We provide IT Staff Augmentation Services!

Founder And Ceo Resume

3.00/5 (Submit Your Rating)

OBJECTIVE:

My objective and dream is to make a very large impact in organizations or companies in the realms of information technology and cybersecurity. Although I specialize in cybersecurity and business management as of late, I want to deliver a well - rounded but focused effort and success within positions and companies that can benefit from my non-paralleled set of problem solving, analytics, leadership, and communications skills.

SUMMARY:

  • Well-accomplished and referenced network architecture and information security background with strong communications and presentation skills in cybersecurity and impeccable troubleshooting skills.
  • Proven entrepreneur owning and running a successful managed security services company for over two years.
  • Built a strong cybersecurity presence and solutions portfolio by leading business development efforts with over seventy-two technology, channel, and strategic partners.
  • Has managed groups of multiple sizes with success and motivation for those who report to me.
  • Proven track record in dealing with mission critical business applications and 365/24/7 business requirements.
  • Highly tuned creativity in forming strategies for business-affecting improvements, compliance, and uptime requirements.
  • Red Hat Certified System Administrator
  • AlienVault certified Security Engineer
  • ITIL
  • Very sound business and operations management skills with a very well-versed mindset for fiscal responsibility

TECHNICAL SKILLS:

  • General routing and switching Cisco, Juniper, Force10, Foundry, and Extreme products (including Cisco Nexus and JunOS platforms)
  • Cisco, CheckPoint, Juniper, Fortinet, Sonicwall, Palo Alto, Confidential PF and IPFW firewall products
  • Check Point VSX and R75 SPLAT
  • Check Point Provider One
  • AlienVault USM
  • Barracuda Appliances
  • Imperva Appliances
  • Sophos NG Appliances
  • F-Secure Products
  • AlienVault USM
  • Splunk, LogRhythm, RSA, HP, andother SIEM technologies
  • Tipping Point, Top Layer, Ellacoya, Juniper,, Snort-based with ACID, Cisco ACNS and IDSM, and Blue Coat IPS/IDS and content filtering products
  • Aruba Networks and Cisco Networks wireless and mobility technologies
  • VMware virtualization products to include ESX Virtual Infrastructure 3.x and 4.x.
  • StillSecure SafeAccess, ForeScout, Cisco NAC (Clean Access), and Mirage NAC products. Obvious experience with Profiler to add various products and endpoints to the exceptions list.
  • RSA Authentication Manager 6.1 and EnVision (Network Intelligence) configuration and administration expertise
  • Riverbed, Cisco, and Juniper WAN optimizers
  • F5 FirePass, GTM, LTM, and SSL VPN product lines
  • RSA Identity Management and SSO systems
  • Cisco CSM and CSS, Citrix NetScaler, Array Networks, Extreme PX1,
  • Cisco Nexus switching platforms (2K, 5K, and 7K)
  • Cisco UCS Server Platforms
  • Dell EMC platforms
  • Veritas
  • Red Hat Linux
  • NetApp Appliances
  • Infrascale Products
  • Foundry ServerIron (now Brocade), and F5 BigIP SLB products
  • Confidential, OpenBSD, NetBSD, Windows workstation and server family, Mac OSX 10.1-10.4 with Darwin fink ports, Linux Red Hat/Fedora, Linux Mandrake, Knoppix, SUSE 8-9, and Solaris 8-10 operating system experience
  • MacPorts for Linux distributions to OS X Darwin
  • Log aggregation and event correlation using Tripwire, RSA, Intelligence, and OSP products
  • Squid proxy, Cisco WCCP, Websense, Surf Control, WebWasher, Microsoft Proxy Server 2.0 proxy and content filtering engines experience
  • MS SQL, OSP SQL, Postgres, and proprietary database expertise
  • Apache 2.0, IIS, and iPlanet web server experience
  • Perl, Python, TCL, Expec, and other scripting languages
  • Microsoft Office XP-2010, Apple Keynote, OpenOffice, and Open-source office and presentation suites
  • Thinkfree Office, Openoffice, ABIword, and NeoOffice

PROFESSIONAL EXPERIENCE:

Founder and CEO

Confidential

Responsibilities:

  • Responsible for business development and overall marketing of cloud-managed security services, disaster recovery/business continuity, cloud services, threat intelligence, and value-added resells.
  • Principal architect of all proprietary and industry-adopted solutions.
  • Worked with all facets of cybersecurity solutions including application, data, cloud, email, web application, network gateway, malware protection, threat intelligence, DLP, DDoS mitigation, and other security categories.
  • Implemented Cloud Services Subscription Program with partnership with Confidential .

