We provide IT Staff Augmentation Services!

Vp, Cyber Security Resume

3.00/5 (Submit Your Rating)

Cary, NC

SUMMARY:

  • Highly accomplished, results - driven professional with over 20 years of progressive experience in Network & Information Security and IT Management.
  • Pragmatic leader with extensive proficiency in leading Infrastructure Security Architecture, Global Information Security Strategy, Cyber Security Strategy, Security Monitoring, Security Operations, Virtualization and Data Center Design & Deployment.
  • Excellent leadership skills demonstrated by adapting rapidly to changing business needs, motivating and inspiring teams to meet aggressive deadlines, and Confidential solid history of successfully achieving desired infrastructure availability and performance targets.
  • Thought leader and Confidential subject matter expert on information security subjects both internally and externally by being knowledgeable on industry trends.

CORE COMPETENCIES:

Security: Infrastructure Security, Cyber Security Defense & Threat Management, Vulnerability Management, Firewall Security, Forensics, WLAN/WIPS, IDS/IPS, WAF, DLP, Security Monitoring Grid, Forward/Reverse Proxy, Anti-bot, DDoS, SIEM, Database Activity Monitoring, Network Virtualization, Encryption / Confidentiality, Identity Management, DDoS Mitigation, Virtualization Security, Zoning and Segmentation.

GRC: Risk Management, Compliance Management, Incident Management, Threat Management, Business Continuity, Audit, ITIL, COBIT, PCI, SOX, and Regulatory Compliance

Data Center: Large Scale Data Center Network Architectures, Application Delivery and Load Balancing, Workload Portability / Mobility, Network & Security Virtualization, DR / HA Planning, Cloud Architecture and Design (IaaS, ITaaS and SaaS).

Management: Information Technology Strategy & Roadmap, Project Management, Vendor Management, Financial Planning & Management, and Project Management, Resource Management, Team Building.

EXPERIENCES AND ACHIEVEMENTS:

Confidential, Cary, NC

VP, Cyber Security

Responsibilities:

  • Contribute to defining the Network, System, Security strategy to ensure that products and services are in alignment with Cyber Security, regulatory and business requirements.
  • Develop Cyber risk strategies and multi-year implementation and remediation programs based on business priorities and enterprise risks.
  • Propose and lead improvements based on knowledge and practical application of security best practices, instituting Minimum Security Baseline, threat assessment, vulnerability prevention, Audit & compliance.
  • Establishing key Information Security reporting metrics related to Network, System Security.
  • Directing and overseeing security monitoring programs to continuously assess effectiveness of information management, compliance, and control activities and promote rational approaches to security
  • Performing Confidential overall company wide security assessment Confidential the information technology, network, operating system, application, database and physical levels to identify risks and vulnerabilities.
  • Provide reports on Confidential regular basis, including preparation of Confidential annual security program report, and Confidential directed or requested, kept senior executive management informed of the operation and progress of security efforts. Ensure proper reporting of security violations Confidential appropriate or required.

Confidential, Foster City, CA

Sr. Director, Global Security Solutions Engineering

Responsibilities:

