From:                              route@monster.com

Sent:                               Thursday, November 10, 2016 3:23 PM

To:                                   hg@apeironinc.com

Subject:                          Please review this candidate for: Network Engineer TS SCI

 

This resume has been forwarded to you at the request of Monster User xapeix03

Brad Bemis 

Last updated:  08/13/15

Job Title:  no specified

Company:  Apeiron, Inc.

Rating:  Not Rated

Screening score:  no specified

Status:  Resume Received


Orlando, FL  32801
US

Quick View Links:

Resume Section

Summary Section

 

 

RESUME

  

Resume Headline: Brad Bemis - Founder and Principal Security Strategist

Resume Value: xc8vqtip8ine37ey   

  

 

Brad Bemis, CISSP, CISA · Orlando, FL · (425) 233-2571 · brad.bemis@secureitexperts.com

 

CAREER OBJECTIVE

 

A challenging information risk management and cyber security position within an organization that recognizes the business value of properly protecting its information assets. 

 

SUMMARY OF QUALIFICATIONS

 

·               A high-impact, results-oriented information technology veteran with over 23 years of solid hands-on planning, design, implementation, operation, security, audit, leadership, and management experience supporting advanced multi-vendor enterprise environments of all sizes.

·               Over eighteen years of direct experience in the information security discipline performing comprehensive security assessments, implementing secure technology solutions, and providing strategic security management services for multiple Fortune 500 companies, military organizations, and government agencies around the world.

·               A proven information security professional with expertise in leadership and team building, a formal background in project management, a keen understanding of how to ensure successful business operations, an excellent grasp of interpersonal communications, a penchant for collaborative knowledge sharing, the patience to work with others in any environment, and a strong belief that customer satisfaction is an important aspect of any project.

 
OVERVIEW OF PROFESSIONAL EXPERIENCE

 

·               Built entire security programs from the ground up using COBIT, ISO 27000, ITIL, SSE-CMM, NIST, etc

·               Directed compliance initiatives for Sarbanes-Oxley, HIPAA, GLBA, PCI-DSS, FISMA and many more

·               Partnered with executive-level committees to determine risk appetite and set security priorities

·               Engaged in formal and informal security risk assessments leveraging OCTAVE, FRAP, FIRM, etc

·               Formalized risk management tools and techniques emphasizing ownership and accountability

·               Authored clear and functional enterprise security policies, standards, guidelines, and procedures

·               Defined and delivered structured security awareness, training, and education materials at all levels

·               Configured and monitored firewall, IDS, and VPN devices, malicious code defenses, and PKI systems

·               Created and implemented system hardening standards for applications, platforms, and devices

·               Administered and conducted penetration testing of systems, applications, databases, and networks

·               Streamlined threat management and vulnerability remediation capabilities across entire enterprises

·               Spearheaded business continuity, disaster recovery, incident response, and digital forensic initiatives

·               Conducted security audits and compliance validation checks against established control baselines

·               Managed multiple large and complex projects in a manner consistent with PMI PMBOK methods

·               Led the work efforts of other security professionals and IT personnel in teams ranging from 6 to 30

·               Formulated and administered budget plans for annual program allocations of up to 4 million dollars

·               Increased effectiveness of security operations, enhanced customer trust, and influenced profitability

·               Participated in advancing the security profession through blogging, forums, and social networks

·               Maintained strong professional relationships and actively contributed to the security community

 

Technical History: 

 

·               Network Protocols:  TCP/IP, IPX/SPX, NetBEUI

·               Routing Protocols:  RIP, IGRP, EIGRP, OSPF, BGP

·               Security:  GRC, IDM, VPN, encryption, PKI, Firewalls, IDS/IPS, pen-testing, incident response, forensics

·               Services:  Ethernet technologies, Frame-relay, ATM, Token Ring, FDDI, X.25, 802.11 (wireless), 802.1x

·               Support:  Cabling, switching, bridging, routing, client-server, security, testing, troubleshooting

·               Operating Systems:  Windows 3.1/NT4 to Win7/2K8 (w/IIS & Exchange), Unix, Linux, Solaris, Novell

·               Network Management:  SNMP, OpenView, CiscoWorks, Tivoli, Optivity, SunNet Manager

·               Languages:  HTML, PHP, SQL, C, Visual C++, Visual Basic, Delphi, Assembler, Pascal, Perl, JavaScript

 

EDUCATION AND PROFESSIONAL DEVELOPMENT

 

Master’s in Education, Capella University (in pursuit)

