Building Secure & Intelligent Infrastructure
I design, build, and run high-availability environments end to end-from physical cabling and 100GbE spine-leaf cores to self-hosted AI ecosystems. Specializing in cybersecurity investigation, scientific workload optimization, CMMC compliance, and translating complex technical challenges into measurable business value.
Security-focused infrastructure, network, and AI systems engineer with a proven track record of designing enterprise-grade solutions that balance cutting-edge innovation with rigorous security practices.
My architectural approach centers on 100GbE spine-leaf cores with server distribution/routing, dual-WAN edge with HA firewalls, and 10GbE high-availability MLAG/VLT distribution and access layers. This foundation, built with extensive SFP+/QSFP+/DAC cabling expertise and meticulous physical layer design, supports everything from traditional enterprise workloads to GPU-intensive scientific computing environments with self-hosted AI platforms and multi-model orchestration.
Core Philosophy
"Build secure, reliable, scalable systems that are invisible to users, transparent to operators, and always tied to measurable business value."
Cost Optimization
60% reduction in virtualization licensing costs through strategic VMware vSphere 6.7 to Proxmox VE 8.2 migration
AI Platform Efficiency
70-80% cost savings vs cloud alternatives via self-hosted multi-model orchestration with GPU resource management
Enterprise Scale
Network modernization serving 1,000+ devices and 300+ users with sub-5-minute service restoration capabilities
Government Security
Successfully passed all third-party government security probes while maintaining CMMC Level 3 compliance standards
SMART-E + CIA Framework
The comprehensive cybersecurity framework I've developed and implemented across enterprise environments, combining practical security measures with the foundational CIA triad for holistic protection.
Strengthen, Speak, Sustain
Monitor, Mindset, Mitigate
Assess, Audit, Assure
Risk, Review, Reevaluate
Timely Patch, Tightly Secure, Trim Privileges
Ethics, Education, Evolution
CIA Triad Foundation
Confidentiality
Protect sensitive data from unauthorized access through encryption, access controls, and secure communication channels
Integrity
Maintain data accuracy and prevent unauthorized alterations through checksums, digital signatures, and audit trails
Availability
Ensure systems and data remain accessible when needed through redundancy, disaster recovery, and performance optimization
Professional Experience
16 years of hands-on experience building secure, reliable infrastructure while maintaining empathetic user support and continuous learning
Cyber Security Engineer / Analyst
Herrick Technology Laboratories, Inc. (Remote - 3+ years)
Network Design Engineer
Herrick Technology Laboratories, Inc.
Founder / Owner - Multiple Ventures
Unity Tech Labs, DATAROSS IT, Option A, Insightful Eye (AI)
Systems / Network Engineer
Experient (Maritz Global Events)
IT Intern & Associate Systems Engineer
Invitrogen Corporation / Life Technologies / Thermo Fisher Scientific
Core Principles
The foundational values that guide every technical decision, client interaction, and team collaboration
Foundational Values
Mutual Care and Reciprocity
"What we do for others, we do for ourselves; and what we do for ourselves, we do for others."
Rooted in Matthew 25:40, serving clients and colleagues serves a greater purposeThe Golden Rule
"We treat others as we would like to be treated."
Inspired by Luke 6:31, guiding all interactions with clients, partners, and team membersShared Responsibility
"We carry each other's burdens to strengthen the whole."
Based on Galatians 6:2, working collaboratively to achieve shared goalsGenerosity and Prosperity
"When we help others succeed, we succeed together."
Drawn from Proverbs 11:25, fostering mutual growth and shared successHumility and Selflessness
"We prioritize the interests of others to build a stronger, united team."
Guided by Philippians 2:3-4, emphasizing humility, respect, and valuing othersInterconnected Excellence
"Our work reflects the interconnectedness of all we do."
Every action aligns with values, ensuring contributions benefit the collectiveDATAROSS IT Core Values
Empathy
Understanding and sharing feelings of others for user-centered design and support
Patience
Tolerating delays and problems without frustration, crucial for troubleshooting and user support
Effective Communication
Conveying information clearly and empathetically, vital for teamwork and project management
Problem-Solving Skills
Analyzing issues and finding creative solutions essential for resolving IT challenges
Attention to Detail
Noticing and addressing small errors or changes important for system reliability and security
Adaptability
Adjusting to new situations and technologies, key for staying relevant in evolving IT field
Continuous Learning
Commitment to ongoing education and skill development in rapidly changing technology landscape
Security Mindset
Prioritizing protection of data and systems with proactive security measures and awareness
Service Orientation
Focus on helping others and providing exceptional user experiences in all technical solutions
Quality Focus
Commitment to excellence and best practices ensuring reliable, maintainable systems
Get In Touch
Let's discuss how the SMART-E + CIA framework and empathetic approach can strengthen your organization's security posture
Location
Frederick, Maryland
Remote/Global Availablelinkedin.com/in/zachary-ross-5b7a6b25/
Professional NetworkGitHub
github.com/rosszc91/
Code PortfolioSupport My Work
paypal.me/DATAROSSIT
Buy me a coffee!