Multi-faceted Technology Consultant, senior security analyst with experience developing strategic and business requirements for the creation and delivery of new technology applications in regard to security. Teamed in implementing and enforcing security policies and procedures in accordance with federal, state, and institutional standards. Experience in aligning new acquisitions in term of security standards and best practices. Managed successful projects over the years that contributed to the retention of a significant number of company customers. Also I developed a solid skill of customers facing over the years by client sites consulting that helped solidify business relationship and trust. From system engineering to programming, from ethical hacking to Vulnerability Management, PCI compliance to Web Application Security with my active security , public trust clearance and my language ability (fluency in French and in Spanish), I helped deliver numerous projects that helped organizations gain competitive advantage and be ahead the game
Overview
23
23
years of professional experience
1
1
Certificate
Work History
Senior Security Analyst – Security Architecture and Consulting
ACI WORLDWIDE
ATLANTA, GA
07.2015 - Current
Plan, research and design robust security architectures for most of IT projects
Work side by side with Security engineers in regard to project implementations
Oversee security awareness programs and educational efforts
Setting up encryption environment with Vormetric Data Security Manager, providing a high degree of security for data at rest on storage systems using techniques like VTE (Vormetric Transparent Encryption)
Years around security assessments on Company enterprise network regarding security architecture
Participate in the maintenance and enforcement of security policies; perform security awareness tasks, risks assessments, VLM, Web Application Security supporting the program in place
Perform risk assessments and executes tests to ensure functionality and effectiveness of security measures or techniques if existent or throw recommendations for improvements
Implement, maintain, and monitors vulnerability scanning program with part of the business; ensures scans run appropriately; works with system owners with the lead of the Business Continuity group as needed to prioritize and implement required corrective actions
Have tremendous experience with Qualys, Trustwave, Acunetix, Imperva, Rapid 7 Nexpose, Nessus Vulnerability Management and Web Application Scanning programs at an enterprise level
Creates and publishes security metrics, reports to teams, to executive leadership as needed
Work closely with internal audit in rectifying gaps by closing opened audit items against our department
Follow up on noncompliant items discovered during scans
Works with other internal teams and departments to ensure their systems are in compliance
Coordinate with other teams and internal departments on security responsibilities
Develop and maintain accurate documentation related to processes and procedures
Monitors security industry news, vulnerabilities and trends by collaborating with the team to address issues identified appropriately within our organization
Works with vendors regarding the evaluation of new technologies, develops functional testing plans, and makes recommendation on future technology purchases
Also Coordinates with other teams on evaluating new security technology
Works with application development team in requirements definition and help them mitigate vulnerabilities detected thru dynamic scanning using OWASP framework and best industry practices
I also introduced and implemented the OWASP Risk Rating Management with the web application security program
Provide metrics for measuring progress and risk mitigation maturity thru vulnerabilities severity and aging
Meet on monthly basis with different teams within application development to talk about approach of safe coding based on vulnerabilities or holes found within application they own
Participate in architecture and firewall review
Participate in ops DDoS tabletop exercises.
Production Engineer /Key encryption Manager
GEMALTO INC
ALTLANTA, GA
10.2014 - 07.2015
Manage Gemalto cryptographic key management processes, including those for the DNSSEC Root Key Signing Key (KSK), KEK (Key Encryption Key), ZMK (Zone Management Key) etc
Manage certificate authority hierarchy and certificate profiles, including Certificate Authority (CA) for Gemalto Clients in partnership with Master Card, VISA etc
Lead Risk Assessments for compliance with third party vendors
Write, review, edit, approve and maintain documentations and policies of these processes
Plan and execute KMS (Key Management System) ceremonies as needed, including logistical coordination
Manage and test disaster recovery plans for key management operations
Propose process improvements to maintain maximum security and maintain continuing operations
Manage the lifecycle of certificates and cryptographic keys
Minimize risks associated with managing cryptographic keys, including coordination of physical security
Prepare responses to third-party audits of Gemalto KMS functions
Prepare briefings and attend meetings to discuss Gemalto KMS execution of its key management responsibilities
Financial Card Instant Issuance production Engineer, logical security, server installation and management of the platform in regard to EMV (Europe MasterCard Visa) Technology
Customer profile setup thru with SQL server utilizing Stored procedure and data modeling with input and output file
Customer facing and coordination for projects accomplishments
Perform vulnerability scans, penetration testing and remediation tracking of IT systems and technologies
Review of Security access rights, IT system logs, encryption standards to ensure the integrity of customer data transmissions and recommend corrective actions as needed
Assist in conducting technical security assessments for networks, systems, applications and databases according to Visa/MC/PCI standards
Prepare and/or remediate corrective action plans as directed by Gemalto management
Participate/cooperate with regional internal audit plans as directed by Gemalto management
Review Information Security policies, procedures, standards and guidelines based on knowledge of Gemalto's guidelines, best practices and compliance requirements
Evaluate new and proposed security systems and technologies
Reviews circumstances surrounding data security incidents and designs corrective actions
Remain current with technology and security advances within the technology arena.