Additional graduate studies in business and psychology

B.S.  Information Technology, University of Phoenix (2004)

A.A.S.  Information Systems Technology, Community College of the Air Force (1998)

A.A.S.  Personnel Administration, Community College of the Air Force (1998)

 

Certifications:  Certified Information Systems Security Professional (CISSP) · Certified Information Systems Auditor (CISA) · Associate Business Continuity Planner (ABCP) · Certified Lean Six-Sigma Greenbelt (CSSG) · Cisco Certified Network Associate (CCNA), Cisco Certified Design Associate (CCDA) · Nortel Networks Certified Support Specialist (NNCSS) · CompTIA Certified Network Technician (Network+) · Microsoft Certified Systems Engineer, Microsoft Certified Professional plus Internet · Successfully completed 2 of the 4 CCNP exams (routing and switching), and am currently preparing to undergo the Certified Information Security Manager (CISM) certification process

 

TRAINING:  Various on-going security lectures, seminars, and events · Computer Security Incident Handling · Securing [Microsoft] Enterprise Platforms · Computer Crime and Investigations · Checkpoint Security Administration · Introduction to Cisco Router Configuration · Advanced Cisco Router Configuration · Accelerated Nortel Networks Router Configuration · Windows Architectural Design · Windows Server Administration · Exchange Server Administration · HP Openview Network Node Management · Introduction to UNIX · Advanced UNIX · Solaris Systems Administration · Solaris Shell Programming · Oracle Database Administration · Oracle Developer Application Design · Cabling for Voice and Data Networks · Motorola Voice Communications · Network Encryption Systems Administration · Network Planning · Network Systems Administration · Project Management · Technical Training Instruction · The Consultative Approach · Lean and Six-Sigma · Consumption of multiple internal Microsoft security training courses · Over 100 Lucent “Knowledge Quest” training seminars · 1,000+ additional hours of computer based training from CBT Systems · Leadership and management training through the U.S. Air Force (John Levitow Leadership Award winner), Nordstrom leadership development track, the Seattle Institute for Management Studies, formal education (MBA program), and personal study of leadership through reading and practical experience

 

AFFILIATIONS:  Active participant in the Cloud Security Alliance (CSA), Information Systems Security Association (ISSA), Information Systems Audit and Control Association (ISACA), Computer Technology Investigators Network (CTIN), Agora, InfraGard, Washington Software Alliance (WSA), King County Bar Association (KCBA), and Pacific Northwest CISO Forum meetings and events · Current Seattle Chapter CSA Secretary, Former Puget Sound ISSA Chapter Secretary · Guest Instructor for the Pacific Northwest CISSP Study Group · Established the Security Program Management Forum for SecurityFocus.com · A key contributor within the ISC2 CISSP Forum, LinkedIn Information Security Community, and ITToolbox Security discussions · Currently maintaining an active information security portal and blog ·  Regularly consulted on issues of security awareness and training, policies and procedures, leadership and management, career development, and a wide range of technical security issues

WORK HISTORY AND PROFESSIONAL EXPERIENCE

 

SecureITExperts, LLC – Consulting Services

June 2012 to Current (Member Owner)

Founder and Principal Security Strategist

 

·               Ownership of a small business focused on information risk management and cyber security services

·               Working with customers to identify information security challenges and resolve them by performing risk assessments and establishing prioritized remediation plans

·               Providing strategic security consulting services; offering advice on how to handle a wide range of security and compliance matters, including PCI, HIPAA, SOX, FISMA, and many others 

·               Establishing security policies, processes, and technology implementation plans based on ‘smart’ security practices properly scaled to meet each customers unique business requirements

·               Developing and delivering security awareness and training plans and materials for organizations of all types and sizes

·               Offering a broad range of other generalized security consulting services covering all aspects of the information security discipline, with deep emphasis on mobile, social, and cloud service trends   

 

Network Computing Architects (NCA)

January 2011 to July 2012 (Consulting)

CISO, Security Practice Manager, and Principal Consultant

 

·               Led all internal and customer-facing security initiatives across the company, including multiple PCI, HIPAA, and other compliance engagements.  

