Post Job Free
Sign in

Senior Network & Security Engineer with 20+ Years Experience

Location:
Lawndale, CA
Posted:
April 07, 2026

Contact this candidate

Resume:

Confidential Resume of

Roderick John Walti

Summary

Senior Network Infrastructure & Security Engineer with over twenty years of progressive IT experience.

Consistent success in analyzing, planning, training, installing, configuring, and maintaining hardware and software

Virtualization specialist, emphasizing best practice techniques, adding fiber & iSCSI storage to cluster for failover.

Exhibit superior problem-solving skills and techniques to resolve issues quickly, efficiently, and professionally.

Provide expertise to explore, test, and assess solutions to remain current with emerging technologies.

Worked on project for GRC - Risk Assessments, TPRM, NIST, ISO 27001 Compliance

Windows & Linux - Implemented Windows Servers & Ubuntu Linux, scanning, patching and updating.

Tenable, Qualys, Rapid7 - Performed vulnerability scans and remediated threat risks found.

Desktop Hardening - performed hardening of systems based on STIGs and CIS Benchmarks

Threat Hunting- Managed Threat Hunting using Symantec EPP. McAfee ePo, Cybereason EDR/XDR and MS Defender and MS Cloud App Security/ATP (MCAS). Performed Threat Analysis & Remediation.

Setup and managed FortiGate and Cisco ASA, Checkpoint and Palo Alto firewalls and Proxy Servers.

Network Infrastructure

Implemented Routers, Switches and wireless solutions in Large Enterprise Environments, segmentation using VLANS, implementing VPN Solutions, both client side and site to site, created connections for T-1s and MPLS secure connections. Create DMZ and other isolated Environments.

Endpoint Security:

Proficient with desktop system security detecting and remediating threats using MS Defender and other tools.

Implemented and upgraded Symantec Endpoint Protection and deployed client to all users including 330 stores, Corporate, and six warehouses. Deployed Cybereason, McAfee EPO (ENS), MDR using MS Defender (Cloud and Endpoints) to find and isolate threats on systems to remediate malware.

Access Control and Privilege Access Management:

Proficient in Active Directory, integrating with tools like Lieberman RED Identity Management and OCTA, implemented Azure Active Directory SSO, integrating systems to AD using LDAP(S) and Kerberos

Data Loss Prevention:

Implemented McAfee DLP to protect against loss of PII and abuse by marking all PII and protecting against loss of intellectual property. Worked with MS Purview on DLP and governance.

Email Security and SMTP Message Gateways:

Implemented, upgraded and managed, MS Exchange servers, mailbox migrations, resolving DNS MX record issues, eDiscovery and Active Directory, worked migrations for mergers & acquisitions.

Implemented redundant Symantec SMTP Email Gateways on Linux Virtual Appliances Implemented Cisco IronPort SMTP Gateway, filtering spam and viruses. Worked on Microsoft Defender for email to remove and isolate threats.

Security Incident Detection & Response:

Worked with FireEye, Splunk, MS Defender, DarkTrace, and other tools for incident response, opened incidents to track and remediate threats.

Instrumental in remediating threats found in student enrollment system at a major university exfiltrating data.

Worked on red/blue team to test incident response, I found 3 of the 5 threats and provided instructions to remediate.

Threat Hunting & Remediation/Cyber Threat Intelligence CTI:

Performed remediation on threats using FireEye NX and Helix HX using Splunk logs to identify associated affected systems by MAC Address, IP Address and userID. Worked with Intelligence feeds to determine IOCs.

Researched Cyber Threat Intelligence Feeds & IOCs to determine remediation efforts.

Security Incident & Event Management:

Worked with Splunk SIEM, Sentinel, QRadar and am proficient in deploying universal forwarders to endpoints

Vulnerability Patch Management:

Implemented and managed Tenable and Qualys Vulnerability scanners and performed reporting, performed

Performed Vulnerability scans using Nexpose & Insight VM by Rapid7 with remediation

Performed updates to on-prem Tenable, Qualys and Rapid 7 Scanners, deployed (WAS) scanners, agents

GRC Risk & Compliance:

Mapping CIS / CSF controls to NIST 800-53, 800-171, GRC AuditBoard, Purview, A-Lign Ascend, CMMC Level 2 compliance for DHC/CBP program, performed Risk Assessments on networks, products & services. Performed Third Party Risk Assessments utilizing tools such as Security Scorecard and BitSight, with a formalized TPRM process framework, Physical Security in support of ISO 27001/2 TPRM and many policies for compliance with NIST 800-171.

