Senior Lead Security Architect Resume
SUMMARY:
- Working with Venture Capital Investors for raising capital.
- Working with executive teams for creating private placement memorandums
- Creating Business, Marketing, Balanced Scored Cards and Operational Plans.
- Working with Managing Departments with over 5 million revenues
- Working with Business Process Modeling and Procedures
- Providing leadership regarding technology architectures and solutions.
- Creating business presentations to executive and senior Management to demonstrate product and services capabilities.
- Providing management and technical guidance towards business - driven initiatives.
- Providing architecture guidance towards Internet based solutions.
- Management of IT Projects and deliverables.
- Implementing Corporate Security Standards for Government, Telecommunications and Financial using eTOM, Six Sigma, ISO27002, NIST Cyber Security Framework, BS7799 and COBIT, ITIL, Zachman and TOGAF
- Business Planning & Project Scope Requirements
- Designing and Implementing E-Commerce and Web Portal Solutions
- Management of Web Portal Environments
- Creating Business, Marketing and Strategy Plans
- Management of Technical Teams 7 - 12 people
- Working and Implementing Open Standards
- Working with securing SCADA systems
- Governance, Compliance & Business Management
- Participation in Technology Committee (Innovation and Technology trends, products and services)
- Business process modeling, swim lanes regarding new business initiatives.
- Creation and recommendation of new policies and procedures.
- Designing and Implementing Cloud Computing platforms ranging from, Software as a Service, Platform as a service, Infrastructure as a service and various technologies with cloud computing.
- Working with Vendor management for product research and budget analysis.
- Exposure and supporting trading systems in the Banking environment.
- Worked designing architectures, blueprints solutions, business data and applications flows with Visio.
- Experience with Satellite communications & Disaster Recovery
PROFESSIONAL EXPERIENCE:
Confidential
Senior Lead Security Architect
Responsibilities:
- Conducting and coordinating IBMAppscan
- Reviewing and approving Source Code with Contrast and Checkmarx
- Reviewing Mobile Security solutions products
- OWASP Framework for ensuring higher degree of security for Web Applications
- Approving all security reviews for production Web Applications
- PCI-DSS Compliance and working with Corporate Security
- GRC Management and tracking of vulnerabilities
- Working with Secure Software Development Life cycle
- Working with DAST/SAST Solutions
Confidential
Senior Executive/Owner
Responsibilities:
- Penetration Testing and Vulnerability Scans for various customers
- Sales and contacting customers for potential projects
- ISO27002-3, CIS and NIST Framework audits
- Project Management and creating proposals for projects
- Budget tracking for security projects
- Security posture assessments for customers
- Creating presentations for CIO’s and Senior Executive Management level customers
- Providing technical guidance to technical staff(contractors)
- Public speaking with customers to describe solutions and reports from security assessments
- Designing Threat Intelligence based solutions.
- Working with cloud based solutions Azure, AWS
Confidential
Cyber Security Consultant
Responsibilities:
- Conducting Vulnerability Scans on assets within the network and servers
- Creating reports for Vulnerability assessments using Nexpose
- Designing and architecting for improving overall security posture for Vulnerability and Patch Management
- PCI-DSS compliance with regards to Vulnerabilities
- Creating presentations for Senior Management
- Creating standard operating procedure documents
- Management of security tools and refining process to better ensure higher degree of security posture
- Management and advising technical staff on using security products and or solutions
- Coordinating Patching for all types of systems based on Vulnerabilities
- Managing security risks and seeing issues to closure and speaking with stakeholders.
Confidential
IT Cyber Security Manager (Consultant)
Responsibilities:
- Responsible for overall security and integrity of the OGGTA’s server, datacenter, network, and desktop environments
- Develops and designs system and network security controls, including reviewing the configuration of firewall and proxy settings
- Evaluates, designs, implements and supports security architecture in alignment with technical and business goals, and objectives and standards
- Leads and coordinates problem management activities
- Provides 3rd level Cyber Security Technical support
- Performing information security risk assessments for projects and initiatives
- Leading and participating in Security Architecture for various lines of business.
- Leads technical research and development to enable continuous improvement
- Process owner of control framework documentation (OLG) and the control activity matrix (AGCO) and other documentation relating to security processes and programs
- Process owner of IT Incident Response Plan, in collaboration with other corporate and operational departments
- Leader in identifying information security needs and collaborating with colleagues and customers to develop and implement solutions
- Threat Based Assessments, Threat Mitigation and Threat Risks Assessments and Remediation
- Process owner for user onboarding and termination processes
- Central point of contact for all audit-related IT security questions; prepares formal audit responses and action plans for review
- Provides leadership, direction and mentorship to direct reports
- Exposure with various security tools such as Firewalls, Vulnerability Assessment Penetration Testing, Anti-Virus Software and End Point Security, IPS, VPN and many other security technologies.
- Responsible for overall Cyber Security of Infrastructure and applications
- Conducting PIA’s and other privacy information assessments.
- Conducting security posture on all projects and operational processes.
- Creating PKI design and build documents
- Improving and identifying Cyber Security gaps and processes
- Meetings with Senior VP of organizations to discuss security objectives
- Implementing Cyber Security controls for gaming systems
- Conducting compliance audits with OLG security framework
- Creating Practice Statement documents
- Implementing and designing PKI and cryptography solutions with applications and databases
- Conducting Penetration Testing with scripting using Metaspolit and other penetration applications
- Bash, perl, powershell and python scripting
- Conducting and creating Vulnerability and Patch Management process
- Working with regulatory and governance controls
- Conducting risk-based assessments with COSO, and other frameworks.
