Content Marketing Writer and Strategist
Austin, TX
Complex technology made clear and compelling across cybersecurity, SaaS, med-tech, and enterprise software. Writing that informs, persuades, and performs.
I'm a B2B content marketing specialist with over twelve years of both agency and in-house experience in copywriting, editing, and content strategy — spanning cybersecurity, enterprise IT, medical device compliance, civic engagement, and more.
My work ranges from tight product blogs to long-form whitepapers and ghostwritten executive thought leadership. A library science background informs everything I do: I think in taxonomies, optimize for discoverability, and approach content programs with attention to information architecture. I stay current on SEO and AEO best practices and use analytics to iterate and sharpen editorial strategy.
I'm seeking a senior leadership role where I can translate my skills as a content marketing generalist into scalable content strategy.
A comparison of two core data loss prevention approaches, helping security buyers understand trade-offs and choose the right fit for their environment.
Recently updated with AI assistance
↗ AI-assisted BlogAnalysis of emerging state-level privacy regulation and its enterprise data management implications.
↗ AI-assisted BlogCo-authored exploration of the security challenges posed by autonomous AI agents in enterprise environments.
Co-authored
↗ AI-assisted WhitepaperA business-oriented DLP framework written for C-suite and senior management audiences.
↗ AI-assisted BlogTimely coverage of a federal threat advisory, contextualizing the Medusa campaign for enterprise security professionals.
↗ Original BlogA technical explainer on how Forcepoint's DSPM platform uses AI-driven discovery and classification to surface and protect sensitive data.
↗ Original BlogGhostwritten executive thought leadership on how generative AI reshapes HR workflows in enterprise environments.
Ghostwritten
↗ Original BrochureA practical guide for enterprise buyers evaluating SD-WAN solutions, covering key criteria, use cases, and vendor considerations.
↗A nuanced take on balancing privacy with content oversight in managed Apple environments.
↗ Original BlogPractical guidance on device management and IT equity for distributed workforces using Apple and Jamf.
↗ Original E-BookLong-form content positioning Jamf's M2 platform capabilities for enterprise security buyers.
↗ Original E-BookIntroductory guide to deploying and managing Apple TV in enterprise and education contexts via Jamf.
↗ Original BrochureSales enablement collateral communicating Jamf's scalable value proposition across company growth stages.
↗ Original Case StudyHow one of the nation's largest universities scaled Apple device management with the Jamf platform.
↗ Original Blog / Case StudyInternational case study exploring how New Zealand schools leverage the Apple–Jamf ecosystem to improve outcomes.
↗Deep command of data security and network security concepts (e.g., DLP, DSPM, CASB, SD-WAN) and the ability to translate threat intelligence and compliance mandates into executive-ready content.
Keyword research, content architecture, and on-page optimization grounded in current SEO and AEO best practices. Analytics-informed planning to drive lead generation and audience growth.
Extensive output across whitepapers, e-books, case studies, and ghostwritten executive thought leadership. AP and Chicago style, with strong editorial instincts for structure and clarity.
Writing experience across cybersecurity, medical device regulatory consulting, and enterprise IT — comfortable with compliance-sensitive messaging in healthcare, finance, and government contexts.
Master's-level library science applied to content taxonomies, metadata strategy, and knowledge management — bringing a systematic approach to content discoverability and reuse.
Practical integration of generative AI tools for content production and research, paired with rigorous editorial judgment to maintain quality and brand voice.