Post Job Free
Sign in

Security Management

Location:
United States
Posted:
February 19, 2015

Contact this candidate

Resume:

Sidney thompson

***** *********** **. *** #***, Gaithersburg, MD 20879 240-***-**** *****@**********.*** /

*******@*****.***

Summary

I am a well-seasoned IT corporate executive, with a proven track record of innovative out-

of-the-box strategies for getting mission critical objectives accomplished ahead of schedule

and within budget. I have significant experience, from the IT Management, Business

Systems/Re-Engineering, Senior Systems Management & Security Management arenas. I

am a true self starter, having successfully started my own company, and guiding its growth

over 10 years to 300 employees serving 5000+ clients, prior to selling it in 2008. I am well

versed in agile methodologies, Business Centric IT strategies, and risk adverse stewardship.

Experienced in providing guidance and mentorship to my reports, while leading by example.

I am an expert at formulating a strategic enterprise approach, while simultaneously

directing alignment of IT security policy and governance strategies. I am an expert at

complementing and enhancing the enterprises’ business processes and strategies by

leveraging current technology to support, sustain and improve the desired corporate

strategy. I give direction to Business Process initiatives, aligning IT Enterprise Management

initiatives to securely and efficiently sustain them. Always aware of IT Security Compliance

requirements. Policies such as ITSM, FISMA 27001, NIST 800-X family of standards. PCI DSS,

OWASP and ISC2 top 10, regulatory compliance, H IPAA, FERPA, SOX, and GLBA compliance,

are among my specialties. I have successfully directed major enterprise-wide SaaS, PaaS,

AWS cloud strategic initiatives for the Banking, Mortgaging, Health Insurance and IT

Security industries; resulting in higher throughput, improved enterprise wide security, at

significant cost savings to the enterprise.

Experience

D ovel Technologies, Rockville, MD 2013 –

P resent

I T Systems Security I ntegration Engineer

Responsible for ensuring projects move from development in a standardized, secure

manner to Integration, Stage, and Production.

Responsible for developing documentation and standardized policies of on-boarding and

off-boarding employees, Deployment procedures, Orbeon, J BOSS, Workflow, Data

Collection and Dashboards.

Monitoring and addressing environment issues via zabbix monitoring, J ira, SVN and

J manage tools.

Patching, and re-imaging AWS servers in an EC2 environment.

Updating Deployment Plans, using wiki, Creation of Security SDLC policies and standards

Keeping abreast of latest vulnerabilities and strategies to address them, e.g. poodle, sql

injection, etc.

H WP L LC, Gaithersburg, MD 2008 – 2013

I T Manager

Managed the Development, Testing and integration SIEM procedures and policies and

review McAfee Vector Trends.

Supervised the performance of security Gap Analysis, White Box Pen Testing, Security

Forensics Post Mortem Evaluations.

Relentless leadership in the Improvement, strategic business process alignment and

Implementation of Security Policy Governance compliance, ensuring auditing success,

strict regulatory compliance direction, while ensuring excellent ROI on enterprise IT

investments, and strict adherence to CAI security initiatives.

Provide technical leadership to maximize efficient use of IT Infrastructure leveraging the

use of open source tools, cost effective processing mechanisms including virtual

clustering, and BI analytics.

Oversee all aspects of Marketing both brick and mortar and internet based, while

ensuring PCI DSS compliance.

I make use of my former systems engineering background, and Linux security

experience, to ensure junior staff is well trained and equipped to make maximum use of

I T tools, IT Security tools & technologies, and network security initiatives including IPsec,

SSL, and VPN.

Directed, reviewed, and ensured the Configuration of systems for NIST 800.53, 30, 37

family and F ISMA 27001, ensuring smooth auditing without sacrificing the tenets of

Confidentiality, data integrity, and process availability.

Columbia, MD

B BN Technologies,

2005-2008

Lead Systems Engineer Support Agent Tier 2 and Tier 3 Escalations / IT Director

Directed contract to provide Help Desk technical support to AOL, Bellsouth Internet DSL

customers, while assuming responsibility for entire IT infrastructure security in

accordance with NIST, OWASP Best Practices and compliance standards.

Mid to large size enterprise specialist, assigned clients of 290 up to 3000 nodes.

Managed a staff of 33 reports, and an annual budget in excess of 27M.

Excellent communication, organizational, and time management skills, along with a keen

sense of project prioritization and business management skills.

Required a clear understanding of TCP/IP, bonding, VLAN Tagging, IP and Port redirection,

among myriad other technologies and management systems.

Served as SME to clients and C-level management.

