Systems Engineer Resume Profile
OH
OBJECTIVE:
Information Cyber Security Expert with 16 years of Information Security Management experience searching for a challenging security executive role. Full time roles considered would be Chief Information Security Officer, Head of Information Security or similar. As a Security Management Consultant open to most security roles with an acceptable rate. Prefers virtual work but open to onsite work and up to 20 travel.
SUMMARY:
- Managed, architected, implemented, and administered security for networks of up to 200,000 users for the United States Department of the Treasury. Passionate about enabling business through security instead of crippling it. Security must revolve around the business. Expert in holistic security. Studies emerging threats and new security technologies. Expert in security architecture and operations. Expert in architecting, implementing and administering global managed security services. Led security teams of up to 75.
- Has led teams of Sr. Managers, Managers, Project Managers, Architects, Engineers, Developers, Analysts and Help Desk Personnel of all levels. Specialized in solving unsolvable security problems. Deep experience not only in virtual security but in administrative and physical security as well. Sees security as a whole and understands what it takes to integrate security into an organization so that security is an asset to the business and not a hindrance. Experienced architect and implementer of complete enterprise security programs. Experienced in architecting cloud security for a variety of enterprises most recently large medical equipment and healthcare organizations. Experienced in creating and managing Vulnerability and Threat Management Programs for small to large enterprises. Designed and built complete security organizations for many corporations from the top down. Expert in finding root cause of the organization's security problems in order to create stable, lasting, security solutions.
- Vertical experience includes medical healthcare, government, non-profit and for profit including financial, telecommunications, construction, retail, wholesale, state federal government entities, and information technology businesses including hardware, software services based organizations.
- Works regularly with individuals at every level of the organization from engineers to CEOs and has a detailed understanding of the unique needs and concerns of each. Expert in adaptation within any group and in any situation. Can communicate to an executive in a concise fashion the security needs of the organization and how security will affect the bottom line. Significant experience in dealing with the security concerns of corporate mergers, expert in working with both sides to efficiently achieve the desired level of security.
- No problem is unsolvable. Expert in both strategic and tactical security and knows when to focus on each. Proven veteran in the field of information security with a fierce passion for learning and security. Flexibility and quick mastery of all challenges presented is an invaluable addition to any organization.
Solutions Experience:
- Cisco Products: Implementation administration and support of routers from 1000 to 7000, Catalyst Switches Series from 1000 to 8000, Linksys All Products, Entire PIX 500 Firewall Series, Entire ASA Series, Cisco Local Directors, Cisco Security Agent, Cisco MARS, Cisco NAC, Cisco FWSM, CSS, RADIUS TACACS expertise in all versions, CiscoWorks, Cisco IPS Devices, Cisco Secure ACS, Wireless Products etc. Routing protocol experience includes BGP, RIP, IGRP, EIGRP protocols.
- Microsoft Products: 15 years experience with Microsoft Business Products including all versions of Windows Operating Systems for Business PCs Servers Standard Server and Small Business Server versions from Windows XP to Vista to Windows 7, Windows 8, Server 2003, Server 2008, Server 2012 All Versions of BackOffice from 2000 to 2013 products including all versions of MS SQL Server, Exchange Server, ISA Server, Proxy Server, IIS, etc. All products in all versions of Microsoft Office including Visio Sharepoint 2003 2010, Powerpoint, Access, Outlook, Excel, Project, etc up to version 2013 LDAP Administration expertise Office 365 Support and Administration.
- Juniper Products: Entire Juniper NetScreen Series of Firewalls and other Security Products All versions of ScreenOS, Entire SSG Series of security devices Entire ISG Series SSL VPN Products IDP Devices, SRX Series, All NSM Versions, etc.
- Checkpoint Products: Checkpoint Software and Nokia Hardware corresponding to these versions: VPN-1 Firewall-1 NG, NGX, R62 and R65, Splat ISO.
- Sonicwall Products: All Sonicwall Firewalls
- UNIX Systems: AIX, HPUX, DGUX, All versions of Solaris.
- Linux Systems: Red Hat and Ubuntu. Some Knoppix, Fedora Debian
- HP Products: Entire Series of HP PCs Servers for Windows, Some HP UNIX Servers, Switches,
- Mcafee Products: Extensive experience with business security products, hardware and software such as the McAfee Mail Gateway Devices Sidewinder Firewalls, McAfee NSM Intrushield , MCAfee IDS Sensors, McAfee Endpoint Encryption.
