We provide IT Staff Augmentation Services!

Sr. Cyber Security Architect Resume Profile

2.00/5 (Submit Your Rating)

CentervillE

OBJECTIVE:

Information/Cyber Security Expert with 15 years of information security experience looking for a challenging security project or role. Full time roles considered would be Chief Security Officer, Chief Information Security Officer, VP or Director of Information Security. As a consultant I am open to senior level information security roles that allow me to work virtually.

SUMMARY:

  • I have managed the information security services and teams for mid-sized to global Fortune 50 companies and large government entities. I have architected, implemented, and administered security for networks of up to 200,000 users. One of the largest clients was the United States Department of the Treasury IRS. I am also expert in managing, architecting, implementing and administering managed security services for organizations of all sizes and types. I have managed groups of up to 50 people who reported to me and groups of up to 100 in total. I have managed Sr. Managers, Managers, Architects, Engineers, Developers, Analysts and Help Desk Personnel of all levels. I specialize in solving difficult problems and in streamlining organizations to remove waste and inefficiencies. I have extensive experience in creating layered security, or defense in depth for organizations of all sizes. I have deep experience not only in virtual security but also in administrative and physical security.
  • I see security as a whole and I know what it takes to integrate security into an organization so that security is an asset to the business and not a hindrance. I am able to architect and implement a security plan and program that combines all facets of security for maximum organizational efficiency.
  • I am experienced in managing, architecting and engineering security for a variety of enterprises including hardware, software, financial, construction, government, retail, wholesale, for profit and not for profit, telecommunications and healthcare organizations.
  • I am experienced in creating and managing Vulnerability and Threat Management Programs for small to large enterprises. I have designed and built the security organizations of many corporations from the top down. I focus on finding the root causes of an organization's security issues so that they can pro-actively resolve their issues instead of remaining in a reactive mode.
  • I have worked extensively with all departments and individuals within corporations and am expert in adapting myself to the group I am with and the situation I am in. I have worked closely with C level execs from small businesses to large enterprises and understand their concerns and mindset. I understand how to act as a translator between the technical and management concerns of an organization. I work daily with executives and can communicate to an executive in a concise fashion the security needs of the organization and how security will affect the bottom line. I understand how priorities change within organizations as they grow.
  • I present solutions instead of complaints. I understand when to strategize and when to focus on tactical solutions. I thrive on being challenged and being rewarded for creating solutions to problems that seem to some to be impossible. I am a proven veteran in the field of information security with the experience of 15 years of problem solving and organization building behind me. I enjoy learning and working with a variety of people. I train to stay on the leading edge of information security technology. My flexibility and quick mastery of the challenges presented me make me an invaluable addition to any organization.

Solutions Experience:

