Quantcast

Cloud Security Financial Services Resume...
Resumes | Register

Candidate Information
Name Available: Register for Free
Title Cloud Security Financial Services
Target Location US-TX-Frisco
Email Available with paid plan
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes

Data Security Cloud Computing Allen, TX

Cloud Security Engineer Dallas, TX

Financial Services Software Development Little Elm, TX

Cloud DevOps Engineer Dallas, TX

Information Security Application Royse City, TX

Cloud Computing Cell Phone Rockwall, TX

Vice President, Global IT / Global Security Officer Dallas, TX

Click here or scroll down to respond to this candidate
Candidate's Name
Email: EMAIL AVAILABLEPHONE NUMBER AVAILABLEFrisco, Texas.ProfileI am an experienced and dedicated professional with a vast IT experience across various business sectors. I have led successful Security transition and transformation programmes and business programmes in Financial Services (Payments, Banking, General Insurance, Asset, Data and Investment Management), Telecommunications, Retail, Energy, Gaming and Aviation business sectors.My core skills include Security, Solution, Enterprise and Technology Architecture delivered across Security transformation programmes, Data Centre Migrations, Service Transformation, Complex System Integration and Consultancy.Specialising in Security enterprise wide programmes and projects from inception phase through delivery for successful business transformation across various sectors.Core CompetenciesTechnical attributes:Experience and knowledge in securing digital solutions in the cloud, including container and serverless platforms and modern application development and delivering secure by-design solutions.Worked on their multi-cloud (Azure, AWS, GCP) platform evolution initiative comprised of delivering a platform that provided self-service automation to manage environments, orchestrate infrastructure, and application deployment to virtual data centres built on top of private and public cloud infrastructure.Successfully worked in fast-paced, regulated environments, delivering high-quality cloud security services.Provided consultancy and support to teams when defining security controls and guardrails for the platform in line with bank policies and standards, mitigating the threats identified from threat modelling.Conducted reviews and assessments of cloud security products or services to ensure that they meet bank requirements.Created logical views aligned to the Group Cloud Security Strategy providing a view of the Security domains and capabilities covered across organisationic cloud estate.Documentation of security features, products, and services across public cloud platforms mapping back to the Enterprise Security Strategy Domains and Capabilities. Providing logical and technical views for auditors, CSO teams, new starts to understand the controls implemented and where and raise risks where gaps.Producing security reference architecture documentation, capturing overviews and high-level designs.Created technical views providing a view of technology products and services that act as security controls, mapping back to the security domain and security capabilities.Providing security expertise and review of High-Level Designs to ensure that these are aligned with relevant Security Principles and security standards.Contributed to the Cloud Security Architecture discussion forums, and also delivery of architecture decisions.Successfully worked in fast-paced, customer service/regulated environments, delivering high-quality information security services.Conducting reviews of assessments.  assessing cloud security products/services at a detailed level to ensure that they meet bank requirements and are the best choice for the group., assessing cloud configuration in response to the latest threat intelligence to ensure that we have appropriate controls in place or to highlight gaps.Providing security oversight /delivering of all cloud security architecture decisions and high-level designsDocumentation of security features, products, and services across our public cloud platforms mapping back to the Enterprise Security Strategy Domains and Capabilities. Providing logical and technical views for auditors, CSO teams, new starts to understand the controls implemented and where and raise risks where gaps.Designed and delivered enterprise wide DLP and cryptographic solutions i.e KMS,BYOK and CASB solutions.Extensive understanding of Detect, Protect, Prevent and Respond pillars as part of the NIST and Azure Cyber Security Architecture and Frameworks.Excellent written and verbal communication skills. Able to translate technical language into clear, accurate terminology that non-technical people understand.Experience of industry standards and Frameworks such as SABSA and TOGAF.Experience in designing and implementing security solutions by delivering capabilities in the diagram below.Experience of technologies across