- RSA Products: RSA SecurID all versions both hard and soft tokens, RSA Ace Server multiple versions
- Symantec Products: All Security Products both Software and Hardware Business Products, also their Veritas Product Lines such as all versions of Backup Exec. Symantec Endpoint Encryption, SEP client and server software. Symantec Endpoint Protection
- CA Products: Entire Security Product Suite, including Business Products such as CA Enterprise.
- Arcsight Products: To include installation and configuration of ESM, Logger, and Connectors
- BlueCoat Products: The full series of Bluecoat devices and software including such products as BlueCoat Director, BlueCoat Reporter, BCAAA Server Software 800, 900, 8000 and 9000 Series of Bluecoat Devices
- Websense Products: Supported Websense Software/Servers Web Security for Internet Security. Have integrated it with Juniper/Netscreen Security Devices.
- Veritas Products: Ten years of experience working with Veritas Products including Backup Exec, Veritas Volume Manager, Veritas NetBackup and several other Veritas / Seagate products.
- Ten years of experience designing, implementing and supporting storage and backup systems.
- Misc Security Products/Tools : A few of them are eEye Retina, Tenable Nessus, Wireshark, GFI LanGuard, Snort, Metasploit, Hping2, TCPDUMP, Nikto, OpenSSH, Putty, NetFilter, NetStumbler, AirCrack, Solarwinds Engineers Toolkit, Solarwinds Orion Suite of Products and Solarwinds Engineer's Toolkit, Intellitactics, EM7, Splunk, MBSA, Tripwire, NMAP, RKHunter, Ophcrack, BackTrack, OWASP Top 10, SANS Top 20, Rapid 7 Nexpose, Burpsuite, nCircle.
- Security Domain Expertise: Information Security Management Security Architecture and Models Access Control Systems and Methodology Applications and Systems Development Operations Security Cryptography Physical Security Telecommunications, Network and Internet Security Business Continuity Planning and Law, Investigations Digital Rights Management, Vulnerability Management, and Ethics
- Government and International Regulations Standards: ST E, DIACAP, NERC CIP Standards CIP-002-CIP-009 , FIPS 140 Compliance 140-1,140-2 new 140-3 , FIPS 199 High, DCMA, DISA, C A, FISMA, NIST 800 series standards including NIST 800-53, 800-37. DOD 8570.01 Certified. HIPAA HITECH, HITRUST CSF, SOX, GLBA, PCI, ISO 27001, ISO 27002, ISO 17799, BS 7799, NIST 2013-2014 Cyber Security Framework. Experienced implementing and auditing around Meaningful use Security Requirements and the CSF Keys associated with HITRUST for large healthcare systems.
- Splunk: Installation and configuration for large national and international corporations
- Secureworks: Experienced with support and operations of SecureWork's Suite of Projects
- Remedy: Experienced with using many versions of Remedy to build and manage tickets and projects
- VMWARE: Workstation, Player, Server, vSphere, vCenter, vShield, VSwitch, Hyper-Visor, High Availability, Data Protection, Fault Tolerance
- Sophos UTM and Firewall Products
- IPAM IP Address Management
- nCircle Tripwire Architecture, administration and support expertise
- AccelOps Adminstration expertise
- Languard GFI - Adminstration
- Qualys Support and administration expertise
- ITIL v3 training and implementation experience
- Ethical Hacking training, skills and experience CEH Certification will complete in February 2014.
Professional Experience:
Confidential
Managing Principal
- Hire by SecureWorks to design, launch and manage the new Security Design Architecture Group for SecureWorks. Now that the group has been launched responsibilities include managing all security architects, engineers and analysts. leading design, documentation and implementations of new security products and services for this group. Working closely with sales and clients to respond to RFPs custom security services requests. Creating and presenting customized security architecture solutions to enterprise organizations around the world. Working as the principal security architect managing and executing security architecture and design projects from pre-sales to delivery. Managing enterprise projects from RFP to project closure including the client relationship, our security staff, vendors and sub-contractors. Interfacing daily with CIOs, CTOs, CSOs and CISOs.
- Responsibilities are extensive and include designing, building, launching, and now managing the security design and architecture services and teams. Conceived a line of security assessment, design and architecture products including a customize security architecture framework covering all domains of cyber security. Managing the security architecture teams on all client engagements.