Professional Experience

SIEM Consultant

LA County Register Recorder- County Clerk: August 2025 - January 2026

Working ar Project Manager to evaluate SIEM Platforms from Microsoft, Google and CrowdStrike to security system configurations and integrations with IAM to align with established security policies and controls. Worked to review current DLP to determine Purview configuration requirements. Planned Firewall to implement segmentation using various ASA, Palo Alto, FortiGate and Check Point Firewalls for both labs and production, worked to secure substation physical security and create redundancy.

Senior Cybersecurity Engineer

S2 Global - OSI Systems Inc., Torrance, CA: August 2021 - July 2025

Working to secure Non-Intrusive Inspection (NII) system that x-ray scans vehicles at the S/W border in support of DHS / CBP, mapping CIS / CSF controls to NIST 800-53, 800-171, GRC AuditBoard, A-LIGN Ascend, CMMC Level 2 compliance, Tenable IO, Qualys, Rapid7 and AWS Inspector, performing remediations, remediating threats with SonarQube in DevSecOps, DarkTrace, InfoBlox, Incident Response in Defender for Endpoint, Fortinet Firewalls, Cisco Routers, EIGRP, VLAN Segmentation, Security Scorecard, SolarWinds, Ubuntu. ServiceNow. Built Windows 2022 & Linux servers, installed and configured AD, tightened group policy, Used PowerShell Scripting for automation, setup DNS, DHCP and encryption.

Managed project to obtained ISO 27001:2022 Certification for S2 Global ISMS.

Managed Project to design and implement AI in a secure AWS instance using AWS workspaces, then wrote a security risk assessment for this instance and supported pen test of environment.

Created large, documented body of evidence in support of ISO 27001:2022.

Managed Project to architect solution to replace VMware with RedHat OpenShift and SUSE Harvester.

Built out Tenable.IO Nessus and WAS Vulnerability management program, scanning in AWS & Air-Gapped systems.

Initiated TPRM program and performed many TRPM risk assessments, worked in Incident Response.

Worked on CMMC 2.0 project and performed CMMC 2.0 Level 1 Assessment.

Worked compliance projects to establish compliance with NIST 800-53, 800-171, ISO 27001, CMMC 2.0.

Senior Cybersecurity Engineer - Contract

Korn Ferry Century City, CA: March 2020 – August 2021

Hands-on with Splunk, Cybereason NGAV and EDR, Tenable I/O, Qualys, Veracode, Tippingpoint, DarkTrace, Service-Now, Azure, MS Defender and Cloud, MS Cloud App Security/ATP (MCAS), O365, Apache, Azure AD Identity Protection, Lieberman RED Rapid Enterprise Defense Identity Management (PAM), BitSight, Security Scorecard, ProofPoint, Knowb4 Rapid7, Bit9, SolarWinds Orion, AD Audit, GDPR, CCPA ISO-27001 & NIST 800-53.

Managed Threat Hunting using Cybereason EDR/XDR and MS Defender and MS Cloud App Security/ATP (MCAS).

Worked on Blue-Team to detect, remove, block and isolate malicious threats from Red-Team to protect against attacks.

Worked to resolve issues on F5 Load Balancer on multiple domains and interfaces after finding expired certificates.

Was instrumental in defense against Mandiant Blue-Team attack exercises using multiple attack vectors.

Worked on project to clean up all issues found with Security Scorecard. Brought Security Scorecard score up to A+ by removing hundreds of domains and reduced DNS and IP attack surface and improved security by implementing security headers on all external sites and resolving certificate and SMTP issues.

Worked in Incident Response to resolve all security and related issues.

Troubleshot Kerberos ticket-granting ticket and service ticket issues, resolving authentication failures and ensuring seamless user access.

Energy Control Center (ECC) Cybersecurity Engineer - Contract

LA Department of Water and Power (LADWP) Los Angeles, CA: November 2019 – March 2020

Working in regulatory compliance in NERC-CIP and SCADA ICS and PLS environment in the DWP Energy Control Center, Work with Operational Technology (OT), Tripwire Enterprise and Log Center, McAfee ENS, SCCM and WSUS, Tenable Nessus.

