Summary
Overview
Work History
Education
Skills
Certification
References
Timeline
Generic

Bradley Bailey-Murray

Chandler,AZ

Summary

Strategic professional skilled in governance, risk assessment, and compliance management. Experienced in overseeing firewall installation, data encryption, and penetration testing to mitigate vulnerabilities. Expert in safeguarding company data through stringent enforcement of security protocols and comprehensive risk management strategies.

Overview

5
5
years of professional experience
1
1
Certification

Work History

Governance Risk Compliance Manager

OpenTech Alliance
Phoenix, AZ
01.2021 - Current
  • Ensured effective communication of changes in regulations or policies throughout the organization.
  • Reviewed contracts for accuracy and ensured they meet corporate objectives while adhering to applicable law and regulation.
  • Developed and implemented policies and procedures to ensure compliance with applicable laws, regulations, standards, and best practices.
  • Created reports outlining compliance activities for executive leadership review.
  • Developed risk assessments to evaluate potential impact of new initiatives or processes.
  • Conducted internal audits to identify areas of non-compliance and recommend corrective actions.
  • Facilitated meetings between stakeholders, including executive leadership, legal counsel, and department heads, to discuss compliance matters.
  • Served as a primary contact with regulators during external audit reviews.
  • Provided guidance on complex regulatory issues to senior management and other departments.
  • Assisted with the development of training materials for employees regarding compliance requirements.
  • Executed successful compliance monitoring and risk assessment programs.
  • Collaborated with legal counsel to ensure that operational activities are compliant with regulatory requirements.
  • Created documentation detailing all aspects of the network infrastructure and its configuration.
  • Installed software updates on servers, routers, firewalls, and other network devices.
  • Assisted in the design of local area networks and wide area networks.
  • Configured and maintained network hardware, including routers, switches, firewalls, and wireless access points.
  • Provided technical support to users experiencing difficulties with their networks.
  • Monitored network performance and troubleshooted any issues that arose.
  • Corrected network faults and malfunctions to restore connectivity to individual users and entire facilities.
  • Configured routers, switches, firewalls and other hardware to deploy and manage LAN, WAN and wireless networks.
  • Implemented, tested, validated and maintained networking services according to solution designs.
  • Implemented security patches, hotfixes, and service packs on all systems in order to maintain system integrity.
  • Performed vulnerability scans and penetration testing of the corporate network to identify any potential security risks.
  • Investigated incidents of unauthorized access attempts or data breaches in order to determine their origin and scope.
  • Coordinated external audits conducted by third party vendors related to compliance requirements.
  • Deployed anti-malware solutions across multiple platforms in order to protect against malicious software attacks.
  • Performed regular backups of critical data stored on the corporate network in accordance with established guidelines.
  • Researched new technologies that could improve the organization's overall level of security protection.
  • Developed security policies and procedures for network infrastructure to ensure organizational compliance.
  • Trained new employees on proper usage of company resources with regards to information security policies.
  • Provided guidance on best practices for users when connecting to public networks or Wi-Fi hotspots.
  • Conducted periodic reviews of user accounts and privileges within the organization's directory structure.
  • Configured and maintained firewalls, intrusion detection systems, and virtual private networks.
  • Managed authentication services such as LDAP, Active Directory, Kerberos for user access control.
  • Assisted with incident response processes by providing technical support during investigations into suspected security threats.
  • Performed system maintenance by handling security verifications of systems and processes.
  • Contributed to task list for maintaining network security across workstations, servers and peripherals.
  • Planned, engineered, and supported data center technology to provide protected and safe data storage.
  • Implemented software tools to assist in threat detection, prevention and analysis.

Change & Release Manager

Technology Credit Union
San Jose, CA
01.2020 - 07.2021
  • Developed, documented, and maintained software release processes that adhere to industry standards and best practices.
  • Managed the communication process between development, QA, operations, vendors, customers and other stakeholders throughout the entire release cycle.
  • Identified opportunities for improving existing processes for releasing applications into production environments.
  • Reviewed release plans, coordinated activities with project teams and stakeholders to ensure successful execution of releases.
  • Ensured all necessary approvals were obtained before rolling out new versions of applications into production environments.
  • Maintained a repository of version control systems containing source code files and configuration information related to deployed applications.
  • Performed post-release reviews in order to identify areas where improvements can be made.
  • Worked with project stakeholders in QA, development and business analysis to achieve objectives.
  • Compiled and reviewed progress data in order to assess timelines and project plans.

Education

Interdisciplinary Studies

Arizona State University
Tempe, AZ

Fullstack Developement

WOZ U

Skills

  • System Development
  • Risk reviews
  • Audit oversight
  • Information Gathering
  • Penetration Testing
  • Application security
  • Disaster Recovery Planning
  • Scripting Languages
  • Intrusion Detection
  • Firewall Installation
  • Firewall Management
  • Patch management
  • Incident Response
  • Firewall configuration
  • Team Collaboration
  • Decision-Making
  • Effective Communication
  • Security Needs Assessment
  • Risk Assessment

Certification

  • CC ISC2 (Certified in Cybersecurity)

References

References available upon request.

Timeline

Governance Risk Compliance Manager

OpenTech Alliance
01.2021 - Current

Change & Release Manager

Technology Credit Union
01.2020 - 07.2021

Interdisciplinary Studies

Arizona State University

Fullstack Developement

WOZ U
Bradley Bailey-Murray