Ambitious Information Security professional committed to formulating innovative solutions to challenges while optimizing processes. Polished in implementing and maintaining security plans and procedures and developing strategies to respond and recover from security attacks or breaches. Logical and analytical leader familiar with security tools and technologies such as vulnerability management, IPS/IDS, Data-at-Rest Encryption and SIEMs.