IMAGE MANAGEMENT /PROGRAMMER ANALYST
CEGEDIM INC
DULUTH, GA
01.2007 - 10.2014
Manage a group of 8 build engineers on the production environment
Windows Scripting for PC automation
Macros engineering (using web batch, win batch, VB Script, PowerShell, Java) that facilitate the daily tasks for the production and quality assurance technicians in customizing laptops and desktops according to our customer needs
Server configuration and control the build check sheet application maintenance (application written in Visual Basic.net and ASP.net)
Projects coordination thru their full life cycle development for internal applications such Clarify using SQL server 2005-2008(stores procedures) and Oracle SQL, Windows batching, power shell scripting and Visual Basic.net
Participate in SQL server backups (full, differential) and recovery model (full, simple and bulk-logged)
SQL Scripting with store procedures creation
Participate in Installing, Configuring, and Patching and Upgrading SQL Server Software instances
Experience with WebSphere server doing basic administration, security related task, distribution list and messaging channels
Project lead when it is time for execution by coordinating groups of technicians by making sure they know how the deployment scripts work in doing the build
I also work with active directory and Microsoft exchange doing back end programming thru tasks automation
Work with server clustering and SAN implementation for our internal applications
DAC (Dynamic Access Control) with active directory administration (Windows Server 2008 and 2012)
Experience with web services technologies like XML, SOAP, and AJAX
Microsoft Project for project management
Active Directory Administration with Citrix and 2X Client
Some experience also in mobile application development with IOS using objective C and Android using Eclipse and Android Studio.
INFORMATION SYSTEM /SECURITY ANALYST
UNITED STATES NAVY
07.2004 - 07.2012
Monitored security threats and risks involving critical infrastructures
Utilized both proprietary and third party (Wireshark, backtrack, Nessus etc.) applications to review customer security incidents on a real-time basis
Assessed the impact of potentially malicious traffic on customer networks
Develop basic IDS / IPS rules to identify and/or prevent malicious activity using Snort or other open source product
Adhered to established internal procedures and guidelines
Articulated security issues to customers, both verbally and written
Responded to customer security questions
Understanding current vulnerabilities, attacks and countermeasures
Knowledge of identified operating system platforms; routers, network protocols, and security architecture
Programming with Snort lightweight intrusion detection for networks
Firewall configuration thru scripting with PowerShell and Win batch for a number of our clients to provide a layer of defense which monitors network traffic for predefined suspicious activity or patterns, and alert administrators when potential hostile traffic is detected
Experience with McAfee endpoint encryption and SGN encryption (Safeguard- with full disk encryption), Sophos Endpoint Security Control for Intrusion Detection Prevention
TCP dump report for packets analysis, identification of patterns or anomalies that can lead to intrusion based on a set of rules in regard to signatures databases
Many Short deployments to Norway working with NATO Joint Warfare Command (JWC Stavanger) as Information System Technician
Engineering of Windows deployment of ISAF (International Security Assistance Force) exercises for joint military forces for Afghan War
Virtual windows environment setup using thin Client hardware at Joint Warfare Command Stavanger
Active Directory management with account creation and access permission
Email accounts and profile creation using Microsoft Exchange Server
Deployed to Africa with the Naval Research office in the cadre of AFRICON for application software testing on UNIX environment (Received award from general 2 stars for leadership and Job well done)
Actively monitored security threats and risks involving critical infrastructures
Utilized both proprietary and third party (Wireshark, backtrack, Nessus etc.) applications to review customer security incidents on a real-time basis thru packets and log analysis
Assessed the impact of potentially malicious traffic on customer networks
Develop basic IDS / IPS rules to identify and/or prevent malicious activity using Snort, and Nessus etc… Adhered to established internal procedures and guidelines
Articulated security issues to customers, both verbally and written by preparing security reports to security manager
Understanding current vulnerabilities, attacks and countermeasures
Adhered to established internal procedures and guidelines
Knowledge of identified operating system platforms; routers, network protocols, and security architecture
Snort programming for intrusion detection with customization
Firewall configuration thru scripting with PowerShell and Win batch for several our clients to provide a layer of defense which monitors network traffic for predefined suspicious activity or patterns, and alert administrators when potential hostile traffic is detected
Experience with McAfee endpoint encryption and SGN encryption (Safeguard- with full disk encryption), Sophos Endpoint Security Control for Intrusion Detection Prevention
Experience with NBTScan, Wire shark, Nessus, Metasploit, back Track for penetration testing
Experience to uncover software vulnerabilities, demonstrate the impact of the weaknesses, and provide recommendations for mitigation using tools like Metasploit, Nmap, Wireshark, backtrack
Obtained unauthorized access and proceeded to the retrieval of sensitive information thru web application and network infrastructure thru white and black box testing.