  • Cisco Products: Router Series from 870 to 7200, Catalyst Switches Series from 1000 to 8500, Linksys All Products, Entire PIX Firewall Series, Entire ASA Series, Cisco Local Directors, Cisco Security Agent, Cisco MARS, Cisco NAC, Cisco FWSM, CSS, TACACS, CiscoWorks, Cisco IPS Devices, Cisco Secure ACS, Wireless Products etc. Routing protocol experience includes BGP, RIP, IGRP, EIGRP protocols.
  • Microsoft Products: 15 years experience with Microsoft Business Products including all versions of Windows Operating Systems for Business PCs Servers Standard Server and Small Business Server versions from Windows 95 to Windows 7 and Server 2010 All Versions of BackOffice from NT4 to 2008 products including all versions of SQL Server, Exchange Server, ISA Server, Proxy Server, IIS, etc. All products in all versions of Microsoft Office including Visio Sharepoint, Powerpoint, Access, Outlook, Excel, Project, etc up to version 2007.
  • Juniper Products: Entire Juniper / Netscreen Series of Firewalls and other Security Products All versions of ScreenOS, Entire SSG Series of security devices Entire ISG Series SSL VPN Products Entire IDP Series, SRX Series, All NSM Versions, etc.
  • Checkpoint Products: Checkpoint Software and Nokia Hardware corresponding to these versions: VPN-1 Firewall-1 NG, NGX,
  • Sonicwall Products: Entire Series of Sonicwall Firewalls
  • UNIX Systems: AIX, HPUX, DGUX, All versions of Solaris.
  • Linux Systems: Red Hat, Ubuntu, Knoppix, Fedora, Debian
  • HP Products: Entire Series of HP and Compaq PCs Servers for Windows, Some HP UNIX Servers, Switches,
  • Mcafee Products: Extensive experience with business security products, hardware and software such as the McAfee Mail Gateway Devices Sidewinder Firewalls, McAfee NSM Intrushield , MCAfee IDS Sensors, McAfee Endpoint Encryption, Symantec Endpoint Protection
  • RSA Products: RSA SecurID all versions both hard and soft tokens, RSA Ace Server
  • Symantec Products: All Security Products both Software and Hardware Business Products, also their Veritas Product Lines such as all versions of Backup Exec. Symantec Endpoint Encryption SEP client and server software.
  • CA Products: Entire Security Product Suite, including Business Products such as CA Enterprise.
  • Arcsight Products: To include ESM, Logger, and Connectors
  • BlueCoat Products: The full series of Bluecoat devices and software including such products as BlueCoat Director, Reporter and the 800, 900, 8000 and 9000 Series of Bluecoat Devices
  • Websense Products: Supported Websense Software/Servers Web Security for Internet Security. Have integrated it with Juniper/Netscreen Security Devices.
  • Veritas Products: Ten years of experience working with Veritas Products including Backup Exec, Veritas Volume Manager, Veritas NetBackup and several other Veritas / Seagate products.
  • Ten years of experience designing, implementing and supporting storage and backup systems.
  • Misc Security Products/Tools : A few of them are eeye Retina, Tenable Nessus, Wireshark, GFI LanGuard, Snort, Metasploit, Hping2, TCPDUMP, Nikto, OpenSHH, Putty, NetFilter, NetStumbler, AirCrack, Solarwinds Engineers Toolkit Orion Suite, Intellitactics, EM7, Splunk, MBSA, Tripwire, NMAP, RKHunter, etc.
  • IBM Products: ISS Products, Tivoli Products, Proventia Products
  • Security Domains: Information Security Management Security Architecture and Models Access Control Systems and Methodology Applications and Systems Development Operations Security Cryptography Physical Security Telecommunications, Network and Internet Security Business Continuity Planning and Law, Investigations Digital Rights Management, and Ethics
  • Government and International Regulations Standards: ST E, DIACAP, NERC CIP Standards CIP-002-CIP-009 , FIPS 140 Compliance 140-1,140-2 new 140-3 , FIPS High, DCMA, DISA, C A, FISMA, NIST 800 series standards including NIST 800-53. DOD 8570.01 Certified. HIPAA HITECH, HITRUST CSF, SOX, GLB, PCI, ISO 27001, ISO 27002, ISO 17799, BS 7799
  • Experienced implementing and auditing around Meaningful use Security Requirements and the CSF Keys associated with HITRUST for large healthcare system s.
  • Splunk: Design and Support for Splunk for Large Enterprises
  • Secureworks: experienced with suppport and operations of SecureWorks suite of projects
  • Remedy: Experienced with using remedy to build and manage tickets and projects
  • Securing the Cloud: Knowledgeable and experienced in moving organizations to a cloud architecture and in securing the cloud architecture to protect the organization's valuable information assets. Most recently completed a Cloud based security project for a large healthcare organization that needed a plan and design both for a new information security program and for securing the cloud as they move to it.

Professional Experience:

