Executive Security Professional Professional Summary More than 30 years of experience as an IT professional with strong expertise in IT management, IT security management, and IT enterprise architecture. Demonstrated expertise in establishing and implementing large information security programs. Designed and implemented automated tool-based vendor management, vulnerability management, and risk management frameworks, with continuous monitoring. Performed certification preparation and attainment of ISO 27001:2013, HITRUST to adhere to CIAA (Confidentiality, Integrity, Availability, and Authenticity) of critical business information assets and environment. Highly skilled, dedicated, financially aware, and enthusiastic team player with excellent leadership and communication Skills. Highly adept in risk management and business continuity with additional skills in Artificial Intelligent security, Deep learning, and blockchain technologies. Additional Skills building out highly effective Security Operations and incident response reporting and alerting. Qualification and Skills C|CISO 2016
Overview
37
37
years of professional experience
1
1
Certification
Work History
SmartRent Date Of
06.2019 - Current
Creation of overall strategy around risk, privacy, compliance, and internal audit program
That interacts with Sales, product, engineering, operation, and physical security
Obtained security certification and attestations with from ISO 27k13/ISO 27k22, attestation SSAE 18 SOC 2 Type 2, and SOX 404a/b audit and report
As well as provided guidance and direction on SEC and reporting
Managed a team of Developers, Engineers, and architects for product development, engineering, and network security approaches
Terraform and other automation tools are secured via the engineering and production security program and initial assessments and evaluation process as well Developed and implemented the overall global privacy strategy and framework
As the continuous improvement imposed by standards and regulations
Creation of overall responsible disclosure and intake system for continuous testing of every product and service offering deployed
Facilitated and identified security framework for COVID-19 and work-from-home protocol
Implementation and coordination of certification and attestation
In order to obtain ISO 27001:2013 certification and SSAE 18- SOC 2 Type II, SOX 404
Codebase elixir, ruby rails, and JS web3.0
Expanded within AWS and architecture of fully redundant solutions and compliance within production services
Creation of security architecture design utilizing the CSA framework to identify issues and preventative controls
Implemented ISMS with no exclusion with full creation of policy library, vendor, vulnerability, risk, and internal audit function
Creation of a 5-year security roadmap and KPI for governance structure and board reporting
Lead initiative to convert SOW and Manual to workflows that are being automated
Designed and implemented
Creation of content for marketing and external websites
Working with shareholders to implement and coach other holding companies
Implementation of Salesforce, HRIIS, and automation tool security
Auditor and author of Internal Audit framework, schedule, and reporting
Implementation and administration of security controls, CI/CD scans, technical security, and WAF security controls as well as directory and SAML 2.0 and Auth 2.0 profiles data
Creation of data dictionary and security controls and retention and risk statements
Development of (Alliance/ Consortium) to help shape reasonable industry standards in the vertical to ensure proper, effective, and efficient security solutions and interop.
Executive Security Strategist
UC Healthcare System, Of
06.2015 - 06.2016
Working with Mid to Large security UC Healthcare organizations providing security services to create effective and efficient security programs based on NIST CSF, technical roadmaps, and technical implementation
Creating effective, efficient evaluations and assessments around Meaningful Use
Creating and designing software and corresponding process and procedures and architectures to support the organization's growth and roadmaps
Saving organization over $500,000 to 2million in cost associated with improper technology selection, resource, and needed skill sets, and technology that do not interop
Creation of sensible security policies /standards/procedures
Creation and implementation of vulnerability, awareness, and vendor management programs
Development of technical roadmap, architectural design, and secure SDLC
Automation code review and change management tool leveraging Kitana
Development of initial budget, staffing needs, and job description as well as hiring and attracting talent to grow
Delivery of ROI and TCO calculation as well as presentation to executives and boards
Provide trusted advisory, code development, and intellectual property
Provide and creation of forensics and incident response protocol and services
Provide virtual Chief Information Security Officer services to assist in driving security strategy through the organization, customers, partners and 3rd parties.