- Working on a daily basis with clients, SecureWorks Sales and Technical teams to sell and execute custom custom cyber security assessment, design and architecture solutions for organizations of all sizes including the largest enterprise organizations in the world. During pre-sales performs tasks normally associated with a Sr. Solutions Architect and post sale performs delivery manager responsibilities including leading and providing daily technical input to the teams that are implementing the custom security assessment, design and architecture solutions.
- Working daily at a CISO level with CIOs and CISOs from the largest organizations in the world to oversee the design and implementation of comprehensive customized security assessment, design and architecture solutions spanning all domains and all controls of Cyber Security. The SDA Team works as an extension of the client's security team partnering with them from project inception to successful implementation. This new group is exceeding all revenue goals which have grown 400 in just the last quarter.
- From a technical standpoint creating and implementing the security solutions addressing a wide range of security needs including The SANS 20 Critical Security Controls version 5, NIST 800 Series Standards, ISO 27001 and ISO 27002 Standards on Information Security, HIPAA, PCI, SOX, Mobile Device Security, BYOD Security, Cloud Security, all major SIEM products, All major brands and types of firewalls including Application Layer Firewalls such as Palo Alto and Web Application Firewalls, Security Governance, IDS/ IPS, content filtering such as Bluecoat proxy servers ,vulnerability management systems such as Qualys and Tripwire, DLP, GRC, Identity Management, SSO, LDAP, Next generation firewall IPS etc. Writing and reviewing security policies, standards and procedures. Conducting security gap analysis reviews across all domains of Fortune 500 enterprise information security programs. Vulnerability and threat management expert with significant penetration testing experience.
Confidential
Principal Security Architect CISO
- Supplied expertise in a consultant role as an Information Security Manager, Security Subject Matter Expert Security Architect for the physical, administrative and logical security for hundreds of companies. 15 years of overall Security experience, this includes Information Security Management Security Architecture and Models Access Control Systems and Methodology Applications and Systems Development Operations Security Cryptography Physical Security Telecommunications, Network and Internet Security Business Continuity Planning and Law, Investigations Digital Rights Management, and Ethics. Provide advanced design, implementation, administration and troubleshooting of information security systems, risk audits, and methodologies. Extensive experience with all aspects of Managed Security Services. Experienced in using IPS and IDS and other security mechanisms to prevent and detect all types of digital security attacks such as DOS, Man in the Middle, Teardrop, Brute Force, Dictionary etc. Experienced in both Symmetric and Asymmetric Encryption. Extensive experience in physical security technology including layered defense, fences, bollards, guard camera placement, mantraps, locks of all types, biometrics such as palm scanning and retina scanning.
- Extensive experience in vulnerability tests assessments, penetration testing, security assessments and audits, disaster recovery and business continuity plans, contingency planning, secure messaging, security policy creation implementation, security awareness training, GLB compliance, OWASP, SOX compliance, HIPAA compliance, FIPS compliance, NIST compliance, INFOSEC governance, risk management and assessments, access controls, encryption systems, MSS managed security services , security awareness training to combat social engineering, malware protection, incident response, forensics, account management policies, acceptable use policy AUP Creation and enforcement, virtual physical and administrative information security, expertise in Juniper, Cisco Checkpoint/Nokia security hardware and software. Experienced with Nessus, Retina, NMAP, SNORT, Sourcefire Cisco IDS, Wireshark, and ISS Tools among others.
- Worked extensively doing work associated with ST E, DIACAP, NERC CIP Standards CIP-002-CIP-009 , FIPS 140 Compliance 140-1,140-2 new 140-3 , FIPS High, DCMA, DISA, C A, FISMA, NIST 800 series standards including NIST 800-53. DOD 8570.01 Certified.
- Experienced in managing groups of up to 25 developers designing and developing custom software using Visual Studio .NET, C , ASP, and JAVA. Experienced in securing distributed applications. Experienced using APIs to customize existing software.
- As a Network Architect duties performed include advanced LAN/WAN, VPN design, installation and troubleshooting with a focus on Cisco hardware and software. 15 years of experience with the entire range of Cisco Switches including Layer2 Multi-Layer Switches and Routers. Routing protocol experience includes BGP, RIP RIP2, IGRP, IS-IS, EIGRP protocols.