Confidential

Chief Security Officer / Principal Security Architect

  • Extensive experience in vulnerability tests assessments, penetration testing, security assessments and audits, disaster recovery and business continuity plans, contingency planning, secure messaging, security policy creation implementation, security awareness training, GLB compliance, OWASP, SOX compliance, HIPAA compliance, FIPS compliance, NIST compliance, INFOSEC governance, risk management and assessments, access controls, encryption systems, MSS managed security services , security awareness training to combat social engineering, malware protection, incident response, forensics, account management policies, acceptable use policy AUP Creation and enforcement, virtual physical and administrative information security, expertise in Juniper, Cisco Checkpoint/Nokia security hardware and software. Experienced with Nessus, Retina, NMAP, SNORT, Sourcefire Cisco IDS, Wireshark, and ISS Tools among others.
  • Has supplied expertise in a consultant role as an Information Security Manager, Security Subject Matter Expert Security Architect for the physical, administrative and logical security for hundreds of companies. 13 years of overall Security experience, this includes Information Security Management Security Architecture and Models Access Control Systems and Methodology Applications and Systems Development Operations Security Cryptography Physical Security Telecommunications, Network and Internet Security Business Continuity Planning and Law, Investigations Digital Rights Management, and Ethics. Provide advanced design, implementation, administration and troubleshooting of information security systems., risk audits, and methodologies. Extensive experience with all aspects of Managed Security Services. Experienced in using IPS and IDS and other security mechanisms to prevent and detect all types of digital security attacks such as DOS, Man in the Middle, Teardrop, Brute Force, Dictionary etc. Experienced in both Symmetric and Asymmetric Encryption. Extensive experience in physical security technology including layered defense, fences, bollards, guard camera placement, mantraps, locks of all types, biometrics such as palm scanning and retina scanning.
  • Worked extensively doing work associated with ST E, DIACAP, NERC CIP Standards CIP-002-CIP-009 , FIPS 140 Compliance 140-1,140-2 new 140-3 , FIPS High, DCMA, DISA, C A, FISMA, NIST 800 series standards including NIST 800-53. DOD 8570.01 Certified.
  • Managed groups of up to 65 people both locally and across a combination of six continents.
  • Experienced in managing the design and development of custom software using .NET and JAVA. Experienced architecting, supporting and securing distributed applications. Experienced working with many third party APIs to customize existing software. Has managed groups of up to 25 programmers/software engineers.
  • Extensive work in all Microsoft Operating Systems, Various UNIX Operating Systems to include All Solaris Operating Systems and various Linux OSs. Some MAC experience with the last several OSs.
  • Experienced in managing and advising software developers overall and in creating secure software through a SDLC that involves security at each phase.
  • As a Network Architect the types of duties performed include advanced LAN/WAN, VPN design, installation and troubleshooting with a focus on Cisco hardware and software. Over 6 years experience with the entire range of Cisco Layer 2 Switches, Multi-Layer Switches and Routers. Routing protocol experience includes BGP, RIP, IGRP, EIGRP protocols. Router experience includes 1000 to 7200 series routers. Cisco switch experience includes the 1000 to 6500 series switches, including extensive work with the 6509 layer 3 switches, utilizing a wide array of blade types and switching technologies. Experienced in administering the full line of Cisco PIX and ASA Firewalls.
  • 15 years of experience in the IT field.
  • Principal Security Architect for Stapleton Consulting, Inc. performing the duties of a Senior Security Architect and Project Manager for Stapleton Consulting Clients. Serves as the Lead on all information security projects.
  • Designed, implemented, secured supported networks of up to 200,000 nodes as the lead network or security architect.
  • Expert in wired and wireless networks. Over 15 years of experience designing, implementing, administering and troubleshooting wireless networks. The size of these networks ranges to 66 access points. Experienced with 802.11a, 802.11b and 802.11g wireless technology as well as 108 Mb/s wireless technologies. Experienced with wireless hardware and software from many vendors to include Cisco, Aironet, Orinoco WaveLAN, SMC, Apple, Linksys, Netgear, DLink, Belkin etc.. Designed and implemented wireless networks in a wide variety of building types and is aware of the issues and resolutions to installing wireless in various physical environments. Experienced with the various encryption/security techniques used to protect wireless networks such as WEP and WPA. Experienced with Cisco Aironet Series devices. Experienced with WPA, WPA2, TKIP, AES WEP encryption models. Experienced with Cisco Wireless Security Suite and the Cisco Self-Defending Network methodology. BGP, RIP, IGRP, EIGRP, IPSEC VPNs
  • 12 Years experience in providing Sun Solaris 7, 8, 9 and 10 installation, administration and troubleshooting, in addition to Microsoft Office all versions , Microsoft Back Office all versions , Windows XP, Windows 2000, Windows Vista, Windows 2003, Windows Server 2008, Windows 7, Windows 8 and Windows Server 2012 all versions , Windows Small Business Server all versions design, implementation, administration and troubleshooting at an expert level. Extensive administration, support and security experience with all Microsoft Office and BackOffice Programs including SQL Server, IIS, ISA, Exchange, Visio, Access, SharePoint, as well as Microsoft Active Directory Infrastructure.
  • Designed, Implemented and Supported Wide Area Networks and Security Systems that connect global corporations across the planet including ATT, Time Warner, FMC, MCI, Munich RE, and Verizon Business
  • 15 years of experience working with various types of telecommunications data lines including, Cable, DSL, T1, T3, DS1, DS3, OC-3, OC-12, OC-48 lines.
  • 15 years of experience working with various LAN/WAN topologies to include, Ethernet, Fast Ethernet, Gigabit Ethernet, Fibre-Channel, Token Ring, FDDI, ATM, Frame-Relay, AppleTalk and X.25.
  • 12 plus years of networking background includes both Ethernet switching and multi-layer Ethernet switching at speeds of 10 Mb/s, 100Mb/s 1000Mb/s.
  • 8 years of experience designing, implementing and supporting Checkpoint Firewall-1 / VPN-1 Software on Nokia Hardware, as well as four years of experience with SonicWall Firewalls.
  • 15 years of experience migrating administering Windows Servers including Windows 2003 and 2008 and 2012 and 14 years of experience with Windows Active Directory, 12 years of experience administering and migrating Exchange Servers. 10 years of experience with Windows 2003 installations and migrations in addition to administration and support of Windows 2003, 5 years of Windows 2008 Server Windows Vista experience as well as Server 2012 MS SQL Server all versions including SQL 2000 and SQL 2005 and SQL 2008.
  • Wide range of experience in the financial, insurance, retail, healthcare, telecommunications, and construction vertical markets.
  • 15 years of project management experience utilizing ten years of experience with Microsoft Project. Currently using Microsoft Project 2013.
  • 12 years of experience working with Veritas Products including Backup Exec, Veritas Volume Manager, Veritas NetBackup and several other Veritas products.
  • 12 years of experience designing, implementing and supporting storage and backup systems.