- Conducting PIA assessments for all Gaming Applications for compliance
- Creating High Level Security Program for Executives
- Advising stakeholders and vendors on security controls and requirements
- Working with Governance and compliance such as COBIT5, ISO27003, ISO27002
- Conducting Cyber Security audits and gap analysis
- Creating and developing Cyber Security Road Maps/Technology Roadmaps
- Network IP Security planning for new projects for F5 load balancers, Cisco Switches, Palo-Alto Firewalls
- Coordination of meetings with team members and projects deliverables
- Advisory to all Cyber Security related matters and Cyber Security technical consulting
- Creating and updating Security Architecture Documents
- Implementing security solutions for Gaming systems
- Working with SIEM Logrythm, Exabeam (Next Generation SIEM)
- Hardening of Operating Systems, Applications and Databases, Penetration Testing & Vulnerability Assessments
- Creating Operational and Security Process for management of SOC
- Coordinating Patching of all systems and updates
- Implementing security and infrastructure for SAN networks
- Data Management and Administration
- Issue Management and Change Control Management
- Conducting Risk Assessments
- Securing Azure and working with Cloud based applications services
Confidential
SENIOR SECURITY CONSULTANT
Responsibilities:
- Creating Security workbook for Citrix environment
- Creating Security workbook for SIEM solution
- Discussing documenting and developing security architectures
- Setting up meetings with team members
- Consulting on security areas within the Confidential
- Identifying security gaps and creating assessments
- Identifying security controls within various environments
- Working with GRC Archer
Confidential
SENIOR SECURITY CONSULTANT
Responsibilities:
- Creating Operational Procedures for SOC management and ensuring optimal uptime and monitoring of Threats within an Enterprise environment comprising of many clients
- Issue and Change control managementMPI
- Management and consulting Cisco Iornports Mail gateways.
- Management and consulting Cisco ASA Firewalls
- Management and consulting IBM Web Application Firewalls
- Management and consulting of IBM IPS solutions
- Management and consulting of QRADAR SIEM solutions
- Management and consulting of various clients in IBM Security Operations Centre
- Management and consulting of Vinspector
- Management and consulting of VPN site to site and client to site environmentsOMERS
- Management of OMERS Firewalls (Cisco ASA and security)
- Setting up site to site VPN for 6 remote sites
- Making recommendations to improve overall security within OMERSGFL
- Management of Fortigate Firewalls and VPN access
- Management of OSPF routes on firewalls and rules for firewall access.
Confidential
SENIOR SECURITY CONSULTANT / INFRASTRUCTURE
Responsibilities:
- Implementing Interforest Migrations
- Setting up and management of Fortigate Next Generation Firewalls
- Implementing Exchange Services using name space services and other Exchange services
- Implementing Microsoft Public Key Infrastructure
- Recommending Security solutions to improve overall security posture
- Implementing and designing new environment for Active Directory Services
- Hardening of Operating Systems / Applications and network devices
- Recommending and consulting on Citrix solutions with improved security
- Reviewing architecture and making recommendations for improving overall security posture.
- Implementing Lync/Skype services for corporate environment.
- Leadership role on all recommendations for security and infrastructure
- Implementing Microsoft KMS Server with Windows client
Confidential
SENIOR SECURITY CONSULTANT / INFRASTRUCTURE
Responsibilities:
- Recommending information technology security solutions enterprise wide.
- Creating security findings and identifying gaps within the organization and providing recommendations.
- Creating a security vulnerability and patch management program.
- Creating a data classification working with legal, privacy and creating security data classification for Corporate.
- Data Management and Aggregate reporting
- Creating security baseline configuration with all areas of IT for determining security posture within the environment.
- Conducting penetration testing and vulnerability management.
- Consulting on architecture and security designs.
- Creating security architecture and road maps for the environment.
- Penetration testing tools (i.e. Kali Linux Metasploit)
- Conducting security risk-based assessments.
- Coordinating patching of systems based on vulnerabilities
- Issue Management and Change Control Management
- Working with securing Financial applications
- Working with GRC for Vulnerability Management
- Working with architects to provide guidance on overall security for applications
- Supporting functional and non- functional security requirements
Confidential
SENIOR SECURITY ARCHITECT CONSULTANT / INFRASTRUCTURE
Responsibilities:
- Consulting on Architecture design for Big5 and VMware.
- Consulting on Practice Statement and Policy Documents.
- Creating build and test cases for production design.
- Consulting and creating new architecture standards for Public Key Infrastructure.
- Consulting on clustering for Microsoft Windows 2012 Server
- Consulting on hardening of operating systems using center for internet security standards
- Consulting and Implementation of Trend Micro Host Intrusion Protection Systems.
- Consulting and recommending Legal requirements for public key infrastructure.
- Consulting and implementing public key infrastructure in test and production environment.
- Consulting and advising of IT security solutions and best practices.
- Implementing and configuration of LDAP Services
Confidential
SENIOR SECURITY CONSULTANT / SECURITY AUDIT / INFRASTRUCTURE
Responsibilities:
- Reporting to Chief Financial Officer and CEO for all security related issues and recommendations
- Meetings with Board Members for updates and recommendations on overall security posture for the organization.
- Creating Security Plans and Project Management of security projects.
- Performing audits and making recommendations regarding overall security
- Working with Human Recourses on a number of initiatives.
- Implementing LDAP Services
- Working with Financial Departments for budget estimates for projects.
- Reviewing network switches, servers and next generation firewalls
- Reviewing application security controls
- Working with external auditors for ensuring security and compliance is maintained.