D I G ICON Corp, Bethesda, MD

2003-2005

Senior I T Lead UN IX Systems FAA & N I H Contractor

• I Worked as a contractor setting up, Troubleshooting, repairing and installing

systems for FAA and N I H.

• UN IX and Windows Systems Administrator.

• Assisted in installing software and applying patch upgrades for campus computers,

N I H Systems and Network Analyst and Consultant (DIGICON Corp.)

D I G ICON Corp, Bethesda, MD

1995-2002

UN IX Specialist I V

• Obtained information to diagnose system problems or networking bottlenecks or

points of degradation and resolve them.

• Documented client accounts in computer system with scheduling information and

collection activity according to company policy.

• Reviewed systems to determine security requirements and potential loop holes, I

designed appropriate methods for system resolution.

• Analyzed network activity to determine t rends for denial of system services, and I

took the init iative to wri te pro-active system tools to perform automatic

administrator alerts.

Education

Washington, DC

Georgetown University,

2015

Master of Science Degree I nformation Systems & Cyber Security Management

GPA 4.00

Chantilly, VA

ITT Technical I nstitute,

2014

Bachelor of Science Degree I nformation Systems & Cyber Security (with Honors)

GPA 3.98

Chantilly, VA

ITT Technical I nstitute,

2011

Associates of Applied Science, Computer Networking Systems (with Honors)

GPA 3.97

Recipient of the Highest Honors Award

Skills, interests and other information

President of OWASP, Georgetown University Chapter . (Open Web Application Security Project).

Cur rently registered and completing CCNA & C ISSP certification programs

Native speaker of E nglish and Spanish, with a strong interest in learning M andarin.

T rans-disciplinary: l i teracy in and ability to understand concepts across multiple disciplines.

Vi rtual collaboration: ability to work productively, drive engagement, and demonstrate presence as a

member of a vir tual teams.

Sense-making: ability to determine the deeper meaning or significance of what is being expressed.

Social intelligence: ability to connect to others in a deep and direct way, to sense and stimulate reaction

and desired interactions.

Cross-cultural competency: ability to operate in different cultural settings. I am also f luently bi-lingua

Cognitive load management: ability to ingest and fil ter information for importance, and to understand

how to maximize cognitive functioning using a variety of tools and techniques.

Novel and adaptive thinking: p roficiency at thinking and coming up with solutions and responses

beyond that which is rote or rule-based.

Computational thinking: ability to t ranslate vast amounts of data into abstract concepts and to

u nderstand data-based reasoning.

New media literacy: ability to critically assess and develop content that uses new media forms, and to

leverage these media for persuasive communication.

Design mindset : ability to represent and develop tasks and work processes for desired outcome.

Excellent Communication Skills: ability to communicate effectively, even the most esoteric and highly

technical details, in a manner easily understood by all audiences, both highly technical and non-technical

MS in I nformation Systems Security with a concentration in Business I T Management, and

H ealth Systems Security

Management.

Strong f luency with large enterprise networks, ITSM, UN IX and Linux systems, including Red Hat,

Centos, HP-UX, Solaris

AIX, Cloud Technology, VPN, SSL, CRM, UTM, UC, IT I L, DR, BCP, BIA, IDS IPS, DDoS, CISCO,

J uniper, SCRUM, SaaS, Document M anagement Systems, Collaboration and Communications

Technologies, M2M, Cybersecurity, Compliance, and Business Continuity, Defense in Depth, SSO, Two

Factor Authentication, Business Structured Analytic Techniques.

Growing companies often face a critical hurdle: how to scale operations to keep pace with expansion. This

typically leads to upgrading or adopting new systems to handle increased operational workload. When

t ransitioning to a new platform, integration is critical. Implementing new systems can result in data

f ragmentation, with t ransactional and customer information making i ts way into multiple locations, often

in pieces. This can have a major impact not just on customer service, but also on your ability to stay

compliant in all areas of your business. My background in IT, Business Management, IT Security, IT

Policy and Governance, coupled with my unique leadership skills is perfectly suited to not just correct suc

situations, but avoid them to begin with.

Other companies and organizations I have worked for in the past include:

American Society of Civil Engineers (ASCE), NY. NY. Chemical Bank, NY. NY. CAC, MD., Prudential

Home Mortgage, MD., United Health, MD.

Some limited experience utilizing Splunk 1, Hadoop 1, Puppet 1

*1* - I have used these tools in school, and will give special consideration to organizations using or

considering any of them, included among them are: (Splunk, Hadoop, Puppet and other Business Intelligence

tools and workflow management strategies).



Contact this candidate