We provide IT Staff Augmentation Services!

Information Security Advisor/global Security Program Manager Resume

3.00/5 (Submit Your Rating)

SUMMARY:

  • Certified IT Executive, Program Manager, Enterprise Architect and Master Instructor with over 24 years of experience in project & risk design, deployment, management, & training. Expert in advanced IT infrastructure design & deployment, IT security, risks, governance and compliance. He is proficient in developing and evaluating test plans, controls, specifications and procedures for enterprise projects to ensure coverage of risk mitigation and compliance requirements. Has exceptional aptitude for inventing, grasping and applying new concepts to increase productivity. Strong customer services skills. Also, he has demonstrated leadership abilities. Excellent track record for creating more efficient teams, improving accountability and reducing cost.
  • Security Architecture Strategy - Developed strategic vision of deploying security controls for organizational governance, physical, secure network (enterprise PKI, IPS/IDS), secure host, and secure application (OWASP) technologies. Designed and deployed BCP, DR, COOP, and Has to ensure maximum system uptime.
  • Auditing & Assessment - As Project Manager, Executive Architect and/or SME, wrote security plans & managed remediation projects for protection of trade secrets/intellectual property. Created security technology roadmaps.
  • Governance, Risk & Compliance - Instituted policies and procedures to ensure compliance with PCI, Basel, CMMI, CoBIT, DFAR, DITSCAP (predecessor of DIACAP), FEMA 426, FEMA 428, FIPS, FISMA, FFIEC, GIG, GLBA, GISRA, HIPAA, HITRUST, ITIL, ISO 27000, NIST, PMI, SAS-70, SSAE-16, SOX, WCO, and other IT audit requirements.
  • Project Management - Delivered projects on-time and within budget by defining & implementing a comprehensive set of changes that result in improvements to human performance, business process and technology to an organization.
  • Risk Management - Directed the planning business process around security controls to mitigate the risk to critical functions, intellectual property loss, security breaches and business disasters.
  • Translates project requirements into detailed designs to be implemented while balancing needs for immediate action and the point of arrival (POA) vision. Performed gap analysis for several business applications within multiple enterprise organizations to ensure present and future needs from a technical standpoint would be accounted.
  • Lead matrixed teams of project managers, architects, system engineers, developers and technologists to successfully deliver change in a large-scale enterprise environment.
  • Gathered requirements, user profiles, and solution concepts for crafting functional specifications which included the conceptual logical & physical design. Created technology roadmaps. Manage project risks and issue.ture
  • Acted as Enterprise Architect for over 1000+ Request For Service (RFS) projects for successful deployment and customer satisfaction.
  • Aided in project design, deployment and maintenance of web distributed applications and database systems for multiple business units within American Express, Confidential, Confidential (BCBSMD & DC), Confidential, Confidential, US Dept of Defense, etc., and other Fortune 500 companies and enterprise organizations. This includes integration of complex heterogeneous systems. Aided in designing the technology blueprints and roadmaps for these business applications.
  • Perform capacity planning which included LAN, WAN, site links, load analysis, application sizing planning, caching tiers, content management systems, page tracking tags, etc. for technical architecture review on the full SDLC life-cycle. Utilized web server and client-side interaction including HTTP, cookies, AJAX/JSON, JavaScript, PCI-DSS, session management, redirects, Java, IIS, Weblogic, Websphere, domain-federation and cross domain technologies, for internet/consumer-facing, e-commerce website technologies.
  • Concurrently manage the infrastructure build-out on multiple corporate change initiatives. Provide leadership in steering projects toward defined standard platform solutions and best practices. Produced technical and project artifacts for business growth.
  • Aided in lowering TCO through standardizing, consolidation, optimization, and virtualization of hardware & software solutions. Immediate corporate ROI increased were seen.

TECHNICAL SKILLS:

Business Architecture: Business Requirements & Rules, Organization Structure, Mission/Vision, Business Process Design & Modeling

Data Architecture: Data Integration & Architecture, Enterprise Application Integration Components, Process Alignment Information/Data, Enterprise Reporting, Content Management & Business Intelligence, Data Modeling & Quality Management

Application Integration: Enterprise Application Integration Components, Process Alignment, SOA (including abstraction, reusability, autonomy, statelessness & composability)

Technical/Infrastructure: Server, Database, Networks, Security, Storage, Telecom, Desktop, Middleware, Other hardware

PROFESSIONAL EXPERIENCE:

