System Administrator Resume Profile
4.00/5 (Submit Your Rating)
ACCOMPLISHMENTS:
- Spent 20 years in the United States Reserves and have seen action in both Gulf Wars and the Afghanistan conflict. Commissioned officer Reached the rank of Major .
- High School Teacher and Coached High School Varsity Football and Track. Was the Head Coach at Coyle Cassidy High School and Bishop Connolly High School.
- Professor at Kinyon Campbell Business School teaching networking and Microsoft Products. Worked on corporate manuals and gave lectures to corporate clients.
- Joined EDS as a Corporate Trainer and worked at CVS Pharmacy, Textron, 3M, US NAVAL Base. Provided Firewall and Network Support.
- Left teaching went to Teradyne and become the youngest manager in the company's existence. Eventually reached the position of Director of Services.
- Built an e - commerce business from the ground up at Geerlings and Wade. Linked 42 warehouses to the corporate network and instituted
- corporate security policies and procedures. Saved hundreds of thousands of dollars by linking each warehouse and eliminated the need for several IT personnel at each warehouse.
- Finished and published a book on HIPAA Policies and Procedures.
- Became the youngest Director at Ocean Spray Cranberries and designed and implemented a new Citrix environment and devised the Win NT 4.0 upgrade to Windows 95.
- In 1999 took a position at Braintree Security Software that was bought out by Pentasafe Travelled the world installing security software to the DEA, CIA, Treasury, FAA, and the University of California College System. Trained the top Security Engineers at each client and wrote a training class and developed all the policies and procedures for these clients. Also responsible for the marketing at Braintree and later worked with the marketing department at Pentasafe to incorporate both companies into one product.
- Started teaching at Northeastern University and went to work as a security auditor at the Seifas Corporation which sold to IBM. Worked way up to the CSO of the Corporation concentrating on Security Audits for fortune 500 companies. Re-affirmed technical skills while writing Policy and Procedures and analyzing data from several top security companies. While at SEIFAS I did spend most of 2004 in the military working as an attachment for the NSA specializing in security.
- Took over a dormant security practice at Aimnet Solutions as the National Director of Security Engineering to oversee the Security Practice that was almost non-existent. Performed Level three Cisco and Firewall Support in the largest NOC in the World. Built the Security Practice to over one million dollars in Revenue in less than six months by concentrating on PCI audits for COACH, MAVADO, RALPH LAUREN, FIDELITY, Bank of NEW YORK, PFIZER, etc.
- Specifically wrote all the security PCI policies and procedures for these companies. I am an expert in Public Key Infrastructure, also performed sales, pre-sales and post sales support, along with re-branding AimNet's marketing documentation. Sold services to Carlyle Group, HBO, Blackstone, DOJ, Artumas, Satellite Asset Management, Apollo Management, NASA, Lockheed Martin, Collier, among others.
- Worked with strategic partners to secure relationships of managed security network services for Verizon, Sprint, Fujitsu, Secure Computing, and IBM. Lead Security testing for EMC's acquisition team. All of EMC's security audits were performed by my team and all policies and procedures plus all summaries were written by me.
- Since the early part of the year worked exclusively as a Security Auditor at the Unites States Government. Analyzed raw data, perform interventions on proprietary networks and devise security plans.
- Citrix MetaFrame and WinFrame, LAN/WAN, Oracle, Sybase,
- PeopleSoft, Designer 2000, Developer 2000, Lotus Notes Domino,
- Siebel, VB, SQL, PeopleSoft, Visual Basic 6.0, Web, Intranet, MS
- Excel, MS Access, WordPerfect, Word, MSMail, cc:Mail, PowerPoint,
- Outlook, 97 and 2000 Office Trainer, APL, AppleOS, AppleTalk, Mac/OS,
- Client/Access/400, Symantec Vault, Client/Server, Etherlink, Ethernet,
- Fortran, Framemaker, FrontPage, ISPF/PDF, Java, HTML, MS Proxy
- Server, Publisher, SQL, Visual Source Safe, Project, OpenVMS, VMS,
- UNIX Shell Scripting C, K, Solaris, Dazel, Tivoli, Crystal Reports,
- Operating Systems/Env ironments:
- Veritas SecureOS, LDAP and Active Directory.