SUPPORT ANALYST /MESSAGING ENGINEER
COCA-COLA
MARIETTA, GA
12.2009 - 12.2011
Messaging engineer on Microsoft Exchange Environment
Managed and troubleshooted user accounts issues for resolution
Served as liaison between Coca-Cola and Microsoft Support with incident related issues in order to avoid downtime for users
Support of Mobile devices for the entire Coca-Cola Enterprise
Supported also many UNIX and SAP based applications around the Coca-Cola production environment
Support and maintenance of Coca-Cola Web SSO with a range of applications on an enterprise scale
Mobile device configuration such IPAD, blackberry, IPhone
Microsoft Lync Application configuration
Support Cisco -Juniper VPN technology
Outlook mailbox allocation size.
COMPUTER /DATA RECOVERY SPECIALIST
DENDRITE INC
NORCROSS, GA
12.2001 - 12.2006
Lead technician, coached about 4 other technicians to improve their work ethic in the result of increasing productivity by being more efficient
Maintained the hardware of more than 10.000 users for Novartis, which is one of our major clients
As lead technician, parts of the duties were to fix and refurbish printers (HP, Epson, Dell, Brother and Xerox)
Repaired and refurbished Toshiba, Dell, NEC, Compaq, Hp, Sony, NEC and Lenovo laptop, tablet models
Advanced data recovery by making sure that the customers get the maximum data when their computers crash thru software capture
Supported the application build check sheet in the Hardware Services written in Visual Basic.net and ASP.net
Build check sheet is the software that contains windows application requirements for each of our client regarding build requirements.
Education
Bachelor of Science in Information Technology -
American InterContinental University
01.2002
Graduate certificate in Information Security and Assurance -
Southern Polytechnic State University
Master of Science in Information Technology, Concentration Information Security -
Southern Polytechnic State University
Skills
Security architecture and consulting
Security policies and procedures
Security awareness programs
Encryption environment setup
Security assessments
Risk assessments
Vulnerability scanning program implementation and maintenance
Qualys
Trustwave
Acunetix
Imperva
Rapid 7 Nexpose
Nessus Vulnerability Management and Web Application Scanning programs
Security metrics and reporting
Internal audit coordination
Noncompliant item follow-up
Security responsibilities coordination
Documentation management
Monitoring security industry news and trends
Vendor evaluation and technology testing
Application development requirements definition and vulnerability mitigation
OWASP Risk Rating Management implementation
Safe coding approach discussions
Architecture and firewall review participation
Ops DDoS tabletop exercises participation
Cryptographic key management
Certificate authority hierarchy and certificate profiles management
Risk assessments for compliance
Disaster recovery planning
Process improvement proposals
Certificate and cryptographic key lifecycle management
McAfee endpoint encryption and SGN encryption
TCP dump report analysis
Snort programming for intrusion detection
Firewall configuration
Metasploit
Nmap
Wireshark
Backtrack for penetration testing
Software vulnerability identification and mitigation
Microsoft Exchange messaging engineering
Mobile device support
UNIX and SAP application support
Web SSO support and maintenance
Microsoft Lync application configuration
Cisco-Juniper VPN technology support
Outlook mailbox management
Computer and data recovery
Hardware maintenance and repair
Printer repair and refurbishment
Data recovery through software capture
Microsoft Access and Oracle database administration and programming
TCP/IP technology and network enterprise implementation
Information security concepts and administration
Ethical hacking and penetration testing
Database security and auditing
Database administration and maintenance
Wireless network security
MS Office
HTML editors
MS Front Page
Excel
MS Project proficiency
Project management and strategic management applied to information technology
Certification
2005, A+ Certified
2015-2016, Qualys Certified Specialist
2017, CCNT CISCO Certified
2017, CCNA CISCO Switching and Routing
2017, CCNA CISCO Security
2023, CISM ( Certified Information Security Manager )
Timeline
Senior Security Analyst – Security Architecture and Consulting
ACI WORLDWIDE
07.2015 - Current
Production Engineer /Key encryption Manager
GEMALTO INC
10.2014 - 07.2015
SUPPORT ANALYST /MESSAGING ENGINEER
COCA-COLA
12.2009 - 12.2011
IMAGE MANAGEMENT /PROGRAMMER ANALYST
CEGEDIM INC
01.2007 - 10.2014
INFORMATION SYSTEM /SECURITY ANALYST
UNITED STATES NAVY
07.2004 - 07.2012
COMPUTER /DATA RECOVERY SPECIALIST
DENDRITE INC
12.2001 - 12.2006
Bachelor of Science in Information Technology -
American InterContinental University
Graduate certificate in Information Security and Assurance -
Southern Polytechnic State University
Master of Science in Information Technology, Concentration Information Security -