We provide IT Staff Augmentation Services!

System Engineer Resume Profile

4.00/5 (Submit Your Rating)

Summary

Career security management professional focused for 15 years on protecting information systems for major corporations and organizations requiring high security with more than 20 years of diverse and increasingly responsible IT experience with overall experience in security operations, systems engineering, business governance, research, and security management. Extensive experience providing security leadership to private and public business sectors. Expertise in corporate security, with in-depth experience in security strategic planning, project management, integrated security architectures, risk management strategies, investigations and incident response programs, compliance, security technologies, and developing new corporate security programs.

Experience

Confidential

Adjunct Faculty Position - Computer Science Department

Currently teaching a CIS101 Computer Science undergraduate class. This class consists of teaching the following topics MS Office 2010, HTML, XHTML, XML, CSS, Alice 2,0 Object Orient Programming, Security and Forensic. Class size consists of 30 students every semester.

Confidential

Enterprise IT Security and Auditing Manager

  • Implementation of a global information security strategy, the management of highly skilled global Computer Emergency Response Team CERT and threat assessment functions as well as a global Security Operations Center SOC .
  • Build and maintain a team of individuals that provide continuing leadership and oversight of Information Security to ensure the proactive identification, reporting and mitigation of internal and external information security risks globally.
  • In-depth understanding of information security principles and best practices across the industry as well as project management principles.
  • Identify and implement the overall global information technology strategy and direction while working closely with other members of technology solutions management and the business. Drive improvements to stay ahead of increasing security threats.
  • Effectively aligns security with the defined technology direction. Integrates IT security into the project management life cycle of all development activities. This will allow security specialists to work with all development teams to ensure that security is part of all ongoing solutions.
  • Establishes close working relationships between the security teams, Enterprise solutions and enterprise architecture teams to ensure common solutions are being pursued while fostering relationships with all of enterprise technology services.
  • Establish enterprise security needs and working with vendors to budget for annual cost on maintainence and support contracts.
  • Ensures that all aspects of the company's security policy and practices are developed, implemented, monitored for compliance, maintained and updated as necessary.
  • Establishes an overarching governance approach that will allow for a more formalized approach to security for all NYPD locations and department. Is responsible for ensuring that the company's global technology assets are adequately protected from unauthorized intrusion and / or misuse.
  • Work in partnership with other City Agencies on ensuring procedures and policies align with their overall direction and Citywide considerations.
  • Oversee the reporting and executive communication on all security and audit issues and solutions as it relates to information security.
  • Knowledge of regulatory and risk management requirements from a security perspective for the public sector industry including FISMA, HIPPA and SOX.
  • Possess strong working knowledge of IT security and privacy issues and technologies as they relate to large-scale, global, on-line transaction intensive and multi-location businesses. Possess experience and business insight to operate effectively at the architecture, strategy and policy level.
  • Metrics and planning: Proven experience identifying, tracking and aging metrics. Demonstrated ability to interpret metrics for decision-making purposes such as long-term planning, capacity, efficiency and industry best practices. Experience in complex technology staff and external resource management and planning.
  • Decision-making skills: Demonstrated ability to process rapid problem resolution, especially around crisis or serious operational situations involving information technology security. Demonstrated ability to act decisively and make confident, sound and timely decisions in the face of uncertainty and with limited information. Involves others appropriately in decision-making.
  • Adaptability: Very flexible and able to work within the organization. Able and willing to take on and learn additional and different responsibilities. Effectively manages pressure, not easily frustrated. Demonstrates consistently positive attitude toward change. Emotionally stable, able to handle crises and to maintain composure. Work effectively in ambiguous situations.
  • Leadership skills: Track record of developing and implementing a comprehensive strategic plan for managing information security globally.
  • Communication and influencing skills: Articulate and persuasive communicator. Able to effectively communicate security and strategy and required investment to a broad audience range, from technical staff to executive business leadership. Effective, clear and calm communicator when situations are fluid and undefined. Communication and influencing skills: Articulate and persuasive communicator. Able to effectively communicate security and strategy and required investment to a broad audience range, from technical staff to executive business leadership. Effective, clear and calm communicator when situations are fluid and undefined. Track record of representing the interests of the company in external settings and to influence government and large customers and potential customers.
  • Change Management: Demonstrated ability to drive change, effectively involving others, preparing people to understand changes, providing affected individuals with the support they need to accept and contribute to the change process.
  • Project Management: Ability to manage numerous projects and activities simultaneously, insuring the correct priorities are assigned and initiatives are completed within resource constraints.
  • Budget experience: Experience in managing and planning a complex multi-million dollar budget.

