Quantcast

Information Technology Systems Resume Mo...
Resumes | Register

Candidate Information
Name Available: Register for Free
Title Information Technology Systems
Target Location US-NJ-Mount Laurel
Email Available with paid plan
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes

Information Technology Systems Jersey City, NJ

Information Systems Technology Newark, NJ

Information Technology Systems Neptune City, NJ

Information Technology Security Philadelphia, PA

Network Engineer Information Technology Jersey City, NJ

Data Analyst Information Systems Jersey City, NJ

Information Technology Customer Service Philadelphia, PA

Click here or scroll down to respond to this candidate
CURRICULUM VITAEDr. Candidate's Name
Phone: PHONE NUMBER AVAILABLEEmail: EMAIL AVAILABLELinkedIn: LINKEDIN LINK AVAILABLEPublications: https://www.anatomyofcyberattacks.com/publications Statement of Teaching PhilosophyAs an educator, I am motivated to share and provide my knowledge and expertise to students that have a desire to learn. In my chosen profession, information technology, continual learning is crucial to sustainability. My 20+ years of experience positions me to be able to help students to become critical thinkers who ask questions from a place of curiosity and create a philosophy of always wanting to learn and grow professionally and personally. My hope is that while students glean knowledge through their course work, they will simultaneously grasp the material and apply that knowledge in the practice and principle of their chosen field. Staying up to date on information technology is crucial to success. My goal is ensure my students comprehend the understanding of information technology practices so they have the ability to secure their environments and have the capacity to secure systems and data. Information technology is a constantly evolving industry that is continuously changing and gaining a firm education on the procedures and processes will enable students to be successful in the workforce. I believe the formal education process is the catalyst for individuals to become critical thinkers and lifelong learners. Through education, individuals of all ages and backgrounds, including myself, can learn and gain a wealth of knowledge that will drive them to success.A good instructor takes the time to ensure students fully understand the concepts and have the ability to apply it to real world situations. In the classroom, I maintain focus, provide guidance, engage students, and keep order to provide students with knowledge that they will maintain giving them a firm understanding of the course concepts. To create an engaged learning environment, the key is interaction. This requires participation on their part and will keep them thinking on how they are contributing to the course/classroom. While instructing, I create lessons that are relevant to each student by listening to the interests, hopes, and dreams. My goal is to get students motivated to the extent that they are still thinking about subject matter outside of the classroom. I believe in the ability for each student to make major contributions to a class, based upon their own life, professional and educational experiences. I utilize teaching methods such as engaging in student discussions, targeting individual interests, and using motivational interviewing to encourage ideas and open exchanges of ideas. This creates a customized educational experience that is dynamic and specific with each course and group to students. My challenge for each student I teach is to leave my classroom better than when they entered and knowing I can have that positive change in someones life is what inspires me to teach. Personal AttributesSkilled in many disciplines such as information security, starting from the baseline of how to ensure a computer system is secure from known attacks, utilizing and writing scripts to automate processes.Respected professional with a passion for educating those in the area of information security on implementing information security best practices and developing solutions on securing systems. Ability to excel in a demanding, outcome-oriented, and dynamic work environment. Skilled at establishing strategic vision, setting key reporting metrics, and defining clear objectives for leading high performing teams, individuals and developing an action plan to mitigate identified concerns.Utilize innovative teaching strategies that promote student success. Ensure compliance with state and federal information security policies, standards, directives and work closely with senior leadership, data custodians and governance groups. Strong leadership experience with designing and the execution of several initiatives focusing on enterprise wide