Vladimir D. Frolov
#***-*** **** **** **, Plano, TX 75075
469-***-**** (cell)
****.******@****.**
Professional
Security and programming Expert with the extensive development (HLAssembler, C/C++, COBOL, PL/1 and many others) on IBM Mainframe platform, including (but not limited to) CICS, IMS, DB2
In-depth knowledge of IBM Mainframe (XA/ESA/390 and zOS) platforms development and security solutions. Maintenance and QA/Testing (Xpediter, IPCS and dump analysis, VM guest testbed, 2-stages Endevor, ACF2 and RACF, RBAC and IAM, PGCRYPT and 4758/PCxCC/ICSF chip). Extensive experience on code adoption (390 -> zOS; 32 bits to 64 architecture)
Proven success in identifying potential areas of risk and implementing assets loss’ preventative measures. BCPlanning (DR) while in regulatory compliance with SDLC/STLC, Waterfall, Agile/Scrum methodologies/policies/practices. Excellent problem determination and resolution skills.
Continuous analytical field research to make sure that the best technical knowledge is deployed to protect organization's businesses and assets.
Technical Highlights
Mainframe platform: MVS/XA/ESA/390/zOS; VM Guest and USS; MQ Series, JCL, JES3, TSO/ISPF/PDF, IMS, CICS, IDCAM, FileAid, IPCS, Endevor, Xpediter, Spufi(SQL), VSAM, Assembler (HLASM), PL/1. REXX, CLIST, C/C++, COBOL, SQL, Java (under USS), UI to DB2, Exposure to Omegamon, ZEKE and CA7/CA11.
Personal Computers: OS/2 (ver 3 and 4), Windows XP/7/8/8.1/10; Linux (RHEL, CentOS and Ubuntu) MS Office 2007-2019 + Visio + MS Project, Lotus Notes 4.51 - 53; C/C++, Cobol VS; WinRunner, SQA Suite.
Crypto and Security hardware/software – both platforms: RACAL, ICSF/PCxCC, TKE, IBM 4753, IBM 4758 (with PCIxCC card), Working knowledge of Atalla and Tandem platform HSMs; PCF, PGP, Entrust and other PKIs, RACF, ACF2.
Summary of Professional Experience and Work History
Infosys Ltd. Technical Test Lead – Expert (Mainframe - HLASM,Cobol/CICS/DB2) 2019 – now
L3 Production Support and development on DWE system (Cobol, HLASM, DB2) on the IBM mainframe
Freelance variety of contracts (Linux/Win7/Win8/8.1/10) 2012 – 2018
Installing, diagnosing and repairing computers/network components. Systems (hard- and software) diagnose and repair – mostly Windows XP through 7 and Windows 10.
WinXP to Win7 to Win8/8.1 to Win 10 migration
AD, firewalls, penetration controls and perimeter hardening, antivirus protection tools, security policies (Server 2003 & Server 2008R2, exposure to Windows 2012 and 2016)
Information Security incidents investigation as required (part of CSIRT)
System, services installation, administration, troubleshoot and support. Process documentation, including diagrams as required
DBNC Network Security Support 2011 – 2012
Managed a project (Team Lead for group of three) of an office WiFi distributed secure network for BYOD project (CEntOS & LDAP based): business case, project planning, test planning. Pen tests and perimeter hardening.
Performed the tasks of installing, diagnosing and repairing computers/network components
Configured firewalls, penetration controls, antivirus protection tools and group policies (WinServer 2003), procedures. System (Windows Server 2003, 2008, in WinXP/Win7 environment) enterprise-wide support maintenance and client support
Provided system, service, and process documentation, including diagrams as required
Installed, administered, supported, tuned, and troubleshoot systems, networks and backup environments
IMB+ Sr Network Security Specialist 2011 - 2012
Complete analysis of Network topology; Perimeter pen testing and hardening.
Performed a risk assessment and recommendation on setting up firewall rules.
Provided Security Advisory on key issues while migrating MS 2003R3 servers to CentOS (the latest were RRAS Servers)
Assisted in translating business requirements into systems qualities and into repeatable design strategies that enable the following: adaptability, scalability, availability, reusability
KRC Software (Kiev, Ukraine) SNA Network administration/RACF Security consultant 2010
Intours Inc Security consultant 2007 - 2009
Established, configured and tuned up LAN, firewalls, penetration controls, antivirus programs, data and mail protection, worked out policies, procedures, and overall security design for the company
Bank of Montreal 2005 – 2006
Senior security advisor
Established key management policies and procedures, identifying key life cycle and overall security design for EMV card (smartcard) project.
Contributor in achieving and maintaining ISO2700x (former ISO17799/BS7799) compliance.
Developed and corrected IS standards such as key management, cryptographic algorithms, identity management, RACF and Vanguard implementation corporate standard, hardware security modules corporate standard/usage policy and some others.
The Royal Bank of Canada 1995 – 2005
IS Manager/Cryptographer (1998-2005)
Led the design, development and ongoing 7/24 support of strategic large scale systems on VSAM home-developed DB
Continuous ACF2 (first, then RACF) rules and access management reviews and audit. Developed SECAF (RBAC) automation administration utility that saved approx. 5M per year on RACF administration (home-developed remote admin solution primarily ported from under ACF2)
Provided consulting in the cryptographic/security field to various projects as well as providing the QA, risk analysis and assessment on the deployed methods and algorithms.
Managed a project to remotely synchronize passwords across domains in the Bank’s network (JCL batch, Assembler).
Managed a project to synchronize keys DB replicas across LPARs/network systems in the real time using MQ Interface (Assembler).
Team leader (1996-1998)
Implemented a major release of the RICKI (Royal Integrated Cryptographic Key management Interface) to deploy 4753 hardware to perform cryptographic services. That was first (across the world) implementation of RSA technology to remotely exchange ATM’s PIN keys. (Assembler, C/C++)
Supported testbed’s maintenance and documentation. This included full support of STLC technology and usage of test automation tools.
VMGuest Testbed maintained: Cobol/C/Assembler with CICS/IMS interface; Endevor support
Programmer/Analyst (1995-1996)
Supported, maintained, enhanced and documented the bank’s major keys dB (Mainframe, MVS/XA/ESA and OS390, then zOS (both 32 and 64 architecture), Assembler, C/C++, TSO-ISPF and other).
Developed a C-Assembler inter-language facility to allow the development in both C and ASM using cross-memory management in re-entrant environment. In addition, this included safety/tolerance timer features, reusability of the system LX (linkage index) and modularized several hundred lines of code.
Education&Certifications
Kangan/Agile certified 2021, Infosys
Dell/BRT/FLS Certified PC Service Engineer (Desktops) 2013
Lenovo Certified Field Service Engineer (Desktops and Laptops) 2013
Information Systems/Network Engineer (CompTIA A+, Network+) CDI College, Toronto
PhD in Computer Science Kiev State University, Kiev, Ukraine
Defeated work Theses: “Finite Automates over direct product of free semi-groups”
MS in Applied Mathematic Kiev State University, Kiev, Ukraine
Bachelor in the Computers and Electronic Devices Kiev Technical College of Radio and Electronics
All international diplomas/degrees are recognized and evaluated by the University of Toronto.