·               Managed a comprehensive ISO 27001 certified Information Security Management System (ISMS) covering all customer data and other sensitive information

·               Developed and managed a complete security consulting services function – defining service strategies, developing marketing materials, engaging is pre and post sales, and more

·               Provided strategic security management consulting services, risk and compliance assessments, and other general security services – working with top executives in most situations 

·               Completely rebuilt NCA’s reputation in the security management space

 

Expedia – Governance and Compliance

September 2010 to January 2011 (Contract)

GRC Program Manager and PCI Technical Lead

 

·               Provided consulting services on a wide range of security issues, including executive communications, awareness and training, policies and processes, vulnerability management, and more

·               Quickly took ownership of the PCI compliance portfolio – identified a number of security and business integration opportunities, then led efforts to close gaps and embed security into the corporate culture

·               Drafted a series of PCI compliance ‘how to’ guides to assist upwards of 10 separate brands – addressing everything from firewall rule audits to advanced policy and governance topics

·               Served as the lead technical advisor on all compliance related activities – driving the compliance roadmap and connecting compliance activities to broader enterprise security initiatives

·               Became the leading advocate for a holistic approach to information protection, working directly with mid-level and senior leaders to see the business value of security as a lifecycle process

 

 

 

Microsoft – Security Response Communications

December 2009 to May 2010 (Contract)

Program Manager – Operations and Communications

        

·               Drove process and tools improvement initiatives to help Microsoft better manage its vulnerability remediation practices

·               Drafted a revised user’s manual for a key internal tool used at Microsoft to consolidate, manage, and distribute security vulnerability information

·               Established a new team collaboration and information sharing portal for Microsoft’s Software Security Incident Response Process (SSIRP) Emergency Communications Team (ECT)

·               Revised metrics and key performance indicators for tracking the efficiency and effectiveness of security response measures during a SSIRP event

·               Stepped in to help support the Microsoft Security Response Center (MSRC) as part of the Emergency Engineering Team (EET) during two especially challenging SSIRP events

 

Clearwire – IT Operations

July 2009 to October 2009 (Contract)

PCI Compliance Lead and Senior Security Engineer

             

·               Successfully built and executed a strategy for ensuring Clearwire met all PCI-DSS 1.2 requirements during its October 2009 self-assessment

·               Initiated and managed segregation of the cardholder data environment, including changes to the network architecture, database structures, and business applications

·               Delivered policies and procedures, application security plans, threat and vulnerability management strategies, incident response methodologies, and other supporting documentation

·               Selected, purchased, and deployed a comprehensive endpoint protection solution for the enterprise while under extremely aggressive time constraints

·               Established a framework for the new IT Security and Compliance team to deliver security services for its internal customers and continue its compliance initiatives

 

T-Mobile – Engineering and Operations

December 2007 to February 2009

Manager, Security Operations Team

        

·               Created and managed two new security operations teams within T-Mobile 

·               Led efforts to establish a new security framework within the company, define new processes and procedures for security functions, and enhance the technical security portfolio of the company

·               Directly supervised the administration of all security appliances and services across the enterprise, including critical infrastructure components directly effecting the customer experience

·               Established a structured security service delivery model founded on ITIL, ISO 27002, and other general industry best practices that exceeded all expectations

·               Worked with internal customer-centric engineering and operations teams to streamline workflow and define specific criteria for the prioritization of day to day work

·               Provided training and support for a team of eight security professionals while transitioning from non-technical security roles to being directly responsible for securing the entire T-Mobile infrastructure

·               Lauded by team members and peers as a clear leader within T-Mobile's security community

 

Microsoft – Windows Vulnerability Management

October 2007 to December 2007 (Contract)

Program Manager – Windows Vista Vulnerability Resolution

        

·               Performed end-to-end case management and patch delivery activities for all reported vulnerabilities in Windows Vista prior to and during the initial release of Vista SP1

·               Participated in the triage, evaluation, classification, and solution engineering process for all security-related vulnerabilities impacting the Windows Vista platform during this time period

·               Led key developers from the various Microsoft product teams and internal security entities through in-depth threat modeling and secure code review sessions

·               Served as the teams expert on deployment implications within large-scale enterprise environments, offering strategic and tactical advice on how to minimize customer impact

·               Monitored internal and external vulnerability reporting services, newsgroups, and other social media services to evaluate the effectiveness and impact of each new patch released

·               Advised Microsoft on specific ways to improve their remediation processes and increase efficiency    

 

Independent Volunteer Worker

November 2006 to October 2007

Volunteer Worker and Avid Outdoors-man

        

·               Took a 1-year voluntary sabbatical away from the security industry

·               Studied various aspects of psychology at the graduate level - focusing on interpersonal communications, human interactions, leadership, organizational psychology, and more

·               Conducted volunteer work with the Seattle and East-side hospice care programs, the King County Crisis Clinic, Snohomish County search and rescue teams, and other worthwhile organizations