Owner and Independent Consultant

Confidential

Responsibilities:

  • Large Cisco UCS virtual data center environment rollout with Nexus and integrated Juniper products
  • Extensive Vulnerability Assessment and Penetration Testing competencies
  • Compliance auditing and documentation for PCI, SOX, and ISO
  • Implemented Check Point, Cisco ASA, IPFW, Palo Alto, and Juniper firewalls for various large customers
  • Pre-and-Post-connect Network Access Control Implementation for point-of-sale terminals, government sites, and enterprises
  • Transitioned from Check Point R65 to Cisco ASA firewalls, Upgrade of routers, switches, and edge appliances at a major Boston-based data center for a 10,000 (plus) store rollout of large food services organization
  • Trainer for Cisco ASA administration Mentor for lower level engineers on perimeter security
  • Implementation of Palo Alto, Fortinet, and Sonicwall firewalls
  • Internal auditing with social engineering projectsmputing
  • SAIC monitoring support with Imperva WAF, Snort, Tripwire, and other tools
  • Security Information Even Management from RSA and HP
  • Data Loss Prevention
  • Linux administration
  • Turn-key IT operations augmentation and hand-off
  • Structured SEP and overhaul of existing security program incident response

Principal Consultant

Confidential

Responsibilities:

  • Responsible for post-sales SOW implementations, troubleshooting, design, and compliance reporting for sold accounts and projects.
  • Performed 90 percent travel across the U.S.
  • Mentor for lower level engineers on perimeter security and networking.
  • SIEM, SLB, IPS, firewall, VPN, wireless, endpoint security, and application acceleration expert.
  • Created standard Juniper SRX configurations for a large customer in Washington State (Redmond).
  • Project Manager for a large Palo Alto Networks UTM deployment.

President and CSO

Confidential

Responsibilities:

  • Wrote router, switch, and firewall configuration standards.
  • Responsible for the network security architecture design for Superior Access in Irvine California.
  • Implemented Check Point and Cisco firewalls for various customers.
  • Implemented RSA Envision for Tampa customers.
  • Designed and implemented Aruba Wireless implementation for a major hotel chain (Atlanta franchise)
  • Performed vulnerability assessments and external penetration testing for multiple customers.
  • Government contractor managing multiple sites and installing Network Access Control products
  • Supported a managed security services environment for Confidential with firewalls from all major vendors
  • Implemented Cisco ACS for Confidential and RADIUS administration for Confidential
  • Converted from Juniper SSG to multi-ASA environment for Confidential
  • Responsible for day-to-day operations of all the network security engineering team.
  • Representative of various vendor products to include RSA, RSA Envision, Checkpoint, Aruba Networks, Aladdin, McAfee, Imperva, VMware, eEye, Symantec, Surf Control, Websense, Barracuda, Ironmail, PGP, Forescout, and EMC.
  • Obtained Checkpoint and Aruba certifications.
  • Responsible for all RSA Envision engagements for log aggregation, analysis, and implementation with router, switch, firewall, Windows 2003 Server, Solaris (Carnival), and Linux system logs.
  • Worked closely with vendors such as Aruba, RSA, Forescout, and Checkpoint for product promotion and pre/post-sales efforts in the Florida region.
  • Managed all professional services effort to include scheduling, statements of work, implementation plans, customer readiness, and support.
  • Responsible for vulnerability assessments and penetration testing using NMAP, eEye, Nessus, NS Auditor, and other products.
  • Handled Tier 1-3 support calls.
  • Created new methods of evaluation software-based products via VMware virtual machines.
  • Built engineering labs for training and customer environment replication.
  • Began socialization of NAC marketing campaigns within the principle organization, to customers, and South Florida ISSA members
  • Responsible for implementation of NAC, vulnerability assessment, and IPS/IDS products. All products are completely Open-source using Postgres, SQL, Linux 2.6 kernel, and Python scripting languages.
  • Environment log analysis for vulnerability assessment and NAC products.
  • Pre-sales engineer for eastern and central regions.
  • Wrote documentation for implementation process.
  • Responsible for mobile lab presentations.
  • Performed various web and VMware demonstrations of NAC and other products.
  • Orchestrated pre-sales engineering model.
  • Completed training for pre-sales engineers.
  • Expert in most vendor NAC products.
  • Major proponent of virtualization for software appliance products and pushing features to engineering and development.