LANs, WANs, Servers, Virtualisation, Applications, Identity Management, PAM and DAM.Strong leadership and influence skills across various business units and acted as single point of contact with Service Integration providers and 3rd party suppliers.Technical SkillsSplunk Enterprise, MCafee SIEM,ELM,Loglogic, Cyber Ark, Sail Point, Oracle IAMGit(Stash),Subversion, Fish Eye,Crucible,Nexus pro, Sonatype CLM for Risk Thales 1500, Safenet, Protect DB and Protect File Qualys Guard, Nessus,Varonis Metadata FWCryptographic Services: PKI, HSM, Gemalto,KMS Akamai,DDOS,WAF,InfobloxCitrix Access Gateway, AWS Shield,CDN,WAF,GCP Cloud Armour,WAFHP Pro curve, Virtual Connect Flex 10,IBM Web sphere Suite (WAS,WPS,WCS)Oracle Fusion Middle WareOracle RAC, DataguardVcloud,,Xen Virtualisation,TrendmicroLinux Z, Solaris Zones & Xen VirtualisationHP EVA,IBM DS Storage Array,Netapp Net App Storage seriesShape Security, Akamai Bot Premier,KSD,WAFMcafee Enterprise Security for DatabasesData Loss prevention,IBM GuardiamIBM ZsecureHP Opsware( CSA), Altiris 6.5,Blade LogicRedhat, Debian, Suse, Solaris, AIX,Cent OSLAN,WAN, Load Balancers(F5,Cisco)Imperva WAF, McAfee IDS,Akamai, Barracuda,Ddos protectionLog logic, Sys log,Tripwire,Log RhythmHP Arcsight, IBM Q RadarCitrix Presentation Server, Net ScalarService Now, Remedy,KMS,CASB,DLP,EDP,EDR,EPPCyberArk,Beyond TrustIBM Data power Xi150, MQ (Linux & Z/os)Sonar qube,Check MarxAWD, Prophet, AbinitioThreat Connect,STIXNagios, Cacti, Athene,IBM Tivoli,CA & HP Open ViewIBM X,I,P and Z series(Z13)Cisco Catalyst 3020,3012, 4500,MDS 9500HP C 7000,IBM H, Dell M Chassis HP DL,ML,rx Itanium & SuperdomeCisco Advanced Threat Analytics, ISECisco Sourcefire, Fire eyeAzure Security CentreAzure Sentinel,Azure Log AnalyticsAzure AntimalwareAIPATPAzure Key VaultAzure DDOSAzure WAFPAW,AD Red forestBYOKEmployment HistorySecurity Architect at Aug 2023 - Apr 2024Security Architect for JLP operations and support services function.Defined and rolled out IAM policies aligning to organisational standards for operational stream lining and upto date user access review.Reviewed Splunk enterprise security usage and outlined SIEM Migration strategy to Google Chronicle for JLP.Developed regular IAM checkpoints as part of streamlining Movers user profiles to validate and confirm that users have access to resources on a need to know basis ad with least privilege.Review DNS Security policies to align with organisational standards and propose changes. update DNS infoblox policies post gap assessments.Designed and outlined EDR solution for JLP enterprise estate by leading the RFP and helping to source the technology solution I,e Sentinel One.Reviewed RACF profiles for JLP critical business services to align with User profiles of operations teams.Security Architect at Jun 2021  Apr 2023Lead Information Security Architect responsible for BAU projects at FCA.Responsible for design and delivery of Security services across business units which outline AD services, SSOAzure Sentinel, Azure Security centre, MCAS, DLP, Vulnerability Management among many of the core security services.Defined Data security capabilities for CTM and BISL across Azure services by enabling ATP, AIP, AKV, Azure SQL protection capabilities.Defined Enterprise DWH capabilities by rolling out Azure Data Bricks, Azure Synapse Analytics, Azure Analysis Services and Power BI technologies.Defined strategy of DDOS and WAF protection services for services across BISL, IDO and CTM. These services are hosted across cloud environments, on premise and third parties.Defined and delivered TPA solutions by rolling Azure Virtual Desktop Solutions in cloud and Citrix Solutions for on prem services.Defined and rolled out Thycotic and Cyberark solutions for CTM and BISL as part of PAM capabilities.Proposed Ransomware Attack strategy as part of Group Protection Services.Defined and delivered end  end monitoring solution for Soc by enabling Azure Sentinel components, ATP and integration into ITSM.Security Operations  SIEM Migration and OnboardingResponsible for end to end design of the SIEM platform for existing and new log sources across FCA.Designed and delivered FCAs strategic SIEM platform Azure Sentinel by deploying centralised logging architecture across various business units for log repositories and access to data for internal and external parties.Designed and delivered migration of log sources from Splunk and Q Radar to target arhcitecture e.g Azure sentinel.Defined log sanitation and onboarding processes to ensure only required data is fed into SIEM environment for cost purposes.Defined and delivered Logging standard patterns for FCA across end points,midrange and mainframe systems.Defined integration patterns for log sources via log patterns by using sentinel connectors and APIs where required.End point Detection and ResponseResponsible for end to end design of the EDR solution using Crowdstrike across the FCA estate.Responsible for running RFI/RFP for EDR project across market leading vendors and evaluating suitable options