- Recommending new IT security for overall company.
- Develops and oversees the execution of a security strategy to improve organizational, procedural, administrative and technological security controls.
- Serves as a security advisor to various operational and business teams.
- Assists in the development of security policies and standards to help ensure compliance with the overall security strategy of the College.
- Attends Change Advisory Board meetings, when appropriate.
- Performs Vendor Risk Management against external partners and suppliers to ensure security requirements align with organizational policies and standards.
- Reviews and develops internal security documents, controls, and procedures on a regular basis.
- Leads the Computer Security Incident Response Team (CSIRT) in the event of a security incident.
- Performs vulnerability scans and assists with the Vulnerability Management process.
- Manages, monitors, and performs signature tuning for security infrastructure.
- Manages Security Event Monitor tools and escalates issues for remediation.
- Performs Security Risk Assessments on new and current technology.
- Recommends controls for reporting, analyzing, and reducing the impact of security incidents.
- Performs security pen-tests for risk reporting and mitigation.
- Conducts and assists with the development of Security Awareness material.
- Develops security metrics and reports.
- Performs Security Awareness for key organizational teams.
- Solid knowledge of security best practices, policies, standards, and guidelines.
- Solid knowledge of security architecture and secure implementation of new technology.
- Solid understanding and experience with compliance standards, including NIST, SANS Top 20, ISO, COBIT, OWASP, and PCI.
- Working with cloud based solutions Azure
- Experience with Firewall policy creation, administration, and audits.
- Experience with Governance, Risk, and Compliance (GRC) platforms.
- Hands on experience with Enterprise Security Event Monitoring (SIEM) platforms.
- Data Management and classification
- Experience with vulnerability scanners such as Nessus, Qualys, nCircle.
Confidential
SENIOR CONSULTANT / DEV/OPS SECURITY CONSULTANT
Responsibilities:
- Investigating and implementing Cloud based Application solution to HP Virtual Private Cloud Service offering.
- Review application code
- Reviewing and implementing site to site VPN connections.
- Implementing Xenserver Virtualization platform
- Reviewing and implementing AWSTAT for managing Web Site traffic for customers
- Acting as an advisor for technology trends
- Reviewing new HP Virtualization portal with Tipping Point and other firewall configurations.
- Ensuring best security standards are implemented for HP Cloud Virtualization offering.
- Working with SaltStack for Cloud Based Computing environment and applications
- Consulting and migration of Exchange on premise to Cloud Based service offering.
Confidential
SENIOR CONSULTANT / TECHNOLOGY, SECURITY & INFRASTRUCTURE
Responsibilities:
- Implementing and Consulting on security application for checking for vulnerabilities for terrorist OSFI (Office of the Superintendant for Financial Institutions)
- Consulting on security technologies such as ASA Firewalls, IPS, Network Access Control and Symantec Anti Virus solutions.
- Management and consulting on VMWare and Site Replication Manager for Virtual environments.
- Implementing of AppDNA for analyzing applications for XenAPP and XenDesktop environments
- Management and implementing of XenApp and XenDesktop environments
- Consulting and implementing Firewall Management software such as Firemon, Tufin and Algosec for management of firewall configurations.
- Implementing of SyslogNG for centralized logging of logs from network and server devices.
- Consulting on Insurance based IT applications
- Consulting and Implementing WIFI networks ranging from product analysis of Cisco and Aruba Networks solutions.
- Vulnerability Management and Remediation of vulnerabilities.
- Designing architectures and standards
- Creating presentations on overall solutions for Senior Management
- Implementing and Management of Windows 2008, 2012 and Linux based environments.
- Management of Dell SAN Solutions with ISCSI connectivity (Updating firmware allocating space for LUN’s).
- Documenting operational procedures for IT systems
- Consulting and reviewing security proposals from vendors and making recommendations
- Management and Implementing of SQL Servers
- Working with Developers and Business Analysts to implement newly developed applications and recommending architecture and security solutions.
- Reviewing and making recommendations to overall architecture, Improving overall efficiency of IT Operational systems and creating and recommending automation for solutions.
- Recommending and investigating thin client architecture and creating solutions to issues.
- Implementing and update of Help Desk system for tracking change control with the IT Department.
- Review and preparation of information for an IT Audit with external auditors.
- Periodic review of user accounts and remediation of findings.
- Investigation and recommending profile migrator for migration of users profiles for Citrix XenApp environment.
- Implementing and network rules and access lists on Cisco firewalls and switches.
- Network monitoring of devices and remediation of issues based on alerts.
- Consulting on Microsoft Remote Desktop Services connectivity with external application services.
- Consulting on server and network architecture and overall improvements to environments.
- Consulting on SQL transactional application solutions
- Creating Firewall, Network devices and Servers security baseline configurations using NSA, NIST and Ciesecurity
- Working with vendors to remediate issues with IT systems and group sharing of issues/remediation
- Implementing and securing site to site Virtual Private Networks
- Review of firewall rules and recommendations for improvement and overall security.
- Investigating Wireless security related issues and recommending overall remediation.
- Consulting Management and Team members regarding architecture and security related solutions.
- Prime and or lead on various projects
- Management of Exchange Mail solutions
- Active Directory management, administration and planning
- Consulting and Recommending Web Applications Firewalls
- Consulting on SIEM Solutions and merging Syslog-NG for correlation with SIEM Solutions.
