From: route@monster.com
Sent: Thursday, November 10, 2016 3:23 PM
To: hg@apeironinc.com
Subject: Please review this candidate for: Network Engineer TS SCI
This resume has been forwarded to
you at the request of Monster User xapeix03
|
|||||||
|
|||||||
|
|
|
||||||
|
||||||
|
VonVictor Valentino Rosenchild United States
Citizen / American New York
University (NYU) *Current Student 287 Decatur
Street Apartment 2 Brooklyn, NY
11233 Email:
vonrosenchild@gmail.com Mobile Phone:
+1 (347) 362-9559 IMPORTANT,
PLEASE READ: ·
U.S.
Citizen / Brown American ·
Active
“civilian” U.S. Passport ·
11 years of
service (1991 – 2002) in the
United States Navy Intelligence Community as a Cryptologist *Honorable
Discharge ·
23+ years’
experience encompass both the Private and Public sectors (76+ countries) _____________________________________________________________________________________ United States
Department of Defense (DOD) Security Clearances held PLEASE NOTE: Currently U.S. DOD Security Clearances are NOT ACTIVE 1.
U.S. DoD Top Secret/Sensitive Compartmented Information (TS/SCI)
security clearance - Not Active 2.
U.S. DoD Special Access Program (SAP) Security Clearance - Not Active 3.
U.S. Diplomatic Passport: U.S. DoD, US DoS, NSA/CSS, CIA - Not Active 4.
U.S. DoD SSBI (Single Scope Background Investigation) - successfully
completed 5.
U.S. DoD SSBI-PR (Periodic Reinvestigation SSBI) - successfully
completed 6.
U.S. DoD Full Scope Polygraph - successfully completed 7.
U.S. DoD Counterintelligence (CI) Polygraph - successfully completed 8.
U.S. DoD Lifestyle Polygraph - successfully completed 9.
U.S. DoD Non-Disclosure Agreements (NDA) completed _________________________________________________________________________________ 10. New York
Police Department (NYPD) Department of Investigation (DOI) Background
Investigation / Character Investigation - successfully completed 11. Private
sector Non-Disclosure Agreements (NDA) completed Private
Sector (13+ years’ experience) Positions Held: · Chief Technology Officer – CTO · Chief Information Officer – CIO · Chief Information Security Officer - CISO · Senior Information Technology (IT) Project Manager · Big Data Project Manager · Senior Managing Principal Consultant · Senior Principal Consultant · Senior Consultant · Director of Information Technology and Training · Director of Information Technology · Senior Systems Manager · Senior Business Analyst · Senior Data Collection Forensic Investigator · Senior Systems Engineer · Senior Information Technology (IT) Auditor · Senior Information Systems (IS) Auditor · Senior Software Engineer · Senor Software Application Developer · University Computer Science (CS) Instructor · English as a Second Language (ESL) Instructor · Senior Network Administrator · Senior Helpdesk Engineer · Senior Management Information Systems (MIS) Manager Formal
Education Background: New York
University (NYU) – *Currently Attending · Major: Economics · Concentration:
International Relations Berkeley
College (New York) · Major:
International Relations · Concentration: Economics · *Academic Achievement:
President‘s List and Dean’s List Kaplan
University · Major: Management
Information Systems (MIS) · Concentration:
Accounting · *Academic Achievement:
Dean’s List University of
Maryland University College (UMUC) · Major: Computer
Science (CS) · Concentration:
Business Law Central Texas
College (CTC) · Major: Computer
Science (CS) · Concentration:
Business Law University
California Berkeley (UCB) · Army Reserve Officer Training Corps (AROTC) Alameda
College (California) · Major: Healthcare
Administration Professional
