Founder And Ceo Resume
OBJECTIVE:
My objective and dream is to make a very large impact in organizations or companies in the realms of information technology and cybersecurity. Although I specialize in cybersecurity and business management as of late, I want to deliver a well - rounded but focused effort and success within positions and companies that can benefit from my non-paralleled set of problem solving, analytics, leadership, and communications skills.
SUMMARY:
- Well-accomplished and referenced network architecture and information security background with strong communications and presentation skills in cybersecurity and impeccable troubleshooting skills.
- Proven entrepreneur owning and running a successful managed security services company for over two years.
- Built a strong cybersecurity presence and solutions portfolio by leading business development efforts with over seventy-two technology, channel, and strategic partners.
- Has managed groups of multiple sizes with success and motivation for those who report to me.
- Proven track record in dealing with mission critical business applications and 365/24/7 business requirements.
- Highly tuned creativity in forming strategies for business-affecting improvements, compliance, and uptime requirements.
- Red Hat Certified System Administrator
- AlienVault certified Security Engineer
- ITIL
- Very sound business and operations management skills with a very well-versed mindset for fiscal responsibility
TECHNICAL SKILLS:
- General routing and switching Cisco, Juniper, Force10, Foundry, and Extreme products (including Cisco Nexus and JunOS platforms)
- Cisco, CheckPoint, Juniper, Fortinet, Sonicwall, Palo Alto, Confidential PF and IPFW firewall products
- Check Point VSX and R75 SPLAT
- Check Point Provider One
- AlienVault USM
- Barracuda Appliances
- Imperva Appliances
- Sophos NG Appliances
- F-Secure Products
- AlienVault USM
- Splunk, LogRhythm, RSA, HP, andother SIEM technologies
- Tipping Point, Top Layer, Ellacoya, Juniper,, Snort-based with ACID, Cisco ACNS and IDSM, and Blue Coat IPS/IDS and content filtering products
- Aruba Networks and Cisco Networks wireless and mobility technologies
- VMware virtualization products to include ESX Virtual Infrastructure 3.x and 4.x.
- StillSecure SafeAccess, ForeScout, Cisco NAC (Clean Access), and Mirage NAC products. Obvious experience with Profiler to add various products and endpoints to the exceptions list.
- RSA Authentication Manager 6.1 and EnVision (Network Intelligence) configuration and administration expertise
- Riverbed, Cisco, and Juniper WAN optimizers
- F5 FirePass, GTM, LTM, and SSL VPN product lines
- RSA Identity Management and SSO systems
- Cisco CSM and CSS, Citrix NetScaler, Array Networks, Extreme PX1,
- Cisco Nexus switching platforms (2K, 5K, and 7K)
- Cisco UCS Server Platforms
- Dell EMC platforms
- Veritas
- Red Hat Linux
- NetApp Appliances
- Infrascale Products
- Foundry ServerIron (now Brocade), and F5 BigIP SLB products
- Confidential, OpenBSD, NetBSD, Windows workstation and server family, Mac OSX 10.1-10.4 with Darwin fink ports, Linux Red Hat/Fedora, Linux Mandrake, Knoppix, SUSE 8-9, and Solaris 8-10 operating system experience
- MacPorts for Linux distributions to OS X Darwin
- Log aggregation and event correlation using Tripwire, RSA, Intelligence, and OSP products
- Squid proxy, Cisco WCCP, Websense, Surf Control, WebWasher, Microsoft Proxy Server 2.0 proxy and content filtering engines experience
- MS SQL, OSP SQL, Postgres, and proprietary database expertise
- Apache 2.0, IIS, and iPlanet web server experience
- Perl, Python, TCL, Expec, and other scripting languages
- Microsoft Office XP-2010, Apple Keynote, OpenOffice, and Open-source office and presentation suites
- Thinkfree Office, Openoffice, ABIword, and NeoOffice
PROFESSIONAL EXPERIENCE:
Founder and CEO
Confidential
Responsibilities:
- Responsible for business development and overall marketing of cloud-managed security services, disaster recovery/business continuity, cloud services, threat intelligence, and value-added resells.