WebPT Date Of
08.2010 - 02.2016
The role of CISO was required to address the risk associated with the lack of a security program, and multiple security gaps in policy, procedures, and technologies
The implementation and auditing to obtain of ISO 27001:2013 cert
Also creating and implementing robust dashboarding and KPI
Creator and implementor of the Internal Audit process
In this role obtained the first certification in this vertical, within an 8-month time frame
Implementation of SSO, Identity management, and MFA
Drive the risk management program, and create a Secure Development Lifecycle, change controls, and release management with dynamic, and static security and code review solutions
Managed multiple M&A reviews resulting in a financial reduction in the asking price
Implementation of security architecture for cloud diversity leveraging AWS and AZURE to integrate with corporate solutions to extend the border to the cloud, and identify flaws that are and can be introduced by cloud solutions
Creation and rollout of Secure SDLC and leveraging automation of IDE automation for code review via Veracode
Creation of SAAS, Cloud, and premise security strategies for dynamic depth in defense
Implementation of SIEM, Vulnerability Management solutions stack
Able to impact revenue by designing and defining efficient controls by using risk identification and proper treatment and scoring to allocate proper funding for the most critical systems and environments Security report outs to the senior management test, steering committees, executive risk counsel, and the board
By implementing an information security management system, the organization has seen revenue growth, and obtaining the ISO has created and changed the current culture within the organization
Full Orchestration of AI, machine learning, Intelligence feeds, SIEM, and smart responses to ensure the automated attack is mitigated by automated preventions.
Interim Chief Information Security Officer
Dignity Health Date Of
02.2013 - 05.2015
Obtained to remediate weaknesses and to create a comprehensive, security program, organization, budget and policies, methodologies and framework to address critical deficiencies
The creation and effective implementation of a collaborative and consensus-driven executive security oversight committee
The creation of and benchmarking of Key performance indicators around, (awareness, 3rd Party Security, risk assessment, business continuity as well as, change, vulnerability assessments and identity lifecycle management)
Creation of and building dynamic highly effective information security, threat intelligence and operational risk teams to address all security concerns
Creation and delivery of security program and toolset required for EPHI EPIC solution, Nextgen and Horizon Labs, to create dynamic and automated security provisioning and removal of the user's account
Optimized and development of organization department budget, TCO and OpEx/CapEx budget ROI’s, management of budget in excess of 20 million over 4-year technical roadmap strategy
Addressed all critical and high-level findings with first 40 days
Performed Meaningful Use Stage 1 and 2 assessments over PHI environments, (Horizon Lab /Clinical and NextGen and EPIC EHR) Performed remediation planning and close out of all remediated items
Analyzed network traffic, eliminated unnecessary routing and equipment and reduced TCO by 32.3%
Created a gold image for Servers, workstations and mobile devices
Developed and managed the BCP/DR plan, also managed the consolidation of 5 data centers to 2 and significant move
Created strategic roadmap for transitioning off of dated Microsoft software and hardware and migrating to Windows8
Maintained and delivered risk reporting and provided an executive dashboard for tracking, prioritization, and remediation and funding
Provided security and risk requirements for ACO and converging 2 ACO’s into 1
Annual State of Security Address to the Board of Directors and Auditing Boards
Introduced a cost-reducing process with vendors, providing joint development
Reduced technology cost by negotiation utilizing best of breed vetting
Minimized risk by addressing roots caused and creation and development of proactive risk intelligence group and malware swat team
Obtained 100% awareness acknowledgment within 90 days over 10,000 users
Effectively addressed security concerns associated with FDA certified product and technologies that reside on the network
Development and architecture design around identity intelligence solution that allowed for dynamic and autonomous and able to extend to cloud and allow for “byoi’ bring your own identity
Led virtualization efforts to create an 80/20 mix of virtual environment and physical
Development and configuration of DLP and system logging and auditing that allows for extended protection and monitoring of SAAS, PAAS, and IAAS
Created, Designed predictive analytic security framework to address security within A.I
Algorithm and analytical predictive systems and development protocols
Created the Merger and Acquisition security requirements and guidelines for assimilation of acquired organization.