vulnerability assessments, penetration tests, security audits, automated patch management and continuous risk program management receiving recognition for successful implementation and remediation.Management skills while defining vision paths that align with business objectives. Establish and maintain effective communication and rapport with various layers of management ranging from the chief technology officer, senior leadership staff, technical teams, peers, clients and vendors.Organized, goal oriented and technically skilled individual whom enjoys the challenge of complex demanding tasks and assignments.Formal EducationDIT, Information Assurance & Cybersecurity 2022Capella University, Minneapolis, MNMS, Information Systems Security 2013New Jersey Institute of Technology, Newark, NJBS, Information Systems and Decision Sciences 2002 Virginia State University, Petersburg, VALicenses and CertificationsCertified Network Defense Architect (CNDA) 2016Certified Hacking Forensic Investigator (CHFI) 2016 Certified Ethical Hacker (CEH) 2015Certified Information Systems Security Professional (CISSP) 2014 Certified Professional Managers (CM) 2014Microsoft Certified Professional (MCP) 2010Microsoft Certified System Administrator (MCSA) 2009 Security + Certification 2008Network + Certification 2006CompTIA A+ 2005Scholarly PublicationsAuthor, Anatomy of Cyber Attacks: Exploitation of the Weakest Link, Palmetto Publishing https://www.anatomyofcyberattacks.com/the-bookResearch Journal Article, Self-Paced Cybersecurity Awareness Training: Educating Employees to Identify Phishing Attacks, published in the Journal of Cyber Security Technology https://doi.org/10.1080/23742917.2023.2244210Current Faculty AppointmentsAdjunct FacultyCornell University, Ithaca, NY 2021-PresentServe as an Adjunct Faculty member in Cornell Universitys Campus teaching courses in the area of System Design for Organizations and System Administration. Courses Taught:Course Title: System Design for OrganizationsThis course provides design principles of intelligent, adaptive organizations built for systems thinking. With expert guidance and hands-on activities, students will create organizations vision and mission and build capacity and learning systems that support organizations ability to achieve core principles. This approach is a systems leadership and organizational design model that provides students to help design, guide, manage, and to have an organization, at every level, working toward realizing their companys vision.Course Title: System AdministrationThis course provides the system administration essentials from a security orientated perspective. This course incorporates system administration information on installing and configuring network component; operating system familiarity and scripting. Security awareness including threats, vulnerabilities, secure protocols and secure system design. Students are provided with an the administration and security features of Windows Server, Linux and Unix operating system, features, tools, and security mechanisms. Department Chair, Computer Science DeparmentPurdue University, West Lafayette, IN 2021-Present Proficiently managed the reporting of all sections including Summer, Fall, and Spring schedules, ensuring accurate and timely scheduling of academic offerings. Effectively oversaw and resolved student complaints for all adjunct faculty members within the Computer Science Department, enhancing student satisfaction and fostering a positive learning environment. Successfully supervised curriculum changes for the Computer Science undergraduate degree, contributing to program enhancements and alignment with industry standards. Managed course registration and instructor assignments while maintaining compliance with university established benchmarks and quality metrics.Adjunct FacultyNorth Carolina Agricultural and Technical State University, Greensboro, NC 2021-Present Serve as an Adjunct Faculty member in North Carolina A&T Universitys Campus teaching courses in the area of System Communication Security and Human Computer Interaction Courses Taught:Course Title: System Communication SecurityThis course builds upon Operating system security by securing communication between networked systems.Implement transport layer security (TLS) and a public key infrastructure (PKI). Use a scripting language to automate security relevant tasks and verify compliance with organizational security standard Course Title: Human Computer InteractionThe study of human-computer interaction enables system architects to design useful, efficient, and enjoyable computer interfaces. The course provides the theory, design procedure, and programming practices behind effective human interaction with computers, and a specific focus on