Systems Administrator Resume Profile
SUMMARY
Demonstrated results in strategic and tactical leadership in a high performance organization. Proven track record for developing results oriented IT programs and initiatives. Offering a unique combination of technical expertise, business leadership, and financial acumen.
EXPERIENCE
Confidential
Project Manager / Scrum Master Consultant
Currently leading the development of a SaaS based solution from the ground up utilizing Agile methodologies.
Confidential
IT Security Solutions Architect / Cyber Security Generalist Consultant
- Primary functions are to design and architect complex IT security endeavors for the organization's cloud initiatives.
- Managed the security component of the cloud project with oversight role over two cyber security engineers.
- Leveraged my prior experience in employing a hybrid agile/waterfall methodology to managing projects to successfully deliver security components in a product development undertaking.
- Developed a comprehensive and modularized Target Corporate cloud security architecture that is not just portable across multiple Cloud Service Providers CSP and hypervisor technologies OpenStack, GCE, AWS , but also interoperable with existing and future technologies.
- Established a comprehensive cloud security control matrix that will improve and reduce the amount of time and effort required for teams to solution security requirements against Target's security standards. This approach eliminates the band-aide security approach that is prevalent in large organizations. The security control matrix also effectively map various regulatory compliance requirements against the organization's overall security standards and policies.
- Succesfully established partnership with numerous disparate IT security, engineering and development groups to bring forth a collaborative working environment that facilitated the enablement of the Scrum Agile process for Target.com's cloud initiatives.
- Developed a risk analysis artifact that will enable future analysts to formally document and analyze new initiatives and map the decisions to prior projects that have been decided on and solutioned. This effort dramatically reduces the the fragmentation of IT security decisions and solutions across large enterprises.
- Participated in corporate-wide IT workload placement and RFP task force.
Confidential
Management and IT Consultant
- Provides IT management leadership insight and guidance to the private and public sector.
- Provides strategic and tactical IT leadership driving operational efficiency and performance improvements across a wide range of IT disciplines including but not limited to Systems Engineering, Administration, Networking, Security, and Risk.
- Provide strategic and tactical project management for various clients that spans product development, PLC, SDLC, information security, infrastructure, and business process management projects.
- Specializing in real-world IT security policies and procedure assessment and formulation information security and risk assessment network assessment and IT operational assessment.
- Assess and improve vendor relationship and vendor management to achieve synergy, security, and reduced cost.
- Cloud Security Design Architecture and Engineering GCE, AWS, RAX, Chef, Sensu, etc.
- Identity and Access Management Consulting.
- Cyber Threat and Incident Response Management.
- Non-classified Direct Clients:
- Supportive Concepts: Independent 3rd-party PCI-DSS and HIPAA Information Security Risk Auditor
- CIT Financial: Advanced Persistent Threat Forensics and Incident Response Management
- Motion Matters: IT Infrastructure, Operations, Security Management, and Project Manager
- AATD: Project Manager, Information Security and Operations SME
- CTI Corp: Cyber Security Consultant and Scrum Master
- LCC/Sprint: LTE/CDMA RF Optimization project principal for CodeRED
Confidential
Director of Information Technology
- Development and leadership responsibility for highly skilled technology professionals in the systems engineering systems administration server and desktop support networking and security disciplines.
- Achieved significant cost savings through effective and efficient vendor negotiations.
- Delivered back office proecess improvements that provided real-time actionalble business intelligence and eCommerce transactions.
- Responsible for over 600k in telecom cost savings through effective contract and billing audit and reviews.
- Managed corporate-wide projects to improve overall network performance through innovative use of technology.
- Developed policies and procedures for investigation and response to malware and other incidents on the network.
- Successfully managed projects that led to the improvement in incident response times through automation of the detection and monitoring of network and security related incidents.
- Architected and implemented an automated vulnerability and patch management system.
- Performed hands-on Palo-Alto network and security device management event and incident analysis threat analysis and threat and incident remediations.
- Implemented security awareness program to reduce regulatory and legal risk to the business.
- Responsible for providing the business with full disaster recovery and business continuity to over 1,200 users.
- Architected and implemented a secure remote access to over 1,500 users, improving overall experience, productivity, and security.
- Overhauled the server infrastructure to conform to industry best practices, effectively improving operational efficiency and improve internal and external customer experience through improved overall performance.
- Overhauled the network infrastructure to comply with industry best practice where it makes business sense.
- Improved overall network resiliency and throughput by overhauling the network core switches in an High-Availability architecture.
- Designed and implemented a zero-downtime network architecture which allowed for zero-impact hardware and/or software upgrades during business hours.