Confidential

Information Security Advisor/Global Security Program Manager

  • Acted as portfolio, program, and project manager for multiple business enterprise initiatives for Confidential customers. These initiatives include, but are limited to project workstreams concerning IT infrastructure, applications, mobile, network hardware devices and appliances (routers, switchers, load balancers, firewalls, IDS, etc), application, virtualization, call center, IP telephony, end-user desktop deployment, data center migration/upgrades/consolidations (on & off-premise), cloud computing, multi-tier storage & SAN, and physical & facilities infrastructures.
  • Aided in portfolio account management greater than $100 million dollars (conservative number - per NDA cannot give exact dollar amounts).
  • Managed project teams greater than 1000 resources on a global scale (ranging six continents).
  • Utilized Project and Portfolio Management (PPM) tools such as Confidential Project, JIRA, Planview, Daptiv, Confidential PPM (Rational, Tivoli, etc.), HP PPM, etc.
  • Acted as lead project manager for SAP ERP deployments workstreams. Managed several SAP project deployments concurrently with both small and large teams. Have detailed knowledge of SAP Business One component deployments including Depot Service, Field Service, Repair Service, Repair Process, Contracts, MDM, etc.
  • Performed large ERP deployments and upgrades with Oracle ERP, JD Edwards, PeopleSoft, SAP, Salesforce, etc. This included end to end program activities from conceptual planning to post deployment. Aided in the architecture and deployment advanced IT infrastructure solutions for Confidential customers. Performed upgrades and migrations of complexed customized multi-tiered server, database and application systems. Oversaw large application development, complex projects that have interactions with several groups/channels and have extensive experience in cross-matrix projects. Performed IT operations management which included, but limited to, server & network system design, deployments, upgrades, migrations, decommissions, patches, etc. Built strong project teams and keep them motivated under extreme project constraints.
  • Acted as lead program manager for system, application and data integration of complex multi-tiered enterprise. Perform capacity planning which included LAN, WAN, site links, load analysis, application sizing planning, caching tiers, content management systems, page tracking tags, etc. for technical architecture review on the full SDLC life-cycle. Utilized web server and client-side interaction including HTTP, cookies, AJAX/JSON, JavaScript, PCI-DSS, session management, redirects, Java, IIS, EDI, Weblogic, Websphere, domain-federation and cross domain technologies, for internet/consumer-facing, e-commerce website technologies.
  • Acted as a lead project manager and assisted in deployment of big data warehouse COTS including, but not limited to, Confidential Netezza, EMC Hadoop, SQL Server, Oracle, etc. Implemented big data solutions for on-premises, off-premise, hybrid cloud, etc., operations. Aided in the design and architecture of big data solutions that extract personalization data to help tailor content and messages to customers on one to one, one to many, and many to many scale data.. Provides big data solutions throughout the SDLC lifecycle. Designed and deployed COTS and customized CRM solutions that utilize big data and business intelligence solutions including Hyperion, Cognos, Microstrategy, Oracle., etc. for enterprise companies within the Banking/Finance, Education, Energy, Federal Government, Healthcare/Insurance, IT Consulting, Telecommunications industries.
  • Performed security assessment and lead remediation efforts to implement information security best practices for enterprise critical and supporting systems for per ISO 27002:2013. This includes deploying application, platform, system and physical security measures and controls; implemented risk management, incident, and communication plans for critical web, application, database, host server & network systems for business and technical stakeholders; aided in redundancy (server, VM and network infrastructure high availability) and contingency planning (via DR, COOP & BCP plans). Conducted technology impact assessments (TIA) and enterprise security roadmaps. Created security plans, policies and procedures for enterprise customers.
  • Provided communication planning, multi-tasking & analysis for successful project delivery. Provided planning and cost controlling support for all projects which includes variation reporting, monitoring of milestone progress to the preparation of monthly project spend estimates. Manage project activity scheduling and monitoring
  • Ensured effective project implementation and utilize productive reports from the creation of WBS with the use of project management system to monitor the status of all purchases, invoicing and delivery up to the closure of the project. Prepare monthly spend estimates compiled from department forecasts which align with General Accepted Accounting Practices (GAAP). Performed project costing related reporting to the team and management’s review on a monthly basis to ensure that expenditures are kept within the project budget. Provided cost control and planning advice to the internal project management team (and external program independent validators) as and when required.
  • Lead matrixed teams of architects, project managers, system engineers, developers and technologists to successfully deliver significant change in a large-scale globalized enterprise environment. This includes crafting RACI for governance initiatives, hosting status meetings, setting agendas, and providing meeting minutes, perform process discovery and documentation, issue resolution and problem solving; plan, forecast, allocate resources, and conduct performance measurement and scheduling, while integrating the results into ongoing operations. Produced and updated detailed project plans (As Confidential Certified Trainer, have expert skill in MS Project, MS Word, MS Excel, etc.).
  • Aided in the design and development of security management program for several organizations. Worked in collaboration with several vendors and subcontractors in defining, establishing, monitoring, and optimizing security and service quality and service levels of services agreed by the customer. Oversaw projects and teams in deployment of security and service level management programs (this includes defining capacity, availability, business continuity, change, problem, incident, access & identity, security vulnerability, emergency response, organizational GRC, etc.)
  • Acted as program management lead and primary focal for various security control and risk management departments including global corporate SOX programs, security vulnerability, government control programs (IRS, DHS, US DoD, US Dept of State, NATO, United Nations, etc.), PCI-DSS, etc., for Confidential enterprise customers. Acted as lead focal specifically for SOX governance, regulatory and compliance activity for Confidential security management team.
  • Directly overseeing program design, deployment, remediations, migrations and upgrades of various systems (organizational, physical, network, host infrastructure, application, database, access management, etc.) of SOX for Confidential enterprise customers.
  • Manage and architect implementations of policy, risk, vendor, incident, and compliance management, and related business process implementations utilizing RSA Archer SmartSuite framework, Confidential Virtual Security Operations Center (vSOC), Resilient systems incident response platform (RIRP), etc. .
  • Worked with multiple organizations in assessment, identification, remediation, and monitoring of nearly 400 PCI-DSS 3.0 controls. Ensured organization successful passed PCI-DSS audits. Utilized several toolsets and implemented multiple systems to store artifacts to ensure governance, regulatory and compliance for PCI-DSS 3.0.
  • Acted as the lead for various security work streams including vulnerability services using Intel Security (which owns McAfee) and all related McAfee Enterprise Solutions for Confidential customers. Oversaw and performed work concerning McAfee/Intel Security products (upgrades, endpoint deployments, new releases, migrations, conversion, etc.). McAfee product, include, but not limited to, VirusScan, Anti-virus, firewall, encryption (PKI, email, etc.), cloud security & other McAfee Security product deployment.
  • Managed implementations of several other security vulnerability tools including Symantec Enterprise including Symantec End Point protection (SEP) policy updates, and remediation, Symantec Critical System protection assisting with policy creation, RSA Archer SmartSuite framework, Confidential Virtual Security Operations Center (vSOC), etc. Managed multiple deployments and system integrations Confidential Virtual Security Operations Center (vSOC) with SiteProtector, Tivoli Endpoint Manager (TEM), Tripwire, various FIM, HIDS, HIPS, etc.
  • Managed and deployed solutions for SEIM tools for Confidential enterprise customers. This includes, but not limited to, AlienVault, ArcSight, Confidential Virtual Security Operations Center (vSOC ) toolsets (QRadar, CyberSpouse, etc.), RSA Archer SmartSuite toolsets (enVision, SecOps, Security Analytics, etc.), Nessus, Rapid7,Solarwinds, Qualys, Splunk, etc.
  • Worked with multiple organizations in assessment, identification, remediation, and monitoring of nearly 250+ SOX controls for several fortune 500 clients that were Confidential enterprise customers. Ensured organization successful passed SOX audits. Utilized several toolsets and implemented multiple systems to store artifacts to ensure governance, regulatory and compliance for SOX artifact gathering and reporting.
  • Oversaw program design, deployment, migrations and upgrades of various systems (organizational, physical, network, host infrastructure, application, database, etc.) of PCI-DSS 3.0 to PCI-DSS 3.2 for Confidential enterprise customers. Architected customized solutions to ensure PCI-DSS 3.0, PCI-DSS 3.1 & PCI-DSS 3.2 compliance.
  • Worked with multiple organizations in assessment, identification, remediation, and monitoring of nearly 400+ PCI-DSS 3.0 - 3.2 controls. Ensured organization successful passed PCI-DSS audits. Aided in production of PCI report on compliance (RoC) for Confidential enterprise customers. Utilized several toolsets and implemented multiple systems to store artifacts to ensure governance, regulatory and compliance for PCI-DSS 3.0 - 3.2.
  • Performed security architecture on the enterprise performing cloud security assessment and remediation physical to virtual data center migrations utilizing several cloud computing products for sites worldwide. This includes designing and deploying of Confidential Azure, Amazon Web Services, Confidential Smartcloud (and other Confidential cloud products), VMWare, Openstack, SoftLayer, several other COTS cloud providers and customized public, private and hybrid cloud (PaaS, IaaS, and SaaS) computing solutions.
  • Architect and deployed advanced cloud security processes, techniques and controls per ISO 27017 & 27018 (information security controls for cloud services) approach for enterprise customers.