smart phones and tablets.Adjunct FacultyTulane University University, New Orleans, LA 2020-Present Serve as an Adjunct Faculty member in Tulane Universitys campus teaching a course in the area of Networking Security Principles and designed the Identity Access & Access Management, Windows Server Administration coursesCourses Taught:Course Title: Networking Security PrinciplesThis course prepares students to install, configure, and troubleshoot networks. Topic areas include LANs, WANs, TCP/IP, security, cabling, cloud computing and virtualization, wireless networking, network applications. This course covers topics in data communications and various technologies that affect business communications. In addition to learning common networking terminology, students will examine existing and emerging networking standards and architectures. Also covered are operating systems, wiring topologies, communications protocols, Local area network (LAN-to-LAN) interconnectivity, and Wide Area Networks (WAN) fundamentals.This course is intended to provide a solid foundation for the study of communications and networking.Course Designed:Course Title: Ethical HackingThis course empowers students to become proficient in ethical hacking techniques, penetration testing, and network security. The course focuses on developing professionals who can ethically and responsibly safeguard digital assets, making it an essential training ground for aspiring cybersecurity experts and those seeking to protect digital ecosystems from cyber threats. Course Title: Identity Access & Access ManagementThis course is designed to familiarize students with the skills needed to administer a Microsoft network within an enterprise. The course provides an in-depth look at the features of Active Directory, including Group Policy, scripting, replication, and disaster recovery, plus the use of Exchange Server in the enterprise for reliable communication services.Course Designed: Windows Server AdministrationThis course is designed to prepare students with the latest iteration of Microsoft Windows Server. Students will be provided with detailed insight and experience on common, foundational Windows Server configurations. Students will learn about the Microsoft Hyper-V environment and how features like high availability, fault-tolerance, disaster recovery, automated backups, and network load balancing. Adjunct FacultyWilmington University, New Castle, DE 2020-Present Serve as an Adjunct Faculty member in Wilmington Universitys Campus teaching courses in the areas of Operating Systems & Computer Systems Security and Security Foundations Courses Taught:Course Title: Operating System & Computer Systems Security This course provides technical knowledge and develops the employability skills necessary for success in the business-world of cybersecurity. The following topics are covered: Security Principles (Windows Security Architecture, Linux Security), Account Security (Securing Accounts, Passwords, Password Aging, and Verification of System State), File System Security (Windows Server 2016, Windows 10 File Security, NAS Storage Security), Accessing Risk (Key loggers, Sniffers, Port Scanning), Risk Analysis(Viruses, Patches, Packaging Techniques), and Encryption. Course Title: Security FoundationsIn the Security Foundations course, students gain a fundamental understanding of the security concepts that provide a conceptual basis for the Cyber Security track. The topics examined in this course include basic security concepts, threat actors and attributes, security frameworks, organizational security policies, security controls, business impact analysis, risk management, incident response, business continuity, and disaster recovery. This course provides students with a global perspective of the challenges of designing, developing, and implementing a comprehensive organizational security solution. Through reading, exercises, discussion forums, and assessments, students learn about the basic foundations, concepts, frameworks, procedures, and laws that shape an organizations security program. The course also reviews standard security terminology, compliance requirements, and the relationships of assets, vulnerabilities, threats, risk, and harm. Countermeasures, mitigations, and the formulas of the risk/mitigation decision-making process.Industry and Professional ExperienceExcecutive Director of Cybersecurity 2019  Present Comcast CorporationPhiladelphia, PAAccountable for driving a comprehensive cybersecurity program to ensure information systems, data, and resources are secured.Established practices designed to uncover, analyze, and communicate information security risks to business executives.Collaborated with department leaders, internal teams, stakeholders to