- Investigating End Point Protection solutions (Bit9-Carbon Black)
- Implementing LDAP Services
Confidential
SENIOR CONSULTANT / SECURITY & APPLICATION /DEVELOPMENT
Responsibilities:
- Documenting Operational Procedures in regards to development
- On-boarding Banking Financial Application into Aveksa
- Preparing extracts and data feeds for application migration or importing into Aveksa
- Development of SQL queries for on-boarding applications into Aveksa
- Ensuring of applications within the Bank for compliance.
- Consulting regarding Tivoli Identity Management
- Configuring applications with LDAP Services
- Onboarding Active Directory Applications
- Onboarding SQL database applications
- Onboarding non-application which use a CSV extract
- Working with and designing Single Sign and Identity Access Management
Confidential
SENIOR CONSULTANT / SECURITY & INFRASTRUCTURE
Responsibilities:
- Recommending security products and solutions for Governance and Compliance.
- Reviewing all security projects and making recommendations
- ISO27001, NERC Remediation, Policy and Procedure Creation & Documenting
- Review of SAINT, MacAfee, RAPID7, Symantec, Tripwire QRADAR and Fireeye security solutions
- Setting up LAB environment with RAPID7 Vulnerability Management
- Securing Scada Systems and Automatic Vehicle Location Tracking
- Recommendations and security review of Source Fire IPS/IDS Solution
- Creating Security Information Technology Presentations
- Security Awareness updates to Web Portal for raising security awareness program
- Recommendations for Securing Systems in DMZ
- Remediation of Vulnerabilities from PWC Audit
- Recommending and implementing HIDS/HIPS Solutions.
- Review and recommending of DDOS solutions such as Akamai, Fortinet and Radware
- Recommendations for securing Citrix Session via Scada Systems.
- Patch Management and release control using Microsoft WSUS and Microsoft System Centre
- Meetings with Vendors for product gathering and information review
- Recommendations and creation of Third Party Policies and connection reviews for data exchange of information
- Anti Virus Review of MacAfee MOVEIT and migration strategy from GFI Vipre.
- Hardening and securing environments with best practices such as NIST and NERC compliance
- Review and Implementing of Password Vault products such as CyberArk
- Developing a plan and framework for provisioning of accounts using CyberArk
- Conducting periodic access review with CyberArk accounts and provisioning using Web Portal.
- Approving security requirements for projects in change management process
- Reviewing security vulnerabilities with Microsoft for Windows 2012, Windows 2008 Server
- Remediation of vulnerabilities on VMware environment
- Remediation of Vulnerabilities on Confidential s VOIP Systems
- IT Risk assessments on projects
- Quality Assurance and testing of application patches prior to production deployment
- Management meetings to discuss sign off of forms, documents, policies and procedures.
- Securing Gas, Electric Scada Systems for enterprise applications services environments.
- Review and securing database servers Microsoft SQL Server.
- Follow up with team members on security related project requirements.
- Review of Fortify, Klocworks and Coverity solutions for securing code development code on Web Services.
- Implementation of MacAfee Vulnerability Solution.
- Working with third party vendors for recommendations on securing Scada Systems.
- Coordination of Management meetings regarding proposals.
- Securing Wireless Networks with security recommendations and solutions.
- Working with architecture frameworks for designing a security architecture framework.
- Creating business cases for technology products.
- Meetings regarding Third Party and Non Disclosure Agreements for business units to review.
- Creating business cases for product and or solution approval.
- Creating RFP's and business cases.
- Coordination and facilitation of technology vendor meetings.
- Creating Security Operational Process for managing overall security
- Disaster Recovery Planning of systems and or solutions.
- Information Security Solutions, Guidelines, Frameworks and Standards
- Change control and Issue Management of Vulnerabilities
Confidential
SENIOR CONSULTANT /APPLICATION & INFRASTRUCTURE ARCHITECT
Responsibilities:
- Implementing AppDNA
- Application Profiling and Analyzing
- Implementing SQL Server
- Analyzing applications for platform compatibility
- Recommending solutions configurations for application architecture profiling
- Working with VMware platforms
- Migration analysis of Windows XP to Windows 7 platforms
- Migration analysis of Windows 2008 server’s applications to Windows 2012
- Conducting application analysis for Hyper V & AppV applications on clustered environments
Confidential
SENIOR CONSULTANT/ SECURITY & INFRASTRUCTURE
Responsibilities:
- Capacity Planning and Server Management.
- Citrix Management & Application Management
- Documentation and Process Management
- Application Profiling with AppDNA
- Data Centre Migration
- Virtualization (VMware) and Security Recommendations
- Implementing & Designing Microsoft Remote Desktop Services
- Management of Private and Public Cloud applications using SOAP
- Implementing Hyper V on clustered environments for Remote Desktop Services on Windows 2012.
- Working and Management of Vmware
Confidential
SENIOR CONSULTANT/ SECURITY & INFRASTRUCTURE
Responsibilities:
- Implementing RSA Authentication Manager Platform Services.
- Conducting Product Decision Analysis.
- Implementing new policies for Juniper platform services.
- Implementing Mcafee EPO
- Reviewing and conducting DA with Sophos and meeting vendors and discussing technical requirements.
- Creating security discussion papers for presentations.
- Following System Development Life Cycle regarding all projects.
- Implementing and architecting Anti-Malware solutions.
- Vulnerability Management
- Exposure for product analysis of Palo Alto Networks Anti-Malware, Fireeye, Symantec and RSA solution.
- Implementing and Management Mcafee DLP
- Reviewed DDOS Radware solution.
- Implementing Windows Servers, Wintel and RHEL Red Hat Linux 4.x, 5.x Servers
- Management of overall Arcsight solution and implementing loggers.
