Post Job Free

Resume

Sign in

Cyber Security Information Technology

Location:
Saint Paul, MN, 55119
Posted:
March 26, 2024

Contact this candidate

Resume:

Cyril Tommy Foday-kailie

**** ******** ** * ********* MN • ad4kti@r.postjobfree.com, ad4kti@r.postjobfree.com • Mobile: 651- 528-1812 www.linkedin.com/in/cyril-tommy-foday-kailie-ph-d-cissp-ccsk-dpo-gdpr-ecih-b79572ba https://www.credly.com/users/cyril-foday-kailie

Summary

Cyber security and data privacy scholar and practitioner with exceptional attention to detail, strong analytical skills, and proven ability to communicate across disciplines to produce excellent work under strict deadlines. Project management abilities and outstanding written and verbal communication skills. Superior capacity to solve complex problems and convey issues clearly and concisely. Skills

Data Privacy Risk Assessment Regulatory Analysis Compliance Policy Analysis Cyber Security Risk Assessment Software Proficiency Database Management, Legal Research, Cybersecurity and Data Protection

EDUCATION

Albany Law School of Union University, Albany, NY Master of Science in Legal Studies in Cybersecurity and Data Privacy, expected May 2024 GPA 3.93

Capella University Minneapolis, MN, Ph.D. in Information Technology Management and Cyber Security, MS, Information Technology Management and Cyber Security, BSc. Information Technology and Cyber Security. (2009-2021) GPA 3.88

CORE QUALIFICATIONS

• MS Office 365 proficient.

• SharePoint Online proficient

• Exception Records and Information Management experience

• CISSP, Security Plus, Certified Data Protection Officer, Certified Security Incident Handly, Certified Ethical Hacker, Certified Project Manager, Certified Cloud Security Knowledge (CCSK) EXPERIENCE

United Nations Secretariat, assigned to the United Nations Assistance Mission in IRAQ and the United Nations Investigative Team to promote Accountability for Daesh Tribunal 2017- March 2024 – Present

My recent responsibilities with the United Nations Secretariat include leading and developing service- level agreements with vendors and partners. Align legal requirements for technology and Enterprise deployment in my entity. Develop guides for organizations toward certification paths (e.g., ISO 27000, CMMC, and Required NIST frameworks).

Provide technical and legal counsel that aligns with multi-jurisdictional statutes as required for operationalizing the Security Council's mandate across multiple Nations and stakeholders. Bridge the gap between IT operations and legal compliance, ensuring robust cybersecurity control practices and safeguarding end-user privacy.

EXPERTISE

• Cybersecurity: Proficient in cybersecurity practices and risk management.

• Assurance and Compliance: Skilled in ensuring adherence to legal and regulatory requirements, including cyber supply chain risk management and security awareness.

• Data Privacy and Protection: Provide leadership in managing end-user risk related to data privacy and protection, including compliance with global privacy regulations federal and State Statutes such as CCPA, CPRA, GDPR, HIPAA, FERPA, NYPA, VCDPA, etc.).

• Legal Research: Provide leadership in legal research related to technology and privacy law compliance.

• Risk Management: Develop compliance recommendations within the organization’s risk tolerance to sustain cybersecurity and end-user privacy. Provide technical and legal counsel based on federal and State statutes, torts, contracts, antitrust laws, and anti-competitive perspectives as required by the FTC, SEC, and OCR while providing a guide for blockchain concepts and best practices.

United Nations Secretariat, assigned to The United Nations Mission in Congo. Cyber Security and Enterprise Risk Manager December 2009 – October 2016 Define ICT security standards and develop baselines to support operational requirements. Ensure compliance with industry "Best Practices. Incorporated international and federal regulations to meet organization ICT expectations through strategic ICT business planning; conceptualized and implemented security architecture based on Enterprise Architecture perspectives. Design ICT architectural perspective to support convergence services. Define end-user training programs to support ICT training requirements; undertake cybersecurity vulnerability assessment; Develop mitigation strategy for the cyber risk register.

Undertake holistic cybersecurity programs and manage server deployments, installation, administration, and development.

Security assurance team lead governing ICT resources, requisitioning and implementing ICT security technologies, and asset classifications.

Undertake risk management and analyses and define risk control recommendations.

Provide oversight for ICT governance and compliance, data privacy and protection, ISO/IEC 27001/2

Designed and implemented Active Directory/Azure Windows directory services; Developed endpoint protection through centralized Windows software update services using Windows Defender; established centralized malware endpoint protection with Symantec Endpoint Protection.

Perform Risk management and governance process developed from Business Impact Analysis; produced vulnerability assessment, audit, and managed Organization ICT security incidents.

Researcher interested in human-centric security controls, IT governance assurance, and security. UNIQUE VALUE PROPOSITION

I can offer adaptable knowledge of global privacy regulations and technology statutes and bring United Nations Secretariat operational diversity and experience. I have a strong information technology background, a passion for ensuring technical and legal compliance related to data privacy and protection are met, and proficiency in managing end-user risk related to data privacy and protection complies with jurisdictional privacy regulations. ENTHUSIASM

I am enthusiastic about governance and enterprise risk management, especially in fintech and non- fintech domains, and providing support at the intersection of technology and law. I am avid about business and security analysis and governance of Operational IT and supply chain while combining legal and technology expertise to ensure privacy compliance, data protection, and Cybersecurity regulatory compliance as required under the law.



Contact this candidate