We provide IT Staff Augmentation Services!

Chief Information Security Officer Resume

3.00/5 (Submit Your Rating)

Santa Clara, CA

SUMMARY:

  • IT Security Professional with 18 years of experience and a strong background in technical leadership ensuring integrity, confidentiality, and availability of organizational assets.
  • Developed full - coverage cybersecurity programs, to demonstrate accelerated solutions that provide comprehensive risk reduction built on frameworks that improve performance, agility, confidence, and clarity.
  • Designed and implemented automated tools for attack, defense, and assessment programs including vulnerability management frameworks that continuously monitor, detect, and respond to vulnerabilities.
  • Enhanced enterprise security posture, resiliency, and architectural strategy and design for all top 20 critical controls and security initiatives.
  • Developed industry best practices, knowledge transfers, and mentoring programs used in multiple market verticals.
  • Ensured broad-sweeping compliance with SOX, HIPAA, PCI-DSS, NERC, SOC2 Type I &II, ISO, FISMA, NIST and GLBA.
  • Delivered new processes and procedures to identify security vulnerabilities, misconfigurations, architectural design flaws, and control weaknesses while performing internal audits and gap analysis to reduce brand impact and reputation or trust erosion.
  • Demonstrated ability to participate in multiple full lifecycle projects simultaneously while redesigning complex enterprise infrastructures to generate improved security postures and line-of-sight visibility.
  • Planned, led, and managed projects to streamline integration and operationalize effectiveness of controls.
  • Demonstrated ability to managing introduction of 3rd party risk while managing partner relationships.
  • Highly skilled, dedicated, and enthusiastic team player with excellent leadership and communication skills.

SKILLS:

Attack Surface & Vulnerability Management (ASM & VMP)

Governance, Risk Compliance (GRC)

Cyber Attack Monitoring, SOC, DFIR (Blue Teaming)

Penetration Testing (Red Teaming)

Network, DNS, Email Security

Endpoint Protection Programs (EPP)

Data Loss Prevention & Identity Management (DLP & IAM)

Backup Contingency & Disaster Recovery (BCP & DR)

Legacy / Heritage System Integration & Migration (LSI)

PROFESSIONAL EXPERIENCE:

Chief Information Security Officer

Confidential, Santa Clara, CA

Responsibilities:

  • Develop and implement City’s Cybersecurity program, policies, standards, strategy, and budgeting for integration of 6 departments, 24 security initiatives and 1,300 employees.
  • Ensure IT Security programs align to regulatory standards to achieve FISMA, PCI-DSS, and NERC compliance.
  • Developed Confidential administrative procedure for IT Security program, to prescribe roles, responsibilities, and conditions to promote security throughout City infrastructure with information sharing integration.
  • Establish systems life cycle and set ground rules under which Confidential operates to safeguard assets.
  • Developed security handbooks to provide detailed information and guidance regarding required knowledge, skills and abilities while ensuring processes exist to meet program requirements.
  • Develop and implement SANS web-based Cybersecurity Awareness Training Program for all employees.
  • Develop and implement automation strategies and programs for tool-based vulnerability management framework.
  • Lead effort to conduct risk assessments and penetration testing for each segment and department.
  • Lead evaluations and selection processes for tools, GRC integration, SIEM integration, automated vulnerability management and penetration testing, Endpoint protection such as malware defense system and application whitelisting, DLP, intrusion detection system / intrusion prevention system (IDS/IPS), web filtering, network perimeter security, network security, and mobile device management.

Cybersecurity Practice Lead

Confidential, Dallas, TX

Responsibilities:

  • Ensure practice meets or exceeds quarterly financial goals through establishment and enablement of the service offering while directing strategies that create marketing and reporting materials.
  • Oversee & participate in development and reviews of assembled RFQ, RFI or RFPs to reflect organizational capabilities for clients.
  • Mature existing practice to provide broader services at a higher rate while directing projects to completion.
  • Deliver technical specifications while managing resources who are achieving contract deliverables.
  • Align project timelines to milestones and goals to deliver promised capabilities while ensuring customer privacy.
  • Oversee & manage organizational and project documentation needs

Chief Information Security Officer

Confidential, Scottsdale, AZ

Responsibilities:

  • Ensure organization meets, exceeds & maintains GSA (Government Services Administration) requirements of GSA award while ensuring all Federal mandates are achieved in government contracts.
  • Oversee & participate in review, assessment & analysis of Federal bids for Cybersecurity Services while assembling proposals which reflect organizational capabilities.
  • Ensure critical controls are mapped to maintain compliance while overseeing Identity & Access Management programs that enhance strong endpoint protection and network security standards.
  • Oversee security architecture initiatives while ensuring oversight of electronic discovery and digital forensics programs.
  • Maintaining a CIRT (Critical Incident Response Team), Business Continuity plans and Penetration Testing services to Federal entities.
  • Established management control and communications processes to ensure program implementation consistent with current policies and contracts.
  • Developed and implemented processes to enable detection, identification, and analysis of IT security threats and vulnerabilities.
  • Defined risk mitigation strategies and reported significant changes to Federal agencies.
  • Managed and implemented Agency certification and accreditation process for all IT systems.
  • Ensured development and approval of IT security plans and procedures, continuity of operations plans and procedures, and information security baselines and controls.
  • Conducted IT security audits to ensure effective implementation of security controls.
  • Ensured development and implementation of risk analysis processes and procedures for IT systems.

Chief Information Security Officer

Confidential, Tempe, AZ

Responsibilities:

  • Designed, defined, implemented, and executed a company-wide security philosophy with associated supporting principals, policies, standards, procedures, and guidelines.
  • Ensure critical controls are established to achieve compliance with all applicable federal regulations.
  • Oversee regulatory compliance efforts (e.g. SOX, GLBA, HIPAA, FISMA, or PCI-DSS, etc.) while achievingISO/IEC 27001,SOC 2 Type 2 and HITRUST certifications implementing best practices.
  • Establish relationships with 3rdparty consulting agencies while negotiating contractual agreements (e.g. KPMG, E&Y, Deloitte, PwC, etc.) to leverage services professional services for assurance.
  • Ensure all IT Security strategic plans are developed and designed to mature security CMMI levels.
  • Supervise all IT Security management personnel and provide leadership, direction and mentoring.
  • Meet with various stakeholders to ensure IT Security department is aligned to business direction to further streamline cost and maximize risk buy-down.
  • Join internal sales force teams to meet with consumers, which promote broader security for both organizations while improving pipeline flow and maturing relationship with Law Enforcement channels.
  • Produce 5-year financial forecast for CapEx / OpEx to account for program’s full cost, budget management and justification, potential TCO and ROI, ALE, while scaling for DR, BCP, Inventory as it relates to implementation and maturation
  • Provided oversight, direction and approvals for Business Impact Analysis, Change Management, Architectural Changes, Firewalls, WAN/LAN, Endpoints, IDS/IPS, IR/SOC teams

Expert IT Security Architect

Confidential, Beaverton, OR

Responsibilities:

  • Provide effective oversight and direction to Confidential ’s security capabilities requirements while being technology agnostic.
  • Meet with various stakeholders to ensure tactical and strategic goals are achieved by baselining current environment and forecasting/directing engagement efforts to align security demands with business direction ultimately providing levels of acceptable risk.
  • Partner with internal teams to develop solutions and operation models through management of internal and external resources while analyzing, developing and supporting the implementation/maintenance of security strategies to better protect Confidential ’s business interest.
  • Establish and maintain enterprise IT Security standards through policy, architecture and training processes while ensuring comprehensive brand protection.
  • Collaborate with IT Staff, Confidential business leaders and external partners to ensure efforts are effective while ensuring the efforts are efficient, measurable and produce value added metrics
  • Ensure countermeasures are implemented in accordance to industry best practice, company standards and regulatory compliance requirements.
  • Provide guidance to engineering and support teams on security risk while understanding effectiveness of security policies and technologies.