Confidential

IT Security and Audit Manager

  • Involved in architecture design, hardware and software configuration, disaster recovery, storage capacity SAN's, ArcServe and Veritas backup/restore, dealing with maintenance and support contracts, standards, policies, procedures and documentation for auditing and DR.Involved with the following projects hands on: Microsoft 2000/2003 Active Directory, Microsoft 2000 Advance Servers which provides and ensures scalability, reliability and availability for critical business needs, Microsoft clustering services, implemented Microsoft's distributing file system to provide redundancy and fault tolerance, Microsoft Exchange 2000/2003, used Microsoft's terminal servers for administrations needs and also for our Citrix project , Citrix MetaFrame XP, McAfee E-Policy Anit-Virus, Administration of Novell 4.x, 5.x,6.5, and eDirectory Servers, Novell clustering services, Intrusion Detection Niksun NetDetector, VPN, Lucent remote access, Dial-Up, Authenex Strong Authentication System ASAS provides two-factor authentication for remote VPN, LAN, and web-based access. Authenex ASAS prevents unwanted network intrusions by employing a convenient token called the Authenex A-Key ., NetLan, f-Secure, PeopleSoft 8, Oracle 8i and 9, Crystal Reports, Unix/Linux and scripting, Cyfin Reports -Cyfin is internet web access reporting software that monitors and reports on computer users' web usage. It analyses log files from your firewall e.g. Secure Computing Sidewinder / Firewall 1 or proxy server e.g. Microsoft ISA Server, Sun Proxy Server . and NetVision NVIdentity Synchronicity of user accounts .
  • Support the Global IS Audit Director, Finance/Operation stakeholders, company divisions and subsidiaries in a consulting role by evaluating and recommending improvements to business practices, processes, and control procedures.
  • Provide management with independent and objective reports, evaluations, appraisals, counsel, and recommendations.
  • Continuously analyze business risk profiles and provide assurance that appropriate risk mitigation is taken.
  • Examine and verify Information System processes and procedures from internal organizations in order to determine the reliability and effectiveness of the existing internal control systems.
  • Introducing new technologies to management and business units. Example was the MTA NYCT Human Resource, Save Program project via the browser internet technology. The SAVE Program enables Federal, state, and local government agencies to obtain immigration status information they need in order to determine an applicant's/recipient's eligibility for many public benefits.

Confidential

Vice President of Information Technology Infrastructure and Operations

  • Examine and verify information system processes and procedures from internal organizations in order to determine the reliability and effectiveness of the existing control systems.
  • Continuously analyze business risk profiles and provide assurance that appropriate risk mitigation is taken.
  • Provide management with independent and objective reports, evaluations, appraisals, counsel, and recommendations.
  • Support the Global IS Audit Director, Finance/Operation stakeholders, company divisions and subsidiaries in a consulting role by evaluating and recommending improvements to business practices, processes, and control procedures.
  • Global business strategy, capacity planning and architecture, reporting to CIO/CFO. Analyzed and reported profits and losses, proposed and reviewed annual budgets, prepared and analyzed auditing and risk management documentation, maintain assess and procurement management, and research technology trends.
  • Project managed multi-million projects.
  • Managed, developed and implemented a centralization and consolidation of infrastructure architecture from recent M A and strategically planned the upgrades of CISCO routers switches, hubs and telecommunication services.
  • Managed and supported over 1000 nodes, 8 branch offices domestically and 6,000 nodes internationally.
  • Developed information technology department standards, policies, procedures and securities.
  • Developed, strategically planned and implemented a centralized CRM enterprise solution, SAP, Workplace, web technology and reinsurance modules. Along with backup enterprise solution, IBM Tivoli and storage system, such has IBM SAN solution.
  • Developed and standardized corporate hardware and software acquisitions to accomplish the organization's business objectives.
  • Developed, managed, maintain and supported a multi-tier Unix and NT infrastructure and integrated third party application systems.
  • Developed, implemented, managed and strategically planned an enterprise multi firewall Checkpoint , Radius Server VPN, TrendMicro VirusScan and E-Manage and SuperScout Intrusion systems. Along with Disaster Recovery with IBM, MCI and AT T.
  • Managed the development and ongoing improvement of enterprise desktop, laptops and PDA's assets and services.
  • Developed and maintained ongoing relationship with vendors, contractors and consultants.
  • Manage and develop the SLA, RFP, and RFI purchasing and procurement process of hardware, software licenses, and maintenance and support contracts. Negotiate world-class contracts for products and services, securing volume discounts where applicable.
  • Manage the purchasing and procurement of hardware, software licenses, and maintenance and support contracts.
  • Ensure the mentoring, coaching and development of staff both formally and informally .
  • Hands-on knowledge with PeopleSoft Implementation, designing, documentation and analyze complex user requests with a working knowledge in the following modules: Human Resource, Benefits, Payroll, Assets Management, Reinsurance and Financials.
  • Hands on support installations, configuration, rollouts and deployments MS WINNT 2000 Servers and Professional, Clustering, AS400, Active Directory, MS WINNT NT 4, MS Win 95 and 98, Novell 4.11, Lotus R4.6 and R5, Helpdesk REMEDY, TrendMicro and Norton Management Console, MS Office 2000, MS Office 97 and Office 2000, MS Access 97 and 2000, MS Exchange 5.5/2000, Outlook 2000, REAL TIME Reinsurance and Financial applications, Btrieve, CICS, STARS, Bloomberg, BNA, ViewDirect, Crystal Reports, MS Access, MS SQL 7.0/2000, PeopleSoft HR and Financials, Oracle 8i, Oracle 11i, Java SDK, JSEE and Visual Basic development, ASP, XML, SICS, SAP, Korvas, DB2, Keyfile, Peoplesoft, etc , TNG, NetSupport, HPOpenView, Tivoli Backup and Restore System, Disaster Recovery , Critix WinFrame 1.8, VPN, FireWall Checkpoint , VirusScan, Norton Anti-Virus, Inoculate Anti- Virus, Dial Up Connection Support, Account and Application Mapping, Bar Code application, Auditing Applications, TCP/IP, IPX, LDAP, DNS Manager and Wins Manager, Internet / Intranet Connection.
  • Prepared system for Disaster Recovery and also to work with our enterprise solution such has SAN's, Tivoli, and SAP environment.
  • Hardware Support IBM Netfinity Servers, IBM RS/6000's, Nokia Boxes, IBM Workstations and X Series Laptops, Compaq Servers, Dell Workstations, PDA's Windows CE , Nextel communications, PBX Voice Data, CISCO Routers, Switches, Hubs.
  • Travel international and domestically.