- Principal architect of all proprietary and industry-adopted solutions.
- Worked with all facets of cybersecurity solutions including application, data, cloud, email, web application, network gateway, malware protection, threat intelligence, DLP, DDoS mitigation, and other security categories.
- Implemented Cloud Services Subscription Program with partnership with Confidential .
Owner and Independent Consultant
Confidential
Responsibilities:
- Large Cisco UCS virtual data center environment rollout with Nexus and integrated Juniper products
- Extensive Vulnerability Assessment and Penetration Testing competencies
- Compliance auditing and documentation for PCI, SOX, and ISO
- Implemented Check Point, Cisco ASA, IPFW, Palo Alto, and Juniper firewalls for various large customers
- Pre-and-Post-connect Network Access Control Implementation for point-of-sale terminals, government sites, and enterprises
- Transitioned from Check Point R65 to Cisco ASA firewalls, Upgrade of routers, switches, and edge appliances at a major Boston-based data center for a 10,000 (plus) store rollout of large food services organization
- Trainer for Cisco ASA administration Mentor for lower level engineers on perimeter security
- Implementation of Palo Alto, Fortinet, and Sonicwall firewalls
- Internal auditing with social engineering projectsmputing
- SAIC monitoring support with Imperva WAF, Snort, Tripwire, and other tools
- Security Information Even Management from RSA and HP
- Data Loss Prevention
- Linux administration
- Turn-key IT operations augmentation and hand-off
- Structured SEP and overhaul of existing security program incident response
Principal Consultant
Confidential
Responsibilities:
- Responsible for post-sales SOW implementations, troubleshooting, design, and compliance reporting for sold accounts and projects.
- Performed 90 percent travel across the U.S.
- Mentor for lower level engineers on perimeter security and networking.
- SIEM, SLB, IPS, firewall, VPN, wireless, endpoint security, and application acceleration expert.
- Created standard Juniper SRX configurations for a large customer in Washington State (Redmond).
- Project Manager for a large Palo Alto Networks UTM deployment.
President and CSO
Confidential
Responsibilities:
- Wrote router, switch, and firewall configuration standards.
- Responsible for the network security architecture design for Superior Access in Irvine California.
- Implemented Check Point and Cisco firewalls for various customers.
- Implemented RSA Envision for Tampa customers.
- Designed and implemented Aruba Wireless implementation for a major hotel chain (Atlanta franchise)
- Performed vulnerability assessments and external penetration testing for multiple customers.
- Government contractor managing multiple sites and installing Network Access Control products
- Supported a managed security services environment for Confidential with firewalls from all major vendors
- Implemented Cisco ACS for Confidential and RADIUS administration for Confidential
- Converted from Juniper SSG to multi-ASA environment for Confidential
- Responsible for day-to-day operations of all the network security engineering team.
- Representative of various vendor products to include RSA, RSA Envision, Checkpoint, Aruba Networks, Aladdin, McAfee, Imperva, VMware, eEye, Symantec, Surf Control, Websense, Barracuda, Ironmail, PGP, Forescout, and EMC.
- Obtained Checkpoint and Aruba certifications.
- Responsible for all RSA Envision engagements for log aggregation, analysis, and implementation with router, switch, firewall, Windows 2003 Server, Solaris (Carnival), and Linux system logs.
- Worked closely with vendors such as Aruba, RSA, Forescout, and Checkpoint for product promotion and pre/post-sales efforts in the Florida region.
- Managed all professional services effort to include scheduling, statements of work, implementation plans, customer readiness, and support.
- Responsible for vulnerability assessments and penetration testing using NMAP, eEye, Nessus, NS Auditor, and other products.
- Handled Tier 1-3 support calls.
- Created new methods of evaluation software-based products via VMware virtual machines.
- Built engineering labs for training and customer environment replication.
