Professional Self-Assessment
Completing the Computer Science program and developing my professional ePortfolio has allowed me to clearly define my technical interests, identity, and professional direction. Through structured coursework and applied projects, I have developed into a backend-focused developer with a strong foundation in database architecture, algorithm optimization, and secure system design. What began as broad curiosity about technology evolved into a focused interest in scalable data systems and the architectural decisions that support long-term maintainability and security.
Throughout the program, I have learned that strong software development is not only about writing code but about building systems that serve real organizational needs. My selected artifact for the SNHU CS capstone ePortfolio, the Grazioso Salvare Animal Rescue Dashboard, represents that thinking. Initially created during my time in CS 340 Client/Server Development, it began as a functional database-driven dashboard. Through the capstone process, I enhanced this artifact across software design, algorithms and data structures, and database architecture. Each enhancement was deliberate and iterative, reflecting the same mindset I apply in my current professional roles as a recruiter working with HR systems and reporting tools, and future opportunities.
Being able to articulate my thoughts and steps of processes well has been a central theme in my academic and professional growth, as collaboration and communication are key in the professional world. In my current career as a talent acquisition specialist, I work closely with systems administrators and stakeholders to improve reporting workflows and data processes. Translating technical details into accessible explanations for non-technical users has become one of my strengths. This capability is reflected in my structured code review and written narratives, where I explain not only what changes were implemented but why they were necessary. Conducting a structured code review reinforced the importance of clarity, documentation, and constructive evaluation within collaborative environments. These practices support informed decision-making for stakeholders and align with industry expectations for peer review and professional communication.
From an algorithmic perspective, I strengthened my ability to design and evaluate computing solutions, using appropriate data structures and performance trade-offs. In my second enhancement, I moved aggregation logic from the application layer to MongoDB using an aggregation pipeline. This change reduced redundant computations, improving scalability. More importantly, it demonstrated my understanding of algorithm placement and performance implications. Designing solutions requires evaluating trade-offs among simplicity, efficiency, and maintainability. By relocating data grouping and counting operations to the database layer, I improved system efficiency while simplifying the application logic. This experience reinforced my confidence in analyzing performance bottlenecks and selecting implementation strategies grounded in computer science principles.
The software design enhancement made focus on modularization, separation of concerns, and structural clarity. Refactoring the codebase improved readability and maintainability while better aligning with software engineering best practices. I approached these modifications using an iterative development mindset similar to the software development lifecycle discussed throughout the program. Each enhancement was planned, implemented, tested, and refined. This process reflects my ability to use well-founded tools and techniques to deliver practical improvements rather than surface-level changes. The result is a cleaner, more professional codebase that reflects production-minded thinking.
Enhancing the database has significantly improved my security awareness and my ability to make architectural decisions. Instead of exposing the full Create, Read, Update, and Delete (CRUD) functionality through the user-facing dashboard, I have separated administrative database operations into a distinct command-line tool. This design adheres to the principle of least privilege, which is a core security strategy emphasized throughout this computer science program. By doing so, I ensure that write operations are restricted to controlled workflows. Additionally, I have externalized the database configuration by using environment variables, rather than hardcoding credentials. These changes reflect a developing security mindset that anticipates misuse, reduces the attack surface, and prioritizes long-term maintainability. Cultivating this mindset has been one of the most valuable outcomes of the program, as security should be an integral part of system design rather than an afterthought.
Beyond the artifact itself, the entire program experience has helped me think critically about backend systems and data-driven decision-making, with everything I encounter. My work as a recruiter involves analyzing hiring data, which involves improving reporting processes, streamlining processes with our hiring teams, and collaborating with HR systems administrators on these initiatives. The technical skills developed in this program, database querying, algorithm optimization, modular system design, and secure configuration, directly support those responsibilities and expand my ability to contribute in more technical capacities. I now approach data systems not only as a user but as a builder who understands the infrastructure behind them.
Together, these enhancements in software engineering, algorithms, data structures, and databases demonstrate a cohesive growth of my technical capabilities. Rather than selecting unrelated projects, I chose to deepen and expand a singular artifact from my past courses to apply across multiple dimensions. This approach allowed me to demonstrate layered improvement throughout this capstone, including structural refinement, performance optimization, and security hardening. Each enhancement builds on the last, illustrating how backend systems evolve through intentional design decisions.
With my experience using HR systems as a user and collaborating with our systems administrators, I am particularly interested in backend development and data systems roles that involve database architecture, analytics platforms, or system optimization. I aim to continue strengthening my understanding of distributed systems and scalable architecture while maintaining a security-conscious perspective. The capstone process has reinforced that my strengths lie in analyzing systems holistically, improving performance thoughtfully, and designing solutions that balance usability with structural integrity.
Ultimately, this portfolio highlights more than just an individual artifact; it integrates my technical skills, professional experience, and intentional growth. It demonstrates my ability to communicate clearly, design efficient solutions, apply industry-standard practices, and develop systems with a security mindset. I am wrapping up this program not only with a degree but also with a clearer professional direction and a portfolio that demonstrates my readiness to contribute to the field of computer science.
Resources
- Cormen, T. H., Leiserson, C. E., Rivest, R. L., & Stein, C. (2022). Introduction to algorithms (4th ed.). MIT Press.
- Humble, J., & Farley, D. (2011). Continuous delivery: Reliable software releases through build, test, and deployment automation. Addison-Wesley.
- Martin, R. C. (2003). Agile software development: Principles, patterns, and practices. Prentice Hall.
- MongoDB, Inc. (n.d.). Aggregation pipeline. https://www.mongodb.com/docs/manual/aggregation/
- OWASP Foundation. (2021). OWASP top 10: The ten most critical web application security risks. https://owasp.org/www-project-top-ten/
- OWASP Foundation. (n.d.). Defense in depth. https://owasp.org/www-community/controls/Defense_in_Depth
- Saltzer, J. H., & Schroeder, M. D. (1975). The protection of information in computer systems. Proceedings of the IEEE, 63(9), 1278–1308. https://doi.org/10.1109/PROC.1975.9939
- Silberschatz, A., Korth, H. F., & Sudarshan, S. (2019). Database system concepts (7th ed.). McGraw-Hill.
- Sommerville, I. (2016). Software engineering (10th ed.). Pearson.