Sr. Manager

Confidential Network Security, Confidential, Atlanta, Georgia

Responsibilities:

  • Managed all information security design for firewall, IPS/IDS, VPN, and content filtering.
  • Drove the architecture of a new Confidential corporate security design and rezoning using Checkpoint, Juniper/Netscreen, and BSD open-source firewall components.
  • Member of the Confidential Operations Risk Council to evaluate security risks and best practices.
  • Personally completed compliance documents for SOX, PCI (formally CISP), and ISO177990 standards.
  • Implemented policy compliance standards for the Security Operations group.
  • Approved all firewall policy exceptions.
  • Launched successful Confidential Unlimited Voice security mitigation strategy for VOIP/SIP Session Border Controllers using Cisco packet filters,
  • Implemented training program for Confidential Operations Center personnel (NOC) for first and second level incident response.
  • Defined, authored, and implemented security operations polices for the management of security appliances.
  • Worked with industry leaders in firewall, VPN, content filtering, and IPS/IDS to evaluate and designate potential products for Confidential use.
  • Instituted new procedures for the audit of changes to firewalls, VPNs, and other security devices
  • Successfully completed the architecture strategies for Video and VOIP security for emerging Confidential strategies.
  • Worked my way from Senior Network Engineer to Director to improve network operations and secure the 200 plus web sites hosted by Confidential from malicious vulnerabilities.
  • Mitigated risk of Denial-of-Service by implementing Juniper IP services routers with extremely granular packet filters.
  • Designed an ironclad network and security architecture to support the 24/7/365 operation of plus 200 websites.
  • One of many liaisons for Confidential
  • Defined, authored, and implemented Internet security policy while also provisioning IDS and active response systems.
  • Spearheaded and designed several new streaming products to include Confidential Trackpass/Racecast and Pit-Command using custom Extreme Networks Streaming media Accelerator blades for 6800 series and Squid proxies.
  • Worked with Confidential DeltaCom to upgrade the backbone network infrastructure to Cisco GSR routers using optical circuits ranging from OC-3 to OC-48 connections.
  • Architected Confidential DeltaCom services infrastructure to support new data centers and secure hosted network offerings.
  • Hand-picked to head a European VSC 3000 (Voice-o-IP-o-ATM) team in Brussels, Belgium.
  • Renumbered the entire AS with a staff of 12.
  • Principle site contact for all Internet-based consultative services.
  • Pix firewall configuration, implementation, and support.
  • Trainer of Network Engineers in Internet filtering via ACLs and service modules for the Cisco 5500 and 120000 series.
  • Trained new Horizons customers as an independent contractor for Novell 4.11 and Windows NT 4.0 certifications
  • Traveled to U.S. cities to train Social Security staff on Windows-based applications.
  • Trained on Nortel, Cisco, and Shasta access technologies.
  • Worked with various customers on Novell and Windows NT operating environments.
  • Lead engineer on Nortel Networks/Teligent wireless DS1 deployment in various cities. Consisted of Nortel and Cisco equipment.
  • Trainer of various staff. Spearheaded Cisco network engineering training program after successful classes.
  • Became a Novell and Microsoft certification trainer within three months of the New Horizons hire.
  • Spearheaded a new certification process for aspiring network, systems, and communications engineers for New Horizons.
  • Began a move into network engineering after completion of Cisco, CNE, and MCSE training classes.

We'd love your feedback!