  • Aided in assessment, design, deployment, consolidation, updating, migration or decommissioning of cloud security products on enterprise accounts. This includes a large product array of cloud security products offerings per vendor, which is not limited to: Confidential cloud security (which includes Confidential Virtual Security Operations Center (vSOC) and other related Confidential cloud security products, RSA Archer SmartSuite framework products, Symantec Cloud security, McAfee, Confidential cloud security, Absolute Software, AVG, Alert Logic, Computer Associates, Centrify, CipherCloud, Confer, Elastica, HyTrust, Netskope, OpenDNS, Ping Identity, Proofpoint, Seculert, ThreatMetrix, Qualys, Rapid7, Splunk, and several other products.
  • Aided in the overall design and deployment of fortune 100 corporate active directory (AD) migration from multiple forest logical design to enhanced security architect environment (ESAE) per Confidential AD security best practices (this includes AD domain hardening, network security, etc.). Implemented AD using Confidential Dynamic Automation (for identity access management processing) per Confidential Tivoli Identity Management (ITIM). Managed AD structure and objects (including group policy, GPOs, FSMOs, OUs, users, computers, sites, etc.) using Dell Quest software (formerly Altiris) including Total Privilege Access Management (TPAM) including Privileged Password Management (PPM), Application Password Management (APM), Privileged Session Management (PSM), Privileged Command Management (PCM) modules and Confidential native tools. Oversaw design and deployment of non- Confidential systems (Oracle LDAP, UNIX, Linux, Mainframe, etc.) integrate within corporate AD for secure IAM.
  • Acted as an ITAR Certified Program Manager for an Confidential enterprise customer account (International Traffic in Arms Regulations (ITAR) is a federal government regulations for transportation of military equipment that is directly monitored by the US Dept of State and indirectly monitored by several of federal and international government agencies (including US DoD, NATO, United Nations, etc.). All businesses, equipment and personnel that work within an ITAR compliance area of a company must be certified per federal requirements). As ITAR Certified Program Manager, directly oversaw all ITAR compliance activity of assigned Confidential enterprise account. Directly overseeing design, deployment, migrations and upgrades of various systems (organizational, physical, network, host infrastructure, application, database, etc.) for ITAR compliance for enterprise customer.
  • Provided guidance and advice for security management per information technology industry best practices to ensure compliance with Basel, CMMI, CoBIT, DFAR, DITSCAP (predecessor of DIACAP), FEMA 426, FEMA 428, FIPS, GIG, GLBA, GISRA, HIPAA, HITRUST, ITIL, ITAR, ISO 27000, NIST, PMI, PCI, SAS-70, SSAE-16, SOX, WCO, and other governance risk compliance requirements.
  • Provided reporting and decision support for senior leadership (senior directors, VP and above, C-level executives, board of directors, etc.) concerning security and operational risk.
  • Provided guidance and advise for security management and service level management per information technology industry best practices (ITIL, CoBIT, ISO 20000-1: 2011, ISO 27002, etc.). Ensured customer satisfaction and key stakeholder buy-in and agreement in all agreed upon KPIs, SLAs RTOs, RPOs, etc.
  • Acted as primary Confidential security focal and liaison for global security review for assigned Confidential enterprise customers. Participated in security risk control board and set policy and guidance for corporate security of Confidential customers industry based information security best practices per ISO 27002:2013. This includes working with PMO, CISO, and other Global Security Organizations to develop standards and best practices across security domains. This includes working with PMO and other Global Enterprise Organizations to develop standards and best practices across enterprise domains. Acted as the final escalation focal for Confidential customer IT security guidance for assigned enterprise accounts.
  • Manage workloads, define deliverables, hire and mentor resources, conduct performance reviews, and ensure compliance with established organization processes. Direct business forecasting and financial analysis activities and identify opportunities and risks along with action plans to ensure attainment of financial goals. Led multi-functional technology teams and key contributor and mentor for a PMO office with over 60 project management resources in a matrix reporting structure. Prescribed solutions that provided quick ROI for maximum revenue productivity, service optimization, and system flexibility. Aided in reengineering vendor policy to enhance quality assurance and to identify risks and issues at earlier stages during the program and portfolio activity for assigned Confidential enterprise customers.
  • Performed executive security architecture on the enterprise performing advanced high-level data security implementation for large enterprise organizations per ISO 15408 (international standard for Common Criteria for Information Technology Security Evaluation) and Federal Information Processing Standard (FIPS) 140-2 level 4 approach.
  • Utilized Project and Portfolio Management (PPM) tools such as Confidential Project, JIRA, Planview, Daptiv, Confidential PPM (Rational, Tivoli, etc.), HP PPM, Clarity, SharePoint, etc.
  • Oversaw network, system and database administration of various technology including SQL Server 2012, Windows Server 2008/2012, VMWare 5.5, EMC VNX, Cisco UCS, Cisco firewalls (including Cisco ASA), routers, switches, Checkpoint, Sophos, etc. Performed security patch administration utilizing Windows SUS, System Center Configuration Manager, UNIX/Linux scripts with sudo access, batch scripts, powershell, etc. Deployed and maintained several third party tools for managing AD artifacts including Dell Quest (Altiris) tools, Confidential native tools, Confidential RACF, etc. Work in virtual project teams.
  • Manage and architect implementations of policy, risk, vendor, incident, and compliance management, and related business process implementations utilizing RSA Archer SmartSuite framework, Confidential Virtual Security Operations Center (vSOC), etc. Managed multiple deployments and system integrations Confidential Virtual Security Operations Center (vSOC) with SiteProtector, Tivoli Endpoint Manager (TEM), Top Secret, QRadar; Splunk, QualysGuard, Nessus, Rapid7, etc. Setup toolset to perform tier 1 & tier 2 automated response for security vulnerability, emergency response, etc.
  • Performed executive security architecture on the enterprise performing cloud security assessment and remediation. Also managed physical to virtual data center migrations utilizing several cloud computing products for sites worldwide. This includes designing and deploying of Confidential Azure, Amazon Web Services, Confidential Smartcloud (and other Confidential cloud products), VMWare, Openstack, SoftLayer, several other COTS cloud providers and customized public, private and hybrid cloud (PaaS, IaaS, and SaaS) computing solutions.
  • Aided in design of automated deployments using CloudFormation. Aided in server configuration management via Confidential and Puppet.
  • Migrated API Management systems from on-prem hosting to Amazon Web Services. Functional, non-functional and performance testing of key systems prior to cutover to AWS. Performed conceptual testing for AWS Elastic Block Storage (EBS).
  • Performed capacity planning, bottleneck identification within AWS. Monitoring AWS via CloudWatch. Managed development, test environments, and production environments with AWS cloud.
  • Design and build of core platforms. Architect and deployed advanced cloud security processes, techniques and controls per ISO 27017 & 27018 (information security controls for cloud services) approach for enterprise customers.
  • Deployed Confidential Mass360 and Confidential mobile device management for Confidential enterprise customers.
  • Acted as lead project manager for designing, deploying and maintaining over-the-counter (OTC) and customized data release governance platforms which assign, catalog, govern, monitor, and manage enterprise data assets (e.g. application services, web services, daemons, events, batch files, reports, etc.) within an enterprise to understand the full breath of assets and activities around those assets. DRG software tool platforms include Akana, Confidential SOA API data governance, and customized data release governance systems. Also, project manage deployments of migrations, upgrades, consolidations, etc., for ERP applications such as SAP, Oracle Business, Salesforce, PeopleSoft, J.D, Edwards, etc. Acted as lead PM for multiple applications and managed workstreams simultaneously.
  • Managed and aided in architecting advanced security management and BCP/DR design and deployment for enterprise customers. Implemented advanced level key cryptography management to ensure data security within mainframe and midrange server environment.
  • Manage and architect implementations of policy, risk, vendor, incident, and compliance management, and related business process implementations utilizing RSA Archer SmartSuite framework, Confidential Virtual Security Operations Center (vSOC), Resilient systems incident response platform (RIRP), etc. Managed multiple deployments and system integrations of Confidential CyberSpouse, RSA Archer eGRC SecOps, and several other threat incident and emergency response tools for enterprise customers.
  • Develop and maintain service delivery plans (including budgets, processes, tools, staffing and charging mechanisms).
  • Deliverables included, but were not limited to documented service management and operational risk compliance structure including:
  • Coordinate documentation and definition of all services (standard offerings as well as “exceptions”), identification of application, business & system owners, service targets and related changes for threat incident and emergency response plans for enterprise customers.
  • Coordinate efforts to mature existing processes (incident, change), and start on processes we need (request, problem, configuration management, continuous improvement). Set up process in moving processes from CMMI level 1 (infancy process maturity) to CMMI level 5 (dynamic automation process maturity).
  • Coordinate the documentation of work processes (how we do it), tools, and methodologies. Coordinate the identification of timing/estimates/expected completion times. Identify metrics to measure service delivery.
  • Meet with key stakeholders either weekly or monthly (depending on LOB) to identify, monitor and craft recommendations for security risk management issues. Designed and implemented remediation activities.
  • Generate a list of process owners and coordinate the definition of KPIs for each process.
  • Help identify gaps in service and advice on methods to close gaps.
  • Ensured timely artifact collection and maintenance of compliance activity.