Partial List of Projects:

Confidential

Global Information Security Manager, Vulnerability Manager , Sr. Security Consultant confidential

  • Contracted by Dell to work as a Senior Security Consultant in the position of Information Security Delivery Manager for Moodys a global financial services company. Responsible for managing global security operations and security projects. Managing and coordinating all aspects of information security including all security teams and all incidents, changes, tasks and security projects across all company divisions on five continents. Organization managed includes over 100 personnel from the security administration helpdesk to the manager for each security team. Security device uptime has been increased more than 30 . Incidents are down 50 and Incident resolution time has been cut by 60 . Team efficiency has been increased by 40 . Management is the significant part of this role but I am involved in advanced hands on engineering and architecture work as well on a daily basis. As the most senior engineer I work the most complex security issues in each group with the individual team leads when there are escalated client issues. The organization has been vastly improved since I began both in efficiency and quality of service across all security teams and technologies. The response and resolution time on support tickets has been improved dramatically. Processes and procedures have been standardized and documented then enforced. Teams have been cross-trained and single points of failure across all teams have been eliminated so that no single individual presents a significant vulnerability to the organization. Significant reporting across all teams has been created and is now delivered on a weekly and monthly basis. The reporting is discussed and auctioned to achieve further improvements in the organization each month. The change management program and processes have been improved and streamlined so changes no longer represent significant risk to the organization.
  • The teams managed are Content Filtering, Firewall, Security Architecture, AV, Endpoint, ACS, TACACS, Security Administration, PeopleSoft Administration, Defender, Audit, The SOC, and Compliance Vulnerability Management. The products my groups support include Microsoft Active Directory, PeopleSoft, Bluecoat, Juniper Security Products, McAfee Security Products, Secureworks Products, nCircle, Quest Defender, Quest Change Auditor, Remedy, and Cisco Security Products.
  • Product solutions include Cisco IPS 4255s and 4260s, Cisco ASA Firewalls, Juniper NSM and Juniper Firewalls, Juniper SSLVPN, Cisco ACS/TACACS, Quest Defender, Dell 600 Series Servers, Bluecoat Reporter, Bluecoat EndPoint Client, Bluecoat Proxy Devices including 800s and 900s, Symantec Endpoint Protection or SEP McAfee Endpoint Encryption or MEEP, nCircle products including Profilers, IP360, SIH for Vulnerability Scanning and Reporting Secureworks Customer Portal and Suite of Products including managed i-Sensors, Threat Intelligence etc., Microsoft SCCM, Remedy Ticketing System, McAfee Intrushield NSM used to manage McAfee IDS Sensors, Managing a wide array of custom global security projects with the client from beginning to end.

Sr Information Security Architect confidential

Confidential

  • I was contracted by a company moving businesses to the cloud to design an information security framework for a large healthcare system in California based on the ISO 27002 Framework in addition to HIPAA HITECH, HITRUST, PCI, FISMA, Meaningful Use, ISO 27001 and several NIST 800 standards. The system had recently been through a Deloitte and Touch audit like my previous client and as before they wanted a second opinion to confirm Deloitte's findings as well as a plan to remediate the findings as quickly as possible beginning with the highest risk findings. I was able to find the root of their various security problems and built recommendations explaining how to address the root problems so that the system does not continue to fail audits year after year. I explained to them how to proactively resolve their security issues instead of remaining in a reactive mode to audit findings. Addressed security in each of the 12 domains represented by ISO 27002 sorting the findings and recommendations by risk level. The recommendations explained how to full resolve their information security problems. A project plan was built showing step by step what they needed to do, who needed to do it, and what it would cost in time and dollars. Detailed security recommendations were written for each of the high risks found. Laid out new organizational structure for the security teams, a security awareness program, a physical security plan with enhanced security measures, addressed Disaster Recovery and Backup Continuity, DataCenter Design and consolidation and much more.

