Steven Wyble
Spring Grove, IL 60081
Phone: 847-***-****
acukuo@r.postjobfree.com
Dedicated information security professional ready to contribute extensive project management and technical talents as well as outstanding information security expertise toward supporting the employer in optimizing productivity and performance while improving the confidentiality, integrity, and availability of its data.
Qualifications Profile
Excel in designing, configuring, installing, supporting and maintaining token ring and Ethernet networks, consistently exhibiting superior problem solving, prioritization, and multi-tasking capabilities.
Significant experience in systems architecture, installation, implementation, integration, security, and administration.
Offering solid talents in project management, systems engineering, technical support, staff training, team leadership, and process improvements.
Skilled in change management, IT policy and procedure development, and identifying cost savings.
Highly adaptable; quickly master new roles, responsibilities, technologies and environments.
Equally proficient in hands-on and supervisory roles; excel in managing and motivating teams to complete projects within defined budgets and rigid schedules.
Professional Experience
AonHewitt
4 Overlook Place, Lincolnshire, IL September 2012 to Present
Global Security Operations, Network and Endpoint Security
Senior Information Security Engineer
Provide security guidance to project teams
Troubleshoot security network components for faults
Configure Open/Free BSD firewall policy management
Configure SQUID and SLBD to provide web proxy and load balancing services to clients groups
Configure and troubleshoot F5 LTM and GTM appliances
Configure and troubleshoot FWSM, ASA and Juniper SRX firewalls
Configure and troubleshoot Bluecoat proxies
Work with managed security vendors such as CSC and Verizon
Walgreens
200 Wilmot Road, Deerfield, IL, July 2010 to September 2012
Firewall Operations
Checkpoint and Fortinet firewall administrator for 8500 gateways.
Information Security Team
Security Analyst
Policy management for Bluecoat proxies, Checkpoint firewalls, and Exceedium jumpservers
Installation and configuration of Tufin SecureTrack for management of Checkpoint firewalls.
Checkpoint firewall administrator.
Brinker International with Veritude, Dallas, TX, August 10, 2009 to December 4th, 2009
Information Security Team
Information Security Analyst
Wrote encryption policy and key management procedures
Assisted staff with rollout of Symantec Endpoint Protection and RU 5 updates
Deployment of 200 tokens to end users (See DFS section for large scale deployment)
Deployment of primary and replica appliances for load balancing and high availability: for local redundancy only
Installation and configuration experience with RSA Authentication Manager v.7.1 through RSA ACE/Server v.3.0
Extensive experience providing end user support for not only RSA Security products, but others as well
Solid experience managing complex customer environments and adjusting to changing needs of customers (scope creep)
Extensive project experience covering a wide variety of enterprise infrastructure projects
Discover Financial Services, Riverwoods, IL, 1996 to 2008
Infrastructure Management External Connectivity – Information Security Services (ISS)
Data Network Security Engineer (2007 to 2008)
Steadily advanced through a series of promotions based on exceptional performance, dedication and results, and selected based on proven technical capabilities as member of newly-created team tasked with resolving infrastructure management issues within ISS group.
Diligently analyzed and resolved stability problems with Netforensics nFx OSP 3.4.2 and PGP Keyserver 7.0.
Applied sharp troubleshooting expertise toward mitigating patching problems between Threat and Risk Team and Windows Support Team.
Spearheaded infrastructure update initiative within secure network zone and partnered with Security Engineering team in designing, documenting, and integrating new security technologies into infrastructure encompassing PGP Universal, Sourcefire IPS, and Qualys Scanners.
Navigated PGP Command Line roll-out, trained key administrators in product use, and instructed associates in company’s standard product development process.
Launched RSA SecurID Appliances to provide two-factor authentication for Juniper SA 6000 gateways, EFT Cisco VPN concentrators, and Neoteris SA gateways.
Conducted audit of ISS assets and entered data into LDRPS (Living Disaster Recovery Planning System) 10 to ensure and support business continuity efforts.
Specific RSA SecurID project related information:
Large scale deployment of 5,000 tokens
Deployment of 4 SecurID Appliances for load balancing and high availability: For local and geographic redundancy.
Documented solution from project proposal to end user training material
Supported end users for both soft token and hard token issues.
No knowledge of the SecurID API
Provided solution for two factor authentication required by end client
Provided project management skills to keep project and project team members on track
Security Engineering – Information Security Services / Network Operations
Data Network Security Engineer / Senior Network Engineer (2001 to 2007)
Sat on Architecture Review Board as the information security representative to perform application risk analysis, risk assessments, and assisted project teams in mitigating identified security risks following internal standards and policies.
Worked with internal IT auditors, external IT auditors, and subject matter experts to resolve identified security gaps, as related to internal standards, policies, GLBA, SOX, and PCI DSS.
Followed information security procedures to prepare risk assessments and appropriately disseminated findings to stake holders.
