Skills and Experiences

Each box below shows a skill that I bring to the workplace. Expand each box to see some of the things I have done in the workplace using that skill.

STRATEGY AND ARCHITECTURE

* Creation and management of technology roadmaps, e.g.: SIEM, IDS, SOC, SIEM

* Developed capability roadmaps addressing mitigation of internal and external threats

* Formulated, documented and communicated IT Security strategy to IT leadership

* Best Practice Identification

* Security architecture development, e.g.: Virtual Data Center, Zoning/segmentation, BYOD, Cloud adoption, Endpoint protection, secure web gateway

* Documented alignment of proposed solutions to frameworks, architecture, strategy, business need and threat mitigations

* Gap assessment (framework, maturity, capability, threat, business initiative)

PRESENTATION AND COMMUNICATION

* Compelling and persuasive communication skills

* Responsible for developing corporate e-mail communications

* Able to tailor messages to all levels and audience types/sizes

* Significant PowerPoint presentation experience

* SharePoint expertise

FRAMEWORKS AND METHODOLOGIES

*I have experience and/or certification in Lean Six Sigma (green belt), Agile, Technical project management, AWS Well Architected Framework

*Deep knowledge of various security relevant frameworks including NIST CSF, NIST 800-53, ISO 2700x and experience mapping to corporate policy

*Experience assessing alignement with NIST CSF, NIST 800-53, ISO 2700x

TECHNOLOGY ASSESSMENTS

* Assessments of how technology solutions would resolve security concerns, for example: CASB, SEG, NGAV, Email protection, malicious domain protection

* Gap identification and mitigation analysis

* Product, solution and vendor analysis and comparisons. Solution bake-offs, product selection, RFP creation and response evaluation.

* Deep knowledge of various security relevant frameworks including NIST CSF, NIST 800-53, ISO 2700x

LEADERSHIP

* Collaboratively set, evaluate, and manage goals and priorities

* Ability to lead through example, influence and negotiation

* Guidance and mentorship to security teams at varied seniority levels

* Trusted advisor, thought leader, consultant

* Champion the strategy and vision of the organization

* A trusted team member leading by example

POLICY LIFECYCLE MANAGEMENT

* Demand and impact analysis, management engagement and approval cycles

* Development and maintanence of artifact content including policy, standard, guidelines

* Data classification and handling policy and guidance

* Alignment of policy artifacts to industry standards and regulatory environments (e.g. NIST, ISO, PCI..)

* Management of the policy function maturity level and the organizational policy framework

CLOUD SECURITY, CLOUD ARCHITECTURE AND INFRASTRUCTURE

* AWS and Azure Security design

* Cloud adoption security strategy and frameworks alignment and creation

* Infrastructure security as code (e.g. AWS CloudFormation)

* Automation support (e.g. Python, Lambda, scripted workflows)

* Architecting secure cloud-based infrastructure and application solutions

SOFTWARE AND WEB DEVELOPMENT

* Website development, maintenance. SharePoint adminstration and content management.

* Java

* Python

* Static and basic web pages (like this one) that rely on Javascript

* Cloud infrastructure as code - CloudFormation

* Scripting - Javascript, Powershell, more

* Documenting

* DevSecOps

* Platform conversions and technology transitions

* COBOL, Algol, Perl, VisualBasic, more

* SQL

SECURITY TRAINING AND AWARENESS

* Creation and maintenance of a detailed security awareness calendar, highlighting monthly training themes, articles, newsletters, site updates, and internal communication updates.

* Development of training and awareness materials including site theme pages, articles, newsletters, posters, digital signage, and courseware

* Scheduling and promotion of essential cybersecurity annual training along with additional specialized and role-based training as needed, with executive reporting on training completion and effectiveness

* Organization of monthly forums to educate the global workforce on emerging cybersecurity topics and trends

* Identification of training demand based on attack simulation results, compliance challenges and regulatory scope, detected events and incident lessons learned

* Advocating for human based controls and the awareness/training components necessary to achieve them

* Creation and transmittal of cybersecurity-related communications for a broad range of audiences, both internal and external

INCIDENT RESPONSE

* Acting incident response manager for a global pharmaceutical firm

* Escalation point for SOC issues

* Performing post-mortem lessons learned

* Identification of playbook and runbook gaps against current threat landscape

* Management of IR document collection assuring consitency, validation, policy alignment and accessibility

* Incident response focal point