We provide IT Staff Augmentation Services!

Lead Information Security Architect Resume

0/5 (Submit Your Rating)

Boston, MA

SUMMARY:

  • Please note: I have been contacted by legions of robo and offshore sourcers for junior roles on random keyword matches with no consideration of my full scope ISSO and Lead Cloud Cyber Security and Blockchain experience. Therefore, I have removed my Email and Phone numbers from this header - if interested with a contextually relevant position feel free to reach out via Monster Mail as I get daily alerts to my smart phone and do check in - if appropriate and interesting work I will follow up.
  • SUMMARY:Seasoned Lead Information and Cyber Security Architect. Secure Information Systems professional with 22+ years experience in Internet Security Architecture and Secure Data Systems Engineering. Secure web frameworks expert and experienced solutions architect with most major vendors secure firewalls, VPN, intrusion detection/prevention, secure storage, secure host systems and networks technologies. Cyber Security Subject Matter Expert (SME) TAM Threat Analysis and Modeling with resultant Risks enumeration and mitigation on a full range of legacy hosts, virtual and modern AWS and Azure cloud SaaS, IaaS, PaaS, DRaaS systems. Enterprise Systems Vulnerability, Threat and Risk mitigation tools including Nessus, NMAP, Lumension and other major vendor CVE compatible network and host vulnerability and OWASP ZAP application layer vulnerability scanning, management and mitigation.
  • Extensive expertise architecting enterprise financial services, secure web content management, and e-commerce frameworks. Secure Healthcare IT virtual infrastructure and networks. Recent major Cloud Workload Security Solutions, WAF, and VPC Firewall controls, CASB/CSG, Security Event Logging, and Behavioral Analysis, AI Threat Detection with Real Time mission critical data Infiltration and Exfiltration mitigation. On-premises and cloud workloads integration and migration. Lead Information Security Architect with deep compliance, incident response, and cyber forensics skills. Extensive HIPAA, NIST, CVE (Common Vulnerabilities and Exposures) CVSS, CWE and OWASP industry standard Cyber Security best practices knowledge. Proven secure solutions architect delivering Secure Data, Networks and Storage Platforms, Web Frameworks, Mobile, E-Commerce, Disaster Recovery and Business Continuity solutions with consistent client satisfaction.

TECHNICAL SKILLS:

NETWORKS: LAN, WAN, SAN, NAS, Wireless, Unix, Microsoft Windows Win7/Win2k/2K12.NET, Secure Solaris, and Secure Linux/Immunix/SuSE, Novell, Peer-to-Peer. ISO/OSI Stacks, DECnet, SNA, NDIS, TCP/IP, SSL, SSH, Fiber Channel and Ethernet/GigE-based networks.

HARDWARE: All manufacturers models of CPU technologies VAX/VMS, Intel & AMD 32 and 64 bit multi-core, Sun PARC and ARM chips. All Wintel PCs, Workstations and Servers and Clusters all buss technologies. Dell, HP & Sun Unix Hosts, VAX & VAX Cluster systems. Major Vendors Data

Backup, Disaster Recovery, and RAID/SMP SAN and NAS systems.

SOFTWARE: MS Windows Win7/2K/2K12.NET), UNIX Linux Operating Systems, VAX VMS, Novell/SuSE, C/C++, C#, PHP, HTML/HTML5, Pascal, Visual Basic, CMS-2y, Ultra-32, AN/UYK-7. Intel and ARM (Advanced RISC Machine) Assembly Languages and multiple Machine Code architectures and instruction sets. VMware and Open-source Desktop and Server Virtualization Technologies with a Cyber Security/Vulnerabilities Analysis and mitigation focus.

APPLICATIONS: IBM/Internet Security Systems, Axent/Symantec, Harris STAT, NESSUS, SNORT and Sniffer systems and network vulnerability scanners and intrusion detection engines. RSA ACE, Radius, Tacacs, authentication and access control. Single Sign On, Veritas, Legato shadow and DR and Bare Metal Recovery, HP Openview, Microsoft Office, MS Project, Visio, Adobe, MS SQL/MySQL and Oracle R12, R11 and Oracle Hyperion hardening and security.

PROFESSIONAL EXPERIENCE:

Confidential

Lead Information Security Architect

Responsibilities:

  • Driving multiple mission critical projects (50+ Team and 10+ personal) information security project reviews from inception, writing Vendor Business Requirements, monitoring POCs, Pilot Evals and Solution Security Scoring for prioritizing budgeting and implementation through to completion in compliance with CIS Top 20 vulnerabilities with NIST Cyber security Frameworks (CSF) best practices. The goal is to make sure the Vendors, CSPs, SaaS, IaaS and PaaS vendors cloud solutions integrate and work as advertised by the vendors with proper infrastructure, Data, and Applications Security.
  • Lead Infosec and Cloud Cyber Security Architect for security reviews of important NIH Grants Management and Collaboration program for Advanced Medical Researchers for biomedical and medical devices research. Lead Information Security Architect who ensured appropriate HIPAA Security Rules and NIST SP Rev4 correlation and NIST compliance working with the ISO and lead HIPAA security rule, legal counsel. Attended recent AWS and Microsoft Azure corporate experts Cloud Application & Infrastructure Security advanced .