Confidential

Assistant Vice President Systems Software Engineer

  • Business Strategy, Planning and Software Engineering Development and Architecture
  • Information and technical architecture development and maintenance, and knowledge management.
  • Managed, configured, maintain, monitor, supported full life cycle DBA, 24x7 supports for major financial corporate systems large multi-tier, LAN/WAN, TCP/IP, DNS, WINS, and Web technology, E-Commerce Technology B2B, Web Servers, File Servers, Reporting Servers, Application Servers and Utility Servers.
  • Involved with infrastructure hardware /software configuration, installation, and administration of TRANSARC Encina, PCDCE, Oracle 7.x, 8.x, NT 4.0, IIS MS Console Management, MQ Series, FrontPage98 and 2000, Java SDK, JSEE, ASP, XML, HTML, HTM, LDAP, Unix HP OpenView, SMS 1.2, 2.0, SQL Server 6.5, 7.0, Crystal Reports 6.x, 7.x, , UNIX.
  • Physical design Intranet/Internet, performance tuning, Analyze event logs, Analyze backup exec, Analyze performance monitor logs, analyze server and link Monitors, run performance optimizer, optimize connections, create and review server disk usage report, download summary report, project management timelines. Monitoring multi server environments for production, QA, development and disaster recovery. Responding to alerts and conducting First Level problem diagnostics/resolution using documentation and available tools. Performing routine tasks under the direct supervision of a System or Network Engineer. These tasks may include verifying site s functionality, changing tapes, performing releases, equipment inventory, etc. Acting as a front line interface to users, accepting trouble reports and dispatching them to appropriate departments.

Confidential

Consultant Messaging Systems Engineer

  • Business strategy, planning and architecture of messaging enterprise solutions
  • Project management meetings with executives and partner solution providers.
  • Managed 4 technical professional.
  • Supported the change management, rollout and deployment of over 100 LAN/WAN Win NT 4.0, MS Exchange 5.5 Infrastructure Servers and over 10,000 desktops and laptops to Outlook 98.
  • Create and review server disk usage report, download summary report, backup status report, user population report, connector throughput, statistics report, practice disaster recovery in lab environment, offline defrag, and archive event, backup, and performance monitor logs, and helpdesk support using REMEDY.
  • Setup faxing system with backbone Unix AIX Solaris 2.6, VI scripting with front-end Exchange.
  • Setup and Configured HP Workstations with Netscape to access the OWA service for messaging systems.

Confidential

Assistant Director of Infrastructure and Operations

  • Support the Global IS Audit Director, Finance/Operation stakeholders, company divisions and subsidiaries in a consulting role by evaluating and recommending improvements to business practices, processes, and control procedures.
  • Provide management with independent and objective reports, evaluations, appraisals, counsel, and recommendations.
  • Continuously analyze business risk profiles and provide assurance that appropriate risk mitigation is taken.
  • Examine and verify information system processes and procedures from internal organizations in order to determine the reliability and effectiveness of the existing control systems.
  • Supervised and managed eight Information Systems Personnel supported and managed 400 users and remote sites.
  • Multiple protocol, multiple systems, systems security and messaging, auditing and inventory systems software and hardware equipment.
  • Managed and developed systems program applications.
  • Manage and develop the SLA, RFP, and RFI purchasing and procurement process of hardware, software licenses, and maintenance and support contracts. Negotiate world-class contracts for products and services, securing
  • volume discounts where applicable.
  • Managed, administered and maintained the help desk. Strategic planning on software and hardware upgrades, maintained procedures and documentation control within the IS Department.

We'd love your feedback!