execute strategies following determined risk management standards.Evaluate new cybersecurity threats, trends, and implement technical security controls to mitigate risks.Provide leadership to a team of cybersecurity professionals in support of established goals, objectives, and career development.Implement automated cybersecurity solutions, research and propose new technical procedures to enhance the security posture.Liaise with engineering architecture team to ensure technical security controls are built into the development of applications.Proactively partner with business leaders to align security requirements, engineering processes and technical security controls.Deputy Cyber Operations Secuirty Officer 2017  2019 State of New Jersey Office of the Attorney General Atlantic City, NJOversee the Information Security Officers of each Atlantic City casino to ensure regulatory information security policies are aligned.Lead monthly vulnerability risk assessments, develop corrective action plans and evaluate proposed risk mitigation procedures.Provide strategic direction and leadership to a cyber security team responsible for resolving reported incidents and compliance violations.Drive reported security incidents through resolution and conduct continuous monitoring to identify potential areas of risks.Implemented metric dashboard reporting system to measure the overall effectiveness of each casinos information security program.Evaluate incident response procedures, business continuity and disaster recovery plans providing recommendations for improvement.Direct the deployment of new security solutions and enhancements to existing security controls in accordance with compliance standards.Ensure effective corrective measures have been deployed after an incident or vulnerability has been remediated.Director of Systems SecurityLockheed Martin Advanced Technology Laboratories Overall 2007 - 2017 Cherry Hill, NJDirector of Systems Security 2011 2017Provided leadership to a team of direct reports responsible for applying information security policies and incident response plans.Implemented system security controls in accordance to corporate information security and risk management directives.Liaise with executive leadership to determine acceptable levels of risk and implement procedures to meet defined policies and standards.Performed continuous risk monitoring of systems to ensure compliance and schedule the remediation of identified vulnerabilities.Senior Information Security Manager 2009  2011Developed annual information security strategy, established milestones and communicate service level agreements.Conducted the implementation of corporate security awareness training courses along with online learning education modules.Created corporate security policies, review vendor acquisition processes and ensure effective security controls are in place.Infrastructure Security Manager 2007  2009Directed the continuous enhancement of initiatives of the corporate information security program. Ensure corporate departments are adhering to defined security policies, technology control standards and regulatory procedures.Managed the timely deployment of data loss prevention solutions, intrusion detection and endpoint data protection strategies.Deployed network defense countermeasures and secure solutions to effectively maintain enterprise network security.PHH Mortgage Corporation Overall 2002 - 2007Mt. Laurel, NJDivision Technical Operations Advisor 2004  2007Provided guidance to a team of system administrators and developer engineers in their daily responsibilities.Established service level metrics, project deliverables, individual and team commitments. Partner with department groups to implement corporate technology vision, strategy and commitments.Implemented preventative maintenance logging efforts to ensure network and data integrity. Assessed the need for system and software reconfigurations based on incident reporting metrics and trends.Performed routine audits of system assets and processes to ensure compliance with established corporate directives.Collaborated with department project managers to evaluate system improvements to increase efficiency and reduce support costs.Hosted technical training courses for employees on the functionality of updated application features and new software.System Administrator Supervisor 2002  2004Supervised a team supporting 10,000 internal and 2,000 remote employees ensuring incidents are prioritized, escalated and resolved.Developed procedures to increase the effectiveness of how incidents are identified, documented, assigned and remediated.Monitored the performance of corporate systems to isolate performance bottlenecks and coordinate the required upgrades.Created online support knowledge