Highly accomplished Technology Officer with proven ability to lead successful corporate information security and technology operations and facilitate corporate growth through technology-business alignment. Special expertise in Cyber security, solution development, organizational excellence, program management, and process improvement. and multiple certifications, including CCNA, CCNP, CISSP Fellow. Adept at directing multi-national teams and administering multi-million-dollar budgets. Extensive familiarity education, Master of Cyber Security & Software Engineer development, manufacturing, transportation, healthcare, insurance, energy, financial, and technology sectors. Excellent presentation, problem-solving, and technical skills. I’m team player, have excellent written and verbal communication skills,
Cyber-Law IT Governance IT Risk Cloud Security Social Networking Security IT security Security Architecture Management Project/Program Management Threat & Incident Management Disaster Recovery / Business Continuity Strategic Planning IT Security Software Development Process Optimization Regulatory Compliance Technical Writing Cost/Budget Control Identity & Access Control
· Change Control Management Forensics E-Discovery
Evaluation - HORSE Project. OWASP, ISACA, ISC2, CSO Roundtable, CISO Counsel, Cyberspace Law Committee, CCE Group, CRISC Examination Advisory Board, CIO Network, Cloud Security Alliance, Computer Forensics and Investigators, Electronic Frontier Foundation, Electronic Discovery
• References: Available Upon request:
UNIX (AIX, Solaris, HP-UX), Encryption Linux, Windows, Cisco IOS, SPLAT, VMS, BSD, MS Office, MS Project, Oracle, SQL, DB2, MySQL, PCs, servers, firewalls, IPS|IDS, switches, routers, data center operational support, TCP/IP, UDP, ICMP, networking protocols and systems, compilers, shell scripting, Perl, C, HTML, Social networking technology, Wiki technology, Blog technology, Syndication, Pod casting, Application vulnerability assessment tools and scripting routines, Penetration testing methodologies and social engineering techniques