- Windows, Unix, HP-UX, Vax, DOS, Certified Linux Administrator
- Network Applications/Protocols:
- LAN/WAN, WLAN, TCP/IP, FTP/Telnet, Kerberos, SSH, NFS/NIS
- Programming Languages:
- Oracle, Visual Basic, SQL, Unix Shell, Sybase
- Gauntlet, Pix, Checkpoint, Sidewinder, Juniper, Symantec, Netscreen, Sanctum, Checkpoint Firewall-
- 1/VPN software NG-AI Checkpoint 4.1, NG, NGAI, NGX, VSX Secure Platform Cisco Pix,
- FWSM, ASA Juniper Netscreen Firewalls Lucent Bricks Cisco Routers/Switch
- MCSE Internet 1999
- Microsoft Solutions Provider Training Course 1995-6
- Cisco VOIP
- Oracle DBA200
- CISSP 2001
- Sidewinder Admin 2004
- Upgraded Oracle Databases from 8 and 9 to Oracle 10 and 11.
- Updated Oracle Financial Database from Oracle 9 to 11.
- Upgraded all of the scientific data applications from Oracle 9 to 11.
- Configured IBM Servers for network.
- Upgrade Exchange mail from 2003 to 2010.
- Installed Cisco Firewall ASA 5500, Router and Switches.
- Installed and Configured Backup Exec.
- Wrote and installed two factor authentications.
- Configured and Installed VPN.
- Installed and Configured Replay 4 Mail Software.
- Wrote and Implemented Policies and procedures for compliance.
- 3/10
- Analyzed, documented, and reported events correlated from diverse areas anti-virus, NIDS,
- HIDS, log files, privacy monitoring, etc. to efficiently identify highest risk incidents that require
- investigation and remediation.
- Defined standards for regular review of the Information Technology environment network,
- systems, applications .
- Lead Architect for the new DOJ Data Center.
- Kerberos installations.
- Developed, documented, and communicated security assessment procedures.
- Recommend security actions for remediation of issues discovered during assessment.
- Managed specific security projects as needed.
- Identify, document, and report security risks as related to technology implementations.
- Proactively manage security attack trends.
- Responsible for escalated security-related problem resolution.
- HP EVA
- EMC Symmetrix
- Citrix Consultant
- Expert in threat and vulnerability assessment.
- Wrote the DOD Training Manual for Cyber Security Analysts.
- Data Archiving Team leader Enterprise Data Vault Collection .
- Responsible for one or more areas of the following security domains, and can be tasked with
- SIM Security Information Management
- Peoplesoft
- Security Assessment and Audit
- Data Communications
- Malicious Code
- Computer Operations Security
- Business Continuity Disaster Recovery Planning
- Telecommunications Network Security
- Security Architecture Models
- Security Management Practices
- Investigations Ethics
- Demonstrated proficiency with security as it relates to several of the following:
- Intrusion Detection
- Anti-virus
- Privacy
- PCI
- Microsoft Windows
- AS400
- Network technologies firewalls, routers, switches
- Security tools and technologies
- erformed product evaluations and evaluated new technologies.
- Requirements definition.
- Evaluation and testing methodologies.
- Documentation including recommendation, implementation issues, cost analysis, and
- alternatives
- Data Center Architecture.
- Maintain current knowledge of the Information Systems security industry's emerging
- technologies.
- Day to day security event monitoring analysis
- Conference Leader on the Director of Central Intelligence Directive in correlation with the
- DOJ and DOD DCID
- Services monitored and delivered include, but are not limited to SIM, IDS/IPS, Firewall, Web
- Content Filtering, Proxy and Security Event Correlation and Reporting to appropriate Tier 2
- incident handling staff or relevant sources to determine increased risk to the Security of the
- United States and her Allies.
