We provide IT Staff Augmentation Services!

Senior Manager, Technical Program Manager Resume

2.00/5 (Submit Your Rating)

Bowie, MD

SUMMARY:

  • Insightful, results - driven IT professional with over 23 years of information systems experience with the Confidential .
  • Notable success directing a broad range of IT security initiatives while participating in planning, analysis, and implementation of solutions in support of business objectives.
  • Excel at providing comprehensive secure network design, systems analysis, and full life cycle project management.
  • Hands on experience leading all stages of system development efforts, including requirements definition, design architecture, testing and support.
  • Outstanding project and program leader; able to coordinate and direct all phases of project-based efforts while managing, motivating, and guiding teams.

CORE COMPETENCIES:

  • Team Management/Leadership
  • Network and Systems Security
  • Research and Development
  • Regulatory Adherence
  • Cost Benefits Analysis
  • Policy Planning/Implementation
  • Data Integrity/Disaster Recovery
  • Risk Assessment/Impact Analysis
  • Contingency Planning
  • Technical Specifications Development
  • Project Management

TECHNICAL PROFICIENCIES:

Platforms: FASTNet, Windows 9x/NT/2000 series/XP/Vista, Mac OS, VM/370, OS2 Warp

Networking: TCP/IP, Novell, ISO/OSI, SNA, SMS/SQL, Ethernet, Token Ring, VPN, SSH, PGP, PKITools LAN Manager, ISS RealSecure, Checkpoint Firewall, Norton Firewall and Ghost, McAfee/Norton

Virus Protection Utilities: Nessus, Micro Office Suite (Word, Excel, Powerpoint, Visio, ProjectOutlook)

PROFESSIONAL EXPERIENCE:

Senior Manager, Technical Program Manager

Confidential, Bowie, MD

Responsibilities:

  • Lead integration of security tools, standards and process into an agile development lifecycle.
  • Ensured secure software development standards are maintained.
  • Oversaw the implementation of static and dynamic analysis testing tools.
  • Integrated threat modeling into agile processes; trained 50+ software engineers to perform threat modeling, secure software development standards.
  • Oversaw internal/external annual penetration testing of applications, prioritizing findings and support mitigation.

Information Systems Security Analyst

Confidential, Bowie, MD

Responsibilities:

  • Perform annual and ad hoc network and security audits consistent with corporate policies and procedures.
  • Conduct research on emerging products, services, protocols, and standards in support of security systems.
  • Monitor security devices for alerts, notifications, and other significant messages.
  • Lead efforts to demonstrate Confidential ’s information systems are compliant with appropriate corporate policies, industry standards, government regulations, and contractual requirements.
  • Stay abreast of the latest thinking, technologies, and security literature.
  • Ensured the integrity of host computers, multiple databases and secure data transfer.
  • Assess and assist in remediation efforts on in-house developed applications

Information Security Analyst

Confidential

Responsibilities:

  • Provided information security support to Headquarters through the Director of Information Operations ( Confidential ).
  • Recruited to revamp enterprise-wide information security program; oversaw command wide efforts to identify and evaluate all critical systems.
  • Designed and implemented security processes and procedures and performed cost benefit analysis on all recommended strategies; managed security budget of $1.1 million.
  • Collaborated with Red Team (external auditors) to conduct in-depth compliance audits and penetration testing, presented results to senior leadership.
  • Developed curricula and facilitated awareness .
  • Instrumental in developing and implementing Confidential continuity of operations/disaster recovery plan.
  • Spearheaded creation of refurbishing Confidential departments: Risk Assessment, Vulnerability, Penetration Testing, and Security Engineering services.
  • Coordinated with other Information Technology branches to build Risk Assessment Team charged with analyzing all critical systems, developed reports to document systems vulnerabilities, and recommended appropriate solutions.
  • Developed policies and procedures governing command security, email, and internet usage, access control, and incident response.

Technical Account Manager / Strategic Business Analyst

Confidential

Responsibilities:

  • Managed global telecommunications for Confidential, Diplomatic Telecommunication Service-Program Office ( Confidential ) for a client base consisting of several military commands and government agencies representing over $31M in annual requirements.
  • Executed logistics across client field operations, headquarters elements and in-house resources to support client telecommunications projects from design to delivery and operations and maintenance support.
  • Performed technical analysis of network configurations, implementation and performance.
  • Provided technical leadership expertise to assist clients with developing IPv4 and IPv6 network architecture guidance with an emphasis on developing solutions that address interoperability and end-to-end performance issues.
  • Coordinated with major stakeholders and the Director to ensure concurrence with the guidance that were provided and implemented best practice and industry standards.
  • Leveraged economies of scale for government agencies worldwide.
  • Created IPv4 and IPv6 transition techniques, designed patterns, and developed implementation guidelines based on private and public sector best practices.
  • Recognized for outstanding quality of customer service with numerous customer-support s and personal commendation from clients.

Cybersecurity Analyst /Program Manager

Confidential

Responsibilities:

  • Developed/maintained Joint Staff publications relating to the cyber domain component of Cyberspace operations.
  • Facilitated development of Combatant Command and service C4 responsibilities and authorities in providing and operating the cyber domain.
  • Facilitated with J6, background information of contingency exercises of cyber domain provision, operation, and protection scenarios.
  • Supported Cyber Network scenarios development and advocacy.
  • Developed analysis/lessons learned capacity to provide feedback to policy development and resourcing for the cyber

Division Chief

Confidential, Andrews AFB, MD

Responsibilities:

  • Steered network migration; 9K users/5k CPUs; merged 3 domains; centralized capital region command and control (C2) functionality
  • Confidential 's Communications-Computer guru; attended Utilization/ Workshop--developed roadmap for Confidential Communications-Computer career field on cyberspace operations on cyberspace ops
  • Directed Secretary of the Confidential Scope Warriors Symposium; provided voice/data services; enabled strategic talks for 40 Senior leaders

We'd love your feedback!