We provide IT Staff Augmentation Services!

Security Architect And Senior Manager - Contract Resume

2.00/5 (Submit Your Rating)

Chicago, IL

SUMMARY:

  • Experience in implementation, integration, and evolution of complex systems architecture
  • Expertise Identity and Access Management, including LDAP, Strong Authentication, Web Security Standards, and Federation.
  • Ability to analyze, evaluate new systems designs and create technical strategies
  • Ability to provide architectural design for a given system or systems
  • Critical thinking/strategic business decision - making abilities, strong problem-solving skills and effective communication skills
  • Solid project management skills, ability to multitask and work independently with a high level of energy and precision
  • Cross-functional team leadership skills, possessing good judgment with the ability to effectively work within a team setting as well as independently
  • Vendor management, evaluation, selection and price negotiation experience

TECHNICAL SKILLS:

  • Security Information Event Management (SIEM)
  • End Point Security
  • SOA Security framework
  • Technical Project Management
  • Microsoft Operations Framework, (SDLC)
  • Regulatory and Standards: HIPPA, Sarbanes-Oxley, (COBIT), ISO7799, PCI, FISMA
  • IDS/IPS
  • DLP
  • Information Security Policies and Procedures: Policies, Standards, Guidelines, Technical controls, workflows and procedures.
  • ITIL
  • Identity and Access Management systems
  • Federated Identity Management, Authentication, Authorization and Access Control: End-End Application Security, WS- Security, Enterprise Authentication and Authorization Web Services, Secure administration, RADIUS, SecureID, Single Sign-on (SSO), SAML
  • Access control and Access Governance
  • Active Directory /LDAP
  • Secure communications: IPsec, Encryption, SSH, SSL,TLS, Digital certificates and signatures

PROFESSIONAL EXPERIENCE:

Confidential

Principle Security Consultant

Responsibilities:
  • Working closely with the Enterprise Customers to provide strategic security plans, assessments and implementation for security controls.
  • Identify and architected cloud security solutions for IAAS and PAAS implementations.
  • Lead security assessments for Vulnerability and Penetration testing for Network and Applications.
  • Lead ISO 27001 gap analysis to improve overall security program and sec urity policies.
  • Lead Managed Security Service Delivery efforts and implementation.
  • Lead Security Architecture Implementations for infrastructure security.
  • Lead assessment to firewall management project and provided firewall remediation roadmap.
  • Set and drove short and long-term security strategy and advisor to CISO.’
  • Ensured appropriate cost methodologies are created and tracked against.
  • Managed teams (5-15) member on different project. This included hiring, conducting annual reviews and reassignments. Implemented Policies, Standards, Security Frameworks, Risk Assessment Frameworks in to Secure SDLC, and Refence Architectures.

Confidential

Enterprise Security Architect

Responsibilities:
  • Working closely with the Enterprise Architect, infrastructure, and the IT operations area in creating a holistic approach to developing and managing the company's security strategy.
  • While a technical position that drives the security architecture, security framework, and technical security roadmap, it governed by a business-driven mindset seeking to develop structured inter-relationships between technology and processes to support the long-term needs of the business.
  • Deliverables include clear communication of strategy, project management, and on-going assessment for initiatives across the enterprise, as well as leadership in security incident response and remediation activities.

Confidential,IL.

Sr. Security Architect

Responsibilities:
  • Lead technical role, providing expertise and guidance to groups across the enterprise in the design and support of architecture and infrastructure solutions for business applications.
  • Facilitated and review the definition and implementation of standards, methodologies, and best practices that guide the design of technology solutions including architecting and implementing solutions requiring integration of multiple platforms, operating systems, and applications across the enterprise.
  • Oversee and participates in the design, implementation, administration, and support of systems architecture and infrastructure products and services to ensure security, availability, reliability, and scalability for the applications services and users of the environments, including development test, UAT, and production.
  • Maintains knowledge of industry trends and new technologies for potential application within the enterprise.
  • Performs research, analysis, and formulates recommendations regarding technologies, products, and solutions to fulfill requirements within the enterprise. Communicates with vendors and service providers to gain a clear understanding of product or service capabilities and costs. Identifies potential risks, analyzes costs vs. benefits, and potential impact on operations associated with new technologies, products, and services.
  • Analyzes and estimates feasibility, costs, time, and work effort needed to design and implement complex technical solutions.
  • Lead complex security projects and created Reference Architectures for Secure Data Center, XML Security Gateways design, Oracle Entitlement Management and Oracle Identity and Access Manager Implementation for web services and portal applications.

