Application Systems Analyst · Google Data Analytics Certified · Library Technologist · Security-Conscious Engineer
With a background in IT librarianship and data engineering, I build systems and integrations that turn operational complexity into reliable, user-facing solutions.
I use AI as a true development partner, freeing me to focus on system architecture, integration design, and delivering solutions people can actually depend on.
💡 I believe technology is a gift from God — meant to serve people, bring light, and reflect His wisdom and creativity. Everything I build, I want to use for good and for God's glory.
My goal is to build systems that are genuinely useful, responsibly designed, and worth the time of the people who depend on them.
- AI systems and multi-agent orchestration — coordinating multiple LLMs for reasoning, comparison, and autonomous dialogue
- Security engineering and cryptographic experimentation — protocol design, applied cryptography, steganography, and fail-closed / fail-safe system design
- Library systems integration and automation — connecting ILS platforms, access control, reservations, and patron workflows through API integration
- Data pipelines and analytics — transforming library and public-sector data into structured, actionable insight
- Human-centered software design — prioritizing reliability, accessibility, and operational usefulness over technical novelty
| Category | Technologies / Tools |
|---|---|
| Languages | Python, C#, SQL, Rust, JavaScript, HTML/CSS |
| Frameworks | .NET 8, ASP.NET Core MVC, Next.js, FastAPI |
| AI / ML | Prompt Engineering, Multi-Agent Systems, LLM Orchestration, LangChain, OpenAI API |
| Data | Data Pipelines, Pandas, Visualization, Automation, APIs, CI/CD, Observability |
| Security | Applied Cryptography, Steganography, Threat Modeling, Tamper Detection, fail-closed design |
| Practices | TDD, Security Review, Ethical Design, Human-Centered Design, AI-Assisted Development |
🚀 Demo (may take 20–60s to wake from free-tier sleep on first load)
An async platform that orchestrates real-time dialogue between multiple LLMs — useful for comparing model reasoning, stress-testing arguments, and exploring how different AI systems approach the same problem.
Highlights
- 5 LLMs supported: Claude, ChatGPT, Gemini, Grok, Perplexity
- Async orchestration with circuit breakers and rate limiting
- Web dashboard and CLI control
- Observability via Prometheus and Grafana
- LLM Guard security and path hardening
- Docker, CI/CD, 90%+ test coverage
uv run aic-start --agent1 claude --agent2 chatgpt --topic "AI consciousness" --yes🌐 Demo
A research project exploring data transfer across air gaps using animated QR / image frames. A phone acts only as an untrusted optical sensor — all cryptographic operations stay on the endpoints.
The design prioritizes an explicit threat model, honest security boundaries, and resistance to misuse.
Highlights
- AEAD: AES-256-GCM
- Password KDF: Argon2id
- Fail-closed parsing with tamper detection
- Explicit, versioned byte-level protocol specifications
- Threat-model-driven invariants throughout
Status: Actively hardening — not yet externally audited.
🌐 Web Site
A Christ-centered learning application mapping Old Testament prophecy to New Testament fulfillment — designed to help people see the unified story of Scripture and God's love revealed through Christ.
Tech: Next.js Tailwind CSS React · Progressive Web App
A prayer-focused mobile application designed to help individuals and groups organize prayer requests, track intercession, and stay rooted in Scripture. UI prototyped in Figma; backend in progress toward mobile/PWA release.
Tech: Firebase Firestore Cloud Functions · Progressive Web App
Focus: Faith-Based Product Design Prayer Workflows Human-Centered UX
More Projects
🌐 Web Site
A Scripture-centered discernment tool walking users through a 10-step framework for seeking God's will — grounded in prayer, biblical wisdom, and reflective practice. Designed as a quiet, focused experience free of noise and distraction.
Tech: JavaScript Next.js React · Focus: Faith-Based UX Scripture-Centered Design Spiritual Formation
🌐 Web Site
An interactive cryptographic algorithm reference covering 12 categories and 55+ algorithms with beginner and advanced modes, international support, and links to portfolio projects. Built for developers and security learners who need a fast, structured comparison across cipher families.
Tech: TypeScript Next.js · MIT License · Focus: Applied Cryptography Reference Tools Security Education
🌐 Web Site
An interactive museum of historical ciphers featuring visual explanations, encryption demos, and cryptanalysis labs — designed to make the history and mechanics of cryptography accessible and engaging.
Tech: HTML JavaScript · Focus: Cryptography History Security Education Interactive Learning
🌐 Demo
A research-grade threshold file encryption tool combining Shamir Secret Sharing with post-quantum cryptography (SMAUG-T + HAETAE). Explores practical applications of Korean PQC standards for future-resistant data protection.
Tech: Rust · MIT License · Focus: Post-Quantum Cryptography Threshold Encryption Security Research
🌐 Demo
An evolved version of the original Dad Mode Morse — encrypts messages with AES-GCM and transmits them as Morse code with beep audio and copy/paste decoding for easier cross-device use.
