Summary
Overview
Work History
Education
Skills
Certification
Affiliations
Personal Information
Other Education
Honors And Awards
Timeline
Generic
Rachel Levitch

Rachel Levitch

Dallas,Texas

Summary

As Chief Information Security Officer (CISO) at Charles Edda and Charles Bouley (CECB), I maintain close partnerships with senior leadership, particularly infrastructure and engineering teams, to manage risk, audit, and compliance, ensuring all applications and platforms are developed with security at the forefront. I collaborate closely with IT and other technology groups to secure information, computer, network, and processing systems. CECB’s primary clients include small businesses, medical practices, and law firms, and the company is owned and operated by Dr. Rachel Levitch, who has expanded services to include advanced cybersecurity solutions that integrate financial risk management and regulatory compliance. Our services follow industry-recognized cybersecurity frameworks like NIST, ISO 27001, and CIS Controls to help organizations establish strong cybersecurity practices and cultures. For more information, visit LinkedIn or rachellevitch.io

Overview

18
18
years of professional experience
6
6
Certification
4
4
years of post-secondary education

Work History

Chief Information Security Officer

Charles Edda & Charles Bouley, INC.
01.2017 - Current
  • Assess current needs; develop, implement, and monitor a strategic, comprehensive enterprise-wide information security and risk management program to ensure the integrity, confidentiality, and availability of information owned, controlled or processed by the organization
  • Lead security strategy, prioritizing user data and application/product security, and coordinate the evaluation, deployment, and management of current and future security technologies
  • Oversee the development and enforcement of security policies and procedures based on industry-standard best practices
  • Monitor the design and implementation of disaster recovery and business continuity plans, procedures, audits, and enhancements
  • Build strong relationships within the security organization and across the enterprise in order to implement appropriate security controls to protect the enterprise and product, ensuring that user data remains the top priority
  • Partner closely with senior leadership, especially infrastructure and engineering, to ensure that all applications and platforms are developed with security in mind
  • Act as an advocate and primary liaison for the company's security vision via regular written and in-person communications with the executive team and other leaders to develop business case justifications and cost/benefit analyses for IT spending and initiatives
  • Work closely with IT and other technology groups to fully secure information, computer, network, and processing systems This includes Windows servers, application servers, storage, database servers, file and print servers, backup services, email servers and gateways, DNS, DHCP and Active Directory

Information Technology Analyst

Charles Edda & Charles Bouley, INC.
01.2013 - 12.2016
  • Configuration and use of firewalls, data encryption and other security products and procedures
  • Conduct penetration testing, simulating an attack on the system to find exploitable weaknesses
  • Monitor IT infrastructure security and performance trends and apply best security practices as governed by IT Security policies and procedures
  • Manage the configuration of the security information and event management configuration and Intrusion Detection/Prevention systems

IT Executive Director

Cognitive Institute of Dallas, 501 c3
Dallas/Fort Worth, Texas
01.2016 - 12.2018
  • The primary duties of this position fall under 3 general categories of which ran on an ongoing fiscal year basis: 1) Policy and Planning, Compliance and Operations
  • Certify that technology systems meet predetermined security requirements
  • Receive escalations and creating policies in what constitutes as a security escalation, employee/internal network threats management and potential impacts and risks. Consult w/ other Engineers; Report to executives

Education

Engineering

Texas A&M University
College Station, TX
10.2014 - 10.2016

Ph.D. - Learning/Information Technology and Performance Improvement

University of North Texas
08.2013

M.S. - Communication Studies

Texas Christian University
06.2003

Skills

  • Cybersecurity Technologies
  • Network Controls
  • Endpoint Controls
  • Governance Controls
  • Data Controls
  • Industry Controls
  • Anti-spyware
  • Antivirus
  • Business Continuity
  • ECloud Computing
  • Configuration Management
  • Content Management
  • Forensics
  • Information Technology
  • Infrastructure
  • Intrusion Detection & Monitoring
  • Intrusion Detection & Prevention Systems
  • Monitoring Systems
  • Network
  • Network Communications
  • Password Management
  • Penetration Testing & Vulnerability Assessment
  • Program Analysis
  • Revision Control
  • Security Planning Tools
  • Storage Tools
  • Virtualization
  • Visualization
  • VPN
  • Vulnerability Patch Management
  • Web Accessibility
  • Web Server Software
  • Web Services
  • Project Management
  • Virtual Conference
  • Platform Development for LMS
  • Technical Writing Platform
  • System/Audience Engagement
  • Team Management
  • Directories
  • HTML
  • CSS
  • Application Installation Platforms
  • JQuery
  • PHP
  • Open Source Software
  • JavaScript
  • RubyRails Lite
  • Python Lite

Certification

  • Cybersecurity, Texas A&M College of Engineering, College Station
  • End User: Network Security, Cybrary, Training Course
  • Chief Information Security Officer, Cybrary, Training Course
  • Network Security Fundamentals+, University of Houston, College of Logistics
  • Six Sigma Project Management and Continuous Improvement, The Quality Group
  • Certified Management and Quality/ Engineer of Quality, American Society for Quality

Affiliations

  • American Society for Quality, Member
  • American Society for Training and Development, Member
  • Texas Association of Nonprofit Organizations, Member
  • Texas Christian University Alumni Association, Member

Personal Information

  • Relocation: Anywhere
  • Title: Sr. Cybersecurity Engineer
  • Availability: Anywhere

Other Education

  • Certificate of Training - National Institute of Science & Technology (NIST), NIST Applying Risk Management Framework to Federal Systems, 2018-06-01
  • Certification of Principles and Practices of Information Security, Center for Information Security and Research and Education (CISRE), 2014-01-01

Honors And Awards

  • UNT Financial Aid Scholarship, 2003-2013
  • Excellence in Leadership and Service to the University, TCU Leadership Center, 2003-01-01

Timeline

Chief Information Security Officer

Charles Edda & Charles Bouley, INC.
01.2017 - Current

IT Executive Director

Cognitive Institute of Dallas, 501 c3
01.2016 - 12.2018

Engineering

Texas A&M University
10.2014 - 10.2016

Information Technology Analyst

Charles Edda & Charles Bouley, INC.
01.2013 - 12.2016

Ph.D. - Learning/Information Technology and Performance Improvement

University of North Texas

M.S. - Communication Studies

Texas Christian University