  • Develop Confidential high performing security team by providing strategic leadership and vision, and professional development of technical and business management staff.
  • Create and implement the Cyber Security strategic roadmap ensuring that it is strategically aligned to mitigate current and future security risks. Strategically adjust and align the roadmap on Confidential ongoing basis to ensure that it is dynamically addressing the changing security risk environment
  • Responsible for the direction of all facets of ongoing network engineering, support, maintenance, security and availability of Confidential services based on business requirements with adherence to tight operational, security and procedural models.
  • Served Confidential information security advisor to key IT and business stakeholders, establishing trust relationships through active engagement and collaboration while building strategic partnerships with various Business Units, Leaders to achieve both highest levels of Infrastructure and Business targets.
  • Establish objectives, develop strategic plans, forecast annual budgets and project plans. Implement resource changes to deliver improved, cost effective enterprise-wide solutions. Delivered comprehensive presentations and reports to executive management.
  • Determine security, network and system requirements by evaluating business strategies and requirements; research information security standards; conduct system security and vulnerability assessments; Performed gap analysis across the organization to identify unnecessary complexity in existing processes and procedures; work with service and application owners on mitigation strategies.
  • Deal with Confidential broad range of complex security and risk-related issues in information technologies. Evaluate risk and act expeditiously in making decisions and recommendations, understanding the factors associated with decision-making in Confidential technological environment.
  • Provide technical leadership in design and implementation of Firewall Architecture, Vulnerability Management, Security Monitoring Grid, NAC, WLAN, DB Monitoring, DDoS, Web Application Firewalls, Endpoint Protection, Anti-Bot, IPS/IDS, DLP, SIEM, Database Monitoring, Network Virtualization, Endpoint Security and Internet Proxy etc.
  • Create Confidential framework for roles and responsibilities with regard to information ownership, classification, accountability, and protection. Develop, implement, and monitor Confidential strategic, comprehensive enterprise information security and risk management program to ensure that the integrity, confidentiality, and availability of information that is owned, controlled, or processed by Confidential . Similarly, develop, maintain, and publish up-to-date information security policies, standards, and guidelines.
  • Overhaul and enhance Security Information Event Management infrastructure program to correlate and generate reports and alerts. This strategy involved large-scale state of the art design dedicated to Security Monitoring across data centers and providing SOC in depth view and monitoring capabilities of enterprise and Confidential & Confidential .
  • Partnered with internal Cyber Response Team to develop the Threat Intelligence program by subscribing to various threat indicators and developing rapid deployment of signatures to security enforcement points. This enabled capability to building world-class fusion center.
  • Close vendor negotiations and contract management to balance the technological and commercial aspects of networking infrastructure to deliver against aggressive deadlines and cost reduction goals.

Confidential, Detroit, MI

Senior Security Architect

Responsibilities:

  • Provided consultation services on information security including policies, vulnerability and risk assessments, internal and external information security audits, network design, installation and infrastructure hardening.
  • Liaise with IT architecture teams to ensure alignment between the security and application architectures, thus coordinating the strategic planning implicit in these architectures. Monitor the external threat environment for emerging threats, and advise relevant stakeholders on the appropriate courses of action. In particular, develop and oversee effective disaster recovery policies and standards to align with business continuity management program goals.
  • Adeptly performed security assessment to identify gaps in the process and threats to the security infrastructure and designed new controls to secure perimeter networks.
  • Performed business impact analysis to identify Business Units, Recovery Point for each key/critical business process, Business Owners, Recovery Time Objective, Recovery Strategic Objective, Dependencies, Prioritize importance and data retention and backup strategy.

Confidential, San Jose, CA

Security Solutions Architect

Responsibilities:

  • Manage projects including budget, product evaluation, software procurement, resource acquisition, task management and migration plan.
  • Design network operations and resources by translating requirements into hardware/software recommendations; researching alternative solutions; preparing proposals; analyzing cost-effectiveness; presenting concepts;
  • Design and implement high-availability Confidential and B2B network infrastructure to meet content delivery requirement.
  • The architecture included services redundancy, security, Global load balancing, DNS, content acceleration.
  • Design and implement high-availability architecture for Web Servers, Web Cache, and Home Access. The architecture included redundant content switches with meshed architecture.

Confidential, San Jose, CA

Network Security Solutions Consultant

Responsibilities:

  • Monitor and analyze network health and bandwidth utilization; makes recommendations upon analysis to ensure cost-effective communication environment solutions;
  • Manage network performance by conducting capacity planning, network modeling, traffic analysis, forecasting, and provisioning.
  • Written and implemented baseline security configuration standards for Firewall, VPN, Wireless, Confidential infrastructure best meeting the organization requirements.
  • Developed and documented Corporate Information Security policies, standards and guidelines taking into consideration all security ramifications, risk assessment and compliance issues Confidential well Confidential legal liabilities.
  • Created Confidential Information Security Roadmap in alignment with corporate goals and responsibilities.

We'd love your feedback!