Information Security Subject Matter Expert / SME

Confidential

  • I was the Lead Security Architect and managing security operations for a Global Medical Services Equipment Company. The company moved from an outsourced security model to in-sourcing security and I was hired to audit and re-architect Information Security for the company. I was leading all security initiatives and team members. I was responsible for auditing and improving all aspects of Information Security including Physical, Administrative and Virtual Security for the company. I was auditing for compliance with laws across the world, in the United States I audited for SOX and HIPAA / HITECH Compliance. I am using a wide array of security tools to run security assessments and tests against over 10,000 networked devices including NESSUS, OPENVAS, MBSA, NMAP, Solarwinds Engineer's Toolkit, and Orion. Device types include Cisco and Juniper Switches, Cisco and Juniper Firewalls, Various Avaya and Cisco VoIP products, All Wi-Fi infrastructure, Tandberg Devices, All Windows Servers and PCs 5,000 , Avocent Devices, NetAPP devices, Miscellaneous Data Center Equipment backups, power, cooling units etc. Building Business Cases for Various new technologies needed to secure the company, Auditing existing security policy and advising on a full set of policies, standards, procedures, baselines and guidelines. I worked to move the company to standardized security methodology and practices after working to creating the initial structure. Designed and built comprehensive Juniper NSM Solution to monitor and administer all Juniper Devices. Build security awareness program and training materials and begin global training. I cleaned up of all security device policies, upgrade of all security devices, business partner audit, access control audit, virtual, physical and administrative security audits and remediation. I designed and installed of NAC, Setup of Juniper SRX Devices to replace SSG devices. I created and implemented security compliance program. I performed Global Intrusion Detection System IDS design and installation. I designed and installed global Incident Response team including training and testing of the team. I performed SIM/SIEM design and installation for the entire company. I led infrastructure asset audit worldwide and much more. Although I led the team it was also requested that I be technically involved in each part to make sure that it was done correctly.

Confidential

Sr. Information Security Consultant / Cyber Security SME

I provided expertise as a Sr. Security Consultant for HP. Supporting Agilent Technologies globally and consulting on information security issues and various security hardware and software on all continents. I was the lead engineer for RSA ACE Server v. 7.1, SecurID, Cisco PIX, Cisco Secure ACS, HP OpenView, Hewlett Packard Open View Service Desk, HP OVSD, Cisco ASA, TACACS, Juniper SSL VPN, Bluecoat Reporter and Director as well as the Bluecoat 800, 8000, 900, and 9000 Series of Devices and the BCAAA Servers running on Windows Servers. I was the technical lead for most of these products in addition to being the technical lead on semi-annual security audits including SOX audits of Cisco ACS and TACACS permissions. Project owner and manager for several projects for the fore-mentioned technologies during this time.

Confidential

Lead Cyber Security Architect / Cyber Security SME -

I was responsible for architecture of network security for several federal agencies using a variety of tools and technologies. As part of the Networx Project, a Senior Information Security Architect / SME contracted to lead the team that architected, implemented and is providing Tier IV support for the information security managed security services for various federal agencies. Architecting and implementing multiple systems with tools including Juniper NSM 2008, Juniper ISG 1000s, ISG 2000s, Multiple IDP/IPSs, EM7 Network Management Application, Splunk, Intellitactics, McAfee Appliances, Bluecoat, Cisco CSM, ASA Appliances, Switches and FWSMs, Enterasys Dragon, and many more. High Public Trust Security Clearance. Worked extensively doing work associated with ST E, DIACAP, NERC CIP Standards CIP-002-CIP-009 , FIPS 140 Compliance 140-1,140-2 new 140-3 , FIPS High, DCMA, DISA STIGs, FISMA, NIST 800 series standards including NIST 800-53. DOD 8570.01 Certified. I performed a series of vulnerability penetration tests on the new network and its management tools. Designed incident response / handling procedures performed incident response work in response to large scale attack on government infrastructure.

Confidential

Sr. Manager - Managed Services Managed Security, Router and VPN Products Security Operations

  • Hired by the company as a Senior Manager to enhance and improve their Managed Security Services Products and to improve the Security Operations Center SOC while managing several teams of employees located in the central NOC in Colorado. Teams initially managed were Managed Security Services, IP Unity VOIP, DNS Mail UNIX and Linux Based , IP Abuse and Web Hosting. Teams added to this are Managed Router IPVPN. Immediate improvements were made which cut costs by over 40 for MSS. In Web Hosting group a 40 cost savings was also achieved. Launched and managed audits across all groups to eliminate waste and increase efficiency of all direct reports. Estimated 2 million dollars per year saved through these audits. Enhanced existing managed security services product lines and designed and implemented new managed security products which should more than double revenues within 6 months. Wrote and began enforcing a new set of policies and procedures for the Managed Security group to enhance the productivity and effectiveness of the support we provide our clients utilizing Six Sigma methodology. I performed a series of vulnerability penetration tests in order to enhance the security of the company and its security products. Responsible for security incident response handling for the company, Redesigned security policies, standards, procedures, baselines, and guidelines for my groups to enhance security for the company and the customers we serve. Launched and managed an initiative among all my groups to get them all technically trained and certified by in two months in each of their respective areas of responsibility, this program was extremely successful. Dramatic improvements to the quality and efficiency of the company's managed service offerings. During this time I was still performing hands on security work assisting my direct reports as the Sr. Security Architect and Engineer of the company, performed security audits, solved advanced security problems and advised Sr. Vice Presidents and C Level Executives on how to enhance internal security as well as the security products of tw telecom.
  • Left Time Warner only because of a family need which required me to relocate to the east coast, now resolved.