for the organisation.Designed and got architecture approval for Falcon Enterprise across end points for cloud, Saas, endpoints and email solutions to provide real time protection across all threat vectors.Outline and onboard use cases inot SIE M to evolve this capability into XDR space.Enabled Xtended detection and response capability for end points across on prem,cloud,saas and End user computing estate.Provided visibility of major incident reduction and prevention of possible phishing attacks and malicious threats by predicting possible incidents based on User behavioural analytics and flagging them as potential incidents.Identity Access ManagementResponsible for end to end design of the IDAM Architecture for FCA environment across people, process and Technology within AzureDesigned and delivered end to end architecture on Sailpoint allowing FCA internal and External users by provisioning Access management, Authorisation and Authentication flows in the form of design patterns for internal and external systems.Defined User Access review processes and report parameters to align FCAs Joiners,Movers and Leavers policy.Responsible for user access policy definitions across all business units to ensure system access is controlled.Rolled out IDAM policies for all on prem and Saas services using Sailpoint Saas solution to ensure a clear end to end user access catalogue is availbel for business for an analysis and in incidetnt resolution perspective.Data Loss PreventionResponsible for delivery of DLP Solution(MS Purview) for FCA across various sites and egress points of FCA environment.Responsible for delivery and Design approval for DLP across cloud, Saas, endpoints and email solutions to provide real time data loss prevention capability and policies to ensure data is protected and aligns to FCAs data strategy principles using existing Microsoft stack capabilities and applicable point DLP solutions as part of the scope of the project.Outlined current data loss channels mapping to applicable DLP controls which can be consumed as part of existing E5 license stack and proposed email dlp solutions for data egress channels in scope.Security Architect at Oct 2020  Mar 2021Security Architect at CSMIP(Cyber Security Maturity Improvement Programme) responsible for design authority and assurance for following streams.Design review for HSBC GIAM for America, Europe and Middle East region based on Azure AD for B2B and B2C security controls.Defined strategy of DDOS, WAF and Bot protection services for services across GBGF within HSBC globally. These services are hosted across cloud environments,on premise and third parties across Azure DDOS and Akamai.Proposed AD Enhanced RED forest approach for customer services and B2B services to mitigate recent attack vectors.Defined Security patterns for DDOS,WAF and botnet capabilities to be consumed across services globally within HSBC to consume Akamai WAF(KSD),Bot manager and DDOS capabilities where currently Akamai services are available globally.Defined security reference model for cloud adoption to align with cloud first strategy and outline services mapping to security controls for services hosted in cloud.Designed and delivered end to end logging solution for on prem and cloud services to be onboarded onto Azure Sentinel.Defined native DDOS and WAF policies to align with Global cyber security controls for services with cloud provides i.e Azure to consume to native DDOS and WAF capabilities until a global operating model is agreed.Proposed AD Enhanced RED forest approach for customer services and B2B services to mitigate recent attack vectors.Security Architect at Payments Ltd May 2019  Sep 2020.Lead Security Architect at Visa Payments Ltd for Earthport Services migration from Earthport data centres, AWS and Azure into Visa(Visa Private Cloud)data centres as part of the Merger and Acquisition programme working across with various global teams across US, Europe and Asia pacific.Principal design authority for security services being deployed for Payment services listed below.IAM, PAM on Sail point and Cyber Ark alignment for payments services with Visa Global security standards.Alignment of People, Process and Technology as part of Joiners, Movers and Leavers across the VPL enterprise organisation to align with Visa Global IAM Policies.Alignment of RBAC controls and privileged access controls aligning with Visa Global standards for Visa Payments LTD.User access review roll out for VPL users across enterprise and LOB applications.SIEM & SOC Services onboarding using Splunk and Azure Sentinel for security incident management and Service assurance.Vulnerability Management using Qualys and Alertlogic.Responsible for design assurance and sign off of Earthport business critical services into Visa Private Cloud. This includes migration planning of services from Earthport to align with Visa Key controls.Define and align security posture for Earthport to meet Visa Security maturity score. This is required to align