Confidential

Lead Cyber Security Consultant

Responsibilities:

  • Formerly the Internet Security Management expert for a major teaching hospital complex at Harvard Medical School. Consulting Cyber-Security Architect at leading edge secure data storage services and secure systems and networks technology companies. Cisco CSE and Security Solutions expert.
  • Experienced with major vendors secure Cloud Service Providers platforms including secure data storage, secure virtual host systems, networks, databases and web application firewall technologies. Secure VMware, Hypervisor host, and Citrix desktop virtualization. Responsible for developing, communicating and realizing the Confidential vision of total Cyber Security solutions and services from A to Z for our clients. Confidential core competencies include advanced cyber security custom technologies and solutions including custom integrating and operating a wide range of rugged, secure systems and equipment for military and commercial/industrial applications with centralized SOC or secure operations center monitoring, control, and management.

Confidential

Lead Information Security & Secure Data Networks & Systems Consultant

Responsibilities:

  • Confidential ™ offered subject matter expertise in the areas of advanced Secure Data Storage and Information Systems Security services, pre-sales consulting, architecture, design, implementation, and operations support. Confidential ™ key core competencies and team talent pool skill sets applied to all aspects of state of the art Secure Cisco Networks, Secure SAN and NAS based primary disk storage, primary tape backup, and recovery, intelligent disaster recovery and distributed Bizcon (business continuation) services. Stealth vulnerabilities (Beast RAT kits et.al.) detection and real-time enterprise threat mitigation solutions.

Confidential

Senior Secure Solutions Integration Architect

Responsibilities:

  • Confidential partnered with a major Internet Data Center Company and a major Storage Systems manufacturer and provided competitive SAN based secure data storage services, including Backup and Restore, Disk on Demand and Data Vaulting services with leading edge vendors including Brocade, Crossroads, Hitachi, Cisco, Veritas, Sun, Checkpoint, Nokia, and StorageTek. Duties included complete customer technical sales cycle management including pre and post sales consulting, implementation assessments, professional services and technical account management and reporting.

Confidential, Waltham, MA

Senior Information Security Management Engineer

Responsibilities:

  • Senior Information Security Management Engineer analyzing and hardening all aspects of the

Confidential

Internet Cyber Security Manager

Responsibilities:

  • Promoted to the parent holding company corporate position, managing all aspects of Internet systems security and risk management including all host and servers User ID policy enforcement and authentication serving 150 major departments. Conducted security software vendor evaluations for institution-wide enterprise management systems rollout and Virtual Private Network vendor evaluation for secure internet access to all clinical and messaging systems. Managing vendor evaluations, and selection process for Internet/Intranet “domain of control” perimeter penetration analysis and intruder detection and automatic capture.
  • Managed IS/IT risks about HIPAA and JCAHO and compliance. Managed institution-wide IS security vulnerability analysis, disaster recovery and business continuation initiatives across all Mainframe and IP & IPX hosts including OpenVMS, HPUX, Sun, Novell NetWare and Microsoft Windows systems including multiple PeopleSoft, Oracle, MS-SQL, and Lotus Notes/Domino mission-critical applications servers.

Confidential, Boston, MA

Senior Network Systems Analyst

Responsibilities:

  • Novell NetWare and NetWare SFTIII (Software Fault Tolerant), Windows NT Server v3.51/4.0and integrated Internet Information Server, Proxy Server and SQL Server-World Wide Web projects directly supporting the global fund accounting, marketing, and legal automation requirements of 300+ mutual funds computing daily net asset values for publication to WSJBarron’s, IBD publications.

Confidential

WINTER WYMAN Network Systems Consultant

Responsibilities:

  • Contract Project Manager for complex Windows 3.1/Windows NT clients to Novell NetWare v3.12 and Windows NT Server v3.51 systems design and integration project in support of an advanced development project for a major Boston Insurer.

Confidential

Network Systems Consultant

Responsibilities:

  • Managed multiple complex client/server LAN/WAN integration, migration and development projects for major medical and financial services firms.

Confidential

Network Systems Engineer

Responsibilities:

  • Designed, built, installed or modified complex network systems including client PC workstations, network servers and cabling media for numerous Fortune 1,000 companies. Supported Help Desk technicians & customers.

Confidential

Networking & PC Systems Support Consultant

Responsibilities:

  • Contract Network Systems Integrator and Consultant including Network AnalysisInternetworking, Project Costing, Proposal Generation and Tracking. Pre & Post Sales
  • Support, Project Management, and Technical Reviews. Designed LAN/WAN configurations.

Confidential

Senior Technical Support Consultant

Responsibilities:

  • Provided in-depth technical consulting, diagnostics engineering and pre-sales support for add-ons and upgrades to all of Confidential 's hardware and software products including LAN/WAN Configurations, Ethernet, VAX Cluster Systems, MicroVAX Systems, Peripherals, Workstations, PC Systems and Power Conditioning Equipment.

Confidential

Data Systems Expert and Ship’s Programmer Analyst

Responsibilities:

  • Volunteered for service in the Confidential . Successfully completed the very rigorous selection process for Confidential . Competed with over 1800 candidates, 180 finalists and was one of 8 selectees for as advanced Nuclear Submarines (Trident and LA Class Fast Attack) combat computer systems hardware and software experts (machine code, assembler, and compiler). One of only 5 to go on to earn Dolphins and serve a full six-year tour.

We'd love your feedback!