Confidential

Information Security SME Subject Matter Expert

Contracted by Sterling HealthCare to conduct an independent security audit of its IT Infrastructure in order to gauge the current state of security and advise them on how to enhance the company's information security as a whole. I performed a complete security audit in each of the three main types of information security physical, administrative and virtual. Used an array of tools to test each area of the company's security and then presented my findings in a detailed report which laid out where the weaknesses were and how to eliminate each of them. Concerning the administrative security I completely redesigned the company's backup continuity plan BCP and disaster recovery plan DRP . Re-wrote existing security policies, standards, baselines, procedures guidelines and added many new ones. Instructed the company on how to conduct security awareness training and of it's great importance in implementing effective information security. I advised the company on how to achieve HIPAA compliance. Audited the physical security of the entire campus reported on each building, each floor, each department and key devices. Identified many issues and came up with cost effective solutions that enabled them to all be resolved quickly. Audited the virtual security of the company reviewed the state and configurations of key devices, performed vulnerability assessments and penetration testing of the infrastructure.

Confidential

Sr. Cyber Security Architect, Information Security SME Subject Matter Expert

Brought in by Verizon Business Software Development Group to help architect, build, and test managed security services MSS for several government and commercial security projects involving an array of security hardware and software. Working daily advising software developers and assisting them with software architecture. Networx is the contract to deliver a large portion of the Federal Government's IT needs over the next several years. I was brought in as a Senior Security Architect and Advisor. Began my first Security Design and Architecture Project for Verizon Business then MCI in December of 2005 and continue to assist with other security projects at present. I worked as lead security architect on several projects with responsibilities for managing the various pieces of the project. I served as Information Security Product Expert for various security technologies including the latest Juniper, Netscreen and Cisco suites of security software and hardware. Included among these products are Juniper's Netscreen Security Manager or NSM Software, All of the Netscreen / Juniper Firewalls and IDP Sensor Devices, Checkpoint Nokia Firewalls Checkpoint Software including NG and NGX R62, all Cisco PIX and ASA Firewalls, Cisco Security Manager, Cisco Routers, Management Center for Cisco Security Agents, The Cisco Security Agent Software, All Netscreen ScreenOS Software and Cisco IOS Software, Sidewinder Firewalls, Arcsight, Websense, RSA SecurID work version 5.x, Surf Control, BlueCoat, Aladdin, SmartFilter URL Filtering, both Netscreen and Cisco VPN technologies. Also continuing to support and administering Solaris 8, 9 and 10 servers and Windows 2000/2003 Servers. I am involved in design, architecture, testing, implementation and support of these various security technologies. I am also consulted on General IT Security matters, not product specific. Worked extensively doing work associated with ST E, DIACAP, NERC CIP Standards CIP-002-CIP-009 , FIPS 140 Compliance 140-1,140-2 new 140-3 , FIPS High, FISMA, NIST 800 series standards including NIST 800-53. DOD 8570.1 Certified. Ongoing support of all Microsoft Operating Systems and Business Software such as all Windows PC Server Operating Systems and SQL Server, Exchange Server, IIS Server, ISA Server, and Sharepoint.

Confidential

  • Director of Information Security Managed Security Services Virtual Armor is a managed security services company that provides managed security services to corporations across the world. They provide a custom monitoring and management solution that uses as it's base Juniper Netscreen technology. I was brought in to steer the direction of the company's IT Security and it's MSS managed security services offerings.
  • I directed the operations, security and software development groups of the company. These groups are based out of the U.S., Canada, Europe and India.
  • I was responsible for managing local and global software development teams. I was responsible for architecting the software and then managing the developers through the entire software development life cycle. Familiar and experienced with a variety of Software Development Methodologies including the Waterfall Model, Cleanroom Model, Spiral Model and various others such as RAD or Rapid Application Development.
  • I have become an expert in Netscreen Juniper Security Products including the Firewalls, IDP systems, SSL-VPN Solutions and NSM or Netscreen Security Manager and SRS or Statistical Report Server.
  • I have been responsible for the creation and development of products, policies and procedures which will soon make Digimerc a leader in the Managed Security Service market.
  • Extensive work in Cisco Routing using BGP and EIGRP, All series of Cisco Switches and Cisco PIX Firewall hardware and software, complex VPN design and administration.
  • I was responsible for incident handling and response for the company and its clients. Administration and support for Windows 2003 Server and BackOffice Software as well as Solaris 7 and 8 and Red Hat Linux.