- Regulate and Lead enterprise IT defense perimeter monitoring and scanning infrastructure
- and led team in communicating security infrastructure integrity and posture to applicable
- Post Jobs, Resume Search, Recruiting Service, Hiring Solutions, all at Monster.com
- Computer Emergency Response Team personnel and/or management.
- Established processes to monitor and analyze the output from various security perimeter
- monitoring devices and recommend security actions per procedures when required.
- Establish processes to perform reviews/audits of mixed Unix and Microsoft Windows
- environments, including network devices, databases, web services, and enterprise applications.
- Coordinate with Infrastructure Support team to maintain/trouble shoot defense perimeter and
- monitoring integrity.
- Development of process, policies and procedures congruent with standards and Homeland
- Security and the Department of Defense best practices.
- Installation and administration of an NT client/server network including Active Directory.
- Installation and maintenance of Cisco Pix Firewall 515E with failover series.
- administering
- a network with 300 workstations, 46 Servers 45 Microsoft and 1 Unix AIX, 4
- locations, 3 web
- sites, 3 firewalls NAT, Pix515Eand Microsoft ISA and 1 Citrix Farm 9
- Applications Servers, 1 SQL Data Server, and 2 N-Fuse Web Server .
- Proficient with WAN Monitoring with FLUKE and What's up Gold
- Installation and maintenance of Cisco Routers 1600, 1700, 2500,
- 3600 and 2800 series
- Installation and maintenance of Cisco Switches 2950 and 2960G
- series
- Installation and maintenance of Cisco Pix Firewall 515E with failover series
- Installation and administration of an NT client/server network including Active Directory.
- Checkpoint Firewall Administration
- 10 years experience with AIX UNIX
- Knowledge of multiple Microsoft Operating Systems DOS, Win 3.1, 95, 98, NT, 2000, XP,
- Server 2003
- Installation and administration of an NT client/server network including Active Directory.
- Installation and administration of FacetWin a terminal emulator and file transfer program for
- UNIX mainframes
- 4 Years setting up and administering a PACS network which is dedicated to running on a fiber
- channel environment
- Install, configure, and maintain VPN's with Microsoft Proxy Server 2.
- Install, configure, and maintain VPN's with Microsoft ISA Server.
- Install, configure, and maintain a farm of Citrix XP Metaframe servers used to hand out
- applications to my internal network while letting the N-Fuse technology handle client access
- from the external side.
- Expert in Microsoft Exchange Server
- Expert in Blackberry Enterprise Server
- Expert with Rove Mobile formerly known as Idokorro servers run through the BES to manage
- all servers, workstations, switches, routers, and pix firewalls with Blackberry handhelddevice
- from anywhere with a cell signal
- Expert proficient with wireless technology
- Post Jobs, Resume Search, Recruiting Service, Hiring Solutions, all at Monster.com
- accidental or unauthorized modification, destruction or disclosure.
- Developed, implemented, maintained and enforced security policies, dealt exclusively with
- PCI at Fidelity, Movado, Coach and Ralph Lauren.
- Citrix Installations and Administration.
- Worked with outside vendors and conducted independent vulnerability assessments and
- penetration testing etc.
- Design, install and support hardware and software systems that provide appropriate security
- functions.
- Identify deficiencies with Active Directory and Group Policies and recommend/implement
- design changes as appropriate.
- Review operation logs and event console activity to determine potential or actual causes of
- security-related events.
- Participate in investigations of suspected information security misuse or in compliance reviews
- as needed.
- Communicate unresolved security exposures, misuse or non-compliance situations to
- management.
- Consult with IT management to ensure selection and use of realistic enforcement
- mechanisms.
- Ensured security-related documentation is created and updated in a timely manner.
