1. Ph.D. in Computer Science & Artificial Intelligence

The portfolio’s AI systems are not wrappers around commercial APIs. They include a flat-file consciousness architecture (PPOJ), a multi-wheel chat ecosystem (ChatPI with 25 wheels across 7 tiers), a cross-LLM governance framework (AI-ENC), and a local LLM deployment pipeline using Ollama on consumer GPU hardware (AMD RX 580 via mnccouk/ollama-gpu-rx580 Docker container). The Sphinx AI Platform development traces back to the challenge of avoiding manual card entry through OCR and tensor mathematics.

Portfolio Evidence

Published Corpus Evidence: The Human Necessity Axiom (HNA-1.0) establishes the immutable governance axiom for all AI systems in the portfolio. The Gir-Axiom defines the loyalty boundary. The AIDET Technical Paper provides the cost-benefit framework for AI behavioral compliance testing. The Understanding the Ant Farm paper translates this architecture into freshman-accessible metaphor — demonstrating the ability to communicate doctoral-level AI concepts to nontechnical audiences.

Required Coursework

  • Machine learning and deep learning
  • Natural language processing
  • Knowledge representation and reasoning
  • Distributed systems architecture
  • GPU computing and parallel processing
  • Model evaluation and benchmarking
  • Retrieval-augmented generation
  • AI safety and alignment

2. Ph.D. in Cybersecurity & Information Assurance

The Quality Engineer principle — “I have to know all the bad things to stop them from happening” — is the foundational axiom of cybersecurity work in this portfolio. The Public Face Exploit discovery represents original vulnerability research. The privacy sovereignty architecture (self-hosted LLM on local hardware, 8-drive distributed filesystem, no cloud dependency for sensitive data) demonstrates defensive security engineering at the infrastructure level.

Portfolio Evidence

  • Public Face Exploit: original vulnerability discovery and documentation
  • Privacy sovereignty: self-hosted Ollama GPU, no cloud dependency for sensitive processing — The Sims: LAN AISec Adventure
  • 8-drive distributed filesystem (D–K) with auto-mounting across Ubuntu/Windows dual-boot — documented in Corpus Architecture (Dataset 4)
  • Security services in GoldHat portfolio: malware removal, system recovery, cyber hygiene — Cybersecurity Methodology
  • 20+ years enterprise QA with security testing across financial, healthcare, and logistics systems — Professional Portfolio
  • Trade secret protection architecture: demonstrated capability without disclosure — Professional Overview
Published Corpus Evidence: The AIDET Getting Started Guide and AIDET Technical Paper formalize a cybersecurity testing methodology for AI systems. The OmniScience Beta Tester Interface implements governance boundaries that are themselves a security architecture. The LAN AISec Adventure documents building a security lab from scratch on consumer hardware — directly applicable to protecting the SMB environments, AI R&D, and creates some reference architectures I can release to the open source community. The pages I've published serves as a ramp from Traditional QA into AIDET, an AI Developer in Test. QA is forever. I've been doing this for decades. Sometimes, you just have to replatform. But I am writing this in VIM in Productions, cause it's funny.

Required Coursework

  • Vulnerability research and disclosure
  • Cryptography and authentication systems
  • Network security and intrusion detection
  • Privacy engineering and data sovereignty
  • Incident response and digital forensics
  • Security architecture and threat modeling

3. Ph.D. in Software Engineering

The portfolio is not a collection of scripts. It is an engineered system of systems: Jenkins CI/CD pipelines, Docker containers, database schemas (SQLite, MariaDB, MySQL), PHP 8.4 applications, Python toolkits with pyproject.toml build configurations, test suites, and deployment automation across IONOS shared hosting. The GoldHat consulting site alone has gone through four major versions with comprehensive deployment documentation.

Portfolio Evidence

  • Jenkins pipeline for automated file processing and IP Nexus updates — IP Nexus
  • Docker containerization (Ollama GPU, worker services) — LAN AISec Adventure
  • 12+ live web properties across PHP, static HTML, and Python stacks — Study Overview (Property Network)
  • GoldHat site v1–v4 with progressive architectural evolution
  • IP Nexus: SQLite database with CLI, file scanner, and 2,126 NAICS codes — IP Nexus Documentation
  • MTG density framework: three versioned implementations (v0.1, v0.2 tensor, hybrid) — Data Density
  • testCathedral: testing methodology as architectural philosophy — LUMINOUS Behave Test Suite
  • Punchcard Compiler v7: custom tooling for corpus processing
Published Corpus Evidence: The Research Corpus itself is a software engineering artifact — an auto-indexing PHP application (index.php) that recursively scans a directory tree, extracts metadata from HTML files, and renders a navigable catalog with zero manual editing. The LUMINOUS Behave Test Suite demonstrates BDD test specification at the system level. The OmniDerive Protocol formalizes reproducible analysis as a software runtime.

Required Coursework

  • Software architecture and design patterns
  • DevOps and continuous integration/delivery
  • Database design and administration
  • Version control and release engineering
  • Testing methodologies (TDD, integration, acceptance)
  • Requirements engineering and documentation