Post Job Free
Sign in

Manager Management

Location:
Troy, MI
Posted:
December 05, 2014

Contact this candidate

Resume:

Frank A. LeFavi

**** ********* *****

Rochester Hills, MI 48307

BACKGROUND SUMMARY

Architected, implemented and managed the infrastructure for domestic and

multi-national corporations on Wall Street and in Michigan.

Areas of Proven Leadership/Expertise in IT Procurement, Defense in Depth,

Risk Management, IT/Audit Compliance, Helpdesk/NOC management, Networks and

Telecommunications:

. Risk Assessment/Mitigation . Policies & Procedures

. Infrastructure/Architecture Review

. IT Audit /FFIEC/SOX Compliance . Enterprise Risk Management

. Defense in Depth Security

. Security/Compliance Best Practices . Network Management/Control

. Technology Evaluation/Deployment

. Proactive Defense Planning . RFP/RFI

Preparation/Process . Security Incident Management

. Legal/Regulatory (ITU) . Service Level

Management . Budget/Financial Management

. ISP/Carrier/Vendor Management . Contract Negotiations

. Contingency/Disaster Planning

. Network Operations . Strategic

Planning . Cost Reduction Programs

Employment History

GreenPath Debt Solutions

9/23/13 - Present - Manager IT Service Delivery and Security

Working in the Corporate office in Farmington Hills, managed a seven (7)

man team and: Data Center Operations, DR/Business Continuity, Break-fix

help desk, Telecommunications/Network, Information Security and Server/VDI

technology for 55 field offices and WHQ.

From a Security/Audit Perspective:

. Performed a security and compliance gap analysis and recommended

changes in alignment with SANs Top 20 Critical Controls

. Evaluated PII touch-points enterprise wide, and implement DLP

. Assessed and revised the Information Security Program; focusing on

current threat landscape and Compliance requirements

. Developed a framework entitle "Attestation of Information Technology

and Controls"; addressing SOC 2 type requirements mandated by

business partners and regulators

. Implemented A Vulnerability Management and Scanning Program;

identifying security and operational patches that needed to be applied

monthly

. Authored several policies addressing appropriate use and protecting

sensitive information

. Adopted, documented and deployed the Defense in Depth architecture;

layering security controls and technology

. Developed a framework for managing and responding to

regulator/external audits; reducing resource impact during audits

. Personally assumed the responsibility as Internal Audit; coordinating

and managing all third party and regulator audits

. Developed and Implemented a Vendor Management Program; proactively

identifying and mitigating risks

From a Disaster Recovery Perspective:

. Assessed the enterprise-wide infrastructure to identify potential

single points of failure; and set in motion to plans to remediate

those risks

. Assessed, with the Data Center Lead, the back-up and solution, and

replaced the technology with a more stable technology

. Evaluated and resolved the instability of the off-site replication, by

changing the co-location of the replication and the replication

appliances

. Initiated the road map for the eventual implementation of a company

owned DR site

From and Operational Perspective:

. Managed the migration from Outlook 2007 to Exchange 2010

. Deployed Onbase 13, Windows 7, IE 10 to 550 devices across the

enterprise

. Deployed VDI to over 250 users; completing the enterprise-wide

deployment

. Evaluating team skills, functions, and revised job descriptions and

roles

. Changed the Help Desk staffing model; adopting a multi-shift model for

support

FirstMerit Bank - Citizens Bank acquired by FirstMerit

4/15/13 - 9/21/13 - Vice President, Manager - Managing day-to-day

operations of Flint based staff and 240 location

.

5/7/06 - 4/15/13 - Citizens Bank - Vice President, Manager of

Telecommunications - ITIL CERTIFIED

Manage the operations of the largest bank in Michigan, with presence

throughout four states, encompassing 222 sites. With a staff of six

professionals manage enterprise-wide voice, data, cellular and perimeter

security related services.