- Expert in wireless networks. Over 15 years of experience designing, implementing, administering and troubleshooting wireless networks for global organizations. Experienced with 802.11a, b, g, n wireless technology. Experienced with wireless hardware and software from many vendors to include Cisco Aironet, Orinoco, SMC, Apple, Linksys, Netgear, DLink etc. Experienced with WPA, WPA2, TKIP, AES WEP encryption models. Experienced with Cisco Wireless Security Suite and the Cisco Self-Defending Network methodology. BGP, RIP, IGRP, EIGRP, IPSEC VPNs
- 12 Years experience in providing Sun Solaris 7, 8, 9 and 10 installation, administration and troubleshooting
- Designed, Implemented and Supported Wide Area Networks and Security Systems that connect global corporations across the planet including ATT, Time Warner, FMC, MCI, Munich RE, and Verizon Business. 15 years of experience working with various types of telecommunications data WAN links including, DSL, T1, T3, DS1, DS3, OC-3, OC-12, OC-48 lines.
- 15 years of experience working with various LAN/WAN topologies to include, Ethernet, Fast Ethernet, Gigabit Ethernet, Fibre-Channel, Token Ring, FDDI, ATM, Frame-Relay.
- 8 years of experience designing, implementing and supporting Checkpoint Firewall-1 / VPN-1 Software on Nokia Hardware and Windows Software
- 15 years of overall experience administering Windows Servers including Windows 2000 Server, Windows 2003 and 2008 and 2012, Windows Active Directory, LDAP, Windows XP, Vista, 7 8 experience. MS SQL Server all versions including SQL 2000, SQL 2005 and SQL 2008.
- Wide range of experience in the government, financial, insurance, retail, healthcare, telecommunications, and construction vertical markets.
- 15 years of project management experience utilizing 13 years of experience with Microsoft Project. Currently using Microsoft Project 2013.
Partial List of Projects:
Confidential
Information Security Management Consultant Architect
Contracted for a review and audit of the current state of information security at this Columbus Based State Retirement System in order to lay out a plan for them on how to improve and mature their entire information security program including all areas of virtual and administrative security. Reviewed and recommended sweeping improvements across the information technology program including architectural and development improvements for custom software applications, UNIX and Windows VMWare servers, SQL Servers, all Security tools including AccelOps and Qualys, and security devices including Sophos UTM and Firewalls, Network infrastructure including HP and Cisco routers and switches, security documentation including policies, standards, procedures and baselines, the security awareness program, Disaster Recovery and Backup Continuity Plans and site, designed a complete security program from the ground up tailored to the unique needs of the organization utilizing standards and regulations that include NIST 800-53, NIS 800-37, NIST Cyber Security Framework, COBIT, ISO, ITIL, ISACA, HIPAA, OWASP SANS Security Tools. Laid out a detailed roadmap for permanent strategic and tactical improvements to security across the entire organization prioritizing and ordering each piece by relative importance.
Confidential
Global Information Security Services Delivery Manager
- Worked as the Security Services Delivery Manager role for Moody's a global financial services company leading a globally distributed security team of 75. Managed and coordinated all information security related incidents, changes, tasks and security projects across several company divisions and across multiple groups of engineers, architects, helpdesk personnel and senior management. Security Services Management was a significant part of this role but there was also daily hands-on security engineering and architecture work as well. Vast improvements in efficiency and quality of service across all security teams and technologies achieved to save millions in operational expenses. The response and resolution time on support tickets was improved dramatically. Processes and procedures have been standardized and documented then enforced. Teams have been cross-trained and single points of failure across all teams have been eliminated so that no single individual presents a significant vulnerability to the organization. Significant reporting across all teams and is now delivered on a weekly and monthly basis. The reporting was discussed and actioned to achieve further improvement across the organization each month. The change management program and processes have been improved and streamlined so changes no longer represent significant risk to the organization. Created and LED the entire vulnerability management program including creation of all hardware and software solutions and authoring all standards and procedures.
- The groups managed include Content Filtering, Firewall, Security Architecture, AV, Endpoint, ACS, TACACS, Security Administration, PeopleSoft Administration, Defender, Audit, The SOC and Compliance Vulnerability Management. The products my groups support include Microsoft Active Directory, PeopleSoft, Bluecoat, Juniper Security Products, McAfee Security Products, Secureworks Products, nCircle, Quest Defender, Quest Change Auditor, Remedy, and Cisco Security Products. Hands on technical skills were practiced weekly for all of these products.