- Consulting on SIEM Solutions
- Working with audit teams for remediation of IT Security related gaps.
- Change Management of Systems and Solutions
- Information Security Solutions, Guidelines, Frameworks and Standards
- Securing systems with End Point Protection such as Macfee EPO
- Designing Architectures and Standards
- Working with cloud based solutions Azure
- Working with Cyber Ark PAM and conducting security reviews
Confidential
SENIOR CONSULTANT/TECHNICAL MANAGER/DIRECTOR of IT & MANAGED SERVICES /PROJECT MANAGER
Responsibilities:
- Line of business assessments for improvements in overall business development strategies
- Executive and senior management presentation on information technology goals and deliverables
- Managing staff, coaching and mentoring
- Implementing OpenLDAP and Single Sign on Services with development team for Identity Management platform.
- Project coordination of projects ranging server builds, Development of Identity Management Solutions.
- Incident Management of Help Desk tickets and issues and resolution.
- Consulting on Incident Management solutions.
- Coordinating patching of systems and updates
- Management of Point of Sale Managed Services environment for Enterprise client.
- Management of overall IT Operations applications and infrastructure.
- Providing management and technical guidance towards executive business initiatives
- Technology Review Board Committee
- Providing leadership and direction to achieving new business direction
- Recommendations to overall business operational efficiency
- Management of overall projects and Senior Management expectations
- Management of Partner Relationships
- Management of Mobile Devices through Mobile Device Management
- Implementing and Project Management of conducting Decision Analysis of Mobile Iron, AirWatch and XenMobile (formerly Zenprise).
- Conducting tests with Mobile Technology Software platforms
- Implementing Mobile Device Technology for BYOD standards and policies created.
- Management and implementing of conversion of notebook/laptops to mobile computing platforms.
- Managing and approval of budget expenses.
- Management of company software licenses process and application solutions for compliance.
- Management of many IT Enterprise Projects.
- Management of Release Management and or Change Management /Approvals and CAB review meetings.
- Management and coordination of external vendors such as Microsoft, IBM for product evaluations and mapping to business requirements.
- Business Continuity and Disaster Recovery planning for Enterprise Retail Customer.
- Project Management of Principals and Frameworks.
- Working and Implementing projects with SDLC.
- Strong communication skills and knowledge of Infrastructure
- Gather information from stake holders and the business
- Chairing meetings and providing direction
- Conducting performance reviews on a quarterly basis.
- Experience managing a team of systems administrator and developers over 700+ Wintel server environment.
- Experience coordinating with application development owners for maintenance schedules on daily and weekly basis.
- Change management approval of all change requests within the IT and Managed services departments.
- Experience planning backup strategies with team members.
Confidential
SENIOR LEAD CONSULTANT
Responsibilities:
- Project Management on a variety IT projects and deliverables including: developing Web Portal Identity Management Software, developing E-Commerce Web Portal for Sales Distribution Systems, EDI, and back office system integration, Server Virtualization/Consolidation and Migration Project. This included creating project proposals, gap analysis, financial and resource management, liaising with clients.
- Implementing SOA Architectures and Solutions using CORBA and SOAP
- Design and Developing Applications using XML, Java, J2EE, .NET, Powershell and Data Modeling concepts and design
- Working and Implementing AppDNA.
- Change Management of Systems and Solutions
- Performing IT audits for internal and external environments.
- Recommending & Designing Akamai (DNS) solutions for redundancy
- Recommending and reviewing Akamai DDOS and other solutions.
- Implementing SCCM solutions.
- Implementing IBM Single Sign solutions.
- Recommending Netezza solutions to customers
- Designing architectures using Zachaman and TOGAF frameworks.
- Storage consulting including implementing Storage Area Networks for File Servers, Linux, Windows, SQL Servers; Implementing Fabric Switches, designing SAN topology; Designing SAN for capacity requirements for Virtualization Platforms, Xen and Vmware; Designing and administration for NETAPP SAN using snapmirror, and dedup; Designing and implementing security standards for NETAPP SAN; Designing and implementing SAN replication for NETAPP;
- Designing architectures and solutions for Retail, Banking environments.
- Designing Solutions with collaboration such as Sharepoint Services and other Web Portal Data applications.
- Implementing and Designing SIEM solutions Splunk
- Application and Data Modeling for E- Commerce Solution with WEB 2.0 platform services.
- Security consulting including performing audits, creating security policies and procedures, implementing Intrusion
- Detection Systems, implementing RSA secure ID servers, implementing Internet Traffic/Gateway/Security for Monitoring and control Internet based traffic.
- Working within COBIT, 5790, ISO27001 and PCI-DSS regulatory compliance standards.
- Conducting Threat Risk Assessments using NIST and other regulatory standards for preparing for 5970 Audit.
- Conducting Vulnerability Scans, Penetration Testing, Audits and Privacy Impact Assessments based on preparation for 5970 Audit.
- Project Management on IT Projects and deliverables
- Lead on Developing Web Portal Identity Management Software
- Lead on Developing E-Commerce Web Portal for Sales Distribution Systems, EDI, and back office system integration.
- Using Joing Application Development process for application development projects.
- Implementing and design IBM Websphere middleware application server
- Implementing Cordys middleware solutions.
- Creating scripts for unix systems to automate specific tasks.
- Implementing and design Apache and JBOSS application servers
- Implementing PKI services with SSL s for Web Services.
- Implementing IBM MQ Series services with Web portal application services.
