Security Architect Resume
2.00/5 (Submit Your Rating)
TECHNICAL SKILLS
- Workflow Re - Engineering
- Compliance (HIPAA, NIST, PCI, GDPR, SOX)
- Program & Project Management
- Policy & Standards Development
- Risk Management (STRIDE, Fair, NIST, ISO)
- Identity Access Management Programs
- ITIL, COBiT, COSO Frameworks
- Quality Programs (Six-Sigma, ISO, IEEE, FDA)
- DR & Business Continuity Planning
PROFESSIONAL EXPERIENCE
Confidential
Security Architect
Responsibilities:
- Developed advanced KPI & KRI reporting applications & managed risks for; ISO programs, vulnerability, remediation tracking and validating mitigations reported as completed.
- Designing security for; AWS; ECS VM, Docker & AWS Fargate application instances.
- Acting ISO for the County of Sacramento. (Halted due to travel.)
- Created the County of Sacramento SSDLC program (Checkmarx, Veracode, IBM, Micro Focus)
- Oversight of all FISMA critical infrastructure audits and all 3rd party FedRAMP related systems
- Personally coded a full Petri Net workflow engine on a MS Azure stack (DOT.NET, SQL Server) Integrated vulnerability & compliance monitoring tool results to remediation workflow activities.
- Used chart macros, report blueprints & gadgets to link Jira data to Confluence content.
- Integrated vulnerability & compliance monitoring tool to automated remediation workflow activities.
Sr. Information Security Architect / Director
Confidential
Responsibilities:
- Author of all security; policies, governance methodologies, strategies and procedures.
- Deployed and conducted the GRC, vulnerability, audit, reporting, and 3rd party oversight programs.
- Managed/conducted the internal vulnerability audits & all endpoint and perimeter systems. Optimized supporting procedures, ascertained risk postures and drove remediation activities to conclusion.
- HITRUST, HIPPA, CIS, PCI, NIST and ISO 2700x compliance programs creation.
- Instituted key risk indicators (KRI) and key performance indicators (KPI) reporting and personally coded dashboards (DOT.NET and SQL Server) for use by the CIO and the Board of Governors.
- Implemented and operated tools for; Phishing (Sophos), AI based SIEM (Darktrace), IAM (Beyond Trust), Vulnerability Scanning (Retina), SSDLC (Veracode), custom build GRC & reporting tools.
- Specified, negotiated and managed 3rd party security of cloud and vendors to required SLA’s.
- Created and lead the information security portions of the emergency response program.
- Partnered with the PMO to identify and incorporate security requirements into all new projects.