- Provided second/third tier customer and systems support as needed.
- Facilitate account and service management for all customer start departure processes,
- along with ongoing authorization and access control changes.
- EMC Symmetrix.
- Lead Emergency Response Team activities as needed.
- Spearheaded disaster recovery/business continuity activities worked exclusively with
- Sunguard.
- security, CC/DITSCAP.
- Detailed project plan for assessment, gap analysis, policies and procedures, training, and on-
- going compliance monitoring.
- Interview outlines, results, and analysis templates, vendor checklists, role-based worksheets,
- security technology selection, user training, audits.
- Gap analysis metrics, with primary risk areas and levels of readiness Department-specific
- HIPAA Notebook guides with relevant HIPAA rules, FAQs for lab, pharmacy, IS, Emergency
- Department, business office, etc.
- Designed and coded Business Relationship Database - MS-Access database for due diligence
- and tracking of External Business Relationships Business Associates, Trading Partners, Chain
- f Trust .
- Quick Guide to Data Modeling with examples using Oracle 8 for supply chain, clinical trials
- and website data collection applications
- Completed and implemented Network Security with PKI: An Implementation Guide
- Led Consulting and Technical Services groups, comprising field deployment consultants,
- interoperability engineers, support and pre-sales engineers. - Zero staff attrition in 1.5-year
- period one dismissal for cause .Worked exclusively with migrating e-mail applications
- Exchange to Notes, Notes to Exchange
- Successfully deployed multi-bank cryptographic application through 3-phase test, established
- secure connections to PKI system components in US, Europe and Asia, trained VPs of
- participating banks. For off-shore commercial secure messaging venture, designed PKI
- architecture, worked on business plan and budget justifications, technology evaluations,
- component integration, participated in every aspect of successful new business - legal, import-
- export, network, hardware/software, staffing, sales / marketing, physical security.
- Trained users, programmers and executives on mathematical basis and operational issues of
- implementing cryptographic technology.For intellectual property exchange, recommended
- security technology and developed operational practices for scientific data
- capture, vetting
- cycle and secure storage system.
- Forensic Auditing
- Citrix
- Penetration and Vulnerability Testing, Audits, and Security Design Implementations
- hiring.monster.com/jcm/candidates/printresume.aspx type classic resumes bn7avd6dpr4mmx6z
- Post Jobs, Resume Search, Recruiting Service, Hiring Solutions, all at Monster.com
- Wrote Windows NT and Solaris 2.6 hardening guides for web servers and Networks. Created,
- directed and secure operation of certification authority CA for software and firmware signing.
- Technical lead on SAP R/3 security partnership.
- Responsible for the sales and installation of the security product within various client sites
- Firewall, Secure Appliance, Tokens, Smartfilter URL filtering product, Anti-virus, Pre-sales and
- Post-sales engineering.
- Installed Various firewalls to add the Smartfilter URL Filtering Product.
- Assisted Senior Sales force with presentations at various client sites, trade shows, vendors
- Duties include lectures, presentations and product trainings at various channel partners.
- Served on various security panels at security conferences and trade shows
- Trained end users on Secure Computing Product Line offsite and at the Minnesota and
- Virginia offices
- Designed and Developed theHIPPA, GLB and Sarbanes-Oxley Act's Sales Marketing
- Analysis with the Secure Product Line
- Presented new Secure Product Line to NSA, CIA, DEA, CIO of the United States Treasury,
- Army, Navy, Air Force, etc.
- Worked exclusively with Citrix's top engineers on the development and deployment of our
- Citrix authentication products
- Personally responsible for bringing in 31.3 million dollars of business.
- Worked on presenting the NT/Unix Security Products to the top Fortune 100 companies.
- Logged over 120,000 air miles in 2001.
- Clients included Federal Reserve Bank, FAA, United States Treasury, DEA, CIA, Umass,
- University of California,
- Wrote all DOD Security Manuals for Cyber Securty.