Controls Management & Security Specialist

Confidential, Foster City, CA

Responsibilities:

  • Conduct high risk and sensitive reviews of Ethical Hacks in relation to internally and externally hosted environments/applications; manage consultants and contractors for multiple enhancement projects; review new product offerings and identify security strengths and weaknesses.
  • Design processes, documents and standards for organizational improvements; improve analysis and reporting with cross division functional education; training and awareness; function/methodology and strategy advancement.
  • Plan and direct significant project, product, service, and functional requirements by management resources within functional areas; improve existing work processes to achieve business goals, define business security requirements for Global Information Systems;
  • Support and consult multiple adjacent projects such as DDoS protection design/improvements, SSDLC, optimization, determine and perform testing and reporting through expert techniques of any given subject in fast-paced and highly technical environment,
  • Troubleshooting of network appliances & disruptions; Automation of environment’s operations, Daily report generation; HIPS rules development; Document and Procedure development, Operational improvement engagements.
  • Virus infection response; Cross-Team support for AD and VPN account management; new build security auditing for pre-deployment. Environment software & hardware implementation, hardening and upgrading, administration & support.

Director of IT Security - SOC Manager

Confidential, Scottsdale, AZ

Responsibilities:

  • Including selection of materials, colors, sound dampening surfaces, low-shine flooring, imagery for controlled environment, lowering EMI, bullet-proofing glass, and improved lighting effects for enhanced staff alertness.
  • Provide coverage, leadership, and mentorship to direct reports for all 10 domains and 20 critical controls. Train direct reports for improved production in relation to enVision, NetWitness, DLP, Archer. Provide leadership to improve employee skillset of event and incident handling, log monitoring, vulnerability scanning, compliance monitoring, while improving customer service, experience, and communications.
  • Improve SOC’s analytical skillset while improving security architecture design concepts. Improve change management programs, increase incident management workflows while reducing bottlenecks. Create internal focus groups to improve general knowledge of industry regulations. Improve handling of customer compliance concerns (e.g. PCI, SOX, and HIPPA).
  • Manage multi-faceted integration projects, Metrics generation, analysis, and risk management, define and generate next-gen run-books, leverage existing frameworks while integrating new technologies or concepts, manage virtual teams while improving standards, processes and policies, develop next-gen architecture built to custom specifications
  • Conduct quarterly reviews. Schedule monthly team meetings * weekly meetings with leads. Ensure 24x7 * 365 coverage for MSS customers.

SOC Analyst

Confidential, Scottsdale, AZ

Responsibilities:

  • All 10 domains are covered as a security analyst.
  • Global Security Operations Center for cloud provider. Processing & reviewing over 100,000 security events per second in 24x7 environment
  • Monitor, Analyze and Resolve Security Incidence, DDoS & Flood mitigation; Review for Indicators of Compromise, Investigations of compromised servers; Malware analysis.
  • Troubleshooting of network appliances & disruptions; Automation of environment’s operations, Daily report generation; Identify and resolve IDS, IPS, HIPS problems and rules; AV and Digital Signature improvement, Document and Procedure development, Operational improvement engagements.
  • Virus response; Special APT investigation and defense, Cross-Team support for AD and VPN account management; New build security development, auditing and deployment, Environmental Hardening, Bastion maintenance and upgrading, administration & support.

Internet Security Analyst

Confidential, Glendale, AZ

Responsibilities:

  • Global security operations center lead for enterprise antivirus solutions; Security Infrastructure re-engineering; Development of real-time reporting sites; SharePoint site administration; Process and documentation development (white papers); Incidence response in 24x7 on-call support environment; Policy design; Automation of auditing processes, Network device configuration & patch audits.
  • Vulnerability Management Program (VMP) establishing on-boarding processes of new builds; Full internal vulnerability risk assessment & review; Analysis & scoring of each business unit’s security awareness/posture/adherence to standards; Development of PCI-DSS compliance standards which are used internationally; External penetration testing analysis; Manual security assessments.
  • False-Positive, patch supersedence, and adherence for Windows, Linux & UNIX environments; Configuration assessments for all OS environments, Cross-team mentoring and training.
  • Re-engineering of vulnerability management programs to generate increase work flow, Identify and remove duplication of efforts, streamline auditing operations; automate remediation; improve internal communications with partner channels to lower overall risk scores & improve visibility to leadership.
  • Review & establish new IT security standards to further promote security rating pertaining to PII and Section 404 of SOX;

Systems Analyst / Integration Developer

Confidential, Chandler, AZ

Responsibilities:

