Head Of Security Development Resume
Princeton, NJ
SUMMARY:
I desire a position with an organization in which I can utilize my customer relation, security, technical knowledge and support skills, along with my creative abilities, to provide comprehensive customer support in a global network environment.
TECHNICAL SKILLS:
- Thorough knowledge of hardware and software on both PC and Mac platforms
- Thorough knowledge of various application software packages
- Operating systems on both PC and Mac platforms.
- Windows various versions
- Mac OS various versions
- Internet Explorer, Firefox and Chrome
- Ghost
- Networking and Routing
- TCP/IP
- Confidential VPN
- DNS/ DHCP
- Security Appliances/Tools: Firewalls, IDS/IDP, DDoS/ Threat Mitigation, Qualys and Foundstone Vulnerability Scanners, Various SIEM correlation tools, Skybox, FireEye, Nessus, Cisco MARS Netflow, Wireshark and Proxies
- Incident/Change Tracking Software: Track - It, Vantive, HP Service Center and Remedy
- Compliance (PCI, SOX, HIPAA)
- IT/Security Frameworks (ITIL, ISO, NIST, SANS)
- Cyber Advanced Threat Risk Analysis and Assessments
- Cyber Advanced Threat Monitoring and Investigations
- Security Incident, Change and Problem management
- Excellent communication skills
- Ability to delegate responsibility and work under pressure
- Self motivated with excellent creative ability
EXPERIENCE:
Head of Security DevelopmentConfidential, Princeton, NJ
Responsibilities:
- Lead a global multi - functional organization of circa 180+ senior security managers and experts that provide Cyber Operations and capabilities across 150+ global customers.
- Act as a collaborative liaison between multiple groups (e.g. IT Infrastructure, IT Applications, and other functional areas) to provide a risk-based and solution-focused perspective on technical security matters.
- Accountable for commercial cyber intelligence, cyber operations, system and network security. Working to protect BT and its customers from cyber security threats while optimizing commercial opportunities to grow the business.
- Provide technical thought leadership for cyber security services, operations, architecture and implementations.
- Defining & driving the cyber security strategy and roadmap globally.
- Owning and delivering security innovation by incubating custom complex security solutions that drive future development of the commercial portfolio.
- Responsible for developing a security management structure to: manage risk related to people, information, assets, revenues and reputation.
- Responsible for successful management and delivery of overall security services and consultancy where appropriate.
- Manages and maintains compliance with relevant security requirements, typically: National Government regulations, contractual requirements and company security and business continuity policy.
- Contributes to the identification and responsible for the collation and presentation of emerging security risks and threats to influence the direction of BT’s or the Customer's Security strategy and policies, particularly in the areas of personnel, physical, information, procedural and products.
- Responsible for managing and maintaining relationships/partnership with specific customers, suppliers and stakeholders ensuring the cost effective provision of a professional Security service.
- Manage the security relationships with in-scope major customers, suppliers and stakeholders ensuring the cost effective provision of a professional Security service. Performing a role perceived by the customer and charged for as being a Contract Security Manager / Information Security officer.
- Provides leadership for a team, or matrixed team, or in a Major Customer contract role, of Security professionals and managers to build high performing and well-motivated teams.
- Contribute to the financial management / P&L responsibility of the department which includes direct financial responsibility of £15 million annual budget and underpinning direct revenue of £50 million per year.
- Responsible for the implementation and operational end to end delivery of cyber capabilities and security services.
- Incident Management decision maker within a defined scope responsible for ensuring that mitigation controls and incident response are appropriate and delivered in a professional manner.
- Providing security advice and direction to Line of Business within BT and external customers.
- Manage the delivery of the security infrastructure and services to provide: identity and trust solutions managed security services and secure network infrastructure for BT and its customers.
- Ownership of multiple Security Systems critical to the defense of BT and its customers.
Head of Security Development
Confidential
Responsibilities:
- Provide technical thought leadership for cyber security architecture and implementations.
- Act as a collaborative liaison between multiple groups (e.g. IT Infrastructure, IT Applications, and other functional areas) to provide a risk-based and solution-focused perspective on technical security matters.
- Accurately portray genuine security risk while also defining specific remediation steps that are consistent with the business model and strategic goals.
- Maintain a high level of technical skills coupled with an ability to effectively communicate specific business solutions while building consensus on security decisions.
- Lead and direct a team of Senior Security Experts in determining and assessing vulnerabilities and providing remediation recommendations based on a cost vs. risk basis.
- Ensure the design of business solutions meets security mandates.
