Chief Information Officer Resume
El Paso, TX
SUMMARY
- Results - driven, Innovative and motivated executive with a proven track record of leading organizations.
- Extensive experience with C Level leadership Confidential the national level intelligence center - Confidential (EPIC) that comprises of 28 Law Enforcement departments & agencies.
- Comprehensive experience in senior-level leadership of advanced information systems and cutting-edge emerging technologies, industry standards and best practices in both commercial and Federal government.
- Certified IT professional with 18 years of hands-on IT experience in all aspects of software engineering lifecycle, IT security, financial management, resource management, project management, process management and risk management.
- Proven thought leader and skilled in structuring strong high performance teams to drive innovation.
TECHNICAL SKILLS
APPRAISAL RATING: Outstanding Performance
COMPUTER Languages: Java, C, C#, Groovy, XML, UML, HTML-4/5, SQL, WSDL, JSP and AngularJS.
SKILLS: Distributed Technologies RMI, CORBA, EJB, WebServices (JSON, BSON, REST & SOAP)
GIS: ESRI, Google Maps & Bing Maps.
Internet Applications: J2EE, Servlets, JMS, Spring, Hibernate, Struts, Grails, Tiles.
Web Application Server: Weblogic, JBoss, ATG Dynamo, Tomcat, TomEE, LifeRay, IIS.
IDE: Visual Studio, Netbeans, JBuilder, Toad, MyEclipse, Eclipse, RAD, STS and IntelliJ.
Methodologies: Agile, Extreme Programming, Rational Unified Process and CMMI.
Scripting Languages: JavaScript, JQuery, AJAX, Ext.js, DOJO, TinyMCE and AngularJS.
Markup Languages: HTML5, CSS3, XSL, XML, DHTML, SAML, LEXS and JHTML.
Version Control Tools: Atlassian, GIT, Jira, Bamboo, Rational, CVS, Jazz, SVN & MS-TFS.
Database Servers/Protocols: Hadoop, Oracle, Sybase, MSQL, JDBC, ODBC and DBCP
Operating Systems: UNIX (Solaris, RedHat Linux), CentOS, Windows, Ubuntu, Kubuntu
Protocols: SOAP, TCP/IP, HTTP, HTTPS, FTP, SMTP, RMI and IIOP
PKI tools: OpenSSO, Keytool, CertUtil, Encryption Algorithms
Identity Management: Sun Access Manager, WSO2, Oracle Access Manager.
PROFESSIONAL EXPERIENCE
Chief Information Officer
Confidential, El Paso, TX
Responsibilities:
- Established a tiered architecture of EPIC’s IT platform and successfully orchestrated my roadmap by prioritizing key initiatives throughout my directorate.
- I was invited by the Australian Criminal Intelligence Commission to provide mentoring to the Australian law enforcement teams in Canberra by sharing with them the technological best practices that I have implemented in my organization.
- Provided numerous executive briefings to high-level audiences ranging from senators, C-level leadership, congressional delegates, department heads, large conferences and the White House Situation Room.
- Pioneered both Agile development methodology and Agile Enterprise Architecture approach within EPIC to streamline the development process.
- Designed and architected the modernization effort for the EPIC portal and delivered a cutting edge mobile ready portal in a record time of just 2 months.
- Implemented high-grade security architecture by leveraging PKI infrastructure facilitated through high government grade encryption algorithms.
- After successfully convincing the HIDTA Directors about the cost advantage of migrating SAFETNet to EPIC, I successfully orchestrated the migration of those de-confliction instances to EPIC.
- Collaborated with external de-confliction organizations like Regional Information Sharing System (RISS) and Washington Baltimore HIDTA to integrate their respective backend systems with SAFETNet using the National Information Exchange Model (NIEM) standards. The integration effort was a huge success and now provides enhanced officer safety throughout the nation.
- Designed and architected a DOJ wide SaaS implementation to facilitate the hosting of software services on a DEA hosted private cloud.
- Launched the first Identity Credential Access Management (ICAM) System in the Drug Enforcement Administration using standards defined by Program Manager of Information Sharing Environment (PM-ISE) Office, which provided enhanced security and meets compliance standards for FICAM and HSPD-12.
- DEA administrator recognized my accomplishments and provided me the opportunity to present my accomplishments right after her opening speech Confidential the International Association of Chiefs of Police (IACP).
- In order to support high availability, I architected the network and Infrastructure COOP leveraging the world’s largest web content distribution network.
- After successfully delivering a highly secure external facing platform for EPIC, I was entrusted to lead the development of DEA’s overall Internet Facing Architecture.
- Developed and launched the user provisioning system - UAM and had it integrated with the ICAM solution. This modernization effort significantly streamlined the user provisioning process for EPIC users.
- Integrated the EPIC portal with Akamai’s edge computing platform to enhance security and performance. This integration laid the groundwork to federate with other law enforcement partners.
- I successfully architected the integration efforts with DHS- HSIN and FBI - LEEP to federate with the EPIC portal for more effective law enforcement information sharing.
- Led EPIC’s IT security to reach the DOJ’s highest security rating amongst all of the 40 DOJ programs.