- Product solutions architected, implemented supported throughout include Cisco IPS 4255s and 4260s, ACS/TACACS, NAC, ASA Firewalls, Juniper NSM, Firewalls SSLVPN, Quest Defender, Dell 600 Series Servers, Bluecoat Reporter, BCAAA EndPoint Client, Bluecoat Proxy Devices including 800s and 900s, Symantec Endpoint Protection or SEP McAfee Endpoint Encryption or MEEP, nCircle TripWire products including Profilers, IP360, SIH for Vulnerability Scanning and Reporting Secureworks Customer Portal and Suite of Products including IDS managed iSensors, Threat Intelligence etc. Microsoft SCCM Juniper NSM Remedy Ticketing System, McAfee Intrushield NSM used to manage McAfee IDS Sensors. Windows 2003 and 2008 Servers, Red Hat Linux, Remedy, McAfee Intrushield and NSM,
- Led all security projects with the client from beginning to end.
Sr Information Security Architect
Confidential
Contracted by Blue Mountain Labs to design an information security framework for this large healthcare system in California based on the ISO 27002 Framework in addition to HIPAA HITECH, HITRUST, PCI, FISMA, Meaningful Use, ISO 27001 and several NIST 800 standards. The system had recently been through a Deloitte Audit but they wanted a second more detailed opinion to confirm Deloitte's findings as well as a plan to remediate the findings as quickly as possible prioritizing by the highest risk findings. Identified the root of their security problems and laid out a detailed plan explaining how to address them to avoid audit failures going forward. Addressed security issues in each of the 12 domains represented by ISO 27002 sorting the findings and recommendations by risk level. Project plan was built showing step by step what was needed, who needed to do it, and what it would cost in time and dollars. Detailed security recommendations were written for each of the high risks found. Laid out new organizational structure for the security teams, designed a security awareness program, a physical security plan with enhanced security measures, addressed Disaster Recovery and Backup Continuity, DataCenter Design and consolidation and much more.
Information Security Subject Matter Expert
Confidential
Was the Lead Security Architect and managing security operations for a Global Medical Services Equipment Company. The company moved from an outsourced security model to in-sourcing security and was hired to audit and re-architect Information Security for the company. Led all security initiatives and team members. Was responsible for auditing and improving all aspects of Information Security including Physical, Administrative and Virtual Security for the company. Audited the company for compliance with laws across the world, in the United States audited for SOX and HIPAA / HITECH Compliance. Used a wide array of security tools to run security assessments and tests against over 10,000 networked devices including NESSUS, OPENVAS, MBSA, NMAP, Solarwinds Engineer's Toolkit, and Orion. Device types include Cisco and Juniper Switches, Cisco and Juniper Firewalls, Various Avaya and Cisco VoIP products, All Wi-Fi infrastructure, Tandberg Devices, All Windows Servers and PCs 5,000 , Avocent Devices, NetAPP devices, Miscellaneous Data Center Equipment backups, power, cooling units etc. Building Business Cases for Various new technologies needed to secure the company, Auditing existing security policy and advising on a full set of policies, standards, procedures, baselines and guidelines. Recommended standardized security methodology and practices tailored to the organization after creating the initial structure. Designed and built a comprehensive Juniper NSM Solution to monitor and administer all Juniper Devices. Built security awareness program and training materials and begin global training. Cleaned up security device policies Juniper SSGs, IDPS, SRX upgraded all security devices, business partner audit, access control audit, virtual, physical and administrative security audits and remediation. Designed and installed NAC Solution, Setup Juniper SRX Devices to replace SSG devices. Created and implemented security compliance program. Performed Global Intrusion Detection System IDS design and installation. Designed and installed global Incident Response team including training and testing of the team. Performed SIM/SIEM design and installation for the entire company. Led infrastructure asset audit worldwide and much more. Led the team and was also technically involved in each part to ensure proper execution.
Confidential
Sr. Information Security Consultant / Cyber Security SME
Provided expertise as a Sr. Security Consultant for HP. Supporting Agilent Technologies globally and consulting on information security issues and various security hardware and software including RSA ACE Server v. 7.1, SecurID, Cisco PIX, Cisco Secure ACS, HP OpenView, Hewlett Packard Open View Service Desk, HP OVSD, Cisco ASA, TACACS, Juniper SSL VPN, entire Bluecoat Series of Devices and Software. Was the technical lead for most of the products and the technical lead on several semi-annual security audits including SOX audits of multiple groups. Was the project owner and manager for several projects for the above listed technologies in my time with HP.