- Overhauled the organization's Cisco telecom infrastructure which enabled the business to exploit all the features and capabilities available to the them. This resulted in increased productivity and collaboration across the board.
- Architected and implemented a hybrid Bring Your Own Device BYOD infrastructure which directly resulted in increased productivity, employee morale, and improved security.
- Managed and maintained vendor relationhips with, including but not limited to Microsoft, HP, Cisco, Dell, Quest Software, Netwrix, Palo Alto Networks, FireEye, Symantec, Verisign, Rapid7, Tennable, Solarwinds, WebSense, Apple, Verizon, AT T, Zayo, CenturyLink, Cogent, and Level3.
Confidential
Information Security Manager
- Developed and established a formal security program comprised of both administrative and technical controls under the Office of the Chief Technology Officer to secure the organization.
- Married the Waterfall and Agile project management methodologies to establish a hybrid approach to project management that is highly effective and delivers high quality results on-budget and on-time.
- Managed and maintained vendor relations with, including but not limited to Microsoft, Dell, Quest Software, Palo Alto Networks, FireEye, Symantec, Verisign, Rapid7, Tennable, Solarwinds, WebSense, and Apple.
- Brought together a dynamic and diverse group of IT professionals to form a robust and effective security team.
- Managed the implementation of a hybrid approach to security that enabled the business to succeed rather than hinder its progress.
- Implemented a thorough vulnerability and patch management system.
- Automated malware analysis and remediation.
- Replaced an antiquated antivirus infrastructure with a complete solution offering antivirus, antimalware, host based IDPS, and host based firewall.
- Introduced encryption technology utilizing Pretty Good Privacy PGP with whole disk encryptions and encrypted network shares for the Human Resources, and Account and Finance department.
- Standardized the security configuration of all mobile devices including but not limited to laptops and mobile phones.
- Developed mobile device policies for the organization and standardized all mobile devices to Apple iPhone devices which translated to increased productivity, improved user satisfaction, and overall device usability.
- Build the security foundations of the organization from the ground up.
- Architected and implemented a centralized log management system for increased visibility, root-cause analysis, and reduce security risk.
- Upgraded antiquated firewalls with next generation firewalls from Palo Alto Networks.
- Architected and deployed a system single sign-on system to improve access control and user experience.
- Implemented secure public cloud solutions to enable the business.
- Implemented a secure delivery system to enable the business to transfer sensitive files to 3rd party business partners and subsidiaries.
Confidential
Security Engineer/Analyst
- Overhauled the organization's security infrastructure to Symantec Protection Suite 4.0 which included Symantec Endpoint Protection, Critical System Protection, and Control Compliance Suite.
- Performed security and risk assessment for the office of the Security Manager.
- Performed security incident response analysis and support.
- Improved overall security monitoring and remediation through the introduction of managed security services through Symantec that provided 24X7 security professional coverage for security incident monitoring.
Confidential
Project Manager
- Managed the highly successful Sarbanes Oxley SOX compliance initiative project.
- Managed various security related projects such as the Symantec Security Information Manager SSIM initiative Next Generation Antivirus Project, utilizing Symantec EndPoint Protection SEP and Virtualization Stretch Cluster and High-Availability Initiative, utilizing Citrix XenServers.
- Employed both traditional waterfall and Agile methodologies in project management and product development alongside the software development team.
- Performed project management functions for the Director of IT.
Confidential
Systems/Network Engineer
- Instrumental in establishing technical and administrative controls that contributed to Sarbanes Oxley SOX , Payment Card Industry Data Security Standard PCI DSS compliance.
- Instrumental in the network design and build-out of the new corporate headquarters and a secondary datacenter where existing and new networking equipment were utilized.
- Designed and built the organization's internal cloud network infrastructure.
- Supported, upgraded and monitored the organization's network infrastructure.
- Designed and implemented various innovative technologies that enabled the business to grow from a three server farm to over 90 in as short as 3 years.
- Proposed, designed, and implemented 802.11n/802.1X Cisco WiFi infrastructure.
- Managed the organization's Active Directory and antivirus infrastructure.
- Established a standardized remote access solution throughout the organization.
Confidential
Systems Administrator
- Performed Oracle database management.
- Formulated and implemented a disaster recovery plan and procedure for the customer facing web servers utilizing Acronis True Image Backup.
- Instrumental in the rapid response recovery from NIMDA Virus that took out all the production server environment. Utilized the Acronis True Image Backups for majority of the recovery effort.
- Managed Active Directory group policies, rights, and permissions for the Tax Management organizational Unit.
- Performed troubleshooting and maintenance of over 90 production web servers.
- Performed Internet Information Server Configuration and Development for the Tax Management Division's web server farm.
- Instrumental in the migration to Active Directory from Novell.
