Here is a summary of my job experience. You can also download a copy of my resume using the link below.
Foley & Lardner LLP
Responsible for working with IT Department personnel to design and architect security solutions. Responsible for the design, development, implementation, and maintenance of the organization-wide security program, governed by strategic direction, business requirements and resourcing and financial constraints. Provides reports regarding the effectiveness of security infrastructure and proactively makes recommendations for the adoption of new technologies, services and/or procedures. Provides technical consulting on all levels of projects (small to enterprise) and recommends resources. Acts as an escalation point for Security Administrators regarding complex security issue resolution. Works closely with the Manager of IT Security to ensure that security infrastructure delivers at a service level consistent with organizational risk, information access requirements, and business strategies.
Responsible for the design, development, implementation, and maintenance of the organization-wide security program. Led the Vulnerability Assessment Team to identify vulnerabilities in the system and assign resources to remediate them. Led the development of Mobile Device Management policy and procedure using Citrix XenMobile, Security Information and Event Management using IBM QRadar, Vulnerability Management using Rapid 7 nexpose, Identity and Access Management using Microsoft Identity Manager, Microsoft Office 365 roll out with Direct Access and two factors authentication using Symantec VIP.
Analyze, troubleshoot and take corrective actions in the network/telecom and computing environments that protect data by maintaining its availability, integrity, and confidentiality. Provide guidance and recommendation to strengthen security in the client area. Responsible for design and implement security solutions like anti-virus, email filter, web filter, SSL VPN, single sign on, data loss prevention and remote authentication using SecurID or RADIUS.
Responsible for LAN/WAN security solutions design and implementation. Served as project consultant and designer for security solutions. Managed over 50 CheckPoint firewalls, Trend Micro Anti-virus solution, F5 load balancer, MacAfee and Bluecoat Proxies. Led the Enterprise Logging project using LogLogic appliance and performed daily log review on systems to remove significant deficiency status on SOX audit. Performed computer forensics using EnCase to collect forensics evidence.