Information technology professional with over 15 years of experience in the areas of security, network, security, and network administration. Proven ability to create and deliver complex IT solutions to meet critical business needs.
Provide security and network management support for the SIEM, including firewalls, and other related documentation. The implementation of the systems include: Solarwinds Orion, Wireshark, Solarwinds, and Netflow.
Perform vulnerability analysis, penetration testing, and security compliance. Responsible for the creation of Symantec Endpoint protection, McAfee EPO, and other enterprise level security.
Ensure that all the systems are implemented and maintained in accordance with the security standards and procedures. Provide guidance and support to the operations team.
Ensure security and integrity of the data Center and application configuration and auditing of the cybersecurity devices. Provide guidance and support to the SIEM team.
Provide security and vulnerability assessments, and monitor and report on SIEM results and trends to ensure compliance with DISA standards and policies.
Buffalo State SUNY
3. Develop and maintain security policies and procedures for the NE. The program is to provide a secure and reliable information protection system.
Management of the IT infrastructure, including: network, security, and software development, and project management. Responsible for the coordination of all aspects of the IT infrastructure.
Responsible for the development of a new system for the company. This includes the creation of a new security policy, and the implementation of a secure network.
Provide technical guidance and direction to the team to ensure that the system is capable of constructing and maintaining a comprehensive and accurate information security program.
Implemented and maintained a secure network infrastructure for the company. Created and managed a new Server environment. This included the creation of a new system, and the implementation of a disaster recovery plan.
Worked with the IT department to ensure that the security policies are adhered to and implemented the best practices for the organization.