HANK HAKAN KIZILOCAK, Los Angeles, CA, 803-***-****, ****@*********.***
Dynamic and results-oriented professional with 10+ years of experience in Government & Military work, and 10+ years of experience in private corporations with Engineering Technology Security Transformation Operations Cloud Migration App Data HR Talent Services Consulting, specializing in physical and cyber security, governance, risk, compliance, investigations, audit, government regulations, vendor negotiations, and process optimization with a strong background in implementing and managing technology, engineering and science. Seeking a challenging position where I can leverage my expertise to drive organizational excellence. Trivia: Erdös 5, Bacon 2.
IntelRanD, Engineering Technology Security Transformation Operations HR Talent Services Consulting, 2004-Present
● Engineering Technology Security Transformation Operations HR Talent Services Consulting
● Physical and Cyber Security Engineering Risk Compliance HR Talent Services
● Enterprise Security Cyber Technology and Security GRC, Governance, Risk, Compliance Audit
● Corporations work sampling: Honeywell Technology Center, Intelligent Optical Systems, Belkin
(Linksys and WeMo), and tech startups such as, Netki, Meed, HopSkipDrive, Honk For Help, and Media and Entertainment corporations such as TBWA/Chiat/Day, Demand Media, InnoceanUSA.
● Trivia: Erdös 5, Bacon 2
City National Bank - CNB (parent: Royal Bank of Canada - RBC), Physical and Cyber Technology & Security Deputy CISO Controller Audit GRC, 2019-2024
● Physical and Cyber Technology, Cloud Security, IT Risk, Risk Assessment, Security Review, GRC, Governance, Risk, Compliance, Audit, Investigations, Reporting and Issues Management, Technology, Consulting, Mentoring, Transformation, Security Enterprise Architecture, Government Regulation Management (OCC, SEC)
Intelligent Optical Systems, Security & Engineering Principal Investigator, 2003-2006
● PI (Principal Investigator)
● Air Force, DARPA, Homeland, NASA.
Honeywell, Scientist, 2000-2002
● Scientist, Engineering, Security
● Honeywell Technology Center stakeholder work: Boeing, Air Force, DARPA and other private, government and military agencies.
EDUCATION
● Course Work: 1st Year Law School Course Work, University of West Los Angeles, Law School
● Degree: Ph.D., Systems and Control (Multi-Disciplinary Ph.D. Degree - Computer Science / Computer Engineering / Electrical & Electronics Engineering / Mechanical Engineering), University of Southern California, USC, Los Angeles, CA
SKILLS & QUALIFICATIONS
Physical and Cyber Security Strategy Development, Technology, Engineering, Science, Automation, Engineering and Architecture, Security, AI, CV, ML, DL, Cloud Computing: API Architecture and Security. Mobile, Cloud, and Container Infrastructure Architecture and Security, DataOps, Data Security, Data Automation, Data Science, Solution / Enterprise Architect, solution risk-based architecture documentation, solutions and patterns for enterprise, Security / Enterprise Architect, Architecture policies, procedures, processes, service catalogs, documentation for the enterprise. Risk and Security assessment and architecture reviews. Threat Modeling. Incident Response and Management, Security Consulting Lead, Security Architecture talent management, policies, procedures and processes, Manager, IT Risk Reporting and Issues Management, IT Risk team focusing on GRC implementation in ServiceNow, Issues (including Self Identified Issues, Policy Exceptions, Audit Findings) Management and Risk Reporting, Cloud Transformation and Technology - Mobile Application Consultant. Cloud and Mobile Digital Security, Regulatory Compliance (OCC, SEC, NIST, CMMC), Vendor Negotiation and Management, Procurement Management, Contract Negotiation, Vendor Relationship Management, Cost Optimization, Market Research and Analysis, Contract Management, Stakeholder Collaboration, ITIL Implementation, ISO Certification Management, NIST 800-171 Compliance, Information Security Management, Risk Assessment and Management, Policy and Procedure Development, Incident Response and Remediation, Team Leadership and Management, Risk Assessment and Management, Incident Response and Remediation, Excellent Communication and Interpersonal Skills, Business Gap Analysis, Current State to Target State Implementation, Data Development, Management and Protection, Hardened Systems, Access Management, Third-Party Logistics (3PL), Logistics Management, Bank Secrecy Act, OCC, U.S. Securities and Exchange Commission (SEC), AML, KYC, Wealth Management, Business Transformation, COSO, CUSO, COBIT, ITGC, Performance Reporting, Credit Management, Project Management Office (PMO), IT Audit, Subject Matter Experts, Deadline Oriented, Technical Requirements, Root Cause Analysis, Regulatory Risk, Core Banking, Fraud Analysis, Enterprise Risk, Access Lists, Internal Controls, Enterprise Risk Management, Financial Regulation, Financial Audits, Internal Audits, Technology Solutions, Core Banking Systems, Third Party Risk Management (TPRM), Interpersonal Skills, System Monitoring, Financial Risk, Symitar, Jack Henry Solutions and Tools, Team Alignment, Customer-Focused Selling, Cross-functional Collaborations, Stakeholder Management, Governance, Risk Management, and Compliance, GRC, eGRC, Loan Structuring, Lending Programs, Portfolio Management, Assets Recovery, C&I, Credit Risk Management, Adjudication, DevSecOps, OpenBanking, Artificial Intelligence, Big Data, Machine Learning, AI, Algorithms, Data Analysis, Robotics, Information Technology, Information Security, IT Operations, Payment Card Industry Data Security Standard (PCI DSS), Regulatory Compliance, Amazon Web Services (AWS), Microsoft Azure, Google Cloud, Rackspace, Matlab, Databases, Natural Language Processing, Augmented Reality, Adtech, FinTech, Bank of Things (BoT), Cyber Technology, Cyber Security, Security Information and Event Management (SIEM), IT Risk Management, Application Security, AppSec, App Security, API Security, Technology Risk, Tech Debt, IT Infrastructure Management, OWASP, Certified Information Security Manager
(CISM) training, Certified Information Systems Security Professional (CISSP) training, Identity and access management (IAM)