with the organisational security posture as part of GSA.Designed integration capabilities i.e network routes to support the migration activities to enable smooth switch over of services to avoid impact on business services.Ensure all solutions are aligned to Visa Technical Security Standards.Outlined a Security remediation plan for Earthport Plc based on the Visa Key control assessment as part of the M&A programme.Designed and delivered Cloud security principles hosted for Earthport PLC to align with Visa TSRs for EP and EPFX services in AWS and Azure.Security Architect at Nov 2018  May 2019Lead designer/architect for Data Loss Prevention Capability for Allianz solution deployed in Azure to ensure Allianz Global have real time visibility to prevent any potential data breaches. Worked with Allianz OE units across Europe and Americas and Asia.Responsible for architectural and technical guidance for Bolden James reporting i.e data classification tool deployed in AzureDefined migration strategy for Motor claims application from OE specific data centres into ACS model (Allianz Cloud Services) hosted on AzureResponsible for a Splunk implementation into Azure to deliver the application operational intelligence capability for key business critical business services within Allianz UK.Design assurance for SIEM solution within Allianz Global .i.e Splunk Enterprise Solution on Azure environments..Security Architect at July 2017- Nov 2018Responsible for design and delivery of projects across Detect, Respond and Prevent pillars for CSDF(Cyber Securityand Digital Foundations) programme. Lead Architect delivering architectural designs to ensure the solutions align tothe programme deliverables and align to enterprise security architecture principles for the below projects.SOC(Security operations)- Responsible to design and deliver the below capabilities for security operations to ensurethey provide a single pane of glass view for end-end threat management in AzureCentralised Logging solutionResponsible to design and deliver a centralised logging solution which provides coverage forentire infrastructure estate i.e Servers, Storage, Mainframe, Network and Security devices to ensure realtime event feeds are ingested into SOC.Defined logging standards across various device types to ensure critical use cases are met todeliver regulatory and compliance requirements i.e GDPR and PCI.SIEM(Splunk Consolidation)DeploymentThe project is responsible to consolidate the various Splunk core platforms across partnership i.e JohnLewis, Waitrose and IS hosted across Azure and on premise environments and deliver a strategic SIEMand Operational Intelligence capability.Designed and delivered solution design to consolidation various application operational feeds fromsplunk environments into a single operation intelligence platform hosted on Azure.Responsible for the design and delivery of Splunk Enterprise Security to ensure security events are fedinto the SIEM environment from the centralised logging environment.Security Operations Operating ModelResponsible to manage third party supplier who provides out of hours SOC services to the businessand deriving a target operational model to ensure it aligns with people, process and technology.Responsible to review quaterly incident response from managed supplier to ensure it meets the agreedSLAs as part of the contractual agreement.Security AssuranceOversee the design and development of playbooks and runbooks developed by Cisco as part of managed service deliverablesDesign authority to review and sign off onboarding standards for various telemetry onto Cisco ATA services.Database Security MonitoringResponsible to deliver a database security monitoring solution for John Lewis partnership services. Thissolution provides real time event monitoring and correlation for Tier 1 and Tier 2 applications to ensure customerdata and brand reputation is safeguarded.Designed and delivered the solution by deploying IBM Guardiam Database activity monitoring solution withhigh availability across to provide real time monitoring services across all sites.Defined GDPR, PCI, audit, user management and internal threat scenario monitoring templates within the solution.Mainframe Security ImprovementsLead Architect on Mainframe security improvements project, where responsible to conduct a third partyindependent assessment around the current infrastructure, policies reinforced and procedures around IBM Mainframe.Define security roadmap for mainframe estate based on the security assessment results to improve the security posture of mainframe.Proposed security controls around RACF databases management database and disk encryption.Remediate identified security vulnerabilities by deploying Z admin tool as part of z Secure suite deploymentAudit and monitoring tooling capabilities to be deployed on mainframe i.e Z Audit and Z detect toolsDeploy a PAM equivalent solution to front and monitor legitimate user access to mainframe.Provide 100 % database security