When systems fail and nobody knows what happened - incident command, triage, recovery coordination, and forensic analysis. GCFA-certified. From initial containment through evidence preservation, root cause analysis, and lessons-learned documentation.
Stabilize the tech environment, identify quick wins, build the 90-day integration roadmap. Been the steady hand during chaotic transitions.
Bridge disconnected systems to find revenue leakage, process gaps, and operational blind spots. Turn messy data into actionable insight.
Current state assessment, business-IT alignment, prioritized initiative planning.
Build, mature, and operationalize security programs - policy frameworks, governance structures, and risk management processes that actually work instead of collecting dust on a shelf.
Available for the right full-time opportunity
8-20 hours/month of strategic guidance
Defined scope with clear deliverables
Stability during transitions
HAIDEN Technologies
Founded HAIDEN Technologies to deliver strategic technology and security leadership for organizations that need executive-level guidance without the full-time overhead.
The problems I get called in for don't fit in one lane. A manufacturer's cybersecurity gap connects to their OT systems, which connects to physical access control, which connects to the organizational dynamics of who owns what and who's not talking to whom. I work across all of it simultaneously because that's how these problems actually exist.
What engagements look like:
On the product side, modernizing a manufacturing execution system I built as CTO that's still in production 10+ years later, and architecting platforms applying AI and edge computing to industrial operations and compliance.
The thread through everything is cross-functional leadership and cross-domain fluency. I drive outcomes through influence, not org chart authority. I mentor and develop people, navigate stakeholder dynamics, detect what's not being said, and build trust that makes hard conversations productive.
I also read people and organizational dynamics with the same rigor I apply to technical systems. Behavioral pattern recognition applied professionally for 15+ years across incident investigation, conflict resolution, and stakeholder alignment.
Growth partner, not break-fix. Remote-first. Available for fractional, contract, interim, or the right full-time engagement.
Waséyabek Development Company, LLC
Managed IT operations and cybersecurity across a tribal enterprise portfolio with multiple subsidiaries, each with different industries and compliance requirements. Reported to VP of IT; functionally served as CISO across the entire portfolio
RSI Manufacturing
Operated as ownership's #2 for a decade with hybrid IT Director/COO influence across technology, production, logistics, finance, and HR. The person people came to when ownership wasn't available - and the person people came to with problems they couldn't take to ownership
Production Software Integrated, LLC
Led product development of a SaaS manufacturing execution system (MES) from concept through production deployment, addressing operational challenges observed on manufacturing floors
Industry certifications and demonstrated outcomes over academic credentials. 15 years of continuous learning in a field that reinvents itself every few years.
NIST 800-171, CMMC, DFARS
HIPAA, PCI DSS
SIEM, EDR, SOC Operations, Vulnerability Management, Incident Response, Digital Forensics, Threat Detection & Modeling, NIST 800-171, CMMC, DFARS, Risk Assessment, GRC, Behavioral Threat Assessment, Physical Security Assessment, Access Control, OSINT
Microsoft Azure, Entra ID, Microsoft 365, SharePoint, Active Directory, Windows Server, Network Architecture, Virtualization, Disaster Recovery, Business Continuity
PLC Programming, SCADA/HMI, Manufacturing Execution Systems (MES), Industrial Control Systems (ICS), IT/OT Convergence, Machine Monitoring, Industrial IoT, Production Analytics
Python, PowerShell, JavaScript, SaaS Architecture, API Integration, AI/ML Pipelines, Edge Computing, Microservices, Enterprise Architecture, ERP Systems
M&A Due Diligence, Post-Acquisition Integration, Vendor & Third-Party Risk Management, Budget Management, Cross-Functional Leadership, Stakeholder Alignment, Security Awareness Training, Change Management
I'm not here to get calls at 3am when things break. I want to work alongside you to build systems, improve processes, and make your business more profitable and efficient. Where should we spend effort? What moves the needle? That's the conversation I want to be in.
Based in Holland, MI. Available for travel when it makes sense, especially for initial relationship-building or critical moments.
Complex insights come out clearer in writing. I do my best thinking with time to process and articulate. Happy to jump on calls when real-time is needed, but don't expect me to be the fastest talker in the room - expect me to be the most thoughtful.
I tell you what you need to hear, not what you want to hear. But I do it in a way that lands. Honesty with empathy. You'll never wonder where you stand with me.
I've been called this more than once. When things get sideways, I'm the person who shows up and somehow makes people feel like it's going to be okay. Not through cheerleading - through competence and calm.
I create space where people can be honest without fear of it backfiring. If someone's frustrated or struggling, I hear that as information, not as a problem to escalate. That's how you actually fix things.
I map the system, identify the risks, design the architecture. Your team handles execution, or I can help coordinate resources. I stay involved for decision points, not status meetings.
W-2 or 1099 - full-time roles, advisory, and consulting
For larger projects and ongoing partnerships
These are the functional roles this experience and capability set points toward - whether as full-time positions, dedicated engagements, or fractional advisory work.
Delivering strategic technology leadership where it creates the most impact - whether embedded full-time in a single organization or across a portfolio of advisory relationships. High trust, high impact, sustainable engagement.
CMMC compliance, security leadership, converged security assessment, M&A due diligence, critical infrastructure, or something I haven't listed yet. Reach out. I read everything.