- Analyses complex projects to identify potential vulnerabilities, security control points, and risk mitigation measures to ensure compliance with Security Policy, Standards and technical security requirements.
- Consult on projects to provide security expertise on how to implement best security practices for application, database and system technologies
- Analyze complex systems architecture (application, network, system and database process) to identify design gaps and recommend security enhancements.
- Understand current as well as emerging security threats and design security architecture to mitigate threats where possible.
- Work with project stakeholders to identify appropriate security requirements, engineer practical security solutions and implement measurable security guidelines.
- Work with project managers and stakeholders to develop practical, effective implementation plans with measurable project milestones for all security solutions.
- Reviews current security policy and standards to ensure technical security requirements, guidelines and best practices are communicated and put into practice for each assigned project.
- Pro-active hunting for Advanced Cyber Threats (Unknown/Unknowns)
- Providing full situational awareness across the business of cyber threats and the risk they pose.
- Managing Capitol Spend for Cyber and Physical Operations
- Developing Cyber Confidential training and development plan
- Developing Cyber Confidential operating model which is people, process and technology based, using capabilities.
Senior Security Operational Architect
Confidential
Responsibilities:
- Provide Managed Security Services and Cyber Security consultancy and subject matter expertise to new and existing client propositions.
- Work closely with bid teams and the client to define and deliver the Operational scope of the required security solution that will meet the client’s business objectives and needs.
- Work on technical complex Cyber security projects.
- Perform Cyber Assessments to point out security gaps/risks and design and implement solutions to reduce those gaps/risks.
- Develop, Implement and Run Global Cyber Security Operation Centers.
- Management and maintenance of relationships/partnerships with specific customers, suppliers and stakeholders ensuring a cost effective provision of a professional security service within agreed timelines.
Network Security Manager
Confidential
Responsibilities:
- Manage a team of 5 direct reports based in the UK.
- Manage day to day operations in regards to the following on a Global Scale for BT:
- Network Vulnerability Management
- Wireless Security
- Manage day to day operations for DDoS service provided to BT and external customers. This is UK based only.
- Pro-active and Re-active Cyber Risk Analysis and Assessment
- Key role in developing multiple processes and training requirements for the creation of the Confidential .
- Create from scratch a custom Network Vulnerability Management service for an external customer. This included internal and external scanning via Qualys and management of vulnerabilities, risk and remediation.
- Custom reporting to show progress of my managed services to upper management.
- Continued Process Improvements and Gap Analysis of security services.
- Key Project: Managed the team and solution for DDoS protection of the London 2012 Olympics.
Senior Security Specialist
Confidential
Responsibilities:
- Created and documented security policies and procedures for 1st full Security Contract out of Princeton office. This included helping create the first Confidential in Princeton.
- Firewall installation, policy setup, changes and monitoring (Juniper, ASA, & Checkpoint)
- IDS/IDP installation, policy setup, and monitoring (Juniper & Counterpane)
- Global device management via Juniper NSM
- Cisco MARS installation, policy setup, and monitoring for Netflow analysis.
- Vulnerability scanning and reports. (Foundstone)
- VPN ( Confidential ) setup and troubleshooting (Cisco & Juniper SSL)
- Bluecoat proxy policy setup and changes
- Websense internet filtering
- Manage RSA Accounts & Access.
- Troubleshoot RAS connection issues.
- Troubleshoot DNS/DHCP, Firewall, Proxy, and IDS/IDP issues
- Handled all tier 1, 2, 3, and 4 security incidents for multiple fortune 500 companies.
- Managed over 50+ security devices at one time
- Provided monthly customer security reports
- Participated in getting Princeton ISO 27001 certified
- ITIL
- Participated on weekly global security meetings
- 24 hour on-call support
Confidential, PA
Deployment Engineer
Responsibilities:
- Customize and build remote access and end point security software
- Create packages of software via Install Shield for deployment
- Test software to ensure proper functionality prior to delivery
- Configure security policy enforcement and coordinate updates with clients.
- Configure VPN concentrators, Nortel Contivities, Juniper SSL, and RSA Servers.
- Troubleshoot all client related problems.
- Evaluate and improve software deployment process
- Oversee customer deployment to thousands of end users including fortune 500 companies.
- Manage remote and local network access
- Track all issues in Remedy
Confidential, Parsippany, NJ
Global Remote Access Specialist - Consultant
Responsibilities:
- Troubleshoot and fix remote access issues dealing with Dialup, DSL, Cable, ISDN, Wireless and VPN.
- Setup and maintain client’s remote accounts.