·               Section hiked most of the Pacific Crest Trail from Canada to Northern Oregon, and many other trails

·               Continued to stay on top of industry trends – especially topics on security program management

·               Used a portion of this time to study the hacker mindset, patterns of attack, and breach reporting

 

Symetra Financial – IT Risk Management Services

December 2005 – November 2006

Senior Information Security Specialist and Program Manager

        

·               Established a senior leadership council to unite disparate but interrelated programs such as information protection, regulatory compliance, business continuity planning, privacy, physical security, etc. under a single umbrella

·               Successfully championed the adoption of ISO 17799 and COBIT as key components of Symetra's overall information protection and regulatory compliance strategies

·               Completed a comprehensive rewrite of all information protection policies and procedures, greatly reducing their length and complexity while enabling the company to better focus on its core business

·               Led the implementation of solutions for enterprise encryption, integrated identity management, and enhanced network defenses; resulting in heightened asset protection and management confidence

·               Partnered with technical project teams, management groups, and internal auditors to advise on challenges and solutions for all security subjects ranging from the adoption of new technologies to daily change management decisions

·               Created a new security risk management planning template and instructional guide to assist information asset owners and custodians in making good, risk-based decisions in accord with defined standards of due care

·               Instituted new processes and technologies for the detection and management of potential security incidents; decreasing reaction and recovery times by nearly half

·               Sought out by senior management to play a key role in the development of Symetra's business continuity and disaster recovery plans, including those for the potential bird flu epidemic

 

Microsoft Corp. – Sales, Marketing, and Services Group

December 2004 to December 2005 (Contract)

Information Security Subject Matter Expert and Instructional Designer

        

·               Developed comprehensive on-line and instructor led security process and technology training courses for the 22,000+ personnel assigned to Microsoft’s Sales, Marketing, and Services Group (SMSG)

·               Defined a modular curriculum mapping method to meet the individual security training needs of each learner, and established knowledge measures and psychometric testing criteria for assessments

·               Worked closely with each SMSG Segment, and all Microsoft security-oriented business units, in order to determine security training requirements and solicit input into the curriculum design process

·               Helped organize the FY06 security curriculum into 30+ knowledge consumables (ranging from basic (100 level) security sales processes to advanced (400 level) technical security solutions delivery and support) based on Bloom’s Taxonomy and the latest in instructional design and e-learning

·               Began the formal study of security awareness, training, and education as its own discipline within the field of information security – making this a primary area of professional expertise

·               Delivered the all-time best e-learning course available on Microsoft security and working with customers to change perceptions

·               Regularly lauded for creative, highly-interactive course components that helped learners understand and use the materials presented    

·               Assumed interim leadership of the Instructional Design Team while the positions of Lead Instructional Designer and Development Manager were vacant  

 

Nordstrom, Inc. – Information Technology Services                                         

September 2003 to December 2004

Senior Information Security Engineer and Department Supervisor

        

·               Initially hired as the Senior Security Engineer responsible for security program development and management, but quickly promoted into a security leadership role as Supervisor of the struggling Nordstrom Enterprise Security (NES) Department 

·               Immediately began working with the team to identify key points of pain and implement solutions allowing NES to transition away from a reactionary firefighting mode and toward a proactive strategic direction 

·               Refocused the team on taking a risk management approach to project involvement - including team development of a risk analysis model with accompanying tools and techniques; Established a holistic 5 year vision covering all aspects of security and business integration; Lobbied for the first ever security budget for the NES department (1.2 million dollars for the first year)

·               Partnered with the executive Information and Privacy Councils as well as other IT departments to redefine Nordstrom’s approach to information security and privacy across the entire organization, developing a comprehensive information security framework designed to balance the dual imperatives of enablement and protection while working toward a corporate standard of due care 

·               Championed for executive level commitment, a hierarchal approach to the deployment of policies and supporting guidance, a targeted security awareness campaign across all areas of the company, and an emphasis on pragmatic ownership and accountability

·               Ensured that all work efforts accounted for regulatory and contractual obligations, including Sarbanes-Oxley, HIPAA (prosthesis unit), GLBA (Nordstrom Bank), VISA CISP/PCI-DSS, and others; as well as the extension of Nordstrom’s focus on superior customer service to include proper protection of the sensitive personal information that was entrusted to us by our customers 

 

Airborne Express, Inc. – Information Technology Services

July 2002 to September 2003

Senior Information Security Engineer

        

