| 20,000+ Fresh Resumes Monthly | |
|
|
| | Click here or scroll down to respond to this candidateCandidate's Name
Street Address
PHONE NUMBER AVAILABLE EMAIL AVAILABLEObjective:To leverage extensive expertise in designing, engineering, and maintaining secure network infrastructures and applications, ensuring robust operational efficiency and compliance.Professional Summary:Dedicated professional with a comprehensive background in network auditing and control, security analysis, and incident management. Proven ability in implementing and managing SIEM systems, vulnerability assessments, and risk compliance frameworks. Skilled in Linux server management and creating secure IT environments.Education:Goucher College, 1990-1991Undergraduate StudiesLeelanau Schools H.S., 1988-1990Student Council President, Varsity Soccer, Basketball, and BaseballFormal Training / Certifications:Certified Novell AdministratorMicrosoft Product Specialist - NT 4.0Certified Novell EngineerCISSP (lapsed in 2012)Project Management Course CompletionVarious specialized trainings including ISS HIDS/NIDS, Encase Software, SANS SEC401, Arcsight SIEM, Vormetric Database Encryption, Proofpoint Email Security EngineeringExperience:Unemployed / Recovery from Longterm COVID IssuesOctober 2022 - Current (June 2024)Note: Took time off to focus on health and recovery from COVID-related illness.Wipro Inc. Infocrossing LTD. State of Missouri HealthCare DivisionSr. Information Security Analyst September 2019 October 2022Qualys Vulnerability Management SystemManaged day to day responsibilitiesIncluding regularly scheduled scansOnboarding of new devicesVulnerability ScansOnboarding of 5 separate environments with separate requirements and reporting structuresCreated scheduled reports for discovery, vulnerability, and special focus on compliance reportingCompleted quarterly and annual GRC (Risk Compliance) reports, and worked with other teams to create or update a Windows Active Directory policy (ies).QRadar SIEM SystemEyes on glass responsibilities for incident managementCompliance reporting / evidence of actionsRule management to lessen false positivesMicrosoft Data Leakage Protection (DLP) and Symantec Endpoint DLPEyes on glass responsibilities for rule triggersOpen up DLP incidents provide evidences for suchRule management to lessen false positivesDelta Dental of MichiganInformation Security Engineer December 2017 April 2018Qualys Vulnerability Management SystemManaged day to day responsibilitiesIncluding regularly scheduled scansOnboarding of new devicesVulnerability ScansCreated new policy compliance scansHand created policy checks for E.L.KElasticSearch, Logstash, Kibana, Salt, Consul applicationsManaged LogRhythm as needed day to day issues.AF Group Inc.Information Security Engineer May 2016 April 2017Engineered TrendMicro Office Scan / Deep Security / ScanMail ProductsRe-Engineered all virus products for entire organizationUpgraded / refreshed all desktop / virtual desktop environmentsRe-Engineered Office Scan products to auto upgrade clientsRe-Engineered product to allow off network communication for sales force employeesRe-Engineered all SMTP virus protection and SMTP policy at both ingress and egress.Went from 70 active servers protected to over 500 active serversIncluded all testing / policy / exceptionsIncluded Cisco ASA SMTP policyIncluded TrendMicro Scan Mail on ExchangeQualys Vulnerability ManagementCreated Vulnerability Management Scheduled ReportsCreated Asset Management SystemIncluded auto tagging of assets as they come on boardBy both Operating System and class C subnetsCreated Compliance Scans for Operating SystemsCIS Benchmark StandardsCylance Desktop ProtectionEngineered, tested and installed Cylance protection to over 2,100 endpointsIncluded all business unit testing, exceptions, and activationCisco ASA Firewall SupportDaily Support / Project Support for ASA Firewall systemsRoot cause analysis of level III support calls, including packet traces and application integration.Corporate Microsoft Office 365 integrationBlueCoat HTTP ManagementCorporate Microsoft Office 365 integrationDaily management of AF Groups HTTP securityIncluded project and daily support of HTTP group/individual exceptions, requests, and project requirementsRoot cause analysis of level III support calls, including packet traces and application integration.Maintained corporate .PAC files (multiple PAC files)Comerica IncorporatedVP Sr. System administrator Comerica Inc. September 2015 March 2016Directly responsible for all internet email security, policies, and day to day management. This includes complex SPAM and email firewall rules, fraud investigations, project implementation, SPAM mitigation, and email delivery.Management of all data leakage policies for SMTP laneManagement of all TLS lines and implementations (supported and managed 170 TLS lines)Management of 15-20 email middleware devicesIncluded day to day management - CLI based upgrades and queries.Linux CENTOS operating system upgrade and managementProofpoint and Zix systems hardware managementVP Sr. Security engineer Comerica Inc 2006 2015Directly responsible for day to day activities of the following products:RSA token Dual lead engineer.I was directly responsible for all RSA token application integration. This mainly included large scale project implementationsImplementation base of over 14,000 tokens. Included both internal and external clients.Testing of DR scenarios /readinessBreak fixArcsite SIEM Integration and project engineerLead engineer of large scale implementation / integration of Arcsite. This included at project end, the integration of over 1,200 windows and Linux servers.Configuration and implementation of real time rules / trap notificationsZix and Proofpoint Email SecurityLead Engineer and implementer Built and managed all middleware hardware (twenty devices) and all email policies for internet email.CENTOS / Linux day to day managementClient base of over 10,000 usersVormetric Database EncryptionLead engineer and implementer. Implemented encryption product to large DB2 database built on Linux technology. Implemented access based on both Active Directory integration and application access.IBM ISS (Internet Security Systems) Host Intrusion / Network IntrusionEngineer Directly responsible for all HIDS (host intrusion detection systems), and for all policies for NIDS (network intrusion detection systems).This included all policies, licenses, rules (exported to Arcsite), break fix scenarios, and integration with hosts.Approximately 55 NIDS devices in 4 environments, and over 600 HIDS client servers / middleware devices in 4 environments.Checkpoint Removable Media and Hard Drive EncryptionLead engineer and designer for corporate implementation to over 10,000 workstations.First person in country to implement a Microsoft AD configuration into a Novell OS infrastructure.Encase forensic (2006-2008)Worked case loads for all fraud / information security investigations. Including:After hour acquisitions of hardware / stealth copyEvidence handlingWorking with corporate, local, and federal police.AVP Project support center Comerica Inc 2002 2006Level III support to help deskRoot cause analysis of large / critical issuesTraining the level I and level II help desk employeesLarge scale project implementations of new products / upgrades of existing NOS (Novell)FLO (first level officer) Technician Comerica Inc 1999 2002Implemented AM Desktop Trust SoftwareImplemented to largest trust accounting holders.Included on site implementations to largest trust holders (billion dollar holders)technician First american title 1997-1999Traveled throughout Midwest upgrading offices from Novell 2.2 to Novell 3.x and Windows 3.11.Included ghost imaging workstations, building Novell Netware infrastructure and setting up Wide Area Networking to home office.Phone support to office clientele.technician omicron Electronics 1995- 1997Sold and built handmade / custom AutoCad workstations.Skills:Network Security EngineeringSIEM Implementation (QRadar, Arcsight)Vulnerability Assessment (Qualys)Incident Management and ResponseLinux Server AdministrationProject ManagementCompliance and Risk ManagementTechnical Support and TroubleshootingReferences: Available upon request. |