Network Cybersecurity Architect - Contract

Southern California Edison (SCE) Los Angeles, CA: June 2019 – November 2019

Project planning for two new separate and redundant datacenters for the electric grid in NERC-CIP SCADA ICS and PLC OT environment on implementation of 15 tools to secure the electric grid. Worked on DT, PKI, ADFS, PAM, FRA, WAF, NAC, NPB, SO, NDR, SIEM, NSM, VS, TIP, DMZ Proxy and FW project documentation, worked on Palo Alto firewall configuration design documents for two data centers and matched key requirements to security architecture design documents, mapped requirements to NIST 800-53 Controls.

Cybersecurity Engineer - Contract

Loyola Marymount University (LMU) Los Angeles, CA: November 2018 – June 2019

Implementation and configuration of McAfee EPO ENS, Threat Scanning and Remediation with FireEye NX and Helix, Vulnerability Scanning and Mitigation, using Nessus and Nexpose/InsightVM from Rapid7, Splunk SIEM upgrade to 7.2 and installed forwarders, worked on Office 365 and Azure security and compliance portal resolving email issues, ProofPoint, mapped network to identify targets.

Cybersecurity Engineer - Contract

University of California Los Angeles (UCLA), Los Angeles, CA: June 2018 – November 2018

Implementation of NextGen EPP, Password Management, Threat Mitigation, Incident Response, Brand Trademark Protection, Threat Scanning, Proofpoint Anti-Phishing Campaign. SentinelOne, FireEye, Qualys and RiskIQ.

Senior Network Systems Engineer - Contract

Rolling Hills Covenant Church, Rolling Hills, CA: March 2017 – June 2018

Managed all Infrastructure - Worked on implementation of Microsoft Dynamics GP self-service timecard program, implemented VLANs, setup static NAT on Cisco ASA, VPNs, SQL Server, Administration of AD and VMWare ESXi 6.5. Setup domain controllers. Configured Symantec Backup Exec to Disk and EPP, SentinelOne.

Integral to the planning and setup of MS Dynamics, configured Time-Card portal, configured all users accounts to connect.

Moved Dynamics to AWS Cloud.

Implemented Meraki Wireless

Worked to remediate a ransomware breach.

Network (& Systems) Engineer II

Smart And Final, Commerce, CA: October 2010 – March 2017

Maintained network security, operating systems, virtualization, MPLS, LAN/WAN, SAN, and Incident Response, Lead multiple projects to upgrade and deploy various leading-edge technologies. Accountable for VPN environment, Email, Azure AD Security including assigning RSA SecureID and Authentication Manager integrated with Cisco ASA, Managed GCP cloud portal.

Installed, upgraded, and managed Checkpoint (for PCI) and Palo Alto firewalls, Setup and managed Cisco ASA, Checkpoint and Palo Alto firewalls and managed Proxy Servers. Configured firewall rules, NATs, Content Filters, LDAP authentication, IDS, Site to site and remote access VPNs, worked with McAfee / Intel Sidewinder Proxy, Worked with routing protocols OSPF, BGP, EIGRP, VLANS, Cisco Switches and Routers, ISE, Firepower

Implemented HP TippingPoint IPS, and AnyConnect VPN on Cisco ASA firewall using IPSec & DMZ

Performed eDiscovery in email providing legal access to specific emails related to litigation risk.

Managed Cisco IOS on Cisco ASA AnyConnect VPN with RSA SecureToken two factor login with Secure ID, AAA, 802.1x Port-Based Network Access Control (PNAC).

Implementation Projects (OKTA Single-Sign-on, ADFS, Carbon Black) for Cyber Security task force.

Performed NESSUS Security and Vulnerability Scans, performed Penetration Tests, performed Remediation.

Responsible for PCI & SOX Audits using Splunk SIEM, McAfee ePO for DLP under ISO 9000 and NIST.

Project to implement McAfee Change Control to lock down access for PCI related data & HR sensitive files.

Designed and configured Clustered Exchange 2010 using DAG running on Nimble iSCSI SAN for fault resiliency.

Migrated 2500 users to Exchange / Office 2010 on ESX5.5 with Nimble iSCSI and Exchange 2016 & Office 365.

Project implementing Symantec SMTP Email Gateways on Linux Virtual Appliances, filtering spam and viruses.

Setup ExaGrid Storage for Windows Backup, Supported NetApp Fiber channel array connected to ESXi.

Migrated backup servers to BE v15, supporting backup of Server 2008 and integrating ExaGrid Backup to disk.

Managed Symantec Endpoint Protection and deployed client to 330 stores, corporate, and 6 warehouses.

