| 20,000+ Fresh Resumes Monthly | |
|
|
| | Click here or scroll down to respond to this candidateCandidate's Name
Street Address PHONE NUMBER AVAILABLEEMAIL AVAILABLEhttps://LINKEDIN LINK AVAILABLEhttps://1byteatatime.com/Technical ExperienceWell-versed and competent in these specific areas: Vendor Management Contract Negotiations Strategic Planning Project Management Team Building Support DeskManagementNetwork Design andmanagementCall Center, setupand performanceGoogle Workspace GCPW, MDM, Drive Security Audits Office 365 PCI, PII, HIPAA, andthe encryption of dataSegmenting networksfor performanceSD WAN,Dualcircuits, redundancyBusiness priorityPoliciesForcepoint,Velocloud, SonicWall,Checkpoint, Fortinet,and Palo AltoCarbon Black,Sentinel One, CrowdStrike, Malwarebytesand SophosKnowB4, InfoSec,Phishing simulationmanagement,Security Awareness.Backupify, Veeam,MacriumDelphi, Salesforce,Voice agent, DuettoOpera Cloud, ONQ,Auto ClerkProfitsword, SORTD,QuickbooksSaflok, Ving,AsaabloyInfogenesis, Micros,Symphony, Addmi,squareHotSos, Whistle,Alice, ZingleSpasoft, Book4Time ADP, PaylocityAdobe, AdobePhotoshop, IllustratorOpen Table, TravelClick, Book4timeVOIP, Five Nine,Mitel, AvayaCabling, fiber, Coax,speaker wire foraudio and videoequipmentWireless Design forcapacity, coverage,stadium, and outdooreventsWirelessmanagement andtroubleshootingAruba, Ruckus,Ubiquity, Aerohive,and MerakiBeyond Trust, PRAfor secure vendoraccessHeritage Hotel & Resorts, New MexicoDirector of Cybersecurity & IT OperationsSeptember 2014 - PRESENT I am in charge of technology and cybersecurity for a diverse range of operations in New Mexico, including resorts, restaurants, offices, and more. During my tenure at Heritage Hotels and Resorts, we experienced significant growth, expanding into new markets and doubling in size. Additionally, our department was heavily involved in an average of 35-45 company projects per year, ranging from cloud migrations to system deployments. Improved network security and redundancy through a redesigned infrastructure, enabling our team to be more flexible and mobile. I effectively spearheaded cybersecurity initiatives for multiple companies, collaborating with top-level executives to achieve their business goals and raise awareness about potential risks. During my time in this role, I bolstered different systems, decreasing our on-premise footprint and implementing a secure cloud strategy, and also introduced automation and standardization to various sectors. It was essential to develop strong teams as our projects grew, and during the last 10 years, I provided mentorship to multiple employees who successfully landed high-paying roles at some of the best companies in New Mexico. I created a program that allows employees to gain certifications and training, helping them enhance their skills and join the salaried team, where they can apply their newly gained abilities in the field. I developed a monthly newsletter aimed at raising awareness about industry risks and introducing cybersecurity terms to our leadership teams. I developed security measures, protocols, and procedures to mitigate risks. I conducted regular vulnerability scans and implemented routine social engineering and penetration tests to minimize potential threats. During a ransomware attack, my team played a vital role in ensuring business continuity by collaborating with disaster recovery and forensics firms, as well as working closely with our CFO to file an insurance claim. My team successfully improved the Wi-Fi infrastructure at all our resorts, we standardized the hardware, and significantly increased guest satisfaction. Technology is a fast-paced industry, which emphasizes the importance of staying current, particularly for cybersecurity. Staying informed about industry news and attacks is a major part of my job, which is why I regularly attend conferences like RSA, Black Hat, Defcon, and Hitec. |