Confidential
Lead Cyber Security Architect / Cyber Security SME
Was responsible for architecture of network security for several federal agencies using a variety of tools and technologies. As part of the Networx Project, a Senior Information Security Architect / SME contracted to lead the team that architected, implemented and is providing Tier IV support for the information security managed security services for various federal agencies. Architecting and implementing multiple systems with tools including Juniper NSM 2008, Juniper ISG 1000s, ISG 2000s, Multiple IDP/IPSs, EM7 Network Management Application, Splunk, Intellitactics, McAfee Appliances, Bluecoat, Cisco CSM, ASA Appliances, Switches and FWSMs, Enterasys Dragon, and many more. High Public Trust Security Clearance. Worked extensively doing work associated with ST E, DIACAP, NERC CIP Standards CIP-002-CIP-009 , FIPS 140 Compliance 140-1,140-2 new 140-3 , FIPS High, DCMA, DISA STIGs, FISMA, NIST 800 series standards including NIST 800-53. DOD 8570.01 Certified. Performed a series of vulnerability penetration tests on the new network and its management tools. Designed incident response / handling procedures performed incident response work in response to large scale attack on government infrastructure.
Confidential
Sr. Manager - Managed Services Managed Security, Router and VPN Products Security Operations
- Hired by the company as a Senior Manager to enhance and improve their Managed Security Services Products and to improve the Security Operations Center SOC while managing several teams of employees located in the central NOC in Colorado. Teams initially managed were Managed Security Services, IP Unity VOIP, DNS Mail UNIX and Linux Based , IP Abuse and Web Hosting. Teams added to this are Managed Router IPVPN. Immediate improvements were made which cut costs by over 40 for MSS. In Web Hosting group a 40 cost savings was also achieved. Launched and managed audits across all groups to eliminate waste and increase efficiency of all managed service groups. Estimated 2 million dollars per year saved through these audits. Enhanced existing MSS product lines and designed and implemented new managed security products which should more than double revenues within 6 months. Wrote and began enforcing a new set of policies, standards and procedures for the Managed Security group to enhance the stability and effectiveness of the support we provide our clients utilizing ISO Standards. Performed a series of annual vulnerability penetration tests in order to enhance the security of the company and its security products. Responsible for security incident response handling for the company. Successfully launched and managed an initiative across all groups to get them technically trained and certified in each product supported in two months. During this time hands on security skills were maintained, served as the most Sr. Security Architect and Engineer of the company, solved advanced security issues and advised Sr. Vice Presidents and C Level Executives on how to enhance internal and external security as well as the security products of tw telecom.
- Left Time Warner only because of a family need which required me to temporarily relocate to the east coast.
Confidential
Information Security SME Subject Matter Expert
Contracted by Sterling HealthCare to conduct an independent security audit of its IT Infrastructure in order to gauge the current state of security and advise them on how to enhance the company's information security as a whole. Performed a complete security audit in each of the three main types of information security physical, administrative and virtual. Used an array of tools such as NESSUS to test each area of the company's security and then presented my findings in a detailed report which laid out where the weaknesses were and how to eliminate each of them. Concerning the administrative security, completely redesigned the company's backup continuity plan BCP and disaster recovery plan DRP . Re-wrote existing security policies, standards, baselines, procedures guidelines and added many new ones. Instructed the company on how to conduct security awareness training and of its great importance in implementing effective information security. Advised the company on how to achieve HIPAA compliance. Audited the physical security of the entire campus, reporting on each building and each floor including each department and key devices. Identified many issues and came up with cost effective solutions that enabled them to all be resolved quickly.
