Secure CI/CD Pipeline
Automated build/deploy with security gates (SAST), approvals, and environment promotion safeguards.
IT Manager • Data Protection Officer • Security-minded
I’m an IT Manager and Data Protection Officer focused on building dependable IT operations, strengthening security, and delivering privacy-by-design practices. I enjoy turning messy problems into stable systems: clearer processes, better tooling, and calmer incident response.
What I do and how I work
I lead IT operations and data protection programs—driving system improvements, security hardening, and compliance practices that reduce downtime and protect sensitive data. I’m hands-on with governance, risk, and incident response, and I like building clear documentation and repeatable processes so teams move faster with fewer surprises.
IT Leadership & Strategy • Data Protection & Compliance (DPIAs, DPA/GDPR) • Governance & Risk (DPO role) • System & Network Administration • Technical Support & Troubleshooting • Cybersecurity & Incident Response • Project & Vendor Management • Documentation & Reporting
Certified Data Protection Officer • Data Protection Officer Training Program • ISC2 Certified in Cybersecurity (CC) • DICT Cybersecurity Competency Training • Ethical Hacking Training • Google IT Support Professional • NC II Computer System Servicing (TESDA) • Network & Basic System Admin (The IT Poor Guy) • CCNA R&S: Routing and Switching Essentials
BS in Information Technology, University of Cebu — Cum Laude. Senior High ICT — With Honors.
Practical work in security, ops, and automation
Automated build/deploy with security gates (SAST), approvals, and environment promotion safeguards.
Centralized logs/metrics with dashboards and high-severity alerting to cut MTTR.
Static, privacy-conscious site deployed on Cloudflare Pages. Minimal analytics; email-free contact flow.
Highlights from recent roles
How this site handles personal data
This website does not require an account. If you use the contact form, the information you type (your name, email, and message) will be included in an email draft on your device.
The “Compose email” button uses a mailto: link to open your email application and prefill the subject/body.
Your message is not sent to a server by this website, and no recipient address is displayed on the page.
This page does not set tracking cookies and does not include third-party analytics scripts by default. (Your hosting provider may still log basic request data for security and reliability.)
If you choose to contact me, your details are used only to respond to your inquiry, coordinate work, or discuss opportunities. Processing is based on your consent and/or legitimate interest in responding.
If you email me, your message will be retained only as long as needed to respond and for reasonable record-keeping. You can request deletion of your message unless retention is required by law or for legitimate business needs.
You may request access, correction, deletion, or a copy of personal information you shared with me.
For privacy inquiries, you can reach me via LinkedIn or through the email you compose using the contact form.
Let’s talk about roles, projects, or consulting