  • Security Domains include: Application and Security Development, Access Control, Security Architecture, Network Security, Computer Operations Security, Physical Security, Cryptography, BCP and DRP.
  • Support and monitor Corporate Investment infrastructure; Provide monitoring and security for International Business Sales in existing Machine-to-Machine (M2M) transactions & File Upload Services (FUS); Monitor and respond to financial transactional systems alerts on Unix/Windows environments; Develop in webMethods Integration environment; Monitor real-time transactions for Fraud, Hacks, Viruses or other malicious activity; Automate multi-layered application systems scanning process; Detect brute-force incidence & facilitate response teams; Root cause analysis.
  • Document & define platform parameters; Establish & streamline processes for recovering lost transaction data; QA testing to ensure compliance to SOX; Coordinate F5 & DNS team efforts for planned outages & updates; Analysis & monitoring report generation.
  • Incidence response to internal & external threats while generating trending reports that operate on an advanced model for forecasting server & network failure of 24x7 environment; Centralized log management; Custom inventory tracking development; Internal process and associated white papers design; In-house software tracking through the CVS.
  • Monitoring & tracking of partner certificates; Improve security posture through role enhancements; Improve functionality of internal WIKI & SharePoint site.

Security Analyst / Integration Developer

Confidential, Phoenix, AZ

Responsibilities:

  • Remediation of nodes identified to be outside security thresholds; Security Incidence response including attacks and system failures; Penetration of rogue systems; Network Management and disabling of newly discovered rogue devices; Enterprise antivirus solutions and virus incidence response team.
  • Remediation of nodes identified to be outside security thresholds; Security Incidence response including attacks and system failures; Penetration of rogue systems; Network Management and disabling of newly discovered rogue devices; Enterprise antivirus solutions management; Virus incidence response.
  • Remediation of global clients; Local & Global policy design assistance, Compliance validation; Feasibility studies; 3rd party product analysis; Development of security automation tools; Incidence response to Cisco PIX & Nokia firewalls alerts; Trending analysis; Virus & spyware deobfuscation; Desktop support for Blue Team/Red Team assignments.
  • Custom patch development for internal software containing buffer overflows, out-of-bound-arrays & dated systems compatibility issues; Improved existing systems through KPIs & CPFs (Key Performance Indicators & Critical Performance Factors); Software true-ups for vendor licensing agreements.
  • Support, assist and mentor enterprise users on software applications; Assist in storage solutions & disaster recovery efforts; Implementation of enterprise automation; SOX compliance testing; Digital certificate management; Backup & purge routine process definition; Internal Wiki development; Data repository standards definitions & development
  • Support Windows, Unix & Linux for webMethods installation, configurations, administration, troubleshooting & security for departments processing $6B annually in global transaction, SharePoint site administration, DNS/Bind administration; IP scoping and assignment, Clustering, and Disaster Recovery
  • Defining server parameters; Shell scripting; Account administration; User right assignments & access controls; HP OpenView integration; Operations statistics and analysis; Scheduling change advisory board (CAB) reviews; Production deployment of services, patches, hot fixes & in-house code enhancement.
  • Organize enterprise efforts to beta test new software; Patches & service pack deployment; Software rollout planning & implementation; Leap & EAP-FAST wireless implementation; Corporate integration of Sprint telecommunications solutions; Splunk; Technical liaison for Confidential Executive Care

GIS Support Specialist

Confidential, San Diego, CA

Responsibilities:

  • Resolve a broad-spectrum of issues with an emphasis on WAN/LAN administration & security technologies; Configuration, Administration and Security of multiple Cisco devices, Sun Blades like Sun Fire V210 Servers, Compaq Proliant 6500 series servers, End-User PC & Laptops; Migration Project Management from Confidential to Confidential ; Bridge technological gaps between internal systems requirements & external business needs; Developing process improvements to increase work flow.
  • Develop & improve network security across all segments; Support DHCP, DNS, Email, Active Directory servers; Provide analytical reporting of performance while introducing models for securing overall architecture; Windows & Unix shell scripting; Co-develop triggered event handling & response.
  • Develop company programs in advanced engineering’s proprietary 16 & 32-bit applications with proprietary high-level languages. Security monitoring & system event response handling.
  • Develop advanced hardware controls bridged through existing USB & Bluetooth technologies; Translate existing technical documentation combined with manufacture’s specifications for standard ISO 9001 formatting; Infrastructure security logging & response with HP OpenView.

We'd love your feedback!