Confidential
Sr. Cyber Security Architect, Information Security SME Subject Matter Expert
Brought in by Verizon Business Software Development Group to help architect, build, and test managed security services MSS for several government and commercial security projects involving an array of security hardware and software. Working daily advising software developers and assisting them with software architecture. Networx is the contract to deliver a large portion of the Federal Government's IT needs over the next several years. Was brought in as a Senior Security Architect and Advisor. Began the first Security Design and Architecture Project for Verizon Business then MCI in December of 2005 and continue to assist with other security projects at present. Worked as lead security architect on several projects with responsibilities for managing the various pieces of the project. Served as Information Security Product Expert for various security technologies including the latest Juniper, Netscreen and Cisco suites of security software and hardware. Included among these products are Juniper's Netscreen Security Manager or NSM Software, All of the Netscreen / Juniper Firewalls and IDP Sensor Devices, Checkpoint Nokia Firewalls Checkpoint Software including NG and NGX R62, all Cisco PIX and ASA Firewalls, Cisco Security Manager, Cisco Routers, Management Center for Cisco Security Agents, The Cisco Security Agent Software, All Netscreen ScreenOS Software and Cisco IOS Software, Sidewinder Firewalls, Arcsight, Websense, RSA SecurID work version 5.x, Surf Control, BlueCoat, Aladdin, SmartFilter URL Filtering, both Netscreen and Cisco VPN technologies. Supported and administered Solaris 8, 9 and 10 servers and Windows 2000/2003 Servers. Involved in design, architecture, testing, implementation and support of these various security technologies. Was also consulted on General IT Security matters, not product specific. Worked extensively doing work associated with ST E, DIACAP, NERC CIP Standards CIP-002-CIP-009 , FIPS 140 Compliance 140-1,140-2 new 140-3 , FIPS High, FISMA, NIST 800 series standards including NIST 800-53. DOD 8570.1 Certified. Support of all Microsoft Operating Systems and Business Software such as all Windows PC Server Operating Systems and SQL Server, Exchange Server, IIS Server, ISA Server, and Sharepoint.
Confidential
Director of Information Security Managed Security Services
- Contracted to lead the Managed Security Services at Virtual Armor an MSS company that provides services to corporations across the world using a custom monitoring and management solution that uses as its base Juniper Netscreen technology. Brought in to steer the direction of the company's IT Security and its MSS managed security services offerings.
- Directed the operations, security and software development groups of the company which were based in the US, Canada, Europe and India.
- Responsible for managing local and global software development teams. Was responsible for architecting security for the software and then managing the developers through the entire software development life cycle. Familiar and experienced with a variety of Software Development Methodologies including the Waterfall Model, Cleanroom Model, Spiral Model and various others such as RAD or Rapid Application Development.
- Became expert in Netscreen Juniper Security Products including the Firewalls, IDP systems, SSL-VPN Solutions and NSM or Netscreen Security Manager and SRS or Statistical Report Server. Implemented and supported every firewall in the Juniper product line, daily.
- Responsible for the creation and development of products, policies and procedures designed to make Virtual Armor a leader in the Managed Security Service market.
- Extensive work in Cisco Routing using BGP and EIGRP, All series of Cisco Switches and Cisco PIX Firewall hardware and software, complex VPN design and administration.
- Responsible for incident handling and response for the company and its clients. Administration and support for Windows 2003 Server and BackOffice Software as well as Solaris 7 and 8 and Red Hat Linux.
Confidential
Lead Information Security Architect - Consultant
- Supplied expertise in a consultant role as an Information Security Manager, Security Subject Matter Expert Security Architect for the physical, administrative and logical security over one hundred companies. GRC Expert.
- Security experience that includes Information Security Management Security Architecture and Models Access Control Systems and Methodology Applications and Systems Development Operations Security Cryptography Physical Security Telecommunications, Network and Internet Security Business Continuity Planning and Law, Investigations Digital Rights Management, and Ethics.
- Provide advanced design, implementation, administration and troubleshooting of information security systems,
- Extensive experience with all aspects of Managed Security Services. Experienced in using IPS and IDS and other security mechanisms to prevent and detect all types of virtual security attacks such as DOS, Man in the Middle, Teardrop, Brute Force, Dictionary etc.
- Experienced in both Symmetric and Asymmetric Encryption.
- Extensive experience in physical security technology including layered defense, fences, bollards, guard camera placement, mantraps, locks of all types, biometrics such as palm scanning and retina scanning.
- Extensive experience in vulnerability tests assessments, penetration testing, security assessments and audits, disaster recovery and business continuity plans, contingency planning, secure messaging, security policy creation implementation, security awareness training,
- Expertise in GLBA compliance, OWASP tools, SOX compliance, HIPAA compliance, FIPS compliance, NIST compliance, INFOSEC governance, risk management and assessments, access controls, encryption systems, MSS managed security services , security awareness training to combat social engineering, malware protection, incident response, forensics, account management policies, acceptable use policy AUP Creation and enforcement, virtual physical and administrative information security, expertise in Juniper, Cisco Checkpoint/Nokia security hardware and software.
