Available for hire

Luke
Kim

Security+ Network+ A+ ITIL v4 DoD 8570 IAT Level II B.S. IT · WGU 2026

Security-minded.
Systems-fluent.

I'm an IT professional based in Northern Virginia, currently working as a Systems Administrator at CATHEXIS in Tysons, VA.

My background spans enterprise security operations, vulnerability management, SIEM analysis, endpoint hardening, identity governance, and cross-functional IT support — developed across environments where accuracy and accountability matter.

I bring the same rigor to every role I step into, whether that's securing infrastructure, administering systems, or building the documentation that keeps teams aligned and auditors satisfied.

Currently completing my B.S. in Information Technology at WGU (expected 2026) and pursuing CySA+, SC-200, and AZ-500.

Eligible for U.S. Security Clearance — DoD 8570 IAT Level II compliant via CompTIA Security+.

5+
Years Enterprise IT Experience
400+
User Environment Secured
20+
SOPs & Playbooks Authored
30%
Reduction in Credential Compromise

Where I've
done the work.

CATHEXIS
Current
Tysons, VA
Systems Administrator

Supporting fast-paced IT operations across infrastructure, endpoints, and security — reporting to the IT Manager in a Tysons, VA on-site environment.

  • Provide technical support and troubleshooting for hardware, software, and network issues — ensuring business operations remain uninterrupted.
  • Manage employee onboarding and offboarding — provisioning and deprovisioning accounts, equipment, and access in a timely and documented manner.
  • Oversee IT asset inventory — procuring, tracking, and managing hardware and software across the organization.
  • Collaborate with IT staff to conduct regular security audits — identifying vulnerabilities and ensuring compliance with security policies.
  • Develop and maintain IT documentation — capturing configurations, procedures, and system changes for operational continuity.
  • Support deployment of new applications and technologies — participating in rollout planning, testing, and implementation.
Museum of the Bible
Aug 2023 – Apr 2026
Washington, DC
IT Service Desk Technician II

Served as the primary information security resource for a 400+ user enterprise — full security analyst scope alongside IT operations responsibilities.

  • Executed vulnerability management cycles against Windows Server assets — CVE analysis, risk prioritization, patch coordination, and NIST SP 800-53-aligned documentation.
  • Served as the escalation point for complex and unresolved tickets — triaging issues beyond Tier I scope, coordinating resolution with infrastructure teams, and ensuring SLA adherence.
  • Led Windows 11 enterprise upgrade across endpoint fleet — coordinating rollout planning, compatibility assessment, and deployment with minimal operational disruption.
  • Led org-wide MFA rollout across 400+ accounts, driving a 30–40% reduction in credential compromise events.
  • Authored 20+ security SOPs and incident response playbooks — audit-ready and consistently followed across teams.
  • Conducted root-cause analysis on recurring incidents — communicating findings and remediation status to management.
Museum of the Bible
Oct 2022 – Aug 2023
Washington, DC
IT Service Desk Technician I
  • Investigated security violations and endpoint alerts — documenting findings, coordinating resolution, and tracking items through to closure.
  • Designed and deployed RBAC-based onboarding and offboarding workflows — reducing provisioning time by ~25% with fully auditable account lifecycle records.
  • Maintained 100% compliant hardware asset inventory with data-safe decommissioning procedures.
  • Documented system configurations and security control changes using the ManageEngine suite — maintaining audit-ready records of all security-relevant activity and supporting management visibility into security posture.
DentCore
Oct 2018 – Jan 2020
Chantilly, VA
Clinical Technology Specialist
  • Secured multi-site clinical infrastructure under HIPAA requirements — hardened network and endpoint configurations to protect PHI.
  • Administered Salesforce CRM and ZOHO CRM with strict RBAC enforcement and auditable access controls — ensuring patient and organizational data remained accessible only to authorized personnel.
  • Managed end-user support and ticket workflows through Zendesk — tracking issues to resolution and maintaining service documentation across distributed clinical sites.
  • Deployed and supported TeamViewer for remote technical assistance across multi-site clinical environments — reducing on-site response time and enabling faster issue resolution.
  • Delivered phishing, password hygiene, and security awareness training across a distributed clinical workforce.

Beyond the
day job.

Hobby Lobby
Feb 2024
Oklahoma City, OK
SOC Operations Program

Participated in live security operations within a production SOC environment.

  • Reviewed SIEM alerts in Splunk and Rapid7 InsightIDR — investigating security exceptions, escalating incidents outside runbook guidance, and documenting all actions and outcomes.
  • Built and configured a sandbox environment for the security operations team — enabling safe testing of detection rules, attack simulations, and incident response workflows without impacting production systems.
  • Participated in live security operations — coordinating incident escalation and managing the full remediation ticket lifecycle in a production SOC environment.
  • Monitored honeypots and analyzed attack logs to identify adversarial TTPs — contributing root-cause findings and detection improvement recommendations to the security operations team.
Askeal AI
Oct 2025 – Ongoing
Remote
Cybersecurity AI Tools Evaluator
  • Evaluated AI-driven threat detection and incident response tools against real-world security scenarios — assessing detection accuracy, identifying gaps, and delivering structured practitioner feedback.
  • Feedback directly shaped product iterations across multiple tool assessments.

The technical
toolkit.

Security Operations
SplunkRapid7 InsightIDRMicrosoft SentinelAlert TriageIncident ResponseIOC Identification
Vulnerability Management
CVE AnalysisRisk PrioritizationPatch CoordinationWindows Server HardeningNIST SP 800-53
Endpoint & Identity
Intune MDMAzure ADRBACMFA DeploymentConditional AccessLeast Privilege
Networking & Infrastructure
TCP/IPDNS / DHCPVPNSnort IDS/IPSpfSenseNetwork Segmentation
Cloud & Platforms
Microsoft AzureMicrosoft 365AWS FoundationalSharePointServiceNowManageEngineSalesforceZOHO CRMZendeskTeamViewer
Frameworks & Standards
MITRE ATT&CKCIS ControlsITIL v4Zero TrustDoD 8570HIPAA
Operating Systems
Windows 8 / 10 / 11Windows ServerUbuntuUbuntu ServerPop!_OSFedoraDebianmacOS

Earned
certifications.

CompTIA
Security+
Jun 2025 · Expires Jun 2028
CompTIA Security+
CompTIA
Network+
Apr 2024 · Expires Jun 2028
CompTIA Network+
CompTIA
A+
Sep 2022 · Expires Jun 2028
CompTIA A+
PeopleCert / AXELOS
ITIL v4
Feb 2026
ITIL v4 Foundation

Academic
foundation.

WGU
Expected 2026
B.S. Information Technology

Western Governors University — actively pursuing degree alongside full-time IT work.

West Springfield HS
2013
Springfield, VA
High School Diploma

West Springfield High School

Built &
documented.

Home Security Operations & Vulnerability Lab

Multi-node Proxmox VE homelab running Splunk SIEM — full incident documentation, vulnerability testing, attack simulations, and network segmentation with pfSense and Snort IDS/IPS. Active Directory and RBAC configured to mirror enterprise identity governance.

SplunkProxmox VEpfSenseSnortActive Directory
Resume Tailoring Tool

Python-based automation tool that takes a base resume and a job description and outputs a tailored version with targeted language and metrics — built using Claude Code as part of a broader career development automation project.

PythonClaude CodeAutomation

Let's talk
opportunities.

I'm open to roles across IT security, systems administration, cloud infrastructure, and operations — anywhere my background in enterprise environments translates into immediate value. If that's your team, let's connect.

Send an Email