Dynamic Security Engineering and Operations Manager at iHeart Media, I excel in leading teams to innovate and enhance data protection through Python-based solutions. With expertise in cloud security and incident response, I achieved 96% endpoint coverage while fostering collaboration and compliance with NIST standards. Passionate about proactive defense strategies and risk management.
Overview
13
13
years of professional experience
Work History
Security Engineering and Operations Manager
iHeart Media
10.2021 - Current
Led and mentored diverse teams of Security Engineers and Analysts, fostering innovation and continuous improvement.
Developed Python-based DLP software for internal use, enhancing data protection.
Oversaw Vulnerability Management, EDR, Cloud Security, and Threat Hunting to ensure proactive defense strategies.
Spearheaded threat hunting initiatives, identifying and mitigating security threats across cloud and endpoints.
Managed security stack including SentinelOne and Zscaler, optimizing performance against emerging threats.
Successfully deployed SentinelOne across 30,000+ global endpoints, achieving 96% coverage.
Built a data lake using Dataset for consolidating security logs, improving analytics capabilities.
Established security policies based on NIST and CIS Controls to strengthen organizational compliance.
Senior Incident Responder
Aspire Technology Partners
10.2020 - 10.2021
Oversaw SOC analysts as final escalation point for security incidents.
Conducted vulnerability scans and recommended patches for private sector and government clients.
Led tabletop exercises and simulations to bolster client preparedness against cyber threats.
Developed custom Python and Java scripts to meet automation needs.
Served as primary client liaison, delivering weekly security reports and root cause analyses.
Senior Incident Response
Motorola
08.2018 - 10.2020
Directed incident response investigations across AWS, GCP, and Azure environments.
Developed and modified Python and Java scripts for automation and penetration testing.
Executed forensic investigations, including memory analysis, disk forensics, and network packet analysis.
Consulted Fortune 500 clients and government agencies on cloud security best practices.
Employed tools such as CrowdStrike, Carbon Black, QRadar, and SentinelOne for threat detection.
SOC Analyst
Dataprise Inc.
06.2015 - 06.2018
Conducted incident response investigations across AWS, GCP, and Azure environments.
Monitored security alerts to facilitate rapid incident response and effective mitigation.
Assisted forensic investigations and malware analysis to enhance overall security posture.
Tuned SIEM configurations to optimize threat detection capabilities.
Managed user accounts through password resets, account creation, and deletion.
Provided technical support for incoming queries related to computer systems and software.
Delivered end-user training sessions as required.
IT Support Engineer
University of Maryland School of Social Work
06.2014 - 06.2015
Delivered technical support by troubleshooting hardware and software issues effectively.
Managed daily backup processes for all servers using enterprise-level solutions.
Monitored server performance metrics to identify opportunities for optimization.
Diagnosed and resolved complex technical problems through systematic troubleshooting.
Collaborated with vendors to secure hardware components and software licenses at reduced costs.
Maintained comprehensive inventory records of all hardware components in organization’s network.
Created detailed technical documentation for IT staff reference and training.
Developed and maintained user accounts, permissions, and access rights efficiently.
Technical Support Engineer
Apple Inc.
05.2012 - 05.2014
Delivered technical support by troubleshooting hardware and software issues for customers.
Monitored ticketing system queues to ensure timely response to incoming requests.
Resolved complex technical problems utilizing root cause analysis techniques.
Assisted users with password resets and account lockout issues.
Installed and tested operating systems, applications, updates, and patches.
Analyzed system logs to identify performance issues or security threats.
Trained end-users and staff on new technologies and system updates.