- Implementation and Management of Unix Platforms (Linux, Solaris, AIX)
- Executive/Technical Public Presentations to customers.
- Delivering a new business model service to Soroc to provide additional revenue streams for the company and presenting overall solution to Executive Management.
- Lead on Cloud Computing Server Virtualization/Consolidation and Migration Project.
- Working with Customers/Sales Executives with clients.
- Working on Electronic Discovery Model for Server Migration and Consolidation Project.
- Implementing Vmware ESX vsphere & Hypervisor solutions from Microsoft and Vmware.
- Technical Architecture Design of Software and Systems
- Working with Fortinet Next Generation Firewalls.
- Lead on Performing Compliance, Audits.
- Implementing Windows and Linux Servers.
- Network Architecture/Security and operational tasks, team members.
- Security for VOIP/Mobile Devices/Network/Servers.
- Implementing Open Source Solutions for Compliance.
- Reviewing and implementing log reviews and correlation solutions.
- Disaster Recovery Planning and Implementing Solutions
- Information Security Solutions, Guidelines, Frameworks and Standards
- Executive Presentations with clients (VP’s, Directors, and Senior Management)
- Capacity Management and Planning of systems
- Working with Senior Management on Business and Compliance
- COBIT, 5790, ISO27001 and PCI-DSS regulatory compliance standards.
- Implementing Application Services and Red Hat Services Platforms.
- Disaster Recovery Planning and Implementing Customized Solutions
- Implementing WebSphere Solutions.
- Implementing Linux and Unix security using NIST and other governing standards.
- Implementing and designing IBM Message Broker services.
- Implementing Tripwire for linux systems
- Creating Technical Project Proposals for projects.
- Design and Implementing Identity Management
- Working with IBM Power Systems /AIX/ VIO and micropartitions.
- Creating Security Policies and Procedures
- Meeting and working with Senior Management and presenting project life cycle and business requirements.
- Implementing Corporate Citrix Presentation Servers with RSA Secure ID
- Implementing Network Monitoring and Management Solutions.
- Implementing Intrusion Detection Systems
- Recommending Fortinet security solutions
- Recommending Checkpoint security solutions.
- Implementing and designing Cisco ASA and SSL/IPSEC VPN solutions.
- Implementing Internet Traffic/Gateway/Security for Monitoring and control Internet based traffic.
- Implementing all projects with full SDLC project life cycle.
- Implementing RSA Secure ID Servers
- Working and Implementing Solaris systems.
- Implementing and managing patch management systems for patch control.
- Working and Implementing with ESXi
- Consulting on Microsoft SQL Server and Oracle Clustered and stand-alone environments.
- Implementing Thin Client Solutions accessing Citrix environments.
- Implementing Storage Area Networks for File Servers, Linux, SUSE, Fedora Windows, SQL, MySQL Servers.
- Implementing Fabric Switches, designing SAN topology
- Designing SAN for capacity requirements for Virtualization Platforms, Xen and Vmware.
- Designing and administration for NETAPP SAN using snapmirrior, and dedup
- Designing and implementing security standards for NETAPP SAN.
- Designing and implementing SAN replication for NETAPP
- Consulting on Tivoli Software Distribution & Inventory.
- Consulting on Active Directory Services.
- Consulting on network & server architecture
- Implementing ESX VMWare and Virtual Center for Virtual machine environment.
- Consulting on Microsoft Exchange and Administration assistance.
- Creating Security Baseline Configurations for Operating Systems
- Creating Operational Documentation for Systems
- Implementing Citrix Password Identity Management Solution
- Creating process for managing Role Based Access
- Implementing all Projects following System and Software development life cycle.
- Responding to Customer RFP’s for the Business
- Designing, Implementing and Architecting Security Logging and Network Monitoring Project.
- Documentation all Project and Operational Processes.
- Designing Architecture for Windows 2008 and Exchange 2007 environment.
- Improving and making security architecture for SharePoint Services.
- Implementing SOA Architectures and Solutions using CORBA and SOAP
- Converting Legacy applications to Cloud Computing and SOA architectures using Cordys Platform.
- Implementing EDI Solutions
- Business Process Modeling, Policies and Procedures.
- Virtual Desktop and Virtualization (Xen, ESX/VMware).
- Cloud computing and design with SOAP and Corba Web Services implementations.
- Consulting /Implementing / Architecture / and Applications of SharePoint Services
- Implementing Microsoft Virtualization Solutions.
- Network Architecture recommendations for Enterprise Systems.
- Lead on Architecture and Implementing E-Commerce Solution.
- Conducting Interviews for Sales, Technical and other Team Members.
- Implementing TIBCO Business Process Modeling Tools
- Consulting and various clients on E-Commerce and Web Portal solutions, comprising of security/law enforcement, retail services, corporate solutions.
- Project Management for Finance Department Projects, i.e. Time Sheets, Gap Analysis
- Presenting new Business Models & Concepts for opportunities to create revenue streams for the company.
- Business & Technical Presentation for customers
- Implementing new Governance Standards, Compliance and frameworks.
- Implementing and Project Management of Financial Systems
- App-DNA implementations and consulting.
- Implementing SQL, Oracle, database servers.
- Consulting on networks ASA firewalls, encryption and security software.
- Lead on Network & Server Infrastructure Disaster Recovery Planning and implementation
- Implementing OpenSSO for Single Sign On with LDAP services.
- Consulting on Oracle Sun Identity Management design and architecture
- Supporting and maintaining Identity Management Systems.
- Implementing Security Standards for Unix systems.