Developed risk assessment form in conjunction with members of our Security Operations team.
Developed incident response form which closely matched that of the United States Secret Service.
Performed Information Security evaluations of enterprise wide infrastructure (both existing and new) and made recommendations on how to improve access control, authorization, and confidentiality, while, in some cases, reducing cost.
Integrated several information security applications into the enterprise network to increase availability of the company’s resources to approved staff and vendors, confidentiality of the company’s data through secured communications, and integrity of the company’s data through approved monitoring of users, servers, and perimeter devices.
Followed an internally developed SDLC process to prepare project documentation, get approvals for project, developed timeline for project, managed project meetings, followed up with project team members to obtain project status reports.
Prepared documentation regarding application usage, support matrices, vendor contact information, application roles and responsibilities and maintained this documentation over several years for several applications and the infrastructure it resided on.
Actively participated in design and implementation of secure, 4-zone architecture, and seamlessly integrated Internet Security Systems’ SiteProtector v.2.0 and Real Secure Network Sensor v.7.0 Fast and Gigabit Ethernet network sensors.
Managed roll-out of CiscoSecure ACS v.3.11 for Windows servers to provide authentication, authorization, and accounting for routers and switches via TACACS+.
Continued …
Professional Experience continued … Steven Wyble ~ Page 2 of 2
Skillfully configured and integrated CiscoSecure ACS with MS Active Directory to provide RADIUS authentication for employee Wi-Fi network.
Achieved secure computing from a trusted zone into a highly restricted, management network by merging RSA ACE/ Server (Solaris) with a Neoteris proxy cluster.
Administered staff training through technical documentation and instructional presentations.
Relied upon to cost-effectively secure and manage multiple vendor relationships from product selection and evaluation, through to contract negotiations and finalization.
Expertly provided centralized systems operational support, administration, installation and maintenance of telecommunications, UNIX O/S, LANs, WANs, distributed processing and client-server operations.
Proficiently leveraged tools such as Tivoli Netview, Concord, nGenious, Sniffer Pro and Acterna protocol analyzers to execute in-depth protocol analysis.
Authored comprehensive network installation plan and changes, as well as associated documentation for use by local and remote team members for subsequent network roll-outs.
Exercised excellent leadership talents to train and mentor junior Data Network team members.
Championed recommendation and implementation of workstation and server protocol change which averted numerous outages, saving millions of dollars.
Network Engineering
Network Engineer (1998 to 2001)
Adeptly supported legacy token ring LANs consisting of Cabletron bridges and Frame-Relay WAN configured for Remote Source Route bridging.
Orchestrated project to convert 3,000 nodes from bridged token ring to switched token ring.
Traveled throughout the U.S. to assist with major conversion of 10 call centers to FastEthernet/Gigabit Ethernet networks.
Headed conversion from static IP addressing to DDNS, DHCP and WINS via Lucent’s QIP v.5.0 Suite.
Promoted from role as Server Administrator, Intel Platform Team (3rd Level Support),1996 to 1998.
Prior Background includes role as System Analyst, Advantis, Schaumburg, IL, 1992 to 1996.
Education & Professional Development
B.S., Journalism/ Advertising, University of Oregon, Eugene, OR
A.S., General Science, Grossmont Community College, El Cajon, CA
Technical Training & Certifications:
CISSP #336867
PMP Candidate #1570542: approved by the PMI to sit for the PMP exam.
CCSA (Checkpoint Certified Security Administrator)
CCNA (Certified Cisco Network Administrator)
CCNP (Certified Cisco Network Professional)
CCDP (Certified Cisco Design Professional)
SANS Institute:
503 Intrusion Detection In-Depth
505 Securing Windows
508 System Forensics, Investigation and Response
579 Virtualization and Private Cloud Security
Management 414: SANS +S Training Program for CISSP Certification Exam
Digital Intelligence:
Computer Forensics with FRED
Microtrain:
PMP
ITIL Foundation v.3
CompTIA Security+
CCNA Security
Technical/Computer Skills
Hardware: Cisco 2500, 4000, 7000, 7200, 3500, 5000, 5500, 6500, 8500, PIX 520, PIX 535, Nokia, Intel, RMON II probes, RSA Authentication Manager Appliance, Forensics Recovery of Evidence Device (FRED)
Software: IOS, Set/Clear CatOS, Windows, Linux, Concord, nGenius, Tivoli Netview, most protocol analysis software, ISS SiteProtector, Real Secure Network Sensor, Internet Scanner, MS SQL Server 2000, RSA ACE/ Server, CiscoSecure ACS for Windows, Cisco Traffic Director, Checkpoint NG, Lotus Notes, DDNS, DHCP, WINS, OSPF, HSRP, SNMP, TCP/IP, DLSW, frame-relay, ATM, MS Office, Visio, Encase