Deputy
Xerox HRO Date Of
02.2011 - 01.2013
Implemented and designed performance optimization program around all solution being offered and created a new architecture, cost structure, and services model to apply the best of breed and reduction objective
Responsible for securing Cloud and outsourced services for customers and the architecture, telecom, and network infrastructure, that also including databases, mainframe, data warehouse, business intelligence environments
Act as trusted advisor and consensus builder when required acted as a virtual security professional for customers lacking security expertise
Plan, develop, and manage information security and risk program for internal business units and to drive customer security requirement
A directed international team of 120 information security directors, architects, engineers and specialists for information risk management, IT audit and compliance, information security operations, architecture/telecom/network, infrastructure and applications, incident response, and capital/expense budget of an excess of 24 million plus
Designed, implemented and led information risk management framework that addressed all customer requirements
Designed risk scorecard for graphical visualization of customers risks portfolio for briefing quarterly of customers risks management steering councils
Managed and overall consolidation of Datacenter operations and implementation of virtual datacenter strategies utilizing virtualization solution
Managed infrastructure, desktop and mobile tech refresh that reduced the overall cost of operation by 40% as well as creating a virtual desktop strategy and lockdown process
Designed and implemented SAAS/PAAS/IAAS security solution for customers that would include tiered firewalls, network IDS, centralized logging, database encryptions, identity management and federation, and encrypted backup, as well as endpoint/infrastructure DLP
Coordinated with business HR to develop information security, risk management, and infrastructure career path
Designed strategic vision for infrastructure growth and implementation schedule and budget with the addition of PMO office and Change Management with overall project and budget for updating of infrastructure over course of 2 years
Designed and implemented physical security controls and personnel
Implementation included IP CCTV, access and incident door
Evangelized virtual Wintel implementation for additional lockdown requirements and also restrict and provide security wall around customer data and adhere to all security compliance and frameworks
Provides customer advocacy for security changes for internal infrastructure and managing all SOW requirements as well as gaps for remediation
Managed organization uplift of router technology from the Cisco IOS to the Nexus platform which reduced the overall cost of hardware and management systems
Increased efficiency of desktop and server build process by driving effective imaging standards and the subsequent processes
Managed and provided reporting on compliance and information security effectiveness against EU Privacy Act
Designed and implemented customers regulator and compliance and provides certification services for customers who wanted to obtain, ISO 27001 cert, SSAE 16 Type II and provided extensive risk and remediation GRC environment for vendors, 3rd parties, and external auditors
Reduced TCO of managed services by 40% within FY10 with an increased profit margin of 5 million
Developed comprehensive proposal (technology architecture, budget, and project plan, TCO, and ROI, Policy, Documentation) and led lifecycle of 3 million global ISO 27001 project to remediate IT infrastructure across 8 countries and 12 LOB
Responsible for building out a security program for leading research universities in the US, infrastructure, identity lifecycle management, and all policies &procedures
Led multiple campus and HIPAA activities which included 10 direct reports and 20 indirect reports in all aspects of security in a distributed environment with 2300+ servicers in multiple data centers
Managed system audits, incident response team and procedure documentation, risk analysis methodology, intrusion detection systems, vulnerability & penetration systems, and information security guidance to the executive management team
Evaluated all systems and performed all evaluation of technical solutions
Hire, train, supervise, and evaluate support/technical personnel for campus-wide support of computing and information systems and infrastructure
Coordinate the functions of the various units of assigned responsibility within the Office of Information Technology (OIT)
Implement security best practices and business controls based on change and configuration management methodologies, computer security, network security, cryptography, etc
Created the University security roadmap, information security program, and architecture, in addition to reviews and updates of Disaster Recovery and Business Continuity Plans
Maintains security liaison, counsel and obtains buy-in across the university and implements university-wide information security awareness, incident response protocols, and training
Conducts internal assessments of University security solutions and reviews the Secure Software Development and PMO mitigation processes
Provided Information Risk Mitigation regarding the HIPAA HITECH Act and FERPA, and FISMA requirements and adhered to PCI requirements and ISO 27001:2005 standards as well as State Breach Legislation
Responsible for all physical security requirements on multiple campuses for on-campus alert systems
Implemented camera system campus-wide
Reduced overall piracy by implementing a system to reduce all issues related to RIAA complaints
Lead University-wide security compliance committee as well as university-wide application security standardization and leadership council
Engineered overall security strategy for over 75000 users 5000 staff and 8000 faculty guest and physical security personnel, while enhancing user experience optimizing network traffic
Appointed on Pandemic and Virginia Tech security initiatives with the overall architectural design of the first university zoned architecture and the utilization of NAT with university infrastructure