. Security, Compliance and Audit Related

o Developed and Implemented 802.1x, port authentication, throughout the

enterprise; eliminating the potential of non-authorized devices

accessing the banks infrastructure

o Developed, implemented and maintained "Defense in Depth" layered

security model creating zones of protection

o Developed, documented and implemented a Vulnerability Scanning Program,

proactively identifying and mitigating risk

o Developed and implemented a IDS/IPS architecture, in support of

proactively reducing the risk of an outside intrusion

compromising critical applications and services

o Took the lead in the development and implementation of a corporate wide

RASIC Framework, in order to document security related functions,

responsibilities, stakeholders and mitigating actions

o Developed and implemented numerous IT Controls and processes, focusing

on privileged access, change/release management, use of network

sniffers, segregation of duties, and the use of remote control programs

o Developed a single repository for internal and external audit

documentation, simplifying audit efforts

o Developed a privileged access matrix, outlining who, how and when

internal critical components are accessed

o Implemented Cisco's NCS, in support of deploying and managing Wi-Fi at

targeted bank locations, reducing the risk of rogue devices being

installed or accessed

o Developed the enterprise Security Incident Management work-flow,

incident remediation and escalation process

o Developed a Vulnerability Management Platform, that focused on how

security events are detected, and acted upon

o Developed and implemented a security event escalation and notification

process

o Implemented 24 x 7 x 365 proactive co-managed firewall/security

management and monitoring with SecureWorks

o Developed a risk management matrix, (including recommended remediation)

which identified potential security and operational risks

o Developed and implemented a high availability architecture for the

Internet and their associated firewalls

o Created details diagrams, focusing on the enterprise-wide security

posture

o Revised the corporate Patch Management process, outlining when and how

patches and releases are deployed

o Authored and published numerous policies, standards, procedures and

workflows, in support of regulatory compliance and documented best

practices

o Served as critical point for internal and external auditors, when the

Security posture was a focus on the audit

o Was an active member of the Change Advisory board, assessing every

change to determine potential operational and security risks

. In support of DR and Business Continuity efforts: (also linked to Audit

and Compliance)

o Developed, documented and implemented a critical device back-up process

o Rated all supported systems, in order to determine criticality and

sequence of implementation during DR

o Developed and implemented a network recovery plan, if power should fail

in the data center

o Developed network/device base-line configurations, enabling the bank to

quickly deploy technology when devices failed

o Implemented several layers of redundancy and resiliency, eliminating

single points of failure throughout the enterprise

o Created a DR technical recovery plan for the

Telecommunications/Security areas/assisted other areas in developing

their plans

o Developed a Service Delivery BCP Resource Management Plan, focusing on

how efforts are managed, following the declaration of a disaster

o Created A Contingency Plan Matrix, focusing on identifying mission

critical components, where redundancy exists, the risks associated with

third party managed hardware and solutions, and time to recover

o Developed standards, for all supported hardware, software and services,

including security configurations

o Developed a Pandemic Plan, which outlined, in the event a Pandemic is

declared, how services will be managed

o Developed a DR support Matrix, outlining the sequence of events, which

services are implemented, and prerequisites when a Disaster is declared

. From an Operational Perspective:

o Managed a $ 7 Million annual budget (reduced from $13 Million), by

developing a detailed run rate

o Renegotiated AT&T, Verizon, FIS and Siemens contracts saving $12 million

over seven years

o Evaluated the Telecommunications industry by issuing an RFP. Selected

the following converged technology for deployment (saving the bank $5.2

Million over a 36 month contract term starting 2013) :

> IP telephony, replacing traditional TDM PBX/VM Systems

> SIP, providing enterprise-wide VoIP to 219 locations

> Cisco Call Manager, creating centralized call management/control, with

a back-up located at our DR site

> QOS, enabling the bank to implement unified communications

> Replacing the Call Center technology, providing a scalable, feature-

rich SIP solution

o Developed and implemented methodologies to track internal and external

SLA's, reducing non-compliant services by 75%.

o Managed and successfully executed the integration of Citizens and

Republic banks network and security infrastructure

o Managed centralized dispatching for site break-fix from Flint,

servicing 222 sites.

o Reviewed and approved all change requests, prior to them being

submitted to the Change Advisory Board, reducing the risk of production

impact

Horn, Murdock, Cole (HMC), Troy Michigan

4/3/05 - 4/22/06 Director - Technology Risk Management

Services Practice

Acting as the practice manager, with CISA's, CIA's, CISSP's reporting

directly to me, and as a billable consultant:

. Assisted in the creation and growth of the Technology Risk Management

Practice throughout Michigan

. As a technical infrastructure SME/resource:

o Assessed HMC's infrastructure for vulnerabilities

o Developed/deployed a corporate-wide Information Security Policy

o Set the framework for future infrastructure IT SOX Compliance

o Created a risk management model, which was presented to our customers

o Identified and hired the required technical/audit team members

o Meet with clients to develop the business, and to monitor audit/project

deliverables

o Developed a Business Continuity Risk Matrix, which was presented to

existing and potential customers

. In an internal IT audit capacity, conducted audits for General Motors in

Detroit. Working for the Director of Internal IT Audit:

o Audited GM's 50 billion dollar outsourcing RFP process

o Assessed standardized work processes and their design, which govern how

IT services are managed on a global basis

o Evaluated the effectiveness of the two major families of evaluation

criteria utilized to formalize and assess suppliers bidding on 48

independent RFP's

o Conducted a Data Center audit, for GMAC evaluating security, incident,

problem and change management, managed by IBM

o Assessed the integrity of the supplier selection program; recommending

critical changes to further proactively mitigate risk

o Assessed the supplier transition plans for risk, and mitigating those

risks prior to the transition taking place

. Prepared an orientation program and document, to prepare auditors for

conducting IT and SOX audits for GM

. Conducted HMC internal training for conducting effective IT audits

General Motors globally

. Remediated SOX exceptions by creating an Information Security Policy, 24

IT policies and narratives for a publishing company, enabling them to

comply with year 2 SOX 404 compliance requirements

. Performed Quality Assurance, reviewing and evaluating the SOX controls

and testing performed by field auditors

ArvinMeritor Inc. Troy, MI

2/9/98 - 3/01/05

1/2005 - 3/01/05 Manager, Infrastructure and Data Security

7 Recently appointed to this newly created position. Scope encompasses

several key areas:

. With a staff of six (6) security administrators, manage global security

for production systems and application access

. Reviewed and assessed risks and vulnerabilities for ArvinMeritor's global

infrastructure

. Meet with suppliers, internal and external customers to determine secure

methodology for connecting to both trusted and non-trusted entities

. Identify, evaluate and implement technology to protect the perimeter

. Chaired a cross functional group task force to monitor/correct ongoing

security threats

. Developed, implemented and updated security policies, standards and

procedures

. Evaluated/recommended changes/enhancements to

ArvinMeritor's global voice and data networks

. Review and address legal regulatory issues that

affect data integrity

. Chair a weekly security audit conference to review potential or known

security issues

. Meet with internal/external IT auditors to ensure Sarbanes-Oxley security

compliance

10/1/03 - 1/01/05 Manager - Architecture and Strategy -

This function was created to accomplish the following business objectives:

. Dedicate an internal resource for integrating the acquired infrastructure

of Dana Corp

. Support divestitures, with regards to IT infrastructure, legal

regulatory, and security

. To provide global direction in the following areas:

o Firewall and Perimeter Security

o Mobile/Wireless Computing

o Security Related IT Controls

o 3rd Party Connectivity

o IT Service Level Agreements

o Corporate-wide Change Control

. Take a leadership role in the Architecture Review,

Incident Management and Change Control Committees.

2/9/98 - 10/01/03 Manager - Global Networks and Security

With a staff of seven (7), managed global voice, local area networks,

perimeter security, remote access, audio conferencing and a wide area

network services with presence in 85 cities and 42 countries.

. Managed $ 4.8 Million annual budget

. Reduced the number of network failures by 75% by implementing network

resiliency

. Implemented a network management platform, monitoring the pulse of the

global WAN

. Designed and implemented a high availability Internet solution utilizing

StoneBeat

. Outsourced Router Management, providing 24 x 7 x 365 proactive network

monitoring

. Improved perimeter and enterprise security by:

. Renegotiated corporate contracts reducing the global

budget by $ 23.8 million

. Issued a Global WAN R.F.I. and identified the next generation network

platform

. Planned and executed the relocation of the network corporate hub/data

center

Entertainment Publications - Troy, Michigan

2/28/95 - 6/7/97 Director of Information Systems - Operations

With a staff of eight (8), managed two help desks, a hardware repair, break-

fix area, procurement, voice and a domestic Frame Relay network.

