Branding

Prototyping

Strategy

Product Designer

UI/UX Designer

Systems Administrator

Devops / Developer / Owner

Hi! I'm Chris

Hi! I'm Chris — a System Administrator, DevOps enthusiast, programmer,  business owner, and home labber. I design resilient infrastructure, automate everything, and build tools that solve real problems. Whether it's managing cloud systems, writing efficient code, or supporting growing businesses, I bring hands-on expertise and a passion for getting things done right.

Converging Technology, Security, and Innovation: Crafting Tomorrow Through Programming, Automation, and Virtualization

My Featured Projects

Companies I Contribute to

My Education & Work Experience

Work Experience

Owner

CK Technology LLC
April 2025 - Present

Systems Administrator

Resolve Technology
April 2020 - Present

My Education

Bachelor's of Science - Software Development

Southern New Hampshire University
Sep 2019 - November 2023 

Certifications 

Security+ , Network+, CCNA, Linux+  
Present 2024

High School Diploma

Nashua High North
June 2008

Services

What I do

Development & Automation

Designing and deploying full-stack web applications, automating business workflows, and managing custom web hosting solutions. From clean UIs to backend logic, I streamline operations through code.

Systems Administration

Providing MSP-grade support for servers, virtualization, networking, and backups. I handle day-to-day systems management, monitoring, and infrastructure optimization with a focus on uptime and reliability.

Security & Cloud

Securing modern businesses with expert configuration of M365 tenants, Azure/AWS environments, and next-gen firewalls. From email security to cloud hardening, I ensure scalable and compliant setups.

Process

5 Steps to Secure your Infrastructure

1. Assessment & Discovery

Audit your current environment to identify vulnerabilities, misconfigurations, and risk exposure across cloud, network, and endpoints.

2. Architecture & Planning

Design a secure, scalable architecture tailored to your business — including segmentation, IAM, and policy enforcement.

3. Hardening & Deployment

Implement security controls: configure M365, Azure/AWS security features, deploy firewalls, MFA, endpoint protection, and automated backups.

4. Monitoring & Response

Set up real-time monitoring, logging, and alerts to detect threats early. Configure SIEM/SOAR, Defender for Cloud, or similar tools.

5. Maintenance & Training

Ongoing patching, auditing, and employee security awareness — ensuring long-term protection and compliance.

Thinking of a New Project?

Let's collaborate to turn your ideas into innovative, user-focused designs that deliver results.