Vice President of Information Technology
· Leadership
· Developed and executed an enterprise IT strategy aligned to corporate goals and regulatory mandates, leveraging TOGAF-based enterprise architecture and strategic pillar models.
· Directed IT operations for a critical infrastructure organization, ensuring compliance with DHS and CISA guidelines through structured resilience and governance practices.
· Led implementation of Governance, Risk, and Compliance (GRC) frameworks using NIST Cybersecurity Framework and SOX controls to meet FDA, GMP, GLP, and SEC requirements.
· Integrated Technical Operations with IT to enable IoT-driven automation across lab instruments and production systems, applying secure-by-design and data integrity principles.
· Established a formal Vendor Risk Management function aligned with SOC 2 Type II and ISO 27001, including security clauses, review cadence, and access controls.
· Enterprise Applications and DevOps
· Directed modernization of core platforms, including ERP, PLM, QMS, LIMS, CLM, VDR, and Board Management, aligning enterprise systems with business capability requirements.
· Managed MSP DevOps operations for enterprise applications with CI/CD pipelines supporting AI-enhanced analytics and ML-driven genomic platforms in native cloud applications.
· Deployed and maintained public-facing web properties in a SOX-regulated environment using secure software development lifecycle (SDLC) best practices.
· Identity and Access Management
· Deployed an organization-wide Identity and Access Management (IAM) strategy across more than 40 platforms, implementing RBAC, SSO, and MFA based on Zero Trust architecture.
· Enhanced security posture by eliminating brute-force threats using adaptive authentication with Azure Entra ID and Okta.
Cybersecurity and Risk Management
· Designed a layered Defense in Depth strategy including air-gapped SIEM, EDR, IDS, and XDR systems, supporting incident detection and forensic analysis.
· Replaced legacy VPN infrastructure with Meraki SASE and AnyConnect integrated with SAML-based SSO and MFA for secure remote access.
· Enforced email authentication standards (SPF, DKIM, DMARC), eliminating over 800 domain allowlists and mitigating delivery and impersonation risks.
· Implemented a ransomware-resilient backup architecture across hybrid infrastructure, supported by redundant encrypted data paths.
· Standardized security operations with automated and manual response workflows, integrating governance KPIs and SOAR readiness.
· Infrastructure and Operations
· Developed and implemented segmented network architecture standards for cleanroom, laboratory, and manufacturing zones, aligned to GxP and Zero Trust Network Access (ZTNA).
· Replaced legacy helpdesk platforms with Zendesk integrated into an ITSM ecosystem that included RMM, change approval workflows, and AI agent functionality.
· Re-implemented Microsoft Intune and RMM tools for endpoint lifecycle management, client backups, and secure configuration enforcement.
· Achieved 99.95 percent system uptime and reduced infrastructure costs by 38 percent through hybrid cloud optimization, vendor consolidation, and capacity planning.