Who I Am

Product Design leader building and elevating data-driven design for cybersecurity.
I embrace the role of B2B product design leader focusing on business outcomes and problem-solving through design, leveraging my continual research and learning in the cybersecurity space to convert complexity into simplicity for customers.
Cybersecurity
Data Enthusiast
Foundations
Design Ownership
Big Picture Thinking
Leadership
I practice an entrepreneurship mentality to product experiences, owning the end-to-end design process which includes a built-in awareness to shape these experiences into outcomes that propel business goals.
I balance the voice for design in an organization and holding myself accountable for maintaining emotional intelligence with all my colleagues, shaped by 15+ years experience on product teams.
I emphasize a holistic product experience that scales, believing the synergy beteen individual core product experiences cohesiveness, familiarity, and trust that resonates with customers.
Results Achieved
Task completion success rate championed by user-centered design.
Reduction in manual work processes involving complex datasets.
Increase in sales revenue through design + sales partnership.
$12+MM
pipeline
$3+MM
ARR
Products involving my ownership of the end-to-end design process, concept ideation to final delivery.
My Driver: The Intersection of UX, AI and Cybersecurity
I’m driven by the intersection of AI and cybersecurity, where user intuition meets machine intelligence. My strong interest lies in collaborating with security experts on how design can help people understand, trust, and collaborate with systems that anticipate and defend against evolving threats.
Anticipating attacks before they occur
How do we help users understand predictions and uncertainties without over - or under - trusting the AI’s foresight?
Translating deviations into actionable insights
How can we present tiny behavioral anomalies in a way that feels actionable — not like noise?
Native AI
partnership
How might we design an AI partner that augments an analyst’s reasoning, rather than replacing it?
Systems that explain the ‘what’ and ‘why’
How do we create UX systems where automation takes action — but humans stay in control?
Suspicious IP:
111.118.51.12
Findings:
Suspicious Location
Outside Work hours
Anomalous Behavior
MITRE Pattern:
Reconnaissance - 89%
Privileged Escalation- 76%
Data Access- 76%
Recommended
identify accessed data
Show specific S3 object paths accessed via GetObject by user B_Wayne from suspicious IP 111.118.51.12.
111.118.51.12
Suspicious
API calls
GetObject
Case Study
Cybersecurity
Native AI
CONCEPT: Native AI partnering with security analysts and threat hunters through a full case investigation, from hypothesis to containment.
Product
AI Protection Platform
Customers partnering with AI to build a story (investigation), layer by layer.
Challenge
1 Week
Deadline for design concept, referencing a single requirements document.
Business Impact
96%
Reduction in MTTR (mean time to respond). Zero-work-to-insight investigations.
9.8
CVE-2023-49733
Weaponized
Threats and Vulnerabilities
Threat actors
12
Wizard Spider, APT29, Conti, APT10, REvil, LAP$U, Lazarus Group, Equation Group...
21
FTP
2022-05-25 15:33:35
OpenSSH 2.0, Firewall, Linux, cpe:/a:openbsd:openssh:7.6p1
Case Study
Cybersecurity
Threat Intelligence
Customer Impact: Replaces 50% of redundant internal security tools, resulting in reduced costs for organization.
Product
Attack Surface Intelligence
Utilizing 620+mm IPs tracked so organizations stay secure against threats.
Challenge
3 Months
Deadline for the MVP release while learning the intricacies of threat intelligence.
Business Impact
10MM
Revenue as of Q1 2024. ..." the fastest growing product line".