top of page

CURRICULUM VITAE

Anchor 1
Professional ​
Background

A certified security specialist, project manager, solutions integrator, and risk manager with extensive experience in information security and process re-engineering, developing and testing security architectures of cloud-based systems, program management, audit and risk compliance, process/policy development and security advisory strategies with coupled with excellent problem-solving skills.

Certifications
Information Security and Risk Manager
BMC Software

​April 2014 to present

 

Manage the operational, technical and organizational risks associated with the business. This includes but not limited to:

Consulting with service tower leads to convey the overall risk exposure levels to facilitate requisite baseline security requirements.

Manage encryption protocols to protect the business's data and manage authentication and access controls.

Researching new offensive security tactics, techniques, and procedures.

Support corporate risk leadership to review enterprise IT and cyber risks, assess capabilities, prioritize security and risk strategies, and communicate risk intelligence to drive business decision-making.

Drive quantifiable control improvements by working with the audit and compliance teams. This includes working directly with external auditors.

Provide mentorship and technical guidance to junior-level engineers.

Liaise with external partners, agencies, and peers to ensure the organization maintains a strong, proactive security posture; keep senior management advised about information security issues and implications for the company.

 

Proficient in information security domains, including policies and standards, risk and control assessments, access controls, technology resiliency, risk and control governance and metrics, incident management, SDLC, vulnerability management and data protection.

Security Solutions Architect
Cisco Systems

April 2008 to March 2014

Security, operations and project management specialist in several strategic capacities with acquisitions integration, special projects, led planning and execution, post-mortem reviews, and tools training. Managed several projects and efforts related to the company’s Tier 1 customers. Efforts included: project planning support, maintain project tracking repository, technical support, project staffing / resourcing, project process and compliance oversight, and portfolio status report preparation. Executed several security projects including: cloud computing integration, portal security, and security policy review / recommendations.

Senior Information Security Consultant
Avanade (Accenture)

January 2001 to April 2008

Formulated the national information security policy. Served as subject matter expert for Audit, Security Policy and Solutions, Risk Management and Operation frameworks. Provided pre-sales support including presentation, solution outline, proposal, and staffing requirements customized for each client. Executed several security audits and compliance assessments.

Information Security Engineer
Accudata Systems

November 1998 to January 2001

 

Performed several detailed security assessments, review and implementation of LAN and WAN designs for campus and enterprise organizations, designed and implemented a security awareness program. Moreover, served as a security advisor to select clients related to supporting security and technology recommendations and overall security posture.

Information Security and Network Administrator
Plains All American Pipeline

​September 1996 to November1998

 

Responsible for day-to-day operational security of in-house systems and remote office security and connectivity. Duties included management of remote dial-in services, account domain and enterprise application access, stability and upgrades of Windows and Unix based systems and backup/disaster recovery operations.

Work​
Experience​
Competencies

Operational Security

Perimeter (Palo Alto, CloudFlare), SIEM (IBM QRadar), Repository (Harbor), Host Protection (Crowdstrike), Web Application Firewall (ThreatX, Cloudflare, F5), DDoS (Neustar, CloudFlare)

Risk / Audit / Vulnerability Management

Enterprise (Qualys, Tenable), Web (Invicti, Qualys, Tenable), Network (Solarwinds, Wireshark, ThousandEyes), IT Risk Management (MetricStream, SAI Global)

Technologies

Cloud Platforms (AWS, MS Azure, Openstack, Google Cloud, Oracle Cloud, IBM), Content Security (CloudFlare, ThreatX), OS (Windows, Linux), Privileged Access Management (Passwordstate), Certificate Management (DigiCert)

Business Continuity

Incident Response Plan / Training / Testing, Business Impact Analysis, Recovery Point Objectives

Information Security Programs

Policies, Procedures, Staffing Criteria, Awareness Programs, Training, Audit, Governance, Compliance, Security / Hardening Guides, Ethical Hacking

Frameworks

CobiT, ITIL, ISO 17799, ISO 27001, ISO 27001:2005

Standards

Center for Internet Security (CIS), National Institute of Standards & Technology (NIST) 

Regulations

GDPR (EU), FedRAMP, DoD IL4/5, FISMA

Clearances

Top Secret

Education
Baylor University
Bachelor of Business Administration (BBA)

Management Information Systems

​1989 - 1993

 

LeTourneau University
Master of Business Administration (MBA)

​International Business

1996 - 1998

Activities, Societies and Honors

Baylor University

Tau Kappa Epsilon social fraternity, Young Investors Club, Lacrosse

LeTourneau University

Pi Sigma Epsilon business fraternity, Debate Club, Academic Honors (Summa Cum Laude)

bottom of page