base for operational procedures, system documentation and technical reviews for planned projects.Communicate attentively with stakeholders throughout scheduled system upgrades, incident progress and unplanned outages.Ensured deployed systems and applications are reliable, effective and meet the service delivery needs of all departments.Automated the backup and restoration of network drives, employee profiles, critical business documents and application databases.Business and Technical TrainingCertified Manager Training October 2014Corporate TrainingCISSP Training June 2014CED Solutions Atlanta GeorgiaMemberships and AffiliationsISC CISSP Chair of the Board of Directors 2014 - Present Member of the Board of Advisors 2010 - PresentNational Society of Industrial Security Professionals Alpha Phi Alpha Fraternity, Inc Technology Committee Board Member 2019 - Present Alumni Chapter President 2020 - PresentNew Jersey Cybersecurity & Communications Integration 2014 - Present FBI InfraGard Advisory Board Member 2007 - Present National Cyber Security Alliance 2010 - PresentCommunity Service and Social ContributionsHabitat for Humanity 2010 - PresentMaple Shade, NJBurlington county community serviceman 2008 - Present Willingboro, NJSouth Jersey Food Bank 2006 - PresentPennsauken, NJYouth Mentoring 2005 - PresentWillingboro, NJConferences AttendedCompTIA Partner Summit August 2023Las Vegas, NVInformation Security Symposium January 2019Atlantic City, NJBlack Hat August 2018Las Vegas, NVDefcon August 2018Las Vegas, NVRSA Conference March 2017San Francisco, CASANS Cyber Security August 2016Washington DCLarge Installation System Administration Conference November 2015 San Francisco, CAPhiladelphia Secure World  ISC July 2014Philadelphia, PADell SecureWorks September 2012San Francisco, CAProfessional PresentationsRisk Management 2016- PresentPresented to Chief Information Security Officers, Cybersecurity Professionals Information Security Awareness 2012 - PresentPresented to all employeesSocial Media Best Secure Practices August 2019Presented to Interns, All Employees, Senior leadership, Executives Security Education Awareness Training October 2015 Presented to all employeesData Privacy January 2014Presented to Engineers, Project Managers, Executive Staff members, All employees Social Engineering July 2013Presented to Engineers, Project Managers, Executive Staff members, all employees Incident Response July 2012Presented to Managers, Security Staff, Infrastructure Staff Emerging Threats March 2012Presented to Security Administrators, Developers, System Administrators, All employees Insider Threat June 2011Presented to Security Administrators, Developers, System Administrators, All employees Residencies and ColloquiaDoctoral Residency  Orlando November 2018Awards and HonorsComcast Corporation Technical Leader of Innovation & Excellence Award 2023 Lockheed Martin Honors Achievement Award 2012Lockheed Martin Service Recognition Award 2011Lockheed Martin Employee of the Quarter Award 2008 PHH Mortgage Corporation Technical Leadership Award 2006 PHH Mortgage Corporation Technology Service Award 2004 Highly Competent Subject AreasSoftware:Microsoft Office SuiteMicrosoft Active DirectoryGroup Policy ManagementRSA Access TokenMcAfee Virus Scan EnterpriseMcAfee EPOMcAfee Host Intrusion PreventionMcAfee FoundstoneSymantec Backup ExecNessusWiresharkFireEyeSplunkRapid7LogRhythmVMwareAir Defense EnterpriseJuniper VPN ClientDell KACEWindows 7Windows 10Windows Server 2016Mac OSXLinuxVisual BasicBatch ScriptingJava ScriptAutoITLearning Management Systems:CanvasMoodleBlackboardUdemySubject Matter Expert:System Security  Windows / LinuxWindows ForensicsVirtualizationCyber SecurityComputer Security and Systems ManagementSystem Planning and AuditingContinuous Monitoring and Security OperationsInformation Security Awareness EducationIT Auditing & ComplianceLaws of Data Security and InvestigationsProject ManagementOrganizational BehaviorNetwork-Arch-ProtocolsCommand and Control SystemsInformation Systems PrinciplesSystems Analysis & DesignEmergency Management InformaticsInformation Systems StrategyReferencesDr. Mark BestSenior Cyber Security Engineer StaffLockheed MartinPhone: PHONE NUMBER AVAILABLEEmail: EMAIL AVAILABLEDr. Cortney BoldenChief ScientistMIA Solutions, LLCPhone: PHONE NUMBER AVAILABLEEmail:EMAIL AVAILABLEDr. Kareem HoganAdjunct Professor, North Carolina A&TPhone: PHONE NUMBER AVAILABLEEmail:EMAIL AVAILABLEDr. Darcel TolliverAdjunct Professor, University of the CumberlandsPhone: PHONE NUMBER AVAILABLEEmail: EMAIL AVAILABLE

Respond to this candidate
Your Message
Please type the code shown in the image:

Note: Responding to this resume will create an account on our partner site postjobfree.com
Register for Free on Jobvertise