Managed and administered Cisco routers and Cisco POE switches, isolating issues, managing endpoint VLANs.

Configured and managed AirWatch MDM, rolling out email and wireless policies to iPods for store scanning of products.

Implemented Nimble SAN on iSCSI and integrated to ESXi to present to Exchange and other servers through VMware, carved up LUNs, expanded volumes and resized Windows drives.

Managed project to install ShoreTel phones with VoIP, rolled out Office365, Integrated Outlook to identify caller on phone. Added voicemail speech recognition to email, sending voicemail in text format via email.

Monitored and audited Kerberos logon events using tools like Event Viewer and PowerShell, identifying and mitigating potential security risks, Configured Kerberos authentication for Active Directory Federation Services (ADFS), supporting secure single sign-on for internal and external users.

Managed bandwidth on MPLS, and T-1 lines on Cisco Routers, applications and Riverbed WAN optimization.

Network System Engineer / IT Manager

City of Palos Verdes Estates / Palos Verdes Estates Police Dept (PD): September 2002 – October 2010

Managed 12-server, 75-user Windows 2008 server, and IT infrastructure environment, on call 24x7x365. Accountable for IT support and project management relating to City and Police Department functions, Windows 2003 Active Directory, GPO management, SQL Server 2008, SSL Certificates, Cisco Routers, SonicWall Firewall, WatchGuard Proxy, Security and ESXi.

In charge of all IT and Cyber Security, performed IDS, IPS with SonicWall, performed vulnerability scans and remediation.

Ran periodic Intrusion Prevention Security Scans using Tenable Nessus, Performed Penetration tests with NMAP.

Migrated to SonicWall NSA3500 Unified Threat Management Firewall, integrated LDAP and IPS and content filtering.

Implemented Symantec Managed AV Spam Protection for SMTP Email Gateways Protection

Implemented and then upgraded to Cisco IronPort SMTP Email Gateway for AntiSpam and Malware detection.

Implemented SonicWall SSLVPN documented and deployed to multiple users.

Implemented Sunbelt SNSI (Sunbelt Network Security Inspector) vulnerability assessment tool, performed remediation.

Setup WLAN connection to LASD/DOJ interface for real-time criminal history updates from Patrol Cars.

Managed project to replace 9/11 dispatch system on IBM AIX - Spillman for historical tracking on DB2 for CJIS.

Implemented and maintained adherence to the most recent CJIS (Criminal Justice) Security Policy, proactively addressing security requirements and overseeing policy implementation to mitigate risks and safeguard critical info.

Led and participated in regular audits to assess and enhance compliance with the CJIS Security Policy, demonstrating a commitment to maintaining a secure and regulatory-compliant environment.

Developed and conducted training programs to educate teams on CJIS Security Policy requirements, fostering a culture of awareness and accountability throughout the organization.

Responded effectively to security incidents in accordance with CJIS guidelines, demonstrating a proactive approach to maintaining a secure and resilient infrastructure.

Replaced existing DVR with Samsung video CCTV security systems, supporting DA subpoenas for jail & PD.

Implemented WSUS for automated Microsoft patching, keeping endpoints up to date for added security.

Installed and configured iSCSI SAN for VMware ESXi with vSphere 4.x for shared storage.

Replaced switches in IDF upgrade to switched 1 Gbps, then upgraded Backbone to 10 Gbps on HP ProCurve Switches

Upgraded all users and servers from Exchange 5.5 to Exchange 2003 and Office 2010.

Managed project to install Automated License Plate Reader (ALPR) cameras in patrol cars, connecting to DB2 and DOJ.

Education and Training / Certifications

Microsoft Purview Training 2025

CCTA Certified Cybereason Threat Analyst

Cybereason NGAV and EDR Training and Certification

Splunk SIEM Training

Checkpoint Firewall-1 Checkpoint Security Administrator and Engineer (CCSA) and (CCSE) Certifications

Cisco UCS, CCNA, and CCNP Training

VMware V-Sphere 5.5 Authorized 5-day FastTrack Training

Spillman CAD Training with Crystal Reports, Police Computer Aided Dispatch (CAD) on (AIX & SUNOS) Certified

EMC Clarion Storage Training

Microsoft Certified Systems Engineer Certification (MCSE)

United States Marine Corps Corporal, Field Radio Operations (El Toro), Secret Security Clearance

Affiliations

HP / Microsoft Frontline Partner / Assistant Chaplain, LA County Sheriff



Contact this candidate