training includes but not limited to: · Sarbanes Oxley (SOX) Section 404 · Information Technology Service Management (ITSM) · Information Technology Infrastructure Library (ITIL v2,
v3, v4) · Gramm–Leach–Bliley Act (GLB)/Financial Services
Modernization Act of 1999 · Dodd–Frank Wall Street Reform and Consumer Protection Act · Control Objectives for Information and Related Technology
(COBIT 4 and 5) · Health Insurance Portability and Accountability Act of
1996 (HIPAA) · Payment Card Industry (PCI) / Data Security Standard (DSS)
- (PCI/DSS 2 and 3) · Basel I, Basel II, and Basel III · Glass–Steagall Act - Banking Act of 1993 · European Union (EU) Data Protection Directive · European Network and Information Security Agency (ENISA)
Regulations · Anti-corruption laws such as the FCPA, UK Bribery Act · Telephone Consumer Protection Act of 1991 (TCPA) · Federal Information Processing Standard (FIPS) Publication
140-2 (Level 1, 2, 3, 4) · Federal Information Processing Standard (FIPS) Publication
140-3 · ISO/IEC 27005 (IT — Security techniques — Information
Security Risk Management) · ISO/IEC/IEEE 42010 (Systems/Software Engineering -
Architecture Description) · ISO/IEC 27002 (Information Security Management) · ISO 27001:2013 (Information Security Management system
(ISMS · ISO/IEC 27001:2005 (Information Security Management system
(ISMS)) · ISO/IEC 27000 (Information Security Management Systems
(ISMS)) · SO 9241 · ISO 9001:2008 (Quality management systems — Requirements) · ISO/IEC 15408 (Common Criteria for Information Technology
Security Evaluation/CC) · Target Of Evaluation (TOE) · Protection Profile (PP) · Security Target (ST) · Security Functional Requirements (SFRs) · Security Assurance Requirements (SARs) · Evaluation Assurance Level (EAL) · ISO/IEC 11770 (IT — Security Techniques — Key management) · ISO/IEC 13888 (IT — Security techniques — Non-repudiation) · ISO/IEC 18033 (IT — Security techniques — Encryption) · ISO/IEC 15408-1 (IT — Security techniques — Evaluation
criteria for IT security (Introduction and general mode) · ISO/IEC 15408-2 (IT — Security techniques — Evaluation
criteria for IT security (Security functional components) · ISO/IEC 15408-3 (IT — Security techniques — Evaluation
criteria for IT security (Security assurance components) · ISO/IEC 19790 (IT Security techniques — Security
requirements for cryptographic modules) · ISO/IEC 24759 (IT — Security techniques — Test
requirements for cryptographic modules) · ISO/IEC 29128 (IT — Security techniques — Verification of
cryptographic protocols) · ISO/IEC 27033 (IT — Security techniques — Network
security) · ISO/IEC 27034 (IT — Security techniques — Application
security) · ISO/IEC 27037 (IT — Security techniques — Guidelines for
identification, collection, acquisition and preservation of digital evidence) · ISO/IEC 24760 (IT — Security techniques — A framework for
identity management) · ISO/IEC 29100 (IT — Security techniques — Privacy
framework) · ISO/IEC 29146 (IT — Security techniques — A framework for
access management) · ISO/IEC 27000 (Information Security Management Systems
(ISMS) standards) · ISO/IEC 27001 (IT - Information Security Management) · ISO/IEC 27002 (Best Practice Recommendations on
Information Security Management ) · ISO/IEC 17799 (Information technology — Security
techniques — Code of practice for Information Security Management) · Project Management Lifecycle (PMLC) · Enterprise Life Cycle (ELC) · Software Development Life Cycle (SDLC) · Application Life Cycle Management (ALM) · Service Oriented Modeling Life Cycle · Technology Life Cycle (TLC) · Product Lifecycle Management (PLM) · Enterprise Architecture Framework (EA framework) · Enterprise Architecture Planning (EAP) · Federal Enterprise Architecture of the United States