Confidential

Chief Consultant

Technical Architect

  • Acted in roles of Technical Architect, Program Manager and Scrum Master for the development and deployment of systems supporting Honeywell premier product line. These Support systems include mobile, hardware device, manufacturing, IT infrastructure, API and monitoring, information worker collaboration, application, virtualization, and multi-tier storage & SAN solutions.
  • Accomplishments includes streamlining delivery of major infrastructure systems including storage optimization solution which was originally slated for over one year timeline delivery to within one month. Also designed and deployed QA/UAT multi-environment, QA staging and PROD data center virtualization environment solutions that were originally slated for over multi-year timeline delivery to within two months under extreme project constraints. Save organization millions of dollars in project delivery. Managed multiple projects & workflows simultaneously.
  • Managed creation and deployment of public and private cloud for multi-tier application system. Managed release paths.
  • Took full responsibility for keeping project cost and schedule on track. Utilize project management tools/techniques (e.g. PERT charts, critical path method, earned value) to track and manage project costs and schedules. Implemented, Agile, SCRUM, Six-Sigma, ITIL, Waterfall, etc., and other best practice frameworks. Managed multiple global teams spanning continents NA, SA & EMEA.
  • Improved project management processes through the implementation of new business case template process. Establish team level cadence and drive team level ceremonies (e.g. sprint planning, team retrospectives, backlog grooming, etc.) in alignment with Program level cadences and communication frequency established. Provided leadership, direction, and coaching to the team to encourage adoption of good agile practices. Be a change agent and foster a “learn by doing” environment. Encourage and facilitate cross-team coordination and collaboration. Remove impediments for the team(s) and escalate as appropriate. Facilitate management of the scrum team’s dependencies between the program team and third parties, release managers, or other scrum teams. Work cross functionally to align strategy, methodology and execution. Maintain metrics that provide visibility to stakeholders on team-level progress and quality. Actively contribute to the company’s Agile and Lean Community through participation in the internal Agile Community of Practice and Scrum Master Forums. Provide real time feedback to the methodology team based on experiences with software delivery teams. Track and manage project execution in accordance with company's solution delivery and financial management practices
  • Hardware/Software include but limited to: MS Azure, VMware, vCloud Public, Private & Hybrid, Cisco UBS Nexus Switches, Cisco UBS Servers, HP & Compaq Server, Cisco ASA Firewalls, Cisco ACE load balancers, Cisco CSS load balancers, EMC VNX SAN, Dell Equalogic SAN, Windows Server 2008, 2008 R2 & 2012, SQL Server 2008, 2008 R2, 2012, IIS, 3Scale, Opower, Jmeter, JIRA, .NET, Openstack, Red Hat Linux, Confidential Voice Recognition products, Wi-Fi product, thermostats, mobile OS, .NET, API., energy monitoring, etc.

