Security Architect Resume
Owings Mills, MD
SUMMARY:
- To gain employment as Security Architect, Information Security Manager, Solution Architect, or Enterprise Architect where I can use my 15 years of IT experience and training.
- 15 years of IT experience including 5 years of experience in Information Security and Security Architecture
- 12 years healthcare industry experience. In depth industry knowledge of healthcare processes and procedures, and health insurance basics.
- 10+ years of experience in various aspects of programming and application development. Extensive and diversified knowledge and experiences on software development life cycle.
- Good verbal and written communication skills.
- Proven technical lead experience.
- Ability to work both independently and as a team member with personnel at all levels in the organizational hierarchy.
- Strong conceptual thinking and communication skills. Have the ability to conceptualize complex business and technical requirements into comprehensible models and templates.
TECHNICAL SKILLS:
Proficient in: Java, J2EE, C#, Visual Basic, Cache, HTML/XML/CSS, Python, GWT, JSON, REST, AJAX, JDBC, JSP, JMS, Web Services, SQL, C, C++, Unix Shell Script, Spring Framework.
Familiar with: TCP/IP, .NET technology, SOAP, JavaScript, IBM Tivoli Security Management Suite: ISIM/TAM/ISIG/TFIM/TDI, Matlab, FORTRAN.
Platforms: UNIX, Linux, Windows.
Database:: IBM DB2, Oracle, MySQL, M, MongoDB.
Big Data/Hadoop: Cloudera Hadoop, MapReduce, HDFS, Sentry, HBase, Hive, Impala.
PROFESSIONAL EXPERIENCE:
Confidential, Owings Mills, MD
Security Architect
Responsibilities:
- Responsible for designing security solutions for internal/external projects and driving its implementation, covering all relevant security domains, including application, database, operating system, network, identity and access management, role management, event monitoring.
- Conduct security reviews and provide security guidance for new systems and applications.
- Contribute to build library of design patterns, security standards, check lists, and other guiding artifacts.
- Collaborate with developers in order to properly interpreting high level designs into working solutions and provide guidance in this regard.
- Lead and manage technical delivery for internal security projects.
- Participate in coordinating project implementation across different teams within IT Department, external partners, and vendors.
- Maintains knowledge and understanding of current and emerging technologies, equipment and systems.
- Conduct research and proof of concept (POC) for new security technologies and contribute to new ideas, patterns, processes and solutions of information security. Most recent POC technologies with hands - on experience: Big Data/Hadoop Security, Oracle Advanced Security Option, Axway API Server, Forum Systems Sentry, CyberArk Privileged Account Security.
Confidential
Application Integration Specialist Lead
Responsibilities:- Participate in brainstorming sessions for interpreting technical requirements into security solutions and designs. Create detailed documents using UML to be shared within and outside the development team.
- Lead joint design sessions and coordinate implementation with other technical teams within the organization to keep projects on track.
- Provide leadership to the development team by defining tasks, level of effort, and tracking development to ensure timely deliveries or escalation of issue. P rovide technical guidance to less experienced staff.
- Develop code, scripts, and configuration/deployment instructions to implement designs. Perform thorough unit testing, code validation, and troubleshooting.
- Skill set includes: Java/J2EE, JSP, JDBC, JMS, XML, WSDL, Web Services, Ant, Spring Framework, Oracle Database, SQL, LDAP, Active Directory, IBM Tivoli Security Management Suite: ISIM/TAM/ISIG/TFIM/TDI/TDS, Oracle Access Manager, Thycotic Secret Server, CyberArk Privileged Account Security, MongoDB.
Confidential, Monterey, CA
Programmer Analyst Principal Lead
Responsibilities:- Gather information from existing systems, analyze program and time requirements. Design systems and programs to meet highly complex business needs. Prepare detailed specifications from which programs are developed and coded.
- Conduct research on database management system with an emphasis on applications of web enabled technology in the meteorological data presentation and utilization area. Work with client and management to resolve issues and validate programming requirements and provide technical advice on complex programming.
- Develop and deploy real-time meteorological systems for data ingest, storage, retrieval, posting, display over web techniques.
- Software, technologies and systems involved: Java, J2EE, XML/HTML/CSS, Google Web Toolkit (GWT), JSON, REST, AJAX, JSP, Spring Framework, Ant, Subversion, Web Servers (Apache, Tomcat), Eclipse, Python, FORTRAN and Linux/Unix/Windows.
- Familiar with Federal, DoD system engineering standards, experience in the DoD computers and high performance computing (HPC) program.
Confidential, Madison, WI
Senior Software Engineer
Responsibilities:- Work as the lead software developer, in a team environment, to build a clinical application used by emergency rooms of hospitals to help medical clinicians document and track patient’s Electronic Medical Record (EMR) throughout patient’s ER stay.
- Work on investigation and optimization of the performance of the software applications using internal-developed or commercial performance tools.
- Assist with demonstrations on sales, and communicated with existing and prospective customers during the design and development process of the software applications.
- Take responsibility to assign projects, monitor project progress and provide consultation in the application team. Work as mentor to train and guide less experienced personnel.
- Being trained and acquired industry knowledge of healthcare processes and procedures. Have visited 20 or so hospitals/clinics nationwide to provide go-live support or take learning and observation trips.
- Software development activities were completed using Visual Basic, C#, Cache, and Java on Windows, Unix and VAX systems.