Confidential

Sr Information Security Architect / Consultant

  • I have Supplied expertise in a consultant role as an Information Security Manager, Security Subject Matter Expert Security Architect for the physical, administrative and logical security for hundreds of companies.
  • 13 years of overall Security experience, this includes Information Security Management Security Architecture and Models Access Control Systems and Methodology Applications and Systems Development Operations Security Cryptography Physical Security Telecommunications, Network and Internet Security Business Continuity Planning and Law, Investigations Digital Rights Management, and Ethics.
  • Provide advanced design, implementation, administration and troubleshooting of information security systems., risk audits, and methodologies.
  • I have extensive experience with all aspects of Managed Security Services. Experienced in using IPS and IDS and other security mechanisms to prevent and detect all types of digital security attacks such as DOS, Man In the Middle, Teardrop, Brute Force, Dictionary etc.
  • I am experienced in both Symmetric and Asymmetric Encryption.
  • I have extensive experience in physical security technology including layered defense, fences, bollards, guard camera placement, mantraps, locks of all types, biometrics such as palm scanning and retina scanning.
  • Extensive experience in vulnerability tests assessments, penetration testing, security assessments and audits, disaster recovery and business continuity plans, contingency planning, secure messaging, security policy creation implementation, security awareness training,
  • GLB compliance, OWASP, SOX compliance, HIPAA compliance, FIPS compliance, NIST compliance, INFOSEC governance, risk management and assessments, access controls, encryption systems, MSS managed security services , security awareness training to combat social engineering, malware protection, incident response, forensics, account management policies, acceptable use policy AUP Creation and enforcement, virtual physical and administrative information security, expertise in Juniper, Cisco Checkpoint/Nokia security hardware and software.
  • I am experienced with Nessus, Retina, NMAP, SNORT, Sourcefire Cisco IDS, Wireshark, and ISS Tools among others. I have expertise with all Microsoft Software including programs such as ISA Server, SQL Server, IIS Server, Exchange Server and sharepoint and all windows operating systems.

Confidential

Installation Engineering Supervisor Installation Engineer IV

  • Responsibilities at Relera included advanced datacenter design, LAN/WAN design, provisioning and support for our data-center customers.
  • Custom design and support work included software and hardware from many vendors primarily Cisco, SUN, Microsoft, Nokia, Netscreen, Juniper, Hewlett Packard and Compaq.
  • Initially hired as a Level IV Installation Engineer but within a few weeks promoted to Supervisor for the Installation Engineering group. Was the only Installation Engineer at Relera who received a promotion.
  • Served as the project manager for the custom design projects and tasked with answering technical RFPs and RFQs for potential data-center clients during the pre-sales process. Custom designed racks and cages for datacenter customers.
  • Administered Cisco switches from the 1900 series to the 6500 series and with Cisco Routers from the 700 series to the 7000 series while continuing to work with Cisco Content Switches and Cisco PIX 500 firewalls .
  • Experienced with RIP, RIPv2, IGRP, EIGRP, BGP and OSPF and worked extensively with Cisco equipment from the design phase to the support phase as well as design and support.
  • Continuing work in Network Security with multiple platforms but focused on Cisco Hardware and Software.
  • Designed and installed VPNs with the following protocols: PPTP, GRE, IpSec, and L2TP and Administered Sun Solaris version 8 and Windows 2000.
  • Became proficient with Siebel, Netcracker, Netcool, Veritas Backup Products and QIP Software.
  • Left Relera after the company lost its financing and could no longer pay its employees.