Confidential

Technical Architect

  • Managed the development and implementation of all critical IT Infrastructure\Security projects. This includes planning, collaborating and coordinating resources and activities of projects to ensure that goals or objectives of projects are accomplished within predetermined time frame.
  • Took full responsibility for keeping project cost and schedule on track. Utilize project management tools/techniques (e.g., PERT charts, critical path method, earned value) to track and manage project costs and schedules.
  • Managed budgets and timelines of high-level, high-impact, and high-cost projects.
  • Utilized various risk management processes (e.g., identification and quantification), tools/techniques to quantify risks (e.g., statistical sums manage program-level risks and issues effective and efficiently.
  • Oversaw development, deployment and maintenance of various technology including SQL Server 2012, SCCM 2010, Windows Server 2008, EMC Avamar, EMC Data Domain, Epicor,.NET, AppFabric, VMWare, QualysGuard, etc.

Confidential

Project Consultant/Project Architect

  • Provided technical vision and responsibility for the end-to-end technical solution. Defined the architecture of an IT solution within Corporate IT.
  • Acted as Project Architect for implementing enterprise security standards for DRC.
  • Provided conceptual design for Enterprise Public Key Infrastructure (PKI) of DRC.
  • Acted as Primary Exchange Administrator.
  • Hardware/Software include but limited to: VMware, Amazon AWS, MS Azure, RSA Archer, Cisco Firewalls & Switches, EMC Data Domain, EMC Clariion SAN, EMC Avamar, Windows Server 2003, 2008, 2008 R2, SQL Server 2005, 2008, 2008 R2, 2012, Exchange 2007 & 2010, Lync, Blackberry Enterprise Server, SCOM, SCCM 2010, etc.

Confidential

Information Security Analyst/Auditor

Performed physical and data security assessment of security controls of third party vendors/suppliers of Confidential . This included Reviewing and understand Information Security Policy and Procedure; to examine and understand the I.T. Infrastructure of business partners of varying sizes; and to assess existing and potential risk and determine if it is consistent with the polices and directives of corporate information security policies, industry best practices, and regulatory requirements.

• Produced security assessment reports for strategic security and business risk planning and analysis for compliance with Confidential lines of business and Office of the Comptroller of the Currency (OCC) regulations.

• Instituted policies and procedures to ensure compliance with Basel, CMMI, CoBIT, DFAR, FEMA 426, FEMA 428, FFIEC, FIPS, FISMA, GLBA, GISRA, HIPAA, ITIL, ISO 17779, ISO 27000, NIST, PMI, PCI-DSS, SAS-70, SSAE-16, SOX, WCO, and other IT audit requirements.

• Effectively lead and conduct information security reviews and assessments of technical, managerial, and operational functions, at various vendor locations within the United States and other countries as needed.

Confidential

Program Manager/Subject Matter Expert /Speaker/Technical Writer

  • Acted as Program Manager, speaker and subject matter expert (SME) for Confidential learning solutions throughout the United States and Canada. Projects include project full-lifecycle (from initiation to closing) of official courseware design & development of Infrastructure Optimization (IO), Windows Server, SharePoint Server, SharePoint Development, .NET Development, Exchange Server, System Center Configuration Manager, Group Policy, Active Directory, IT security best practices and several other Confidential Learning division deliverables.
  • Lead Technical SME - SQL Server 2005 official courseware deliverable
  • Technical SME (senior) - Windows Server 2008 official courseware exam deliverable
  • Technical SME (senior), Speaker & Advisory Consultant - Confidential Infrastructure Optimization framework
  • Technical SME (senior) & speaker - Active Directory Best Practices
  • Technical SME (senior) & speaker - Group Policy Best Practices
  • Designed, developed and deployed Confidential official curriculum learning deliverables for Confidential Development and Confidential Learning divisions within Confidential . Under Confidential NDA, collaborated with other top-expert Confidential MVPs & MCTs along with Confidential personnel and partnering vendors in creating physical & virtual labs, black-box, unit and regression testing, as well as authoring Confidential official courseware, exam content, presentation, etc., for Confidential on a SDLC life-cycle.
  • Manages project scope, requirements changes, critical path, workflows, multiple and competing demands and priorities determining and conveying impact on budget, resource allocation, time and risk using appropriate fact-based metrics/assumptions.
  • Performed vendor on & off-boarding of resources, monitor cost, and ensure service level agreements, quality delivery and customer satisfaction were met using metrics derived from Confidential partner and participant surveys (Metrics that Matter).

Confidential

  • Strategically planned and deployed all aspects for multiple engagements of major state contracts from successful RFP response, procurement of investments for project financing, personnel selection, project on & off-boarding, and monitoring cost, schedule and profitability of projects for corporate growth. The included earned value management (EVM) and project cost estimate deliverables for compliance of contract terms.
  • Projects include PeopleSoft ERP integration and state financial application migration (SWIFT Project). All modules were either upgraded and/or performed new installation.

