Our Science

Most consultants sell tools.
We understand why people use them wrong.

Behind every failed software rollout, every phishing click, every operational bottleneck is a human behavior problem — not a technology problem. We bring the science of how people think, work, and change to everything we build and every team we protect.

I-O Psychology — UTRGV, Summa Cum LaudeFull Scholarship — SUNY Graduate ProgramBicultural · Bilingual · 30+ Years RGV Business Operations
The Discipline

What is Industrial-Organizational Psychology?

I-O Psychology is the science of human behavior in organizations — how people are motivated, how they form habits, how they resist change, and what actually makes training stick. It sits at the intersection of psychology, business, and data. It is the reason our systems get adopted and our training changes behavior, while most consultants' work collects dust.

01

Organizational behavior

How teams, hierarchies, and culture shape the way people actually act — versus how they say they act. Every system we build accounts for real human workflow, not ideal workflow.

02

Behavior change science

Spaced repetition, threat appraisal, psychological safety, and social proof are how you get employees to actually change security habits — not annual training videos.

03

Human factors & risk

91% of breaches start with human error. We understand the psychological vulnerabilities — authority bias, urgency response, social engineering — that attackers exploit.

The Problem We Solve

Why most cybersecurity training fails

It is not a content problem. Employees know phishing is dangerous. They click anyway. That is a behavior design problem — and it requires a behavioral science solution.

What most companies do
vs
What we do
Annual compliance training — one session, forgotten in days
vs
Spaced micro-learning — 5 min/week, behavior change in 30 days
Generic “don’t click phishing” slides with no context
vs
Industry-specific scenarios your employees actually encounter
Fear-based training that creates anxiety without agency
vs
Psychological safety framing that builds confidence and reporting culture
One-size-fits-all rollout ignoring team culture and resistance
vs
Culture assessment first — training designed for how your team works
Applied to Your Business

Where the science shows up in our work

This is not academic theory. These are the mechanisms we use every day to build systems that get adopted and training programs that actually change behavior.

Cybersecurity

Security culture, not security compliance

We assess your organization’s psychological relationship with risk before designing your training program. Employees who feel psychologically safe reporting mistakes catch more threats than those who hide errors out of fear. We build that culture intentionally.

Operations

Systems built for human adoption

The #1 reason automation projects fail is change resistance — not bad technology. We map how your team actually works, identify adoption barriers before they become problems, and design onboarding that makes new systems feel natural, not imposed.

Training design

Spaced repetition + retrieval practice

The forgetting curve is real. Information without reinforcement disappears within 48 hours. Our training programs use evidence-based spacing — short sessions distributed over time — because that is what the research consistently shows drives retention.

Risk perception

Why employees click phishing emails

Attackers exploit predictable cognitive biases — authority bias, urgency response, social proof, reciprocity. We teach your team to recognize these manipulation patterns as they happen, not just after the fact. That is threat appraisal theory applied to your inbox.

The Background

Credentials that matter in the real world

Graduate — Full Scholarship

State University of New York (SUNY) — Industrial-Organizational Psychology

Selected for a full-ride graduate scholarship to one of the nation’s leading I-O Psychology programs. Studied organizational behavior, psychometrics, training design, and human factors research at the graduate level.

Pre-Medical Sciences

Pre-Medical Studies — Biology, Chemistry, Anatomy & Physiology

Completed pre-medical coursework building a foundation in clinical sciences, medical terminology, and human systems. This background shapes how we approach healthcare technology — we understand patient workflows, clinical data sensitivity, and why HIPAA compliance isn’t just a checkbox but a design requirement.

Undergraduate — Summa Cum Laude

University of Texas Rio Grande Valley (UTRGV) — Psychology

Graduated with the highest academic distinction from our own Valley university. Research focus on organizational psychology, human performance, and behavioral systems. UTRGV alumni building systems for UTRGV businesses.

Peer-Reviewed Researcher

Published Research — Cognitive Psychology & Behavioral Systems

Author of peer-reviewed publications in cognitive psychology and a published thesis examining human behavior and decision-making. This research discipline is the foundation of every system we design — because technology that ignores how people actually think and behave doesn’t get adopted. It gets abandoned.

Practitioner — 30 Years in the Valley

Rebel Minds OPS — Founder & Systems Architect

Bicultural and bilingual by lived experience — not by geography alone. The RGV has its own identity, its own rhythm, and its own relationship between owner, crew, and client. Over 30 years of operating in this market means we understand not just the business problems, but the human context surrounding every one of them. That context is what makes our systems get adopted instead of abandoned.

91%

of cyberattacks start with human error — the problem is behavioral, not technical

70%

of software implementations fail due to change resistance and poor adoption design

4x

better retention from spaced training vs. single-session compliance

🔒

We intentionally don't publish implementation details. The methodology behind our systems is the result of significant original research — combining I-O Psychology, behavioral design, and operational architecture. We share outcomes freely. We protect the work that produces them. That protection is part of what you're hiring us for.

Ready to work with someone who actually understands your team?

Most consultants hand you software and leave. We stay until your people have adopted it, your security culture has shifted, and your systems are running without you having to think about them.