. Managed the on-line operation of 155 sites, consisting of local and wide

area networks

. Managed a $ 4 million annual voice/data budget. Reduced operating

expenses by 28%

. Managed the headquarters local area network/infrastructure

. Performed a detailed network audit, identified and implemented diversity,

redundancy and resiliency; reducing down time by 21%

. Evaluated business needs and implemented a corporate wide electronic mail

system for 1600 users

. Evaluated MCI invoices, identifying billing errors totaling $ 520,000.00

. Conducted internal security audits, identifying and resolving security

vulnerabilities

. Evaluated grid power failures and installed a UPS and back-up generator

. Maintained 99.98% uptime during publishing production season

Other Accomplishments:

Published Material: Authored twelve articles/journals - published in trade

magazines and on-line. Recent publications include:

< Mitigating the Risk of IT Outsourcing Efforts - Published 12/11

< Change Management, The Framework for Reducing Infrastructure Failures and

Disruptions-

Submitted the following article: RMLC (Risk Management Life Cycle): New

Term for an Old Challenge

U.S. Military Certified - Graduate of the NCO Academy for Signal Corps -

Top Secret NATO Clearance Attained

U.S. Armed Forces Medallion Veteran

Presented Infrastructure Risk Management Elements and a Technology Risk

Management model to Detroit Chapter of ISACA on October 19th, 2005 in

Southfield. Provided consultative interviews that were published in

Newsweek and in Computer Decisions. Provided consultative services to the

United States Congressional Committee/Office of Technology Assessment on

network, communications and systems security. Presented views and

strategies on maintaining 100% uptime at the Interface Conference.

Recognized early in my career by the editor of Telecommunications Magazine

as a visionary and leader in transnational network management.

Was one of an eight man team at Citicorp presented with the KARP Award, for

creating a weighted criteria for vendor and technology evaluation that

later became an industry standard.

Challenges facing CFO's, CIO's and CTO's

Considering today's changing and demanding economy, data loss, identity

theft, and theft of Intellectual property, Finance and IT Leadership (and

most companies) are typically faced with the following challenges:

. Finding and retaining strong IT leadership, that has a balance of

business, technical and people skills

. Aligning IT with the lines of business; demonstrating IT is an

enabler, not just a cost center

. Disaster Recovery and Business Continuity plans are ineffective, un-

proven, or do not exist

. There are minimal controls in place; whereby elevated or privileged

access is not monitored

. A Security posture has not been developed or documented

. A layered approach to mitigating risk is not in place

. Developing and i9mplementing a vulnerability scanning/risk management

program; to proactively

mitigate risk wherever possible

. Viruses and other forms of malware threaten the integrity of their

infrastructure

. Technology is end-of-life, impacting performance and availability

. The absence of adequate redundancy and resiliency, enterprise-wide

. The impact social media, data loss and theft of intellectual property

has on the company

. Keeping up with the changing regulatory environment; and the need for

3rd party assessments

. The Wide Area Network is not scalable, or capable of supporting

changes in business direction

. Security Awareness programs do not exist or represent the current

threat landscape

. Policies and procedures are not thoroughly documented, or do not

exist

. IT expenses are high; with minimal accurate run-rates or expense

management

. Cost is not leveraged, by means of effective contract negotiations and

vendor management

. Internal and external SLA's do not exist, or are not aligned with the

business needs

. There is an absence of a formal operational framework, such as ITIL,

SDLC, SDP21

. Unauthorized changes are made within the infrastructure, that cause

production outages

. Major exceptions are identified during internal and external audits;

many repetitious from

previous audits

. The development, deployment and maintenance of IT and technology

standards

. Knowing if an intrusion has already taken place; compromising critical

assets and data

While the above noted may seem to focus on areas of challenge, actually, it

is not as uncommon

to find many of these areas are in need of refinement with most IT

organizations.

Attached is a proposal, more specifically, my resume/credentials. I have a

proven/successful

[pic background, and once part of your management team, I will assist

you both tactically and

Strategically; implementing a RISK MANAGEMENT mentality and culture.

Home: 248-***-****

Mobile: 248-***-****

*******@******.***

- Implementing internet monitoring/filtering tools

- Developing, Implementing and monitoring Security Best Practices

- Creating and Publishing 85 Security IT Controls\Procedures

- Developing/Managing a daily risk assessment process/team

- Implementing VPN Technologies for non Trusted Entities

- Implemented a secured IVPN global remote access solution supporting

4,500 users

- - Deploying DMZ architecture

- Conducting Internal Audits

- Outsourcing Firewall Management

- Implementing Enterprise-wide Firewall Change Mgmt

- Centralizing WAN and Internet provisioning

- Conducting External Vulnerability tests/scans



Contact this candidate