Government (FEA) · Treasury Enterprise Architecture Framework (TEAF) · FDIC Enterprise Architecture · Department of Defense Architecture Framework (DoDAF) · Enterprise Information Security Architecture (EISA) · Sherwood Applied Business Security Architecture (SABSA) · Extended Enterprise Architecture Framework (E2AF) · Capgemini's Integrated Architecture Framework · The UK Ministry of Defense (MOD) Architecture Framework
(MODAF) · NIH Enterprise Architecture Framework · Open Security Architecture · Information Assurance Enterprise Architectural Framework
(IAEAF) · Service-Oriented Modeling Framework (SOMF) · The Open Group Architecture Framework (TOGAF) · Zachman Framework · Department of Defense Discovery Metadata Specification
(DDMS) 1.0, 1.1, 1.2, 1.3, 1.4, 2.0, 3.0, 3.0.1, 4.0, 4.0.1, 4.1 · Department of Defense Modeling & Simulation Community
of Interest Discovery Metadata Specification (MSC-DMS) · Data Acquisition (DA) · Data Acquisition Systems (DAS/DAQ) · Data Analysis · Descriptive Statistics · Exploratory Data Analysis (EDA) · Qualitative Data Analysis (QDA)/Qualitative Research · Descriptive Statistics · Inferential Statistics/Confirmatory Data Analysis · Document Content Description facility for XML, an RDF
framework · Document Definition Markup Language (DDML) · Document Schema Definition Languages (DSDL) · Document Structure Description (DSD) · SGML’s Document Type Definition (DTD) · Namespace Routing Language (NRL) · OASIS CAM Content Assembly Mechanism · RELAX NG and its predecessors RELAX and TREX · Schema for Object-Oriented XML (SOX) · Schematron · XML-Data Reduced (XDR) · ASN.1 XML Encoding Rules (XER) · XML Schema (WXS or XSD) · Information Architecture (IA) · Information Design · SAS Analytics, Business Intelligence, Data Management,
MDM, Data Quality, Data Quality Accelerator for Teradata · MicroStrategy BI, Scorecards & Dashboards, Enterprise
Reporting, Advance & Predictive Analytics, Closed-Loop BI, QuickStrike,
High Performance BI, MultiSource, SQL Engine, Health Center, Big Data · Oracle OBIEE 11g, Solaris, Linux, RAC, Enterprise Manager
12c, Enterprise Data Quality, Data Integrator App Adapter for Hadoop, Big
Data Appliance, ERP, Oracle & Siebel CRM, Oracle 10g, 11g & 12c · Informatica Data Archive, Data Subset, DW Advisor, ILM
Nearline, B2B Data Exchange, B2B Data Transformation, HParser, RulePoint,
Vibe, PowerCenter, AddressDoctor, Data Explorer, Data Replication, MDM,
Identity Resolution · Teradata DW Appliance, Appliance for Hadoop, Data Mart
Appliance, Aster Big Analytics Appliance, MDM, Aster SQL MapReduce · IBM InfoSphere, InfoSphere BigInsights, IBM Business
Analytics for Big Data, InfoSphere MDM, Security Intelligence with Big Data,
System x, System z, Power Systems · SAP ERP, SAP CRM, Asset Information Management,
Operational Risk Management, Decision Service Management, SQL Anywhere,
PowerDesigner, PowerBuilder · NetSuite ERP, NetSuite CRM+, Financial Management
Software, Financial Analytics and Reporting PMP, PME, CISSP, SSCP, CAP, CSSLP, CISM, CISA, CGEIT, CRISC, MCPD,
MCSD, MCA, MCITP, MCSE, MCSA, MCP, CCIE, CCNP, CCNA, VCP, VCA, CCE, CCP, CCA,
RHCVA, RHCT, RHCE, RHCSS, RHCA, JBCAA, OCA, OCP, OCE, OCP, SCJA, SCJP, SCJD,
SCWCD, SCBCD, SCDJWS, SCMAD, SCEA, Linux+, Network+, Project+, Security+, A+ 1 |
|
|
||||||||
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Languages: |
Languages |
Proficiency Level |
|
English |
Fluent |
|
|
German |
Intermediate |
|
|
Spanish |
Intermediate |
|
|
Turkish |
Intermediate |
|
|
|