Sr. Rsa Archer Systems Developer Resume
4.00/5 (Submit Your Rating)
SUMMARY:
- To obtain a leadership position where I can apply my comprehensive IT Industry and business knowledge to assist client companies achieve an optimized safeguarded, and compliant enterprise. Specializing in Enterprise Resiliency and Corporate Certification, I have/am:
- Certified in CERT - RMM from CMU-SEI and member of a CISO Development team for a $72B enterprise.
- A certified RSA Archer advanced administer from RSA and a Certified Business Continuity Professional from Confidential ;
- A member of the team developing a Continuous Diagnostic and Mitigation Dashboard (CDM) System for the Confidential to uncover cybercrimes and technology threats for the entire government enterprise in near real-time, rate incidents in accordance to Risk Impact Threat so that Worse Case problems can be addressed first by all government departments and agencies;
- Adhered to OMB, FISMA, Confidential, FIPS, FICAM, FedRAMP, FFIEC, OSHA, ISO 27001, ISO 22301 and other standards;
- Performed Cyber and Technology Risk Audits like Cyber Security, IT Security, and Risk Management;
- A certified course developer and instructor at Confidential (BCP - IT/DR course with Virtual and Cloud Technologies for Active / Active Recovery Management, BIA’s, Risk Evaluations, and Integrating Recovery Operations and Entitlements);
- Board Member for the Association of Contingency Planners, NYC Metro Chapter;
- Developed Computer Risk Management department for MHT, created Security Pacific Risk Asset Management (SPRAM), and Total Risk Management (TRM) company to provide Risk Management Services to the industry;
- Performed CERT-RMM and COSO analysis for client companies to insure all Risk Exposures are identified, rated, and reported to management. Corrected Risks that management selected as important to mitigate, while seeking insurance to cover other Risks management deemed less important to resolve at that point;
- Implemented Business Continuity and Risk Management for enterprises of all sizes;
- Completed Enterprise Resiliency and Corporate Certification projects for major enterprises;
- Performed System and Security Architecture reviews using COSO, CERT RMM, COBIT, TOGAF, and ITIL v3 for clients.
- Performed the duties of PMO and Project Manager for large complex projects;
- Implemented, upgraded, and discontinued data centers of all sizes;
- Expert with SDLC’s including Waterfall, Agile, and Scrum. Utilized MS Project for phases, tasks, resources, and costs;
- Updated and modernized the NYSE and AMEX trading floors and trader equipment, Edgars, and post display system,
- Developed a world-wide IT organization for a major manufacturer that migrated applications and services in-housed from outsourced vendors, Inventoried Assets, assigned to Production Site, Equipped the new sites and ran applications in parallel to validate their operation, discontinued vendor sites and their contracts. Converting the organization to a virtual environment, and provided application recovery certification resulting in large savings in cost, 100% Leeds certified environment, compliance, and improved efficiency;
- Submitted the winning bid and implemented the tenant and vehicle security system for the new World Trade Center;
- Designed a worldwide trading system like Alibaba based on a Barter System to exchange foreign currencies;
- Designed an Electronic Voting System based on “One Person - One Vote” and capable of detecting Voter Fraud and Corruption as it occurred. Utilized Bio-Metric ID Card to verify identity and validate person has not voted more than once per election and used Blockchain technology to eliminate data tampering. System also supports Absentee paper ballots as well as electronic voting (both locally and remotely).
PROFESSIONAL EXPERIENCE:
Confidential
Sr. RSA Archer Systems DeveloperResponsibilities:
- Member of CISO Development Team specializing in Cyber Crime and technology Threat Response Plans.
- CISO structure was based on RMM V1.1 to establish business processes and reporting metrics.
- Established the Service Continuity Functional Recovery Plan template for High Value Services and assisted HVS groups develop their recovery plans.
- Created repository for Recovery Plans, Training Materials, and Industry documents for general use.
- Consulted with management and staff on how best to achieve Enterprise Resilience and Corporate Certification. Provided training and leadership to staff.
Confidential
Sr. RSA Archer Systems Developer
Responsibilities:
- Member of the RSA Archer Development team responsible for developing and implementing a Continuous Diagnostic and Mitigation (CDM) Dashboard System capable of detecting and resolving cybercrimes and technology threats throughout the entire government enterprise in near real-time (RSA Components include FEM, CM, A&A, and GRC).
- Created Agency and Federal Dashboards where Agencies would provide the Federal Level with encountered problems as a summary report. After performing a Risk Assessment, the Federal Level would provide detail reports back, listing worse case problems first and directing government locations to address largest impact problems first, then others.
- Project included three phases:
- End-Point Protection,
- Role Based Access Controls (RBAC) and PIV (Personal Identification Verification) cards to support Entitlements, and
- Behavior and Automation to implement AI responses that would automatically repair / circumvent encountered cybercrimes, technology threats, and improper access to physical and logical resources, in real-time.