- Setup and maintain Secure ID accounts.
- Setup Dialup, DSL, Cable, ISDN, and Wireless modems/routers.
- Track all issues in Service Center
- Global support
Confidential, National Park, NJ
Computer Consultant
Responsibilities:
- Troubleshoot and fix all client computer related problems over the phone or on-site.
- Keep up with updates to software on client machines and servers.
- Setup and maintain users and permissions
- Support Windows 95/98/NT/2000/Xp, Office 97/2000/2003 , Mac OS 7.1 OS X.
- Run nightly backups.
- Web Page Development (HTML and FLASH)
- Graphic Design including Logo’s, Magazine Ads, CD Cover’s, Power Point Presentation’s, Menu’s, and Press Packets.
- Computer Animation
Confidential, Chester, NJ
Systems Engineer
Responsibilities:
- Take level 1, 2, & 3 support calls and log them in a database.
- Setup and maintain 25 Windows NT and 2000 Servers.
- Run nightly backups on all servers.
- Create and maintain user accounts and permissions.
- Setup of VPN, Cable Modem, DSL, RSA, and Dial-up remote access.
- Setup of email server and email accounts.
- Setup and maintain telephone system.
- Setup both MAC and PC on the network.
- Troubleshoot and solve all hardware and software problems.
- Troubleshoot and fix PC and Mac desktop/laptop computers, copiers, printers, scanners, fax machines, CD-RW/DVD-R drives, and many other devices.
- Software support for Microsoft Office 97/2000/XP, Windows 95/98/NT/2000/XP, Mac OS 7.1 through OS X, All Adobe products, Lotus Notes, Netscape and Internet Explorer, Quark, Suitcase, Outlook 2000/2003, SQL, Ghost, Firstclass and many more.
- Remote desktop support using Timbuktu and PC-Anywhere.
- Image machines and deploy software using Norton Ghost.
- Archiving data to a server and backing it up to tape and DVD.
- Setup of audio/video equipment for conferences.
- Troubleshoot and fix Palm issues.
- Setup and maintain Helpdesk software.
- Run reports and look for problem trends.
- Keep inventory of all hardware and software.
- Keep up to date on all service packs and patches for all software packages.
Confidential, Lebanon, NJ
Computer Support Analyst - Consultant
Responsibilities:
- Take Level 1, 2, &3 support calls.
- Troubleshoot hardware such as Monitors, Hard drives, Network cards, Modems, laptops, and Local and Networked printers.
- Troubleshoot software such as Microsoft Office 97/2000, Windows 95/98/NT/2000, Outlook 2000, Lotus Notes, Schedule Plus, Netscape Navigator, Adobe Acrobat, Winzip, and Palm Top software.
- Use Net-meeting and SMS to take over remote machines and troubleshoot them.
- Software deployment with SMS.
- Reset NT, Mainframe, Vax, and AS400 passwords.
- Setup Teleconferences using Meeting Time.
- Troubleshoot and solve remote dialup and VPN problems.
- Log Cases of problems in Vantive Database software.
Confidential, Philadelphia, PA
Network Administrator/ Office Automation Analyst
Responsibilities:
- Fix problems via the phone or on-site.
- Installation and configuration of 10 NT4/2000 servers.
- Setting up and maintaining 1000 user accounts and permissions on servers.
- Setting up and configuring TCP/IP protocol.
- Setting up tape backups for all 10 servers.
- Enterprise wide Lan/Wan administration and support for 1000 users within 5 Administration Buildings.
- Software deployment using SMS and Ghost.
- Desktop support for Windows 95, 98, Workstation, NT Server4, 2000, Novell and MAC OS systems.
- Setup and configure Dell, Compaq, IBM, and Gateway desktops and also Dell Power-Edge, IBM Netfinity, and Compaq Proliant servers.
- Updating hardware such as Hard Drives, Memory, Video cards, Network cards, and CD-ROM drives.
- Installation of software such as Microsoft Office 97/2000, Lotus Notes, Internet Explorer, Netscape Navigator, Eudora Pro, Adobe Acrobat, Adobe Photoshop, Crystal Reports, Remedy and other various types of software.
- Setup, train, and administer Helpdesk from scratch.
- Setup Track-It Software for tracking calls.
- Train 30 employees how to work the Help Desk.
- Tracking level 1 and 2 support calls for 1000 users.
- Run reports to verify that calls are being handled.
- Downloading software updates from the server to clients.
- Provide on-site repair and setup of computers and other external hardware for 1000 users.
- Printers, Scanners, Zip Drives, CD-RW Drives.