Tech: HTML JavaScript · MIT License · Focus: Signal Encoding Client-Side Crypto Creative Security
❄️ SNOW2
🌐 Demo
A modern Rust reimplementation of the classic SNOW steganography tool with strong 2026-era cryptography, focused on secure hidden-message embedding and educational security engineering.
Tech: Rust WASM Cryptography Steganography · Focus: Security Engineering Privacy Tools
Analysis of U.S. public library service and funding trends using IMLS Public Libraries Survey data.
Tech: Python Pandas Matplotlib · Focus: Public Library Data Visualization Insights
Automates catalog key creation for SirsiDynix by fetching current NYT Bestseller ISBNs via API.
Tech: Python APIs Automation · Focus: Library Automation
An interactive Google Colab course teaching AI prompting through Bible study exercises.
Tech: Python Colab LLM APIs · Focus: Education Faith + Technology
The following production systems cannot be open sourced because they involve library infrastructure and operational workflows. High-level summaries are provided below.
A two-application ASP.NET Core platform built for the LeRoy Collins Leon County Public Library. The public-facing app handles online library card registration and identity document submission. A separate internal dashboard provides staff with tools to review, approve, and manage applications, along with diagnostics for system health and ILS connectivity.
Key capabilities
- Encrypted document upload pipeline using AES-256-GCM
- Multi-layer file validation and malware scanning
- Barcode reservation and issuance workflow
- Address validation via ArcGIS services
- Automated patron record creation through SirsiDynix Symphony Web Services
- Staff dashboard for registration review, approval, and rejection workflows
- Diagnostics interface for Symphony connectivity, configuration review, and log inspection
- Rate limiting, request size controls, and defensive security boundaries
- Adversarial, security, and integration testing across all system boundaries
Architecture
- ASP.NET Core MVC — C#
- Public and staff applications deployed separately for security isolation
- Encrypted JSON-based shared record storage
- Service-layer architecture covering validation, scanning, encryption, email, diagnostics, and ILS integration
- Fail-closed startup behavior and defensive error handling
Focus: Security Engineering PII Protection Library Systems Integration Operational Reliability
A real-time monitoring service that ingests door swipe events from the C-CURE 9000 access control system via Victor Web Services, evaluates operational conditions, and triggers automated staff alerts.
Key capabilities
- Real-time ingestion of C-CURE 9000 access control events
- Secure webhook endpoint with HMAC signature validation
- Automated email alerting for monitored door activity
- Health monitoring and diagnostics endpoints
- Structured logging for operational visibility
- Reliability controls preventing missed or duplicate alerts
Architecture
- JavaScript web service
- Victor Web Services integration with the C-CURE 9000 platform
- Webhook-based event processing pipeline
- Monitoring and diagnostics interface for staff
Focus: Real-Time Systems Security Event Monitoring Systems Integration Operational Reliability
A collaboration with a staff programmer integrating LibCal meeting room reservations with the C-CURE 9000 access control system. My contribution covered systems analysis, integration architecture, and domain expertise — identifying LibCal's APIs as the integration entry point, defining the data flow between platforms, and guiding the overall design. The programmer handled implementation.
The system automatically provisions temporary door access based on active reservations, allowing patrons to unlock meeting rooms using their library cards.
Key capabilities
- Automated provisioning of temporary access clearances from reservation data
- Eliminated manual staff steps for study and huddle room access
- Improved patron autonomy through event-driven access control
- Recognized with an I² (Innovator / Inspirator) Award for development and deployment leadership
Architecture
- C# web service
- LibCal APIs — reservation data retrieval and integration entry point
- C-CURE 9000 via Victor Web Services — access clearance provisioning and management
- Event-driven service layer bridging reservation state to access control actions
Focus: API Integration Systems Analysis Workflow Automation Access Control Systems
A collaboration with a staff programmer integrating LibCal reservation data with the SirsiDynix Symphony ILS to automate checkout transactions for Library of Things items. My contribution covered systems analysis and integration design — identifying LibCal's APIs as the entry point, defining the mapping between reservation records and Symphony patron/item data, and establishing the workflow logic. The programmer handled implementation.
Key capabilities
- Automated circulation transactions triggered directly from LibCal reservation events
- Synchronization of reservation state with Symphony patron and item records
- Eliminated manual checkout processing for equipment lending workflows
- Improved reliability and consistency for Library of Things programs
Architecture
- C# web service
- LibCal APIs — reservation data retrieval and integration entry point
- SirsiDynix Symphony Web Services APIs — circulation transaction processing
- Web service layer translating LibCal reservation events into Symphony checkout operations
Focus: Library Systems Integration Systems Analysis Web Services Process Automation
I'm always open to collaboration, thoughtful technical discussions, and projects that combine AI, data, automation, ethics, and public good.
If you're building systems that help people, improve access to knowledge, or solve real operational problems, I'd love to connect.
"So whether you eat or drink or whatever you do, do it all for the glory of God."
— 1 Corinthians 10:31 (NIV)