Confidential (American Express Account)

Principal Consultant (Project Manager, Technical Architect, Lead System Administrator roles)

  • Acted as project lead for several programs and projects in the subject areas of application development, network infrastructure, server consolidations, server steady-state operations, EMC SAN migration, IT security, disaster recovery, cloud computing, executive reporting, Windows OS migration and several other key projects for American Express. This included working and negotiating with top-level executives and key stakeholders at American Express and Confidential .
  • Performed high level system engineering and system support for multi-tiered web distributed applications for over 25,000+ servers for American Express.
  • Performed Windows authentication and authorization (utilizing Active Directory as well as standalone password databases) with SAP ERP systems for Confidential Global Services clients.
  • Integrated customized SAP ERP application components for end user interfacing for Windows XP & Vista workstations.
  • Managed projects concerning migrations (including data center and facility migrations and expansions), system refresh, moves, decommissions, updates, and upgrades of servers, applications, databases, storage, network, voice and other infrastructure systems of American Express. This included business unit and key stakeholder buy-in, requirement and scope definition, performing project scheduling, project tracking and status reporting, project budgeting and resource planning and alignment. Performed project activity on a full lifecycle (from project charter to post deployment activity). Collaborated with business units in designing and deploying various customized business applications.
  • Acted as Technical Architect for over 1000+ Request For Service (RFS) projects for successful deployment and customer satisfaction. This included identifying key business and technology drivers that impact application architectures, such as end-user community requirements, existing software distribution capabilities, existing application environment (including legacy, COTS, packaged systems, etc.), security, performance and availability requirements. Translates project requirements into detailed designs to be implemented while balancing needs for immediate action and the point of arrival (POA) vision. Performed gap analysis for several business applications within American Express to ensure present and future needs from a technical standpoint would be accounted.
  • Perform capacity planning which included LAN, WAN, site links, load analysis, application sizing planning, etc. for technical architecture review on the full SDLC life-cycle. Created linkage with project, architecture and technology processes and artifacts by redesigning process flow and checklist creation.
  • Primary technical POC for Global Steady State Intel Services (GLSSIS) disaster recovery (DR) and business continuity for American Express global server environment. Oversaw all aspects of business continuity and disaster recovery for American Express DR environment including logical security access and authorization into the disaster recovery server portal. Was acting member of business continuity design board for American Express and acted as technical architect and advisor for disaster recovery program activities.
  • Aided in the active directory & group policy architecture design and deployment; streamlined various active directory and network infrastructure artifacts on the American Express IT server environment. Performed migration of Windows NT/2000 server environments to Windows 2003 active directory and network infrastructure. Deployed and maintained several third party tools for managing AD artifacts including Quest (Altiris) tools.
  • Aided with integration of Confidential Windows 2003 Active Directory with Lightweight Directory Adapter Protocol (LDAP) for distributed application system authentication and authorization access control.
  • Team and Technical Lead for EMC Migration Program. Acted as the final escalation point of contact (POC) for problem and incident resolution for project activity. As acting technical architect for project activity on Intel servers, designed and developed application, server & system architectures for multiple (500+) departments within American Express for compliance of EMC Migration Program which was migrating all hosted data storage from heterogonous SAN storage ((Dell, Confidential, NetApp, HP, Hitachi, etc.) to EMC managed tiered storage. Designed and deployed projects on full life cycle which included server remediation, data cabling and connectivity, storage cut-over activity, and post storage compliance activity for American Express global server environment.
  • Worked with load balancing & clustering solutions for Cisco, Sun, Confidential, Symantec, etc., content switching, NAT/FW rule sets; worked with EMC, Confidential, HP, Dell for NAS & SAN solutions. Worked extensively on EMC and Confidential multi-tier storage solutions. Worked extensively with Active Directory) for authentication and authentication. Worked with multiple operating systems including Windows (worked extensively with Windows), AIX, Linux and Solaris. Worked with VMWare (with Platespin) and Confidential Virtual Server products for Virtualization. Worked other platform services and components including Confidential Websphere, Citrix, MSMQ, Confidential MQ, Tivoli, etc.
  • Managed design, deployment and system integration of Oracle ERP systems within American Express multiple resources spanning over five continents.
  • Manage project logistics & activities, resource management, risk assessment & mitigation, and project tracking and reporting to key stakeholders and upper management of Confidential and American Express. Aided in defining key performance goal (KPG), key performance indicators (KPI), service level agreements (SLA), etc. for several programs, projects and operational teams for Confidential on the American Express account. . Created work breakdown structures (WBS) and maintained critical path for project completion.
  • Manage project logistics & activities, resource management, risk assessment & mitigation, and project tracking and reporting to key stakeholders and upper management of Confidential and American Express. Created customized solutions that quickly identify & address major vulnerabilities, measure & maintain compliance efforts to reduce those vulnerabilities, lower the tremendous cost of meeting countless mandates, created controls, gain clear visibility into vulnerabilities (lower ROI) and measure compliance status.
  • Lead matrixed teams of system design engineers, developers and technologists to successfully deliver significant change in a large-scale enterprise environment. Concurrently manage the infrastructure build-out on multiple corporate change initiatives. Provide leadership in steering projects toward defined standard platform solutions and best practices. Ensure the infrastructure adheres to the requirements for availability, stability, and efficiency. Develop and maintain business application development planning, tracking and resource cost estimates. Define and manage project schedules, resources, and delivery commitments. Complete assigned projects within budgetary and scheduling guidelines. Manage project risks and issue. Delegate, integrate activities, and resolve conflicts.
  • Utilized IT framework and governance best practices including standards from Agile, RUP, Waterfall, SDLC, PMI, CMMI, ISO 20000, ISO 27001, Zachman, ITIL, CoBIT, MSF, MOF, Six Sigma, Integrated Methodology Software Development, TOGAF, Kimball Data Warehousing, etc., for business application & infrastructure design, deployment and maintenance in a complex multi-facet global enterprise IT environment.
  • Utilized several technologies including MS SharePoint, MS Project, Planview, Rational Project tools, Confidential WebSphere, etc. for project logistic storage hosting and reporting.
  • Performed project deployments of several technologies including server consolidations, multi-tiered application updates & decommissions, Cisco network devices, EMC multi-tiered storage, thin client solutions ( Confidential terminal services, Citrix, etc.), virtualization, and other infrastructure initiatives for project fulfillment.
  • Aided in providing forecasting and resource allocation with regard to IT projects. Player/Coach contributions at all levels in IT environment.
  • Coordinated project deployments with vendor partners for smooth deployments and ongoing operations. Worked with multiple vendors for program transformation and project streamlining.
  • Collaborated with business units in designing and deploying customized business applications. This includes setting up designing, deploying and maintaining application frameworks and their built-in security services, API’s including J2EE, COM+, .NET, etc.; general application security API’s and protocols: GSS-API, MS CryptoAPI, PAM, Kerberos, DCE Security Service, SSL/TLS, SAML, S/MIME, PKCS API’s, or others; built-in security functions and services of application infrastructure components: Oracle, DB2/UDB, MS IIS, MS BizTalk Server, Hyperion, Cognos, Informatica, Microstrategy, Oracle Financials, MS Integration Server, SharePoint, Confidential WebSphere, iPlanet Directory, MS Active Directory, Citrix, Sun LDAP, Confidential MQ Series, MSMQ, MS Exchange, etc.; imbedded operating systems security controls including Windows XP, Windows 2000, Windows 2003, Windows 2008, AIX, Solaris, Red Hat Linux, Z/OS, AS/400, etc.; network infrastructure and security functionality including Cisco (via AT&T) switches, routers, firewalls, IDS/IPS, SEM/SIEM, VPN’s, etc.; incident response including creation of tiger CERT teams; aiding setting up patch management, configuration management, physical security.