- Disaster Recovery Expert.
- Penetration and Vulnerability Testing
- Responsibilities also included: Configuring Servers for Raid Configurations, Windows 2000
- Server Installations, Exchange Server, Firewalls, Backup up configuration, usually Arc Serve or
- Backup Exec and prospect and configure customer security.
- Required to maintain customer network configurations onsite as well as at the office.
- Responsible for the sales and installation of the security product within various client sites.
- Installed Oracle, Sybase and SQL Server Database for the company's database security
- products. Performed the exclusive design for over 100 companies using PeopleSoft.
- Handled all Citrix responsibilities within the company, and became known as the Citrix guru.
- Trainings three weeks at University of California, Umass, Trade Trainings three weeks at
- University of California, Umass, Trade Shows, High Level Corporate Demonstrations CEO, CIO,
- CFO, fortune 100 companies, Seminars, Webinars, Installations.
- Personally responsible for bringing in 31.3 million dollars of business.
- Worked Presently working on presenting the NT/Unix Products to the top Fortune 100
- companies.
- Logged over 120,000 air miles in 2001.
- Clients included Federal Reserve Bank, FAA, United States Treasury, DEA, CIA, Umass,
- University of California
- Disaster Recovery Expert
- Partnered with Computopia, a Citrix reseller, to sell and install Citrix MetaFrame1.8 and
- WinFrame 1.7 at companies who purchased BHC financial software.
- Performed over 50 PeopleSoft Installations as well as Oracle, and wrote
- most of the
- PeopleSoft Security that Peoplesoft uses today
- Responsible for over 4 million dollars in sales.
- Developed Crystal Reports for clients using Visual Basic and SQL.
- Firewalls, Backup up configuration, usually Arc Serve or Backup Exec and prospect and
- configure customer security.
- Architect for Security Designs for Customers
- Introduced Ocean Spray to Citrix MetaFrame.
- Responsible for upgrading the Citrix servers to MetaFrame.
- Implemented and maintained the Network's Infrastructure and developed new technology.
- Provided hands on support and installed all network hardware and software, including: NT
- Servers, Novell Servers, Oracle Database installations, Administered Exchange and Lotus Mail
- Servers, Raptor Firewall Software.
- hiring.monster.com/jcm/candidates/printresume.aspx type classic resumes bn7avd6dpr4mmx6z
- Post Jobs, Resume Search, Recruiting Service, Hiring Solutions, all at Monster.com
- Directed and implemented the Windows 2000 upgrade.
- Checkpoint Security Administrator with a Strong concentration with Network Security.
- Headed the Novell to NT Migration, Dazel and Tivoli Administration, SQL Server Disaster
- Recovery IBM's ADSM .
- Developed the MIS design and Managed the Team that developed the MIS solution for
- medical equipment using Java, HTML, Oracle Designer and Developer 2000, and Oracle.
- Designed LAN and WAN configurations for external customers.
- Performed Unix and NT administration for numerous clinics in the field.
- Lead Security Team in the Data Centers
- Introduced the company to Citrix to manage its 21 warehouses.
- Sole administrator for Citrix MetaFrame.
- Directed the largest Internet Wine companies IT department.
- During the initial stages of the company I was the only IT person during the initial setup that
- was not a developer.
- Served as NT Administrator for company
- Firewall Administration NT and UNIX
- Mail Administrator cc:Mail and Exchange account creations
- UNIX Administrator HP 9000 and Dec Alpha 2100
- Maintained all Citrix machines as Citrix WinFrame was introduced into the company.
- Other responsibilities included: NT Administration, Lotus Notes Server Admin, PeopleSoft,
- FirewallAdministrationandSecurity,InstallationofCiscoRouters,ExchangeMail
- administrator, TCP/IP Monitoring Operations, VAX and HP-UNIX backups, UNIX and VAX
- administration.
- Administered company Intranet server as Intranet Web Server Administrator.