Defined procurement legal documentation and negotiated all legal security requirements, assessment, and right to audit and site visit requirements
Installed redundant servers and led virtualization efforts that increased line capacity
Launched an effort overseeing a team of programmers review and rewrite over 30 key software applications to support cloud and mobile computing
Implemented change management leveraging ITIL process documentation for all aspects of the business including, new software and telephony upgrades
Maintained a highly secured environment base on FISMA, NIST, and FIPS-compliant technologies policies standards, and processes
Architected, engineered, and operationalized all encryption communication as well as centralization of the PKI infrastructure and all subsequent implementations
Managed and designed chip pin solution for university swipe pay and Sun Devil Dollars system
Quarterly briefing and communication to the Board of Regions
Launched security awareness programs that reached security and students and negotiated additional security packages for students with McAfee, Microsoft, and vendors
Designated HIPAA Security Officer for the school of nursing, health clinics, and medical and emergency services
Architected, engineered and operationalize all encryption communication as well as centralization of the PKI infrastructure and all subsequent implementations
Managed and designed chip pin solution for university swipe pay and Sun Devil Dollars system
Quarterly briefing and communication to the Board of Regions
Launched security awareness programs that reached security and students and negotiated additional security packages for students with McAfee, Microsoft, and vendors
Designated HIPAA Security Officer for the school of nursing, health clinics, and medical and emergency services
A rapidly recruited team of contractors and security employees to develop and implement the comprehensive, cost-effective information security program
Supported Board of Regions and Universities within Arizona as well as a State organization
Negotiated statewide contract of IDM and implemented as a service for all participating agencies
Implements a security service-oriented architecture within ASU, UofA, and NAU, which allowed for federated environments and services
Performed additional duties serving as the designated HIPAA security officer of all ASU location
Managed PCI level 2 assessments
Design and implementation of ISO 27001 certification and award
Compliance-driven by utilizing the ITIL service delivery model
Created RFP for University-wide physical security systems which included (camera, access, and security guard )
Increased standard .1% information security funding to 6 % within the first 18 months
PRINCIPLE SECURITY ARCHITECT
TERADATA NCR
02.2003 - 01.2005
Enable Business Strategy - developed and coordinate multi-year project plans Information Security Operations - monitors, detect, and responded to information security incidents; coordinates and manages proactive prevention and responses to environmental attacks; conducted penetration testing and implemented preventive measures; coordinates technical investigations; manages firewall rules and devices; manages intrusion detection, anti-virus, and spam control technologies across the enterprise Audit/Regulatory Liaison and Change Control - in-depth knowledge of the banking/healthcare/retail regulatory environment, federal laws and regulations; completed an annual information security risk assessment, oversee information security policy; coordinated interaction with internal auditors and corporate security, industry regulators and government agencies, the OCC and the Federal Reserve, OTS; coordinated interactions with internal compliance; managed the production change control board and associated processes Information Security Engineering and Vendor Review - Developed and maintained the security architecture for the banks and healthcare; oversees the security architecture engineering lifecycle; coordinated existing and new solution security design reviews; coordinates security awareness and communications; completed third-party vendor risk reviews and oversee the annual review process Data Security and User Provisioning - oversee end-user security architecture; manages end-user computing controls including governance and compliance; managed end-user system access operations and services; managed end-user accounts and lifecycle Application Design Guidance - works with Application Development leaders to develop best-practice security methods and standards for custom and third-party vendor applications; conducts third-party vendor assessments and certifications before approval for production implementation Program Management - worked with enterprise project services (EPS) to formulate strategies and tactics for successful governance of Business Unit projects; establishes efficient work procedures in conjunction with EPS, assignments, monitoring mechanisms to meet objectives; understands risk-based project management and develops appropriate risk mitigation strategies; completed accurate project statuses and meet appropriate deadlines; ensured all software was developed in accordance with common services and risk management standards and methodology
Resource Management - works with other IT Directors for effective and optimum use of resources within IT Risk Management and across the technology enterprise
Financial Management - provided accurate and timely forecasts and information for reporting; monitor project financials routinely; takes corrective action to meet financial objectives; appropriately composed and presented the cost/benefit of IT investment decisions in support of business strategies
Client Management - developed positive working relationships with all clients based on trust and contribution; maintains ongoing, substantive dialogue with business leaders resulting in a thorough understanding and embracing of business strategies
Service Level Management - developed and monitored key success metrics and quality standards