- Performed Data Feeds, Risk Formula Construction, Standard Operating Views, iViews, Dashboards, and tailoring to meet Requirements Definitions from DHS.
- Utilized Agile Scrum approach to implementing continuous improvements through release management.
- Produced product technical manuals and training materials (including videos)
- Accepted Requirement Definitions, grouped them into Functions, and used Agile to produce continuous production ready releases
- Conducted product testing for end-User Acceptance
- Served as Level Three product support
- Produced training presentations (PowerPoint, Word, Excel) that served as product orientation and usage guidance
Confidential
Course Developer / Instructor
Responsibilities:
- Overview of evolution to Virtual Technology, both hardware and software,
- Provided training on performing Risk Assessment via COSO and CERT RMM,
- Converting business requirements to IT Applications and Services via COBIT and TOGAF.
- Introduction to COSO, CERT RMM, COBIT, TOGAF, CMMI, and ITIL v3 to understand Best Practices.
- How to convert physical equipment into virtual systems,
- The full range of virtual technologies available and how to utilize them to optimize business and recovery,
- Hypervisors and how to avoid “Lock-In”,
- Steps involved in creating a virtual environment and how to integrate recovery operations,
- Load Balancing and Error Handling to optimize operations and recognize errors that are automatically responded to,
- How to achieve a “High Availability” or “Continuous Available” environment, and
- Created Confidential course on BCP IT/DR and became a Certified Instructor for Confidential on three courses.
Confidential
Subject Matter Expert
Responsibilities:
- Inventoried existing equipment, and transitioned resources to designated data center.
- Transformed equipment, or replaced equipment, with virtualization and transitioned the equipment to their designated regional production site.
- Performed a full Risk Assessment (COSO and CERT RMM) to insure all Risk Exposures were identified and resolved.
- Reviewed and updated Business Requirement conversions to IT Applications and Services in compliance to COBIT, TOGAF, CMMI so that GRC compliance could be easily met in a continuous manner.
- Developed a Recovery Certification process for IT Applications and Services, and Business Locations included in transition.
- Defined business location recovery practices and exercised plans to eliminate problem areas.
- Developed Statement of Work relating to Enterprise Resiliency and Corporate Certification.
- Created a DR Recovery Planning Guide and DR Exercise Booklets for use in Recovery Certification.
- Trained company staff and management on Recovery Planning, Business Continuity, and Disaster Recovery, along with Best Practices and industry standards for compliance and optimizing operations.
- Coordinated the fulfillment of Recovery Certification based on RTO / RPO objectives and criticality.
- At the end of this project:
- All Services and Applications were Recovery Certified as to the group, or Tier, they are associated with (Continuous Availability or Active-Active utilizing a Flip / Flop approach, High Availability utilizing a Failover / Failback approach, or Best Effort.
- Adhered to all Laws and Regulations of countries where conducting business.
- Integrated Audit and Security Controls within the SDLC and Change Management Cycle.
- Integrated Version and Release Management principles, Library Management, Vital Records Management, and Access Controls throughout the process.
- Implemented Management Dashboard Documentation & Control System governing; Infrastructure, Systems Development Life Cycle (SDLC), Recovery Management, and Compliance Management within a Repository).
Confidential, Delaware
Project Manager
Responsibilities:
- Consulting position as a Project Manager for the High Availability / Disaster Recovery (HA/DR) project at Confidential, responsible for creating a Confidential that led to funding for the HA/DR Project.
- Completed implementation of HA/DR procedures and validated their acceptable operation.
- Trained bank staff and turned process over to them.
Confidential
Disaster Recovery Process Lead
Responsibilities:
- In this position, I was responsible for establishing a line of business to create automated Disaster Recovery and Business Continuity plans for existing clients and prospects using the company’s line of products and services.
- Created a job stream that was responsible for recovering data files, applications, and services in a desired sequence.
- When completed site was recovered to new destination successfully.
- The company went forward selling this process as a new service offering.
Confidential
Business Continuity Analyst
Responsibilities:
- Locating the latest Business Continuity Plan for each of over 160 locations world-wide;
- Develop a Baseline to judge the current plans ability to support Recovery Operations;
- Agree upon Gaps and Exception guidelines and resolutions;
- Develop LDRPS Plan format / content in association with the end-user; convert old recovery plans to LDRPS; publish LDRPS Plans, obtain review and approval of LDRPS Plans; and
- Defined and delivered documentation and training to end-users on recovery planning and the LDRPS product.
Confidential
Engagement Manager
Responsibilities:
- As an employee, I was responsible for performing cyber security reviews through IT Audits, IT Sarbanes Oxley Surveys, IT Risk Assessments using COSO and CERT RMM, Business Continuity Planning, IT Security, overseeing Basel II and SSAE Supply Chain audits, and many other functions devoted to selling and closing client contracts for Technology Risk Management services.
- Directed personnel assigned to Technology Risk Management tasks and performed Project Management over concurrent activities assigned to my staff (adhere to Confidential and Confidential standards)