Global It Security Operations Manager Resume
4.00/5 (Submit Your Rating)
PROFESSIONAL SUMMARY:
- Information Systems Security/Cybersecurity management professional and retired Military Veteran with 20 years of proven experience who has accomplished measurable results while leading teams of 10 - 60 in dynamic, fast - paced Information Technology environments.
- A strategic manager who possesses a comprehensive background in Enterprise Management Systems derived from conducting domestic and global operations in the Confidential, Confidential, Confidential and Confidential .
- Managed security risks upon multiple lines of effort to protect assets, property, and equipment valued over 48 million while exceeding the expectations of senior leaderships’ objectives and milestones.
- A skilled senior manager that delivers quality results when analyzing, deploying, or troubleshooting systems hardware, applications, and software.
- Proven experience working with all DoD operating systems, applications, software, and networks.
TECHNICAL SKILLS:
- Leadership
- Configuration Management
- Threat Analysis
- Risk Management
- Incident Response Management
- Process Improvement
- Software deployment
- Communication
- Cybersecurity Management
PROFESSIONAL EXPERIENCE:
Confidential
Global IT Security Operations Manager
- Manage, implement and monitor a strategic, comprehensive corporate information security monitoring and operation program to ensure the integrity, confidentiality and availability of information owned, controlled or processed by the organization.
- Provide real time decision making for ongoing information security incidents as they occur to protect corporate assets. Analyzes incident request trends and patterns to improve processes and services.
- Oversee all Global Security Operations Center positions in their daily tasks and projects. Participate in the selection of technology, devices and software that are to be used on the network and in the information security infrastructure, and ensure that their implementation meets information security requirements.
- Participate in incident response activities as a senior information security representative as needed. Act as the senior information security liaison to the IT Infrastructure teams.
- Develop and report on metrics showing how the network and the information security infrastructure are being managed with respect to information security.
- Provides direction to subordinates based on general policies and management guidance. Interprets and executes policies and procedures to respond to incident requests and provide desk side analysis of systems.
IT Security Course Mentor
- Serves in an online professorial role as subject matter expert who assist students as they engage specific courses of the graduate IT security curriculum.
- Teaches graduate or master level IT subjects such as Ethical hacking, Forensics and Network Intrusion, Secure Software Design, Secure network Design, Disaster Recovery, and Compliance
- Coaches graduate students to competency development by asking open-ended questions, brainstorming next steps, and maintaining accountability.
- Brings courses of study to life with students via one-to-many or one-to-one forums.
- Provides instructional help (proactively and reactively) and facilitated learning communities.
- Responds to student inquiries about content, course of study, learning resource, or assessment daily.
Senior Cybersecurity Manager
- Provides technical/management leadership for assisting organizational level Information Assurance Program Managers (IAPM) in the implementation of Command Level Army Information Program (AIAP) and Information Assurance Vulnerability Management Program (IAVMP). Serves as technical advisor for all applications and hardware.
- Expert level knowledge as an Information Assurance Manager (IAM) with experience advising IAPMs on all issues related to new IT and resource utilization trends, DoD, Army and federal IA requirements and initiatives.
- Assists the Information Assurance Manager with the identification of new system, modification or recertification of a present system and the appropriate IA Controls based on Mission Assurance Category (MAC) Level and Level of Confidentiality.
- Creates and implement processes to protect the confidentiality, integrity, authenticity, and non-repudiation of information at the appropriate level while ensuring the availability of secure data and delivery systems.
- Provides full life cycle IA expertise in the design, development, integration, testing and sustainment of Identity and Access Authorization Management commercial off the shelf (COTS) services and capabilities.
Information Systems Security Manager
- Led and supervised an Enterprise Management Systems (EMS) team consisting of System Engineers and System Administrators IAW mission requirements resulting in sustained superior performance.
- Oversaw analyzation, planning, design and implementation of Enterprise Management System in accordance with mission requirements resulting in increased production and execution of required technology initiatives.
- Documented, assessed, and managed the enterprise systems supporting (IT) help desk, data center operations of the Department of Defense Information Network supporting all joint recruiting and all Army human resource domain systems and applications.
- Analyzes software and hardware requirements to support all organizational web and application services.
- Provided expertise in breaking down and developing new practices and approaches to address optimizing human-computer interface resource management.
Information Systems Security/Cybersecurity Management Professional
- Maintained reliability and efficiency of programs in accordance with mission requirements and priorities resulting in streamlined programs.
- Coordinated security of information design, development, deployment, maintenance and enhancement of information technologies and personnel business processes.
- Integrated new technologies and methodologies in accordance with unit requirements and standards resulting in sustained superior performance.
- Diagnose hardware and software problems and remediated or replaced to maintain services across the organization.
- Led technical division Information Assurance Security responsible for the division compliance remediating Information Assurance Vulnerability Alert (IAVAs), STIGs, plug-ins, and patches; checks and modifies POAM submissions.
All Source Intelligence Management Professional
- Supervised, and coordinated the planning, collection, evaluation, fusion, analysis, production, and dissemination of all-source intelligence and counter intelligence at all echelons for an organization.
- Performed multi-disciplined collection management and coordination of surveillance activities, and advised on the use and employment of intelligence resources at all echelons.
- Maintained and performed intelligence analysis in accordance with mission requirements resulting in sustained superior performance throughout required mission sets.
- Employed automated intelligence data processing systems and developed/facilitated intelligence training at all levels.