- Implementing Active Directory Services, DNS and DHCP
- Creating scripts for Korn and Born Shell on Unix platforms.
- Implementing Cisco and Brocade switches for SAN fabric network.
- Operational management of backups using Veritas solution for backing up systems.
- Recommending and implementing IIS Web services solutions.
- Managing a team, a team of 7 administrators and 3 developers.
- Implementing Remote Access Solutions
- Creating policies and procedures for ensuring data management of applications is consistent
- Architecting and designing databases applications using data management methodologies
- Implementing Cisco switches & VLAN configurations
- Implementing WAN/LAN Solutions
- Working, designing, building and Implementing Hyper V on clustered environments for File & Print Services on Windows 2012.
- Creating CSV (Cluster shared Volumes) for Virtual Machine Fail-over.
- Providing and creating documentation
Confidential
LEAD SENIOR SECURITY/INFRASTRUCTURE ARCHITECT CONSULTANT
Responsibilities:
- Conducting Security Assessments for PCI Data Compliance
- Implementing Security Tools required to meet PCI Data Requirements
- Creating Security Baseline Configurations for Operating Systems
- Creating Security Policies and Standards
- Creating Governance Procedures and Process
- Vulnerability Management Systems and Conducting Remediation.
- Implementation and Management of Unix Platforms (Linux, Solaris, AIX)
- Meeting with Senior Management on project status and updates.
- Information Security Solutions, Guidelines, Frameworks and Standards
- Conducting Threat Risk Assessments
- Implementing centralized NG syslogging/correlation and process
- Improving security and auditing requirements for Solaris, Windows, Linux based Systems.
- Implementing Host Based Intrusion detection systems. (Samhain, Tripwire, Solidcore)
- Implementing Security Awareness Programs as part of requirement for PCI compliance.
- Penetration testing for vulnerabilities and or exposures with environment.
- Providing and creating documentation
Confidential
SENIOR INFRASTRUCTURE CONSULTANT
Responsibilities:
- Conducting Security Audits for Network and Server Platforms
- Performing IT audits for internal systems.
- Implementing LDAP Services for applications services.
- Change Management of Systems and Solutions
- Recommending Architecture Standards for UNIX and Wintel based platforms
- Information Security Solutions, Guidelines, Frameworks and Standards
- Implementation and Management of Unix Platforms (Linux, Solaris, AIX)
- Administering Storage Area Networks comprising of HP EVA
- Implementing of Exchange 2007 and Active Directory Services.
- E-Commerce Website management and deployment of J2EE, CORBA, WebSphere, Microsoft IIS Web Server.
- Implementing DB2 databases.
- Implementing Citrix Meta frame Server
- VMware implementations and configurations of Windows 2003/2000 platforms.
- Conducting Vulnerability Assessments
- Implementing Solid Core (Change Management Solutions)
- Reviewing requirements for Oracle Sun Identity Management Solution
- Implementing Web Services application with IIS
- Capacity Management and Planning
- Tripwire HIDS
Confidential
SUPERVISOR OF SECURITY
Responsibilities:
- Project Management for Security and IT Projects, including management of a team of 7
- Implementing and Leading Vulnerability Projects
- Conducting Threat Risk Assessments
- Reviewing products for implementation such as Cyber-Ark.
- Implementing Database Security using IPlocks
- Project Charter and PM methodology creation and planning.
- Working with Z/OS platform for DB2 on mainframe.
- Implementing Windows 2003 Servers and security compliance
- Lead on all Sarbanes Oxley Security Projects
- Disaster Recovery Planning and Implementing Procedures
- Decision Analysis for Tripwire and Solidcore
- Creating Scope and Strategies for Tivoli Identity Management and Tivoli Access Management Solutions.
- Performing IT Audits on standards such as ISO17799
- Working with ITL Frameworks and standards
- Creating Security Baseline Configurations for AIX v5.3, HPUX, Windows 2003/2000, Linux, MainFrame, and AS400.
- Recommending security for Lotus Notes Platform.
- Information Security Solutions, Guidelines, Frameworks and Standards
- Designing and architecting VMware solutions.
- Implementing NetIQ solutions
- Implementing Citrix Metaframe Servers.
- Performing internal IT audits
- Change Management of Systems and Solutions
- Providing and creating documentation
Confidential
SECURITY ARCHITECT
Responsibilities:
- Business Planning and Meetings with Senior Management.
- Integration and Architecture design of Windows 2000/2003 and Active Directory Services and VMware.
- Implementation of HPUX and administration of services
- Creating Scope and Strategies for Identity Management Solutions.
- Performing IT Audits on standards such as ISO17799 and BS7799
- Working with ITIL Framework for IT environments
- Information Security Solutions, Guidelines, Frameworks and Standards
- Implementing and Management of Wireless Security Framework.
- Implementing Web Portal and Transaction based environments with Wireless connectivity
- Implementing Microsoft SharePoint Web Portals.
- Conducting Security Reviews on Mainframe Platform (MVS)
- Design Corporate Wide Business Continuity plans
- Designing Network and Application Security Architecture.
- Creating Security Baseline Configuration Standards
- Implementing Security Standards for AIX, RedHat and Alpha Tru64
- Designing and Researching Tivoli Identity and Access Management Solution
- Working and with Active Directory Services.
Confidential
PROJECT LEADER
Responsibilities:
- Working with PCI DSS Security Data Standards
- Implementing Voice over IP Telephone Systems using Confidential s
- Management of Technical staff ranging from 5 - 8 people
- Performing IT Audits on standards such as ISO17799 and BS7799
- Integration and Architecture design of Windows 2000/2003 and Active Directory Services and VMware.