- Experienced with Nessus, Retina, NMAP, SNORT, Sourcefire Cisco IDS, Wireshark, and ISS Tools among others. Expertise with all Microsoft Software including programs such as ISA Server, SQL Server, IIS Server, Exchange Server and sharepoint and all windows operating systems.
Confidential
Installation Engineering Supervisor Installation Engineer IV
- Responsibilities at Relera included advanced datacenter design including rack and cage design accounting for proper power, cooling and backup needs for each client. Performed LAN/WAN design, provisioning and support for our data-center customers.
- Custom design and support work included software and hardware from many vendors primarily Cisco, SUN, Microsoft, Nokia, Netscreen, Hewlett Packard, Compaq, Siebel, Netcracker, Netcool, QIP and Veritas Backup Applications.
- Served as the project manager for the custom design projects and tasked with answering technical RFPs and RFQs for potential data-center clients during the pre-sales process. Custom designed racks and cages for datacenter customers.
- Administered Cisco switches 1000 to 6000 series, Cisco Routers 700 to 7000 series, Cisco Content Switches and Cisco PIX 500 firewalls.
- Experienced with RIP, RIPv2, IGRP, EIGRP, BGP and OSPF and worked extensively with Cisco networking and security hardware and software from the design phase to the support phase as well as design and support.
- Designed and installed VPNs with the following protocols: PPTP, GRE, IPSEC, and L2TP. Administered Sun Solaris version 8 and Windows 2000. Left Relera after the company lost its financing and could no longer pay its employees.
Confidential
Network Security Manager / Sr. Network Security Architect
- FastIdeas was an accelerator incubator company housing 13 startup companies. Responsible for Design, implementation and support of all LAN/WAN infrastructure including wired and wireless devices such as access points and for Information Security infrastructure which was composed primarily of Cisco equipment. Built enterprise wide standards and processes for information security and networking.
- Daily administration of Cisco equipment and software included the full range of Cisco Routers from 1000 series to the 7000 series and Catalyst Switches from the 1000 series to the 6500 series. Cisco Local Directors, PIX Firewalls, VPN Concentrators, Cisco Net Rangers, CiscoWorks, RSA SecurID, and Alteon Devices. Designed and installed VPNs using IPSEC, GRE, L2TP and PPTP.
- Supported Windows 2000 Server and Windows 2000 Professional. Supported Veritas Backup Exec, Volume Manager and NetBackup on Windows and Solaris. Expert knowledge with TCP/IP and these routing protocols RIP, RIP2, IGRP, EIGRP and OSPF.
- Solaris Administrator for FastIdeas. The Sun machines served several purposes, one of the primary purposes was controlling external DNS.
- Utilized and supported Visio 2000, SecureCRT, PCAnywhere, Microsoft Office and all Microsoft BackOffice Products such as Microsoft Exchange, SQL Server, ISA Server, IIS Server, Sharepoint.
- Designed enterprise wide standards processes for design support and administration of the LANs and WAN.
- Served as the lead engineer on all LAN WAN projects. Managerial experience as the leader of the network engineers from the 13 portfolio companies. Left FastIdeas after the company lost financing. The CFO and he were the last employees of the company.
Confidential
Sr. Systems Engineer Pre-Sales Post-Sales
Optika created, sold and supported imaging system and B2B e-commerce software solutions. Assisted clients with planning, installing and configuring this software. Involved in the technical pre-sales and post-sales work with the partner accounts, worked with the client to architect and implement complete infrastructure solutions for them which included Microsoft Servers, UNIX Servers, Networking Security Equipment.
Confidential
Sr. Systems Engineer
- Worked for this VAR supporting many clients as a Sr. Systems Engineer responsible for implementing and administering UNIX and Microsoft Servers. Supported all Microsoft Business Applications such as Exchange and SQL Server. Expert use of all MS Office Products such as Visio. Architected, implemented and supported the entire network infrastructure for these customers including the network security devices such as firewalls and proxy servers.
- Technical Certifications Has completed dozens of technical training courses and programs for dozens of different hardware platforms and seemingly countless applications including training by Microsoft, Cisco, Juniper, Checkpoint, Arbor, Sun and many other flavors of UNIX, Linux, HP, Compaq, Comptia, ISC2 and many more.