monitoring for critical databases on mainframe by using IBM Guardiam solutionPKI (Public key Infrastructure)The project is responsible to deliver a Managed PKI environment provided by Entrust Datacard for partnership services and offload the inhouse certificate services management capability consumed by internal services.Designed and delivered end-end solution design for PKI services across various key components for PKI solution i.e HSM services in Entrust Data centre, Certificate services in Azure and Issuing CA in JLP data centres.Delivered integration services flow as part of the PKI environment to ensure Active Directory, Airwatch and ISE services are onboarded successfully.Outlined migration approach to ensure a seamless migration path is enabled for remaining certificate services to be migrated at the point of certificate renewal for remainder services within John Lewis Partnership.Security Architect ( Prosource IT) at Oct 2016  Jun 2017Responsible for design and delivery of projects for Digital Security and Risk(DSR) at BP PLC by working closely with local cyber teams across Europe, US, Africa and Asia.Lead architect providing architectural and technical guidance for CTU(counter Threat Unit) projects within DSR.Responsible for project deliverables to deliver and align with Enterprise Security strategy and BPs vision.Intelligence Threat Data AnalysisOversee requirements management for Intelligence threat analysis.Conducted proof of concepts with various vendors as part of vendor selection process.Provided Architectural guidance and solution cost options to be included in the business case for the project.Draft solution design of the solution to meet the functional and non-functional requirements.Threat Detection CapabilityDefined a solution to assess and validate the security controls for BP plc across people, process and technology.Defined and delivered verodin architecture as part of the solution for BP sites globally. The solution ensured that any zero day attacks i.e Ransomware Attacks were dealt appropriately.Defined use case scenarios to ensure security controls across network and end point systems are validated and identify any gaps within security operations.Prepare a mitigation plan to fill any gaps as part of the projectProvided Security controls capability matrix to help tools rationalisation and consolidation for BP business units.Application Infrastructure Monitoring ProgrammeThe project is responsible to deliver security log monitoring capability for critical applications hosted within BP across data centres hosted at various geographical locations.Managed and improvised business requirements from key stakeholders to ensure project is delivered on time.Designed and delivered an enterprise wide security logging capability, enabling real time threat analysis with close integration with BPs SIEM (HP Arcsight) technology.Solution deployment was designed to ensure it aligns with cloud transformation programme reference architecture.All security logging was designed and aligned to BPs Splunk service line support model to deliver information owner dashboards for stakeholders within DSR.Information protection Essentials.The project is responsible to deliver security controls implementation for secret data classification environments.Audited and documented current security controls on environments where secret data for BP is stored.Performed gap analysis across current security controls for secret data and BPs security controls principles.Defined and delivered solution to ensure all gaps are addressed across technology, people and process around the secret data classification to deliver and align to information protection essentials principles.Designed high available architecture with a hybrid approach of on premise and cloud hosting. environment.Security Solutions Architect Apr 2016  Sep 2016Responsible for design and delivery of projects within Cyber Security Programme (CSP).CSP was initiated to comply with HMG standards to meet the maturity model and scoring performed as part of the IAMM review conducted by EY and to align with HMG 10 Steps to Cyber Security.Responsible for architectural and technical guidance for the following projects as part of Cyber Security Programme.MUP  Managing User PrivilegesThe project is responsible to deliver security controls implementation for user privileges meeting the CESG guidelines.Defined and delivered RBAC process flow and due diligence for Privilege account management and identity access management tools. Concluded tools assessment based on the requirements and proposed CyberArk and Oracle IM as the recommended options.Proposed IDaas model(Identity as a service) for Ladbrokes. A business case is due to be written based on the due diligence report and estimated costsDesigned and delivered Varonis solution as part of user privileges auditing to ensure relevant security measures are in place for PCI data access controls.Secure ConfigurationThe project is responsible to implement end