·               Formalized a comprehensive strategic information security program emphasizing the proactive defense of Airborne’s extremely diverse enterprise environment 

·               Coordinated and performed information security risk assessment activities.  Identified information security deficiencies, investigated risk mitigation solutions, and recommended corrective actions as appropriate

·               Implemented technology solutions to enhance the security of Airborne’s IT systems and corporate data.  Acted as the internal IT auditor for ensuring compliance with established control objectives 

·               Enhanced visibility into network and system security events for the correlation and analysis of event activities.  Defined, developed, and deployed incident handling processes and procedures to ensure the continued operation of Airborne services in the face of an adverse event 

·               Developed, implemented, and maintained corporate information security policies, standards, guidelines, and procedures 

·               Facilitated information security awareness, education, and training opportunities.  Established cross-functional information sharing forums to encourage group involvement at all levels of the company 

·               Advised senior management, business unit representatives, and IT personnel on all information security related matters, serving as the sole internal information security consultant for Airborne’s entire operation

·               Monitored security program compliance through cooperative efforts between all IT functions, internal audit, human resources, and legal services 

 

Lucent Technologies - Enhanced Sales and Services

April 2000 to June 2002

Information Systems and Security Engineer

        

·               Provided comprehensive security evaluation services, secure technology solutions, and strategic security management consulting services for multiple Fortune 500 companies and government agencies located in the Pacific Northwest region 

·               Core services provided include:  security program development and management; security policy/procedure development and review; business continuity and disaster recovery planning; incident handling; security audits and assessments; security requirements determination and analysis; perimeter security architecture design and implementation; network security infrastructure design and implementation; security awareness training curriculum development and presentation; and formal security-focused project management 

·               Identified as Lucent ESS’s Pacific Northwest Subject Matter Expert on security reviews and auditing, security policies and procedures, business continuity and disaster recovery planning, security awareness program development, and technical security deployments of firewall, IDS, and VPN solutions

·               Active regional point-person for internal Lucent engagements and security practice functions which included:  client proposal development, quality assurance of client deliverables, building and managing client relationships, internal training program management, security methodology modeling, development of service marketing materials, and security service business process development 

·               Regularly provided assistance to other consultants, and strategic support on other engagements; often called upon to address delicate situations, or to refocus engagement teams on effectively meeting (or exceeding) client expectations

 

United States Air Force – Special Operations

September 1991 to March 2000

Information Systems and Security Engineer

                

·               Involved in all aspects of planning, design, implementation, and management of complex integrated network systems, including their proactive defense against internal and external threats 

·               Determined network security requirements, configured network security devices, monitored networks for intrusion attempts.  Developed security accreditation packages and security awareness program materials, taught security awareness seminars, conducted physical security reviews, assessed disaster recovery plans, authored security policy and procedure documents 

·               Engineered entire network architectures from the ground up on a daily basis.  Provided wireless, fiber-optic, and copper-wire connectivity between backbone and end-user devices. Configured routers, bridges, hubs, and switches for use in multi-protocol environments

·               Administered Windows, Windows NT, Solaris, and Linux operating systems in mixed network configurations.  Monitored network connectivity and operational status using HP OpenView, CiscoWorks, and Optivity network management utilities 

·               Wrote several field guides and training references that were distributed Air Force wide, and either created or consulted on the development of numerous Air Force technology training programs

·               Served as the Non-Commission Officer In Charge (NCOIC) of Wing Command and Control Systems Management under Headquarters Pacific Air Forces (PACAF), and as a Combat Communications Team Chief for Theater Deployable Communications under Headquarters Air Force Special Operations Command (AFSOC) – leading each group to unprecedented success

·               Directly supervised over 30 military and civilian network and security operations personnel, often under real-world combat conditions while operating in the field  

 
ADDITIONAL INFORMATION

 

·               Previously held a Top Secret Department of Defense security clearance with access to Sensitive Compartmented Information (TS-SCI)

·               References and additional information will be made available upon request

 

Page 1 of 8

 

Experience

BACK TO TOP

 

Job Title

Company

Experience

Founder and Principal Security Strategist

SecureITExperts

- Present

 

Additional Info

BACK TO TOP

 

Current Career Level:

Experienced (Non-Manager)

Work Status:

US - I am authorized to work in this country for any employer.

 

 

Target Job:

Target Job Title:

Founder and Principal Security Strategist

 

Target Company:

Company Size:

Occupation:

IT/Software Development

·         Computer/Network Security

 

Target Locations:

Selected Locations:

US-FL-Orlando