Confidential

Technical Architect

Designed and developed IT solutions with emphasis to Confidential -centric solutions. This includes identifying client network security risks and threats, setting up security using NTLM, Kerboros V5, and certificate-base authentication, utilized various PKI technologies (digital certificates, Certification Authority (CA) servers, various public-key enabled applications, intrusion detection systems (IDS), honeypots, Certificate Revocation List (CRL), etc.), and creating and configuring stand alone and Enterprise CA servers/policies within environments using Windows NT/2000/2003 & UNIX as the NOS platforms. Installed Cisco security solutions (PIX, Cisco IDS/VPN), RSA ACE Server (fobs), Archer, various firewalls, and security software for clients.

Confidential

Technical Architect/Project Manager/System Administrator

  • Aided in the design and architect of CFAST version 2.0 (CFAST is the war planning and deployment ERP application currently used by the United States military and NATO).
  • Provided direction and leadership to US Department of Defense (DoD) information systems by ensuring application and infrastructure projects were delivered on-time, within budget, and produced business results utilizing industry standard techniques. Utilized project management techniques including PM and security frameworks standards from PMI, ISO 9000 & 17799 (pre-cursor of ISO 27000/27001 ), DITSCAP (predecessor of DIACAP), ITIL, CoBIT, CMMI, MSF, MOF, Six Sigma, TOGAF, Zachman, etc.
  • Oversaw network security design and deployment of an ERP solution for military logistics for US and NATO forces throughout the world. Created security controls, policies, standard operating procedures (SOP) and systems for multiple applications that exceed compliance standards for both corporate and NSA and US DoD standards. Provide network analysis and security to the SIPRNET, the classified Internet of the U.S. military. Performed security risk analysis and assessment, risk planning and implementation, and risk mitigation and monitoring of various systems for US DOD and NSA compliance for DITSCAP and DCAA reviews.
  • Aided in lowering TCO by using primarily Dell hardware and Confidential software for government solutions. This resulted in ROI of over 35% for Confidential and U.S. Government (conservative estimate).
  • Perform information security risk assessment on projects that involve application review and deployment, modification to existing applications or infrastructure. Perform vendor security risk assessments. Develop and maintain relationships with internal and external customers to formulate information security governance solutions.
  • Develop action plans and/or recommend alternate solutions to resolve exceptions to standard operating procedures. Assisted in identifying and communicating application control deficiencies and the associated risks for compliance of NSA security standards.
  • Utilized Network Sniffing and Vulnerability Assessment and Penetration Technologies (Network General Sniffer, Ethereal, OPNET, SNORT, Nmap, Nessus, etc.), PKI; Encryption; Digital Certificates and their use, Anti-Virus; Anti-Spyware; VPNs; SSL; IPSec, TCP/IP; DNS; DHCP; LDAP; Active Directory, Multi-Factor Authentication Mechanisms, IP Packet Routing & Switching; IP Packet Analysis, Edge Firewalls, Application Layer, Stateful Packet Inspection, and WAF (utilizing primary ISA Server 2004 various Confidential security toolkits) and Desktop Firewalls
  • Managed the design and deployment of disaster recovery and business continuity plans for various US DoD and NATO data sites throughout the world.
  • Designed and deployed US DoD application solutions using Windows 2003 technology including all Windows 2003 Server operating systems (Web, Server, Enterprise, Small Business Server RC1, Terminal Server, etc.), Internet Information Server 5/6, SharePoint Portal Server 2003, ISA Server 2000, Office 2003, SQL Server 2000, Visual Studios .NET 2003, Project Server 2002, Visio Professional 2002, Live Communication Server 2003, etc., Shavlik HFNetChk Pro, Ghost 7.5/8.0/2002/2003, NeoTrace, SNORT, GFI LANguard, etc.
  • Managed the design and deployment of disaster recovery and business continuity plans for various US DoD and NATO data sites throughout the world.

Confidential

Adjunct Professor

Taught courses in Windows OS, Active Directory, Networking, Infrastructure, etc., as the subject matter for preparing student for real-world experiences in a university environment.

Confidential

Technical Architect/Project Manager

  • Utilized Confidential Solutions Framework/ Confidential Operations Framework (MSF/MOF), Six Sigma, PMI, CMMI, Agile, COBIT, ITIL, and several other project management approaches to develop and execute project plans. Several solutions evolved implementation of corporate security initiatives.
  • Developed and tracked project plans, project status reporting and earned value management analysis for managing project scope, resources, and cost.
  • Conducted project meetings, developed risk analysis and facilitated communication within teams.
  • Provided project leadership and direction to project teams that deployed and maintained server support operation of business applications. Software applications hosted on Dell, HP, Sun, Compaq and Confidential AS/400 & Mainframe server platforms all located in a large corporate data center.
  • Managed several multi-million dollar projects concurrently and successfully.
  • Redesigned change, release, operational readiness review processes and deliverables within the organization. Created linkage with project, architecture and technology processes and artifacts by redesigning process flow and checklist creation.
  • Performed DC migration consolidation from multiple sites to Herndon, VA DC headquarters. Managed projects concerning migrations (including data center migration and facility site closures), system refresh, moves, decommissions, updates, and upgrades of servers, applications, databases, storage, network, voice and other infrastructure systems of Confidential .