point security controls for access mechanism and malware protection to servers and desktop environments.Responsible to deliver an antimalware and file integrity monitoring solution for Ladbrokes estates across the UK and Gibraltar data centres. Designed a high available FIM solution for critical servers across the strategic UK data centres by using Vmware SRM solution.Lead toolsets assessment options based on the requirements for server patching and software management distribution. Outlined Microsoft SCCM and Symantec Altiris client management for the windows environment and retail estate. RFP to follow.Advised operations on revision of patching policies and recommended proactive monitoring to be in place to minimise downtime on critical business systems.Advised operations on revision of patching policies and recommended proactive monitoring to be in place to minimise downtime on critical business systems.Designed a POC environment for evaluation of Symantec Data centre security and Trend micro as part of malwareProtection services to evaluate the right product for the project.Initiated log aggregation and log auditing capability by ensuring entire server estate is logging to Mcafee SIEM at Ladbrokes.Network SecurityThe project is responsible to deliver security controls implementation to monitor access to end point on the Ladbrokes network.Designed and delivered satellite office capability services by proposing the use of shared corporate services.Responsible for the design of firewall management solution i.e Algo Sec for Ladbrokes. The solution was designed to adopt virtual appliances and use the existing virtual infrastructure for Ladbrokes to minimise deployment and operational costs.Proposed a Site  Site VPN tunnel for third parties with a ring fenced VDI environment connecting to Ladbrokes network. This architecture provides stringent controls in place allowing a parallel access link to stream line and consolidate the current third party users connecting to Ladbrokes network.Solutions Architect Sep 2014  Mar 2016Responsible for project design changes and security solution architecture as part of cyber threat management within Vocalink which provides services i.e BACS, FPS, BGC and Zapp (Pay by Bank App).Lead and delivered enterprise wide operational intelligence tool within vocalink i.e Splunk Enterprise.Responsible for project from inception to delivery phase by defining business case and seeking approval from investment board to execute the project into delivery phase.Responsible for senior stakeholder management as part of cyber threat management programme.Responsible for technology roadmap and security tools to ensure end to end security controls are in place.Designed and delivered BACS Reporting project i.e Migration of reports from ORS to BI Publisher with no interruption to the reporting capabilities allowing a seam less migration.Designed and delivered shared oracle services on OVCA as part of strategic hosting for card Services and Transaction Services.Advised and proposed strategic tools and capabilities to establish business service management within vocalink.Lead the due diligence phase for BSM project to ensure the business requirements are met and delivered and reduce impact management for core service within vocalink.Designed and deliver source code scanning solution for vocalink as part of the toolset strategy project by deploying Sonatype CLM for Risk solution.Responsible for Vocalink Enterprise Toolset Roadmap as part of Rationalisation and consolidation of Vocalink IT tools estate.Senior Architect for Oct 2013  Sep 2014Responsible for Data Centre Migration (DCM), hosting strategy, IT standards, supplier and vendor management .i.e. HP,IBM and Service Now at General Motors Financial Company .Technical Design Advisor on Ally separation programme TRB.Responsible for DCM migration approach from Ally to GM financial IO data centres.Developed migration strategy for all wholesale and Retail application portfolio applications to respective regional data centres, UK and US data centres.Defined hosting standards as part of DCM programme and promoted shares services infrastructure platform as part of the target architecture design.Defined application migration work streams as part of the DCM programme.Technical design authority for target architecture designs for whole sale and retail applications as part of the DCM programme.Adopted Saas solutions as part of transition and transformation to align parent company technology and vendor standards i.e Service Now for service management.Oversee Technology governance board as part of the DCM programme to ensure the migration strategy is aligned to IT standards and principles.Senior Solutions Architect for at April 2013  Sep 2013Responsible for Solvency II and BAU activities for

Respond to this candidate
Your Message
Please type the code shown in the image:

Note: Responding to this resume will create an account on our partner site postjobfree.com
Register for Free on Jobvertise