- In charge of Corporate Computer Security for 7,200 users worldwide.
- Taught many seminars to ISG Staff Microsoft Office, Lotus Notes, Internet, Remote Access .
- Provided desktop support for both hardware and software.
- Strong concentration with Network Security.
- Instructed Business and all Microsoft Network classes.
- Counseled and placed graduates in field excellent placement rate .
- Taught many Corporate Seminars in Access, The Internet, Excel, Word, and Word Perfect.
- Participated in research and development for Gold Star Industries.
- Worked on technical manuals.
- Maintained the schools network on a 24-hour basis.
- Passed all the Microsoft Solutions Provider Tests.
- time during school.
- As a Corporate Trainer, taught all software Microsoft Office, PMD, Lotus Notes, Goldmine .
- Wrote all Corporate Training manuals for all Microsoft Office Applications and
- wrote the
- policies and procedures for the Help desk.
- Supervised all Anti-Virus installations corporate level .
- Converted all customers from Windows 3.1 to 95 approximately 2,500 employees .
- Researched and tested new software to meet the needs of the customer.
- Provided network support company wide. Ran all levels of support from the Help Desk, which
- served over 3,000 employees.
- Converted documents from earlier forms of MS Office to the updated versions.
- Performed general maintenance on laptops and desktops.
- Firewall Administration.
- High School English Teacher and Coach at Bishop Stang, Bishop Connolly, and Somerset High
- Schools
- Most recent employer
- Relevant work experience
- 10 to 15 Years
- Highest education
- Doctorate
- Career level
- Executive SVP, VP,
- Availability
- Department Head, etc
- Immediately
- Location
- US-MA-North Woodstock
- Relocate
- Will Relocate
- US military service
- Yes
- Citizenship
- Security clearance
- No
- Veteran status
- Work authorization
- US - I am authorized to work in
- Willing to work shifts
- this country for any employer.
- Willing to work weekends
- Travel
- Up to 100
- signatures, PGP, SFTP, HTTPS, TLS/SSL, SNMP, TCP/IP, UDP, SSH, BGP, DHCP, SMTP, Telnet, ICMP, IPSec, ARP, RARP, OSPF, RIP, LT2P, LT3P, MAC, MPLS, DSL, FDDI, AES, Kerberos, SSO, ACL, subnetting, IIS, IDS/IPS, VOIP, PBX, SIP and the OSI Model.
- Advanced technical expertise across a broad range of technologies. Advanced and solid experience in troubleshooting Firewall flows. Experience in migrating Firewalls from one platform to another unlike platform requiring in dept rules analysis and translation Protocol decoding and analysis using a variety of software tools. An understanding of Internet DNS, HTTP and load balancing concepts. Technical Consultative Skills and the ability to manage projects. Broad and thorough knowledge of security systems, BIND, Squid, Postfix, Amavis, Snort, and tcpdump
- Netscaler -
- Smart Access
- GSLB - Global Server Load Balancing
- DNS
- Web Interface
- Endpoint Analysis - build custom scans
- XenApp
- XenDesktop
- Edgesight
- XenApp qualifications
- Provisioning Services 5.x
- XenApp 4.5, 5 and 6
- XenDesktop 3 and 4
- End User Experience Management - GPO, Citrix User Profile Manager, Appsense Environment Manager
- Citrix Streaming Profiler and Isolated Applications
- Application tuning and optimization
- Good Active Directory skills, specifically Group Policy
- Web Interface
- EgdeSight
- Netscaler/Citrix Access Gateway
- Smart Access
- CERTIFICATION/TRAINING:
- Citrix Certification 1998 - CCA Citrix Certified Administrator 1998
- NT Certified MCSE Certified 1996
- American Student Assistance is presently becoming FISMA compliant as it diversifies from being a direct lender to a wellness company
- Wrote the policies and procedures for the FISMA security compliance strategy for Firewalls, PKI, PCI, and Network Security Fundamentals.
