We provide IT Staff Augmentation Services!

Engagement Manager/lead Architect Resume

SUMMARY:

  • Senior - level IT Security and Privacy Architect/Engagement Manager wif diverse experience in the retail, financial, medical, higher, pharmaceutical, manufacturing, and government sectors.
  • Proven skill sets include successful implementation of new solutions to the enterprise environment from the requirement gathering phase to operations turnover. Also, adept at conducting information assurance activities such as, solution reviews and security policy compliance activities as well as dealing wif multiple levels of corporate management including CEOs.
  • Additional experience includes RFP and RFQ sales activities.
  • Security and Privacy infrastructure - architecture, design, installation/support, and assessment:
  • Two Factor Autantication Solutions (DS3)
  • Access management (Sun and Tivoli)
  • Identity management (Sun and Tivoli)
  • Directory services - LDAP, X.500 and DNS (Sun, IBM, Novell and Active Directory),
  • OS Harding/HIPS/Change Control Enforcement (McAfee SolidCore and Tivoli)
  • E-Mail Encryption wif emphasis on privacy protections (Entrust)
  • SSO Systems and Biometrics (ActivCard and Tivoli)
  • Firewalls
  • IT Process Tools: TOGAF, ITIL, ISO, & Six Sigma
  • Mentoring and of developers, network and system administration staff
  • Application, infrastructure, and system problem diagnosis on Windows, Linux, and Unix platforms
  • Installation, optimization, and maintenance on Unix, Linux, and Windows solutions

PROFESSIONAL EXPERIENCE:

Engagement Manager/Lead Architect

Confidential

Responsibilities:

  • Responsible for completing the update of the project roadmap
  • Responsible selecting and assigning resources
  • Responsible for the quality of deliverables
  • Responsible for project management activities
  • Responsible for project finances
  • Responsible for Tivoli Access Manager for e-Business operational
  • Oversight for IBM Security Access Manager for Web And Mobile Version 8.0., and IBM Security Access Manager Architecture.

Engagement Manager/Security Lead

Confidential

Responsibilities:

  • Responsible for completing the Identity and Access Management Assessment
  • Responsible for the quality of deliverables

Lead Architect/Engagement Manager

Confidential

Responsibilities:

  • Responsible for creating architecture and design
  • Responsible for project management activities
  • Responsible for project finances
  • Responsible selecting and assigning resources
  • Responsible for project management activities
  • Responsible for project finances
  • Lead CritSit Team
  • Responsible for the collecting of inter-process autantication and entitlements requirements
  • Responsible for the collecting of inter-process autantication and entitlements design and architecture
  • Responsible for evaluating requirements and design against US Federal Banking mandates and best practices to control access to the production environment, eliminate the leakage of sensitive data, and prevent attacks, malicious access and transactions
  • Responsible for documenting and presenting findings
  • Supported other areas of review:
  • Logical resource separation
  • Object promotion
  • Data movement
  • Network

Confidential

EDS -Infrastructure Specialist - Senior

Responsibilities:

  • Responsible for System Requirements, and Architecture Design Documents.
  • Responsible for Bill of Materials
  • Lead multi-country, multi-continent, and multi-cultural team: India & United States

Technical Lead

Confidential

Responsibilities:

  • Served as Technical Lead from end of plan and define phase to implementation close down
  • Delivered first pilot ahead of schedule
  • Managed vendor relations on technical matters
  • Completed system design document and other deliverables
  • Provided engineering estimates
  • Worked wif project manager to construct and manage schedule
  • Led multi-country, and multi-cultural team: New Zealand, Brazil, India and United States

Confidential

me/T Architect

Responsibilities:

  • Completed solution reviews documenting customers’ areas of exposure and possible solutions for those issues.
  • Conducted implementation readiness reviews to help the customers find the optimal solution.
  • Improved the security stance of customers through information assurance activities such as firewall policy review, threat and vulnerability management, and conducting risk assessments on various solutions.
  • Often asked back for subsequent engagements
  • Assessed Firewalls
  • Provided threat and vulnerability management
  • Completed region wide vulnerability remediation management effort after penetration test - worked to resolve over 3000 vulnerabilities in the North America region
  • Management Performing Suppliers
  • Reviewed requests for security deviations and made recommendation to GM Management
  • Provided risk assessment of computer systems
  • Coding of a JAVA based tool to monitor system utilization
  • Coding of data migration tools in CSH/BASH/PEARL
  • Coding using Java Script wifin various middleware tools

Hire Now