- Implementation and Management of Unix Platforms (Linux, Solaris, AIX)
- Architecting and integration of Microsoft Systems Management Server for Desktop clients and Server Environments.
- Architecting and Integration of Citrix Servers.
- Implementing Web Services and IIS Solutions.
- Integration of Storage Area Networks using HPEVA Storage solutions.
- Implementing PostgresSQL, MySQL, Oracle databases
- Implementing Tivoli Framework with various modules including Tivoli Identity Management and Tivoli Access Management.
- Implementing Microsoft Systems Management Server
- Implementing VPN using Cisco, NetScreen and Sonicwall products
- Implementing Microsoft Exchange Server
- Implementing Entrust PKI with various security products
- Design Corporate Wide Business Continuity plans
- Recommending security architectures for servers and firewalls.
- Implementing NetIQ solutions
Confidential
SENIOR NETWORK AND SECURITY ARCHITECT
Responsibilities:
- Management of Technical Staff ranging from 7 - 9 people
- Working and Implementing with JAVA, Perl and CORBA Web Applications
- Implementing and Management of network devices using Solarwinds
- Implementing Wireless Transaction solutions for Banking Customers
- Implementing Voice over IP Telephone Systems using Confidential s
- Performing IT Audits on standards such as ISO17799 and BS7799
- Design Corporate Wide Business Continuity plans
- Designing Network and Application Architecture.
- Implemented Tivoli Solutions as follows: Tivoli Framework, Tivoli Distribution and Monitoring, Tivoli Data Warehouse, Tivoli Netview, Tivoli Security Administrator, Tivoli Storage Manager, Tivoli Web Response, Tivoli Web Site Analyzer, Tivoli Web Access for Information and Tivoli Inventory, Tivoli for Exchange Servers, Implementing VPN solutions using Cisco, Netscreen and Sonicwall
- Implementing TIM/TAM for users access management.
- Implementing PKI Thawte Security s for Web Services
- Implementing Symantec Ghost and upgrading and implementing security for workstations and servers.
- Implementing Cisco Solutions ranging from firewalls and recommending IDS solutions.
- Change Management of Systems and Solutions
- Working with Confidential Canada Customers to provide solutions and consulting
- Implementing Symantec Ghost and upgrading and implementing security for workstations and servers.
- Implementing Security Standards and Architecture for Sun Solaris and Red Hat.
Confidential
TEAM LEAD - NETWORK ARCHITECTURE AND SECURITY
Responsibilities:
- Performing IT Audits on standards such as ISO17799 and BS7799
- Documenting Technical Designs and Data Flow patterns.
- Supporting Entrust Get Access for First Canadian Title Customers.
- Performing Network Review and Analysis and Server Administration Windows NT 4.0 & Windows 2000.
- Performing Network Installation and Management of Operational Procedures
- Designing network and security architecture design and planning.
- Capacity planning for applications and database LDAP integration & management.
Confidential
SENIOR PROJECT LEADER - INFRASTRUCTURE
Responsibilities:
- Management of Technical staff 3 - 5 people
- Providing consulting services for technical engineers and providing technical architectures
- Consulting on Microsoft Meta Directory and Active Directory Solutions for Corporate and Government
- Network Analysis, design of various networks ranging from Enterprise to Medium Scale networks. Implementing Windows 2000, Exchange, Proxy Servers, Routers, Switches and troubleshooting Windows
- Implementation and Management of Unix Platforms (Linux, Solaris, AIX)
Confidential
SENIOR TEAM LEAD AND NETWORK ARCHITECT
Responsibilities:
- Providing Leadership on Linux and Windows 2000 Security
- Performing IT Audits on standards such as ISO17799 and BS7799
- Implementation and Management of Unix Platforms (Linux, Solaris, AIX)
- Security Planning of Firewall and Intrusion Detection software methods.
- Implementing Microsoft PKI Services for Active Directory Services.
- Implementing backup procedures with SANS, NAS and GHOST images on Windows 2000 Servers
Confidential
SENIOR NETWORK AND SECURITY ARCHITECT
Responsibilities:
- Providing information to the Government of Ontario to ensure more technology and protection is upheld for the Canadian Public.
- Documented Network Architecture and presented recommendations.
Confidential
TEAM LEAD - INFRASTRUCTURE
Responsibilities:
- Designing Network and Application Architecture
- Implementing VPN solutions using Cisco, Netscreen and Sonicwall
- Recommending security architectures for servers, intrusion detection and firewalls
Confidential
SENIOR PROJECT LEADER - NETWORK AND SECURITY
Responsibilities:
- Performing IT Audits on standards such as ISO17799 and BS7799
- Designing, Management of Web Portal Environments
- Documenting Security Solutions and Providing Architecture and Solutions for Rogers & Compaq
- Created functional perimeter best practices based on application and network data flows
- Creating Service Level Agreements
- Implementing and Using Best Practices for BMC Remedy
Confidential
PROJECT LEADER
Responsibilities:
- Technology and Business planning with respect to product functional requirements
- Created functional specifications documentation for VPN, Firewalls, IDS, Anti-Virus, Router technology
- Coordinated Network Security Architecture meetings to discuss functional requirements as it relates to security.
Confidential
SENIOR NETWORK AND SECURITY ARCHITECT
Responsibilities:
- Network Security Assessments and design
- Implementing VPN solutions using Cisco, Netscreen and Sonicwall
- Implementing and Recommending IIS Web Solutions
- Implementing and Designing Apache Web Services Solutions