Solution Design - manages the process and the personnel, who identify, research, evaluate and recommend appropriate IT Risk solutions for business initiatives and provide assistance with a presentation to executive management
Vendor Relationships - established relationships with key IT Risk vendors to expand computing capability while reducing technology complexity
Assisted with projecting software and hardware requirements
Consultation with personnel in information systems sections to coordinate activities
Managed the simultaneous activities of multiple project teams
Performed general management duties, exercising the usual authority concerning staff, performance appraisals, promotions, and terminations
Recruited, developed and retains highly qualified staff
Established the security advisor role across multiple international organizations and orchestrated security engagements with national and global Fortune 500 companies
Provided information risk mitigation and security reviews for client’s security program
Assessed Teradata security implementation solutions and provided tools and technical requirements for effective remediation and security controls
Created the design and installation of security services and systems for Fortune 500 companies such as Albertson’s, DOD, CITI, Hershey’s, and Royal Bank of Canada
SENIOR DIRECTOR
FIRST COMMAND FINANCIAL SERVICES
05.2001 - 02.2003
The areas of responsibility reporting directly to the CIO include Application Delivery, Mainframe Operations, Distributed System Operations, IT Risk Management, Physical Security, Telecommunications, Desktop Services, IT Vendor Mgmt and Administration, Enterprise Records Management and Enterprise Project Management
Primary responsibilities included: Data Security User ID administration (provisioning and maintenance) Information Security Operations and Infrastructure (including Firewalls, intrusion detection, anti-virus, proxy servers, phishing, spam control, laptop encryption, database encryption, patch management) Corporate Computing Standards Oversight Audit and Regulatory Liaison Production Change Control Management
Overall management expectations were to provide strategic leadership, vision, and on-going support to other IT and line of business (LOB) leaders regarding information security best practices and trends
I worked in concert with the other members of the IT Leadership team to fulfill regulatory requirements and deliver state-of-the-art protection and oversight for the banking technology infrastructure
Core competencies included technical capability and general savvy with leading information security tools and practices
In addition, relationship and communication skills were critical due to the highly interactive nature of the position with external regulators, the board of directors, internal auditors, and internal enterprise risk management
Other duties were general business knowledge, strategic/global/visionary/ enterprise thinking, critical thinking skills, overall leadership adeptness, and proven project management wisdom
Service Level Management - developed and monitors key success metrics and quality standards Solution Design - manages the process and the personnel who identify, research, evaluate and recommend appropriate IT Risk solutions for business initiatives and provides assistance with presentation to executive management Vendor Relationships - establishes relationships with key IT Risk vendors to expand computing capability while reducing technology complexity Assists in projecting software and hardware requirements Consults with personnel in other information systems sections to coordinate activities Manages the simultaneous activities of multiple project teams Performs general management duties, exercising usual authority
Implementation of surveillance systems within the bank and access badge system
Negotiated cost-effective contracts and services with external vendors and retailers
Evaluated in-house, non-COTS (Commercial off the Shelf), and legacy software implementation and enhancements
Set annual budget considerations and developed long-term security strategies
Managed updates and responsibilities regarding the Corporate Business Continuity Plan, including outsourcing recovery planning and providing BCP testing under FFIEC guidelines.
INFORMATION SECURITY SENIOR ARCHITECT
MATRIX
04.1991 - 03.2001
Globally deployed and managed enterprise security architecture, infrastructure, and governance for complex security initiatives, as well as managed budgeting and forecasting for multinational organizations covering APAC, EMEA, America, and Africa
Created a comprehensive security policy, processes, and procedural documentation and implemented supporting security technology and methodologies (based on Infosec Assessment Methodology NSA and ISO 17799)
Reviewed and engineered the EDI framework as a secure solution for all backend processes and service calls
Developed and implement comprehensive security policy and procedural documentation
Secured project funding with ROI models and business case outlines as well as conducted returns on resources for completed installations
Provided risk evaluation and protection through cyber-insurance exercises to retain coverage with local insurance companies
Acquire, designed, and implemented a Global VPN solution, with RSA SecurID and directory services which supported over 35,000 users
The design guaranteed an uptime of 99.999% by building redundancy and leveraging VRRP
The solution also served as 3rd party environment for collaboration and joint development
Developed standard images for desktop systems and servers
Provided administration of Windows, Linux
Created a Merger and Acquisition process for Information Security and evaluation criteria and reports
Created an innovative solution for VPN to ensure timely and secure joint development was accomplished.
Regional Security Manager
SBC Internet Service
01.1996 - 01.1998
Provided technical and business policies, management.
Information Risk Management Consultant
KPMG
01.1995 - 01.1996
Provided risk assessments and evaluation services.
Senior Network Engineer
SuperNet
01.1991 - 01.1995
Provided internet service provider network and infrastructure technical support and maintenance.
