Executive Cyber Security And Risk Strategist Resume
3.00/5 (Submit Your Rating)
SUMMARY
- Optimize company potential with visionary technology leadership through relentless innovation and teambuilding to transform organizations.
- Global security, infrastructure, and financial application development thought leader catapulting teams, and exceeding expectations in complex environment.
- Propel MM revenue savings, utilizing predictive analysis, reducing redundancy in code base and implementing best practices in the international market.
- Identify business needs, organizing cross - functional teams, delivering time saving solutions during critical incident outages.
- Develop methodologies, supporting migration and transformation of applications.
- Drive high sustainable growth through innovation, assuming additional responsibility without growing team size.
- Mitigate IT risk and compliance, working across organization, identifying cyber risk threats, and formulating viable solutions.
- Continuous improvement advocate, defining methodologies, migrating, and transforming legacy applications to cloud solution.
AREAS OF EXPERTISE:
- Strategic Planning and Execution
- IT Risk Mitigation / Complexity reduction
- Data Analytics
- Vendor management
- CISSP Candidate
- Data Center Transformation
- Program Management
- Large budget acumen
- Technical capabilities
- Cultivating Relationships and Business Development
TECHNICAL SKILLS
- Qualys, Endpoint, Kerberos, CyberArk, Darktrace, Shodan, RSA SecurID, Symantec BlueCoat, BIT9, SolarWinds, RedHat Enterprise, FireEye Enterprise, F-Secure, Firewall Checkpoint, F5, Phishing Box, RSA Archer, Fortify, VeraCode
- EMC VMAX, VCS, Fiber and iSCSI SAN - Hitachi USP-v, EMC VNX, HP P4500, 3Parv800, AS400, Windows (2016, 2013, 2010, …2003) Linux (Ubuntu, Debian, Mageia, Fedora, OpenSUSE, PC Linux OS, Manjaro, ARCH)
- Webservers (IIS), FTP, Microsoft SQL, PowerShell, MS Hyper-V, VMWare, MS ForeFront, MS InTune, MS Lync, Active Directory and Group policy, DNS, Firewall, Load balancing, WideIP, Wireless
- VMware ESX 2.01,2.5,3.0 & 3.5, ESXi4.0/4.1/5.0, Visio, Citrix MetaframeXP/3.0/4.0/4.5 Citrix Xenapp 4.5/5.0/6.0/6.5 , Citrix Edgesight 5.2/5.3/5.4, Citrix Netscaler, Citrix Access Gateway
- XenDesktop5.6 sp2, XenServer5.6 sp2, XenCenter 5.6 sp2, Provisioning Server 5.6 sp2
- Mongo DB, SQL 2016, DB2, Oracle, SYBASE, Access
- BlackRock, Electronfie, YieldBook, Murex, Calypso, Splunk, Numerix, Charles River, Tableau, UML/Rational Rose, OOD, Tableau, VBA/Excel, VBA/Access, C#, VB, RUP, J2EE, Java, JavaScript, JSP, XML, JSON, DOM, C, C++, HTML, Visual Basic, Microsoft Visual Studio .Net Enterprise Architect, Clarity
PROFESSIONAL EXPERIENCE
Executive Cyber security and Risk Strategist
Confidential
Responsibilities:
- Assisted with direction and execution of a cyber security roadmap that establishes requirements including, but not limited to, security for hybrid cloud deployment, B2B web services, mobile computing, fine grained access control, policy driven security, Identity Governance, Access Management, and Privileged access management, user provisioning/de-provisioning, and federation focusing on multiple protocols, such as Java and BeanShell coding.
- Oversaw the design and development of security solutions that adhere to applicable policies and comply with information security requirements.
- Provided oversight for building, configuring, and architecture of Identity platforms.
- Identified emerging threat tactics, techniques and procedures used by cyber fraud actors and identify those actors for investigation referral.
- Developed and use predictive analytics to counter threats by tracking attack campaigns and pursuing strategic and tactical efforts to mitigate threats.
- Delivered expert cyber intelligence services and material to fraud, information technology and business leaders. Prepare appropriate threat intelligence content for customer and executive presentations.
- Identified and evaluate tools and processes to ensure the cyber fraud technical intelligence team can perform analytic tasks.
Confidential
Global IT Risk and Security Director
Responsibilities:
- Established security best practices for application development design reducing high-level risk findings in Archer by 10%.
- Led investments IT organization through regulatory audits including FINRA, SEC, SOX, SSAE16, SRO (NYSE and PHLX), CCAR, cyber security and external audits resulting in no high-level risk findings for the organization.
- Designed, executed and managed Agreed Upon Procedures (AUP) for software development lifecycle.
- Recovered hundreds of thousands of dollars for organization, resolving vendor SLA breaches.
- Managed inbound audits from corporate compliance for the investments IT organization, ensuring all audit work performed in accordance with regulatory, department and professional standards.
- Assisted in development of investments disaster recovery, vendor management, regulatory compliance, audit procedures, improving and reducing timeline.
- Used Splunk to analyze logs for potential security risks.
- Partnered with corporate legal to performed vendor assessments for onboarding our data center provider and all strategic partners.
Global IT Infrastructure Director
ConfidentialResponsibilities:
- Conducted security reviews to minimize cyber threats.
- Designed investments innovation initiative strategy, working with enterprise strategic initiatives and continuously improving organization, defining IT policies, standards and procedures, and providing advice and best practices.
- Used Splunk and other security tools listed below to analyze logs for potential security risks.
- Performed vendor assessments using AUP processes.
- Negotiated with vendors, improving efficiency, and reducing cost 20%.
Global Change and Environments Director
Confidential
Responsibilities:
- Established change management process, complimenting software development cycle, and adhering to ITIL release and change methodology.
- Partnered with operations, ensuring infrastructure decision consistency between locations, aligning to enterprise architecture, and leveraging common approach opportunities.
- Assisted with migration of investments infrastructure from enterprise data center to independent data center reducing infrastructure changes 40%.
- Designed and wrote target operating model, establishing governance model for process management between Confidential organization and external data centers, adhering to regulatory requirements.
- Defined Key Performance and Operating Indicators (KPI / KOI), measuring vendor performance in comparison to SLA objectives.
- Oversaw that changes adhered to data privacy regulations and compliance.