Confidential

Network Security Manager / Sr. Network Security Architect

  • Responsibilities at FastIdeas included designing, implementing and supporting all LAN/WAN environments and their security within FastIdeas and its 13 portfolio companies.
  • FastIdeas was an Internet accelerator/incubator company. Designed, implemented and supported network/internet work systems, which were composed primarily of Cisco equipment and Alteon 180es for load balancing.
  • Responsible for designing, implementing and supporting an Orinoco / WaveLAN Wireless Networking solution for all 14 companies. Access Points positioned at strategic points to minimize interference, architecture, overlap etc. Worked extensively with all pieces of wireless technology as a result of this project including encryption. Worked with both 802.11a 802.11b.
  • Daily utilization of Cisco equipment included the full range of Cisco Routers from 1000 series to the 7000 series and Catalyst Switches from the 1000 series to the 6500 series. Cisco 400 Series Local Directors, 500 Series PIX Firewalls, Cisco VPN 3000 Concentrators, Cisco NetRanger, RSA SecurID.
  • Designed and installed VPNs that ran through the following protocols: IpSec, GRE, L2TP and PPTP.
  • Supported Windows 2000 Server and Windows 2000 Professional Software while continuing to work with Microsoft BackOffice Software with emphasis on networking and internetworking technologies including a focus on network security. Supported Veritas Backup Exec, Volume Manager and NetBackup on Windows and Solaris.
  • Expert knowledge with the TCP/IP Suite of Protocols following Routing Protocols, RIP, RIP2, IGRP, EIGRP and OSPF.
  • The WAN ran over HDLC as well as Frame-Relay. Ran leased PPP T1s over the WAN environments, utilized CiscoWorks Software for network management.
  • Managed the network and security for 14 companies, served as Solaris Administrator for FastIdeas. The Sun machines served several purposes, one of the primary purposes was controlling external DNS.
  • Utilized and supported Visio 2000, SecureCRT, PCAnywhere, Microsoft Office and all Microsoft BackOffice Products such as Microsoft Exchange, SQL Server, ISA Server, IIS Server, Sharepoint.
  • Designed enterprise wide I/S processes for design support and administration of the LANs and WAN.
  • Served as the lead engineer on all network/internet work projects. Managerial experience as the leader of a group of network engineers assembled from the 12 portfolio companies.
  • Left FastIdeas after the company lost its financing and I was told that all positions would soon be eliminated.
  • Responsible for the Security of 14 companies both the physical and virtual sides of IT Security.

Confidential

Sr. Systems Engineer / Systems Analyst

  • Optika created, sold and supported an imaging system and B2B e-commerce software products. I assisted clients with planning, installing and configuring this software.
  • Provide support for all Microsoft BackOffice and Office Products, SQL 7.0, IIS 4.0, as well as NT 4 and Windows 2000 OSs.
  • Designed and implemented WAN and LAN solutions while working with Cisco Routers and Switches.
  • Responsibility included creating LAN/WAN for clients software, hardware and data lines testing software from development and responding to several support issues from our channel partners.
  • Additional responsibilities in relation to the software involved site design, installation, training and support.
  • Involved in the technical pre-sales work with our partner/reseller accounts, worked with the client to architect a complete systems infrastructure for them based on the imaging and B2B e-commerce software.
  • Responsible for Securing the Applications that Optika created. This includes securing the software and the servers it resides on.

Confidential

Sr. Systems Engineer

  • As a Systems Engineer, was responsible for design, implementation and troubleshooting of LANs and WANS with corporate customers.
  • Administering Microsoft Servers and AIX and HPUX UNIX Servers.
  • Designed and implemented network security for many of our customers through the use of Cisco PIX Firewalls and Routers and Microsoft Software such as Internet Information Server and RSA SecurID.
  • In depth knowledge of the TCP/IP protocol suite, installed, configured and supported various e-commerce solutions for approximately 100 companies.
  • Designed, implemented and supported internetworking solutions for customers using a wide array of Cisco equipment including, the entire 2000 series of Routers, Layer 2 and Layer 3 Catalyst Switches, 500 series PIX Firewalls, various bridges and an array of hubs.
  • Proficient with a wide variety of Microsoft Software, to include NT Server 4.0, NT Workstation 4.0, Windows 95, Windows 98, IIS 3.0 and 4.0, The Microsoft Office Suite, DOS, Exchange 5.5, SQL 6.5, and Proxy Server 2.0. Supported Various Seagate / Veritas Backup Products
  • Comprehensive knowledge of various Network Topologies, including the various types of Ethernet, Token Ring.
  • Worked extensively with several WAN technologies including Frame-Relay, ISDN and point-to-point leased lines. The frame relay and point-to-point lines were usually fractional T1s, full T1s or T3s DS3 .
  • Well versed on the subjects of installing, modifying and supporting Hewlett-Packard Netservers and various Compaq Servers.
  • Responsible for the IT Security Networking equipment for dozens of companies/clients.
  • For Technical Certification - I have completed dozens of technical training courses and programs for dozens of different hardware platforms and seemingly countless applications including training by Microsoft, Cisco, Juniper, Checkpoint, Arbor, Sun and many other flavors of UNIX, Linux, HP, Compaq, Comptia, ISC2 and many more.
  • Example: Successfully completed the Solaris Certified Systems Administrator SCSA training through SUN education in Broomfield, CO. Successfully completed various training classes in Juniper Security Technology such as JNCIA and JNCIA-FWV. Completed training in Arbor Software and Hardware.

.

We'd love your feedback!