Intelligence/Logistical Officer
United States Marine Corps
01.1987 - 01.1992
Education
Regulations
HIPAA/HITECH, PCI-DSS 3.2, State PII and Federal PII, GDPR, MIPS - undefined
HITRUST (5)
ISO 27001:2013 # IS684187
Infosec Budget Forecasting, Management and ROI, Capex and OpEx, GRC, WAF, IDP, personnel management, Governance, Audit Board presentation, Awareness Program, Security program, Secure SDLC, OWASP Project
Salesforce-Security, AWS – Security, Azure Security, Data Center Security, DR site security, DLP (endpoint, network, and CASB) Nextgen FW, Load -Balancer, Router Switched, Cisco Firepower, Certificate Authority, Code Static Analysis, dynamic scanning, policy compliance, Certificate Authority, Encryption: TLS 1.2, ECC Sha, SHA 512 - undefined
ISO 27001 Lead Auditor - undefined
2018
NSA Blue Team - undefined
2018
CRISC - undefined
2013
BACHELORS SCIENCE - undefined
ALAMEDA UNIVERSITY
2009
NSA_IAM - undefined
2003
CISSP - undefined
2002
Computer Forensic Investigator - undefined
2001
NSA Red Team Leader - undefined
2000
Bachelor of Science - Technology Engineering
Charter University
1995
Skills
Lucent - ATM Switch
Lucent – Definity Phone Switch
Oracle – Security Best
Proximity – Card Reader system
Evantix, BITKOO, AppScan, Deep9nines, DBwall
Cyber Law (Contracts), Atlassian (Jiro, Confluence), GitHub/Lab, AWS security hub, CASB , DLP , Dark Trace, ProductBoard, LucidChart, Google Security/ DLP , Okta
Audit Compliance
Investigate Breaches
Takedown Maneuvers
Improve Policies
Training Methods
Employee Relations
Daily Status Reports
Awareness Programs
Staff Hiring
Report Analysis
Policy and Procedure Adherence
Skilled in Conflict Resolution
Protocol Optimization
File and Records Management
Regulatory Compliance
Security and Antivirus Software
Court Testimony
Investigative Procedures
Administrative Duties
Team Leadership
Security Resource Management
Attentive and Observant
Database Query Software
Active Shooter Training
Crime Prevention
Security Hardware
Compliance Management
Program Auditing
Company Risk Mitigation
Operational Effectiveness
Employee and Visitor Screening
CCTV Monitoring
Closed Circuit TV Systems
Team Onboarding
Corrective Actions
Emergency Management
Training Materials
Wireless Technology
Digital and IP Video
Performance Evaluations
CCTV Expertise
Staff Management
Criminal Law Understanding
Employee Performance Evaluations
Accomplishments
Saved the company more than $700k in security consulting fees.
Collaborated with team of 20 in the development of security management .
Achieved 100% compliance by introducing A.I. NDR,XDRSoftware for remediation and breach notification.
Achieved Result through effectively helping with Task.
Resolved product issue through consumer testing.
Certification
CRISC, NSA_IAM
AppScan – Certification
Rapid 7 Certificate
Core Impact Certificate
Palo Alto Firewall Certificate
FTK – Forensic Certificate
Cellebrite – Mobile Forensic Certificate
Qualys – Certification
Network Associates – Sniffer Certification
BEA – Portal, and Application Server Training (Known as Oracle Fusion)
EPIC – System Training
Websense DLP
CISCO – IOS
Microsoft – Server and Desktop Administration
Splunk
Oracle Security
SailPoint
Opower
Cyber Law – Contracts -ASU
Negotiation – ASU
PMI – Training Course
Checkpoint NGX – Training
Sonic - ESB Integration Training
I2 Technology –Rhythm training
Global Knowledge – Advanced Security Engineering Course
Global Knowledge – Biometrics
Teradata – Teradata Factory Phase I / II course
J2EE- Architecture Design
SOA Architecture
Global Knowledge – Ultimate Hacking Windows 2000
Forefront ILM /DRM certificate
Eeye –Retina Scanner
Network Associate - Scanner
Oracle – Administration & Security Best Practices
Lenel – Access System
Envisioning Information (Yale, Emeritus Edward Tuft)
ITIL- ITIL Foundation
Naval Intelligence: Cryptography IEEE: J2EE Security AlphaTrust: PKI Altiga: VPN Cisco: PIX Whales: Air Gap Firewall Nortel Network – Connectivity Switch NTI – CNSP (Computer Forensics) IEEE – Member IEEE - Advanced architecture Design
Affiliations
Association of Information Technology Professionals
APICS – Association for Supply Chain Management
Toastmasters
Project Management Institute
Work Availability
monday
tuesday
wednesday
thursday
friday
saturday
sunday
morning
afternoon
evening
swipe to browse
Quote
You only have to do a few things right in your life so long as you don’t do too many things wrong.