- Identified and coordinated the implementation of DEA’s first in-memory reporting capability and integrating the capability with EPIC’s portal, Geospatial Intelligence System (GIS) and mission critical applications.
- Architected DEA’s first fully integrated GIS platform that was recognized by the commercial industry and presented me with the International Special Achievement Award.
- Initiated the first internship program Confidential EPIC and made alliances with the major educational institutions to attract the best local talent.
- Presented EPIC’s new set of capabilities Confidential numerous national and international level conferences and meetings to encourage reusability and promote law enforcement officers to leverage EPIC’s modernized capabilities to meet their operational requirements.
- Architected DEA’s first private mobile app store, which will provision mobile applications managed through the Mobile Device Management/ Mobile Application Management.
- Architected the modernized National Seizure System with mobile ready capability that also included the ability to record seizures leveraging a WebGL API based 3-Dimensional interactive user interface.
- Designed EPIC’s first configuration management platform with automated continuous integration build processes and leveraged multiple architectural patterns including reactive and strangler design patterns.
- Designed and architected EPIC's first Big Data Analytical solution with state of the art technological capabilities.
Environment: TomEE, JBoss, IIS, Spring, ESRI/Google maps, Maven, Atlassian - Jira, Confluence, Stash, GIT, Visual Studio, Spring MVC, Spring Workflows, LifeRay, Akamai, Sharepoint, Cloud architecture, HIPAA, PCI-DSS, PA-DSS, PTS, PIN, P2PE, Appcelerator, Qlik, AngularJS, WSO2, Unity modeling, LEXS, NIEM, Hadoop, Redis, Accumulo, Solr, Zookeeper, Docker, Splunk, Containerization.
Software Architect/ Team Lead/ Contracting Officer Representative
Confidential, Washington, DC
Responsibilities:
- Led the complete design, development and deployment of various DHS custom application development engagements including DHS’s financial management system - Future Years Homeland Security Program (FYHSP), Management Business Intelligence Tool (MBIT), component specific - Web Content Management as a Service (WCMaaS), USCIS-SelfCheck, DHS’s Agile Configuration Management Platform and many other mission critical DHS applications.
- Chaired the Technical Working Group Confidential DHS HQ to identify technical initiatives with DHS components and to determine the most optimal development course for those business requirements.
- Chaired the Agile Working Group Confidential DHS HQ to align the Agile methodology with existing business process in the Federal Government. As a result of my efforts, I was able to align the lifecycle of all 33 successfully delivered DHS projects to the Agile methodology.
- Led the design and development of the Identity, Credentials, and Access Management (ICAM) initiative for the Cyber Security &Communications - Network Security Deployment (NSD) unit.
- Implemented security controls across multiple DHS networks and application fabrics, leveraging PKI encryption and edge platform security.
- Led and managed the modernization and development effort for NPPD’s CyberScope application, which is a web-based application that allows all federal agencies to provide monthly security and vulnerability data feeds.
- Designed and developed the DHS HQs SaaS platform to be leveraged across all 16 DHS components.
- Led the effort to identify and develop the Cross Domain Solutions across the different NPPD classification fabrics.
- Collaborated with Applied Physics Lab - John Hopkins University in the identification of the most optimal technology stack for the various cyber security initiatives.
- Proactively worked with the risk management team to identify any project risks and proposed remediation plans for the identified risks.
- Partnered with component heads by representing DHS HQs Confidential the DHS Agile Working Group to draft the Agile development roadmap. As a result of these efforts the team was able to finally deliver the roadmap to the DHS CIO.
- Developed multiple Analysis of Alternatives (AoA) to identify the most optimal technological solution and worked with the budget office with the procurement process of these multi-million dollar acquisitions.
- Worked with numerous DHS components with their migration effort to the DHS Public Cloud Confidential DC1 and DC2. Based on the feedback received, I actively worked with the cloud vendor to ensure the most optimal deployment of the virtualized development platform.
- Led development teams to establish robust enterprise architecture and manage delivery of the software modules in the private/public cloud.
- Led the design and development of common components for cross cutting concerns like logging, security and exception handling.
- Spearheaded the deployment of the IBM Rational Application Lifecycle Management Jazz suite to support the Agile methodology within the department.
- Authored and reviewed various SELC/ Agile document deliverables for software projects.
- Led and represented the department in efforts for base lining Agile Development standards for projects.
- Configured continuous integration using Rational Build Engine to automate deployments, security scans to various different environments.
- Led the mobile development effort for the DHS HQ to incorporate security scans as part of the mobile deployment process through continuous integration and partnered with external departments like FAA and GSA so they can leverage the reusable service.
Environment: JBoss, IIS, Grails, Spring, Microsoft Bing maps, Gradle, Rational Jazz, SpringSource Tool Suite, Visual Studio, Spring MVC, HIPAA, Spring Workflows, Drupal, Akamai, Sharepoint, CRM, Cloud architecture, PhoneGap, Sencha, TLS, PKI, OTP, SAML, IAM.
Associate/ Chief Architect
Confidential, McLean, VA
Responsibilities:
- Chaired the project Architecture Working Group and coordinated with DHS architecture for compliance.
