Director Resume
4.00/5 (Submit Your Rating)
SUMMARY
- Multifaceted technical career with 20+ years of innovation and success
- Repeated success using established and emerging technologies to achieve maximum operational impacts with minimum resource expenditures. Talent for providing information security, governance, risk and compliance services to large enterprises, as well as providing management, solution architecture, implementation, support, and mentoring to team members. Extensive experience and knowledge of PCI, HIPAA, SSae, SOX, NIST, ISO and CIS frameworks to support compliance and protection of PII, PHI and IP.
- I ntermedix C orporation, Fort Lauderdale, Florida
TECHNICAL SKILLS
- Various Network Monitoring tools, TCP/IP, DecNet, NetBeui, Ethernet, cabling, ISDN, DSL, FDDI, FTP, SFTP, FTPS, HTTP, HTTPS, IPSEC, IPX/SPX, SNMP, T1, Frame Relay, DHCP, LDAP, SLDAP, DNS, WINS, NAT, RAS, VPN, Terminal Server, Citrix, LAN, WAN, Wireless, WLAN, Wi - Fi, VPN, DMZ, Managed File Transfer, SSH, RDP
- Lawson ERP, EPIC EMR, Kronos, Dovico, SalesForce.com CRM, Siebel, Maximo, Concur, Daptiv, Ceridian Dayforce, JIRA
- Hardware Dell, HP, IBM PC's & Compatibles, Dell, HP, Compaq and Intel Servers, Intel processors, DEC Servers (VAX, Alpha), Cisco, 3Com, Linksys Routers, Switches and Access Points, Fax Servers, APC UPS and power protection, virtual servers
- Operating Systems & Apps Windows 3.1/95/98/NT / XP/7/2012/10, MS DOS, VAX/VMS, PathWorks, Exchange, IAS / Proxy Server, IIS Web Server, Active Directory, SharePoint, CentOS, RedHat, FreeBSD, MSSQL, MySQL, Postgres
- Printing & Scanning HP Laser, InkJet and large format plotters, HP Print Servers, 3Com print servers; Various network attached copiers, printers and multi-functions devices, HP, Microtek and Epson scanners
- Security Tools Symantec Control Compliance Suite, Symantec End Point Protection, Juniper / JUNOS, Sentillion SSO Single Sign On & proVision, Q1 Labs QRadar, LogRhythm, Websense (Triton), Checkpoint, Palo Alto, PGP, GnuPG, RSA, Accellion, Vulnerability Assessment, Penetration Testing, Nessus, NMAP, Nexpose Rapid 7, Metasploit, Backtrack, Kali Linux, Data Loss Prevention (DLP, Websense, Symantec, McAfee, Varonis, Data Insight), Pointsec Full Disk Encryption, Email Gateway filtering, SPAM reduction, IDS, IPS, Active Directory, Directory Services, Domain Admin, nCircle Benchmark, Quest InTrust, AlgoSec, HP Weblnspect / AMP,
PROFESSIONAL EXPERIENCE
DIRECTOR
Confidential
Responsibilities:
- Detect, defend, and respond to attacks, threats, and network vulnerabilities.
- Provide leadership concerning vulnerability identification / remediation, incident response, and risk assessments.
- Minimize company costs during the management of security budgets, staffing, contractors and vendors.
- Support application developers by reviewing security controls during Software Development Life Cycle.
- Ensure IT systems remain current by reviewing and recommending emerging technologies including cloud delivered services and applications.
- Manage all external and internal HIPAA, PCI, SOX and related audits to completion including implementation of any additional controls.
- Create new or modify existing policies to maintain compliance with required regulatory frameworks.
SENIOR INFORMATION SECURITY ENGINEER
Responsibilities:
- Developed security processes and procedures, as well as regulatory compliance policies.
- Managed firewall access, remote access profiles, and VPN along with resolving related issues.
- Conducted vulnerability testing, investigated security incidents, and remediated as required.
- Improved security by performing application reviews and developing recommendations.
- Minimized disruptions while managing service requests, incidents, and change requests.
DISTRICT MANAGER, SALES ENGINEER
Confidential
Responsibilities:
- Optimized client revenue streams by designing solutions using hosted services and hardware.
- Partnered with vertical application vendors to ensure the compatibility of new equipment.
- Guided implementation team in the efficient delivery and integration of proposed solutions.
- Secured data assets through the implementation of user provisioning and security groups.