- Configured the Juniper Firewalls and Cisco ASA 5500's.
- Updated SQL Database servers for FISMA compliance.
- Redesigned the network infrastructure for FISMA compliance.
- Installed Vormetric software for FISMA compliance
- Installed, Upgraded, Configured and Administrated, Oracle and Sybase databases.
- CISCO VOIP Cisco Unified Contact Center .
- Brought in to rebuild A Nobel Prize winning scientist's Oracle 8 and 9 Database and upgrade all of the scientific applications to Oracle 11. Built a new Microsoft and Cisco network.
- Provided technical excellence in security assessments v ulnerability scanning and penetration testing and systems audit against existing and proposed information technology systems and environments. Sold and developed the largest non-Microsoft software deal to the DOJ
- Joined Aimnet Solutions as the National Director of Security Engineering to oversee the Security Practice that was almost non-existent. Level three Cisco and Firewall Support. Built the Security Practice to over one million dollars in Revenue in less than six months. Worked with strategic partners to secure relationship of managed security network services for Verizon, Sprint, Fujitsu, Secure Computing, and IBM. Lead Security testing for EMC's acquisition team. Pre-sales and post sales support, along with re-branding AimNet's marketing documentation. Lead a Team of IT Forensics Scientists for the US Government. Third Level Support for Sprint and Verizon.
- Technology and Regulatory Compliance:
- Regulatory: HIPPA, SOX, PCI, ISO
- Storage: EMC Symmetrix, EMC Cellara, EMC Centara, Equallogic PS series arrays
- Network Technology: Cisco, Juniper, Checkpoint products
- OS and Network/Telco Environments: Windows 2003/2008, OpenVMS, UNIX, Linux, Active Directory, Group Policy, Citrix, Avaya
- Security Related Applications: NetIQ products suits, Websense, Trend AV, Symantec Enterprise Vault, Microsoft Hosted Filtering, RSA Security, Intrusion Detection/Prevention Systems,
- IP Protocols and Standards: DNS, DHCP, IP, VoIP, UDP, FTP, SNMP, SMTP and other common protocols, etc
- Security Information Officer Project Manager Database Administrator Oracle, PeopleSoft, SQL, Sybase, Web
- Logic Server, Apache, IIS
- SEIFAS specialized in Information Technology Security, IT Auditing, Disaster Recovery, and Security Software. SEIFAS secured all of your data and your gateway to the Information Super Highway.
- Last project: Auditing, Security Policy and Planning project for a large government clients and Fortune 500 Companies, focusing on enterprise security requirements. In-depth treatment of risk assessment, business continuity planning / disaster recovery, Oracle and Sybase Database administration, Citrix Administration, email
- BHC Software sold to Braintree, /Braintree Security Software sold to Pentasafe /Pentasafe sold to Net IQ Sr. Security Sales Engineer/Oracle, Sybase, SQl, Peoplesoft/Network Engineer/Project Manager
- March 1999 - October 2002
- Additional Information
- Career Information
- Target Job
- Company size -
- Desired status Full Time
- Job type Employee, Temporary / Contract / Project
- Salary 125,000 - 10,000,000 USD/yr
- Locations US
- US DC Washington/Metro
- US MA
- US MA Boston
- US MA Framingham/Worcester
- US NH Southern
- US RI
- US RI Providence
- US DC
- US NH Northern
- US MA Boston South
- US MA Boston North
- US MA Cape Cod/Islands
- Job titles
- Government and Fortune 500 Sales
- Industry
- Professional
- Biotechnology/Pharmaceuticals
- Chemicals/Petro-Chemicals
- Computer Hardware
- Computer Software
- Computer/IT Services
- Education
- Electronics, Components, and Semiconductor
- Mfg
- Healthcare Services
- Occupation
- Management Consulting Services
- Computer/Network Security
- Database Development/Administration
- IT Project Management
- Network and Server Administration