- Began socialization of NAC marketing campaigns within the principle organization, to customers, and South Florida ISSA members
- Responsible for implementation of NAC, vulnerability assessment, and IPS/IDS products. All products are completely Open-source using Postgres, SQL, Linux 2.6 kernel, and Python scripting languages.
- Environment log analysis for vulnerability assessment and NAC products.
- Pre-sales engineer for eastern and central regions.
- Wrote documentation for implementation process.
- Responsible for mobile lab presentations.
- Performed various web and VMware demonstrations of NAC and other products.
- Orchestrated pre-sales engineering model.
- Completed training for pre-sales engineers.
- Expert in most vendor NAC products.
- Major proponent of virtualization for software appliance products and pushing features to engineering and development.
Sr. Manager
Confidential Network Security, Confidential, Atlanta, Georgia
Responsibilities:
- Managed all information security design for firewall, IPS/IDS, VPN, and content filtering.
- Drove the architecture of a new Confidential corporate security design and rezoning using Checkpoint, Juniper/Netscreen, and BSD open-source firewall components.
- Member of the Confidential Operations Risk Council to evaluate security risks and best practices.
- Personally completed compliance documents for SOX, PCI (formally CISP), and ISO177990 standards.
- Implemented policy compliance standards for the Security Operations group.
- Approved all firewall policy exceptions.
- Launched successful Confidential Unlimited Voice security mitigation strategy for VOIP/SIP Session Border Controllers using Cisco packet filters,
- Implemented training program for Confidential Operations Center personnel (NOC) for first and second level incident response.
- Defined, authored, and implemented security operations polices for the management of security appliances.
- Worked with industry leaders in firewall, VPN, content filtering, and IPS/IDS to evaluate and designate potential products for Confidential use.
- Instituted new procedures for the audit of changes to firewalls, VPNs, and other security devices
- Successfully completed the architecture strategies for Video and VOIP security for emerging Confidential strategies.
- Worked my way from Senior Network Engineer to Director to improve network operations and secure the 200 plus web sites hosted by Confidential from malicious vulnerabilities.
- Mitigated risk of Denial-of-Service by implementing Juniper IP services routers with extremely granular packet filters.
- Designed an ironclad network and security architecture to support the 24/7/365 operation of plus 200 websites.
- One of many liaisons for Confidential
- Defined, authored, and implemented Internet security policy while also provisioning IDS and active response systems.
- Spearheaded and designed several new streaming products to include Confidential Trackpass/Racecast and Pit-Command using custom Extreme Networks Streaming media Accelerator blades for 6800 series and Squid proxies.
- Worked with Confidential DeltaCom to upgrade the backbone network infrastructure to Cisco GSR routers using optical circuits ranging from OC-3 to OC-48 connections.
- Architected Confidential DeltaCom services infrastructure to support new data centers and secure hosted network offerings.
- Hand-picked to head a European VSC 3000 (Voice-o-IP-o-ATM) team in Brussels, Belgium.
- Renumbered the entire AS with a staff of 12.
- Principle site contact for all Internet-based consultative services.
- Pix firewall configuration, implementation, and support.
- Trainer of Network Engineers in Internet filtering via ACLs and service modules for the Cisco 5500 and 120000 series.
- Trained new Horizons customers as an independent contractor for Novell 4.11 and Windows NT 4.0 certifications
- Traveled to U.S. cities to train Social Security staff on Windows-based applications.
- Trained on Nortel, Cisco, and Shasta access technologies.
- Worked with various customers on Novell and Windows NT operating environments.
- Lead engineer on Nortel Networks/Teligent wireless DS1 deployment in various cities. Consisted of Nortel and Cisco equipment.
- Trainer of various staff. Spearheaded Cisco network engineering training program after successful classes.
- Became a Novell and Microsoft certification trainer within three months of the New Horizons hire.
- Spearheaded a new certification process for aspiring network, systems, and communications engineers for New Horizons.
- Began a move into network engineering after completion of Cisco, CNE, and MCSE training classes.
