NCAA Basketball
Experienced Information Security Leader skilled in managing and designing infrastructure, with expertise in secrets management, encrypted file transfers, and identity access management to ensure security and compliance. Recognized for fostering collaboration and risk awareness in global enterprises. Specialized in proactively enhancing security through Vulnerability Management, Penetration Testing, and Security Architecture. Collaborates effectively with IT and Security teams to navigate the evolving security landscape. Brings a decade of experience in developing solutions for critical needs, deploying systems with minimal disruptions, ensuring compatibility, operational thresholds, and budget compliance.
With over 10 years of expertise in cloud computing infrastructure development, excels in facilitating smooth transitions from on-premise to cloud-based solutions. Utilizes cloud infrastructure to address on-site computing challenges. Builds enduring partnerships with vendors and clients, adept at installing, configuring, and monitoring complex systems. Proficient in system virtualization using VMware for Windows and Linux systems. Motivational team leader aligns cross-functional teams with business objectives. Holistic Systems Engineer creates seamless solutions, contributing to increased revenue and profits. Experienced with IT infrastructure management and team leadership. Utilizes strategic planning to optimize technology solutions. Track record of driving efficiency and innovation in IT operations.
IT asset management
Technical troubleshooting
Team development
Team collaboration
IT compliance
IT infrastructure
Cybersecurity best practices
Disaster recovery
Change management
Operating system management
Information security
ITIL framework
Enterprise architecture
Documentation management
IT governance
IT risk management
Documentation and reporting
Information confidentiality
Technical leadership
Technical onboarding design
IT service management
Technical support scheduling
Problem-solving
Multitasking
Project coordination
Project leadership
Analytical thinking
Project planning
IT infrastructure proficiency
Infrastructure planning
Project lifecycle management
Agile framework
Relationship building
Staff hiring
Budget control
End point configurations
Attention to detail
Requirements analysis
Infrastructure development
Excellent communication
Task prioritization
Scope definition
Organizational skills
Security planning
Multitasking Abilities
Decision-making
Team building
Teamwork
Time management
Problem-solving abilities
Reliability
Active listening
Effective communication
Adaptability and flexibility
Self motivation
Interpersonal skills
Professionalism
Strategic planning
Agile methodology
Time management abilities
Continuous improvement
Adaptability
Project management
Risk management
Technology integration
Professional demeanor
Technical support
Performance metrics
· 10 years of progressive experience in leading technology initiatives and managing high-performing teams.
· Proven record of leading security teams and implementing robust security protocols to ensure confidentiality, integrity, and availability of sensitive data.
· Extensive expertise in secrets management, including key generation, rotation, and secure storage.
· Strong understanding of identity access management (IAM) principles and experience in designing and implementing IAM systems to ensure appropriate user access controls.
· Proficient in infrastructure management, adept at overseeing the deployment and maintenance of secure infrastructure architectures.
· Excellent problem-solving skills, with the ability to address security vulnerabilities and implement effective risk mitigation strategies.
· Strong communication and leadership abilities, capable of collaborating with diverse teams and stakeholders to drive security initiatives and ensure compliance with industry regulations.
· Stay current with security trends related to Vulnerability Management, Penetration Testing, and Security Architecture
· Build and develop teams that are integrated and high performing.
· Stay current with security trends related to Vulnerability Management, Penetration Testing, and Security Architecture
· Ensure solutions developed across the organization are aligned to enterprise architecture standards and principles, leverage common solutions and services, and meet financial targets (cost and benefits)
· Analyze to determine the best path for solving business problems/opportunities that may include process improvement, systems enhancement, and user training.
NCAA Basketball
NCAA Football
Dallas Cowboys
LA Lakers
Family