- Led the team to successfully overcome the complex integration involved with the distributed project architecture.
- In my effort to optimize performance, I spearheaded the design and development of Spring web services for JUnit test cases, which will determine the performance throughput of the application and identify potential latency points.
- Led the automation of workflows through the development of WebSphere Process Server (WPS) Business Process Execution Language (BPEL) workflows using JDBC adaptors.
- In order to achieve robust application integration, I orchestrated the desktop Single Sign On (SSO) for the RAMP application using Kerberos and also configured the WPS SSO using Lightweight Third Party Authentication (LTPA) managed through the DataPower appliance. As part of the integration effort, I was also able deliver the Oracle OBIEE SSO through data-sources.
- I authored various SDLC deliverables like the System Design Documents, Version Description Document etc. to ensure process compliance.
- Designed and developed project automation through continuous integration using Cruise Control and Hudson.
- Integrated ESRI GIS functionality within the enterprise application to support DHS HSIP data map layers and leveraged the geo-coding service provided by ESRI to geo-code DHS address data.
- Led the Access Management task and provided the security architecture to Joint Chief of Staff applications.
- Led the configuration of the Single Sign On (SSO) initiative for all Joint Chief of Staff mission critical infrastructure by leveraging the Sun Access Manager suite.
- Accomplished complete integration with Joint Chief of Staff mission critical systems by federating Access Manager with Microsoft Active Directory and Sun Directory Server 6.0.
- Led the effort of designing and developing the JTP data move module for the JTIMS application, using the underlying Spring and Hibernate framework.
- Leveraged the Agile scrum stories to provide an accurate level of effort and provided team members the best practices of detailing user stories.
Environment: J2EE, Sun Access Manager 7, Policy Agent 2.2, Weblogic 10, IIS 6, Tomcat, Eclipse, Sun Directory Server, OpenSSO,, Oracle 10, MySQL. JBoss, Hibernate, Struts, Spring, Acegi, JMS, IntelliJ.
Confidential, Arlington, VA
Access Management
Responsibilities:
- Led the development on the Identity Access Management module for Research.gov, which facilitated the first federation in the Federal Government between the NSF, USDA and DOD grants management systems.
- Led the effort to develop industry standard portlets with JSR 168/286 specifications using the Weblogic Framework.
- Led the development task to migrate legacy PowerBuilder application to a J2EE platform.
- Developed Analysis of Alternatives for the redaction capabilities to identify the most robust technology.
- Spearheaded the effort to develop an online redaction capability using the JavaScript API DOJO and TinyMCE.
- Drastically improved application performance for the EJacket's Ecorrespondance module by replacing applet based editing with TinyMCE editor.
- Designed and implemented the batch processing capabilities for the NSF E-correspondence module.
- Led the implementation of cutting edge application security leveraging Java Cryptography Extension APIs.
- Configured custom batch management using Quartz based Flux API and developed it as a reusable module for various internal NSF applications.
- Successfully completed the modernization effort of NSF’s mission critical EJacket Application.
- Leveraged best practice to persist configuration properties in the database using the Jakarta Commons Configuration API.
- Led the design and implemented NSF’s mission critical application to support Committee of Visitors.
- Adopted best practices to exchange data across the Conflict of Interest (COI) module using contract first SOAP web services
Environment: J2EE (Java 1.3, JSP, Struts, Java Servlets, Tiles), Maven, HTML, JavaScript, XML, XSL (Xalan), JDOM, Eclipse, SunOne 8.1, JRUN 4.0, Sun Solaris 2.6, Flux 7.1, Sybase 12.5
Confidential
Sr. Java Developer
Responsibilities:
- Successfully delivered Confidential most lucrative ordering platform with a monthly revenue of $110 M.
- Led the design and development of the contract and ordering modules using cutting edge JSP and custom tags. Leveraged the MVC Framework and Design Patterns to complete the middleware implementation.
- Adopted development best practices to document sequence/ flow/ class diagrams with Unified Markup Language using IBM Rational rose.
- Orchestrated the data sharing with external applications leveraging Business Objects and Web Services.
- Drastically improved application performance by reducing network round trips within the enterprise application.
- Spearheaded the solution to a complex integration problem by leveraging CORBA (Visibroker).
- Led the development effort to streamline Confidential business workflow for ordering, pricing and provisioning of the web hosting capabilities, thereby significantly reducing process duplication.
- Documented the application logic leveraging industry standard Unified Markup Language (UML) representations.
- Finalized the deployment of Confidential two major services namely Intelligent Content Distribution Service and Confidential Remote Access Services, which significantly increased Confidential’s revenues.
- Led the successful deployment of Confidential &T cutting edge portal using ATG Dynamo server technology.
Environment: JDK 1.2.2, Servlets, Java Server pages (JSP), Oracle8, Iplanet Server, HP-Unix, JBuilder 3.0, Custom Tags, Visual Age for Java, ATG Dynamo 4.5 (Personalization Server, Commerce Server, Transaction Server), Workbench, JHTML, Java Servlets and Relational Viewer.