Confidential,Chicago, IL

Security Architect and Senior Manager - Contract

Responsibilities:
  • Designed and implementation of a 24x7 Global Security Operations Center from conception to sustainment.
  • Created standard operating policy and procedures for the Security Operations Center using ISO 20001 and ITIL practices.
  • Architected, designed and implemented the security technology and capabilities for the SOC including firewall, IDS, DLP, Threat Management, Antivirus, Config Management, Asset Management and Network Monitoring.
  • Responsible for analyzing and/or administering security controls for information systems.
  • Safeguard the network against unauthorized infiltration, modification, destruction or disclosure.
  • Provide incident response, analysis and reporting per policies and procedures.
  • Reviewed, assess and document vulnerabilities to improve the security posture of information systems.

Confidential,Chicago, IL

Senior Technology Architect

Responsibilities:
  • Engage with Operations, IT Management, Security, Procurement, to develop enterprise strategies based on defined drivers from key business stakeholders, influencing the development of roadmaps for IT Infrastructure and Security-based deliverables.
  • Translate business requirements into technology strategy and implementation for the firm’s network infrastructure. Influence senior level management and key stakeholders.
  • Performed comprehensive gap analyses to identify/resolve discrepancies leveraging Federal Enterprise Architecture (FEA), SABSA and Zachman frameworks and create future roadmaps for enterprise IT technologies.
  • Selected to SWAT team to overhaul corporate approach to network design and system security, preparing foundation for solutions such as Enterprise Service Bus (ESB) and Network Redesign.
  • Lead Security Architecture Teams to establish Technical Reference Models for Security Domain and develop an enterprise security roadmap, and defining standards, and polices.
  • Developed formal best practices for architecting security solutions using a top down approach to ensure security deliverables met business goals.
  • Develop, coordinate, and direct the implementation of standardized enterprise-wide Infrastructure and Security-based strategies and processes throughout the firm.
  • Lead other assigned infrastructure projects such as AAA, SEM, Encryption, End Point Security, Audit Trail, Network Redesign, Second Data Center security, Secure File Managed Transfer, Datapower, ESB Security, and other projects as requested.

Confidential,Chicago, IL

Microsoft Operation Manage

Responsibilities:

  • Obtained account from Microsoft to implement Microsoft Operation Manager for Confidential .
  • Performed testing and proof of concept.
  • Serviced as an escalation point for implementation.

Confidential,Redmond,WA

Sr. Network Security Engineer

Responsibilities:
  • Implemented and managed Confidential ’s internal IT Global Mobility services in 63 countries. Directed and managed the budget and operations of the firm’s data and voice communications networks. Created metrics to validate enterprise-wide CISCO; Windows Servers; Radius infrastructure; PKI and other wired and wireless transports infrastructure business operational reliability; continuity Improvement; Customer satisfaction and reliability of system.
  • Managed the Global Implementation of smart card (PKI), secure remote, radius, 802.11, SIM infrastructure.
  • Executed service plans and strategies to meet client business and service requirements by providing overall technical analysis, including accurate technical results from technical recommendations, and resolutions.
  • Defined and created Metrics utilized to Investigate root causes of service issues and to drive systematic improvements.
  • Developed and tested business continuance and disaster recovery plans.
  • Collaborated with Engineering and Product Development identifying technical requirements and to drive new product design including Radius for authentication, account authorization, established policies and use of wired and wireless communication equipment.
  • Coordinated replacement of corporate dial-in and Internet connections with virtual private networks.
  • Responded to escalations from executive management and stakeholders within company and responded to operational network issues.
  • Served as primary “POC” for instituting ITIL approach including change control, release Mgt and operational Service Mgt.

Confidential,Mount Prospect, IL

Sr. System Engineering

Responsibilities:
  • Drove beta, implementation, testing and support for Confidential on Total Control 1000 CDMA IWF technology for NSPs and ISPs.
  • Installed, tested and supported the IWF for Lucent or Motorola’s base stations that will connect directly via a new radio port (RP) interface to a packet data-serving node (PDSN); Configured and supported (AAA) servers for user authentication and traffic management, then forwards traffic to a gateway router/home agent (GRHA) at the designated IP network.
  • Worked closely and consults with the development and test teams, during both pre-release product cycles and post-launch operations to ensure the highest quality service by providing bit level problem-solving solutions to Confidential ’s Research and Development team for issues related to bugs and fixes.

We'd love your feedback!