Lead System Engineer

  • In charge of all business application IT maintenance for Confidential . Oversaw 4 direct reports and 16 indirect reports.
  • Lead daily operations: system and database administration, backups, monitoring and performance analysis. Focus on automation, eliminating administrative overhead and reducing cost. Hardware primarily hosted on Dell, HP, Sun, Compaq and Confidential AS/400 server platforms all located in a large corporate data center
  • Oversee several in-house applications that reside on over three (300) hundred servers with my primary focus administrating business applications and underlining software with Windows NT/2000, VMWare, UNIX (Solaris, AIX, & HP-UX), and AS/400 as the NOS platforms. Created automated tasks utilizing Perl, T-SQL, VBScript, Jscript, WMI and NT shell scripting. Created documentation for IT operations for business applications and underlying software.
  • Managed DNS, DHCP, RAS, WINS, AD forests, domains, OUs, and other Windows 2000 AD and network components. Utilized SMS 2.0 for desktop distribution and software packaging. Managed Exchange 5.5/2000 corporate email systems. Acted as Primary Citrix Administrator.
  • Installed and managed clustering services for applications hosted on Windows NT and Windows 2000 network operating system. Rolled out and managed EMC Data Manager and Veritas Backup Exec for server and SAN disaster recovery and storage solutions. Manage Cisco routers and switches.
  • Oversaw 110 instances of SQL Server 6.5/7.0/2000 databases. Provided technical support and troubleshooting for ODBC & OLE/DB connectivity with several types of databases including Oracle, Informix, AS/400, etc.
  • Utilized Confidential Solutions Framework/ Confidential Operations Framework (MSF/MOF), Six Sigma, PMI, CMMI, Agile, COBIT, ITIL, and several other project management approaches to develop and execute project plans. Several solutions evolved implementation of corporate security initiatives.
  • Aided in configuring corporate patch management, change management configuration management, data security and physical security

Accenture

Senior Project Consultant

  • Managed the migration of tier-2 help-desk operations for Andersen Consulting Central Information Operations Technology Services (CIOTS) from multiple locations in the DC, MD, and VA region to its Reston, VA office.
  • Aided and trained Andersen Consulting personnel on various techniques of technical troubleshooting and customer support which resulted in a 25% productivity improvement in the organization.

Confidential

Technical Architect

  • Facilitated “sign-off” meetings with business owners, management, etc. for ensuring stakeholders concur with defined requirements, wants, and needs.
  • Responsible for $550K+ budget for SSA contract.
  • Managed resources in a matrixed project organization environment. Directly oversaw 15 direct reports.
  • Assisted in writing statement of work (SOW) and creating response for RFP for the project
  • Provided management experience in the integration and coordination of multiple parallel project development efforts in a decentralized execution environment.
  • Coordinated project deployments with vendor partners for smooth deployments and ongoing operations.
  • Oversaw full deployment operations of IT consolidation which included:
  • Core technology deployment - servers components such as OS, database, messaging, applications deployments at the central data center
  • Site deployments - server and application components deployments at particular sites including”
  • Site preparation - analyzing, scheduling, and communicating deployment plans to the team.
  • Site installation - execution of the site deployment and validating results.
  • Site stabilization - ensure that system is stable while resources are available and establishing new SLAs and OLAs

Lead Engineer

  • Acted as Lead Engineer for the migration of the continental United States Social Security Administration’s computer systems from a Novell 3.12 NOS to a Windows NT 4.0 NOS network solution. Managed deployment solutions for the entire SSA WAN which encompasses the continental United States and 90,000+ end users for compliance of SSA security standards.
  • Setup and configured using various programs such as Inoculan anti-virus, ARCserve & Seagate tape backups, as Enterprise Administrator, NT Resource Kit, SMS, Citrix Winframe, Word, PowerPoint, Excel, Outlook, etc. for both server and workstations.

Confidential

Technical Architect

Managed the design and deployment of integrating multiple BCBS sites located throughout MD, DC, WVA, DE to merge the former BCBS’s IT networks into Confidential enterprise infrastructure. Produced business and technical analysis of Confidential ’s enterprise architecture for technological readiness assessment. Performed business and technical analysis throughout all BCBS offices and facilities in DC & MD for high-level executive review. Analyzed, designed, and implemented long-term solutions for the Confidential WAN which encompasses DC, MD, DE, and WV and 10,000+ end users.

  • Performed needs analysis & network auditing services for total cost of ownership development and evaluation which resulted in a 45% productivity improvement in the organization.
  • Managed team of six engineers (6 direct reports) and IT team of over 50+ personnel (indirect reports) for completion of migration services on a daily-basis.
  • Responsible for multi-million budget for Confidential WAN deployment contract.

Lead Engineer

  • Managed deployment of migration service of various operating systems (AS/400, Apple, MS-DOS, Confidential PS/2, Novell, Windows 3.11/95 workgroups, etc.) to Windows NT NOS environment for Y2K compliance. Managed team of six engineers (direct reports) and IT team of over 50+ personnel (indirect reports) for completion of migration services on a daily-basis.
  • Created queries, scripts, etc. for the transferring of data from various systems (Mainframe, OS/390, etc.) to Confidential database solutions (Access (Jet database engine), SQL Server, etc.).
  • Performed network auditing services for total cost of ownership development and evaluation which resulted in a 45% productivity improvement in the organization.

Confidential

Director of Information Technology

  • Oversaw all IT/IS Operations of a multi-site independent insurance agency. Worked with management, employees and vendors to maintain seamless Information Systems operations.
  • Provided process optimization by assessing & facilitating business Process re-engineering (BPR) strategies that are creative, service sensitive, and cost effective. Create and automated patch management utilizing various patching hardware and software.
  • Performed all phases of project management of independent insurance agency by managing projects from start to finish with ‘General Deliverable’ SDLC Phases (Problem Recognition, Feasibility Study, Vision, Analysis, Design, Construction, Testing, Maintenance, Prototype, Support, and Help Desk).
  • Developed and implemented SOPs for daily procedures, backup, configuration management, capacity planning, change control, and system operations. Developed documentation and security analysis, including a comprehensive risk assessment. Create and automated patch management utilizing various patching hardware and software.

We'd love your feedback!