From:                              route@monster.com

Sent:                               Monday, October 24, 2016 10:31 AM

To:                                   hg@apeironinc.com

Subject:                          Please review this candidate for: DNS Secret

 

This resume has been forwarded to you at the request of Monster User xapeix03

Edward Turkaly 

Last updated:  08/07/16

Job Title:  no specified

Company:  Apeiron, Inc.

Rating:  Not Rated

Screening score:  no specified

Status:  Resume Received


Golden, CO  80401
US

Mobile: 720-432-5821   
Home:
720-432-5821
13fefe1d@opayq.com
https://www.linkedin.com/in/edward-turkaly-aa64877
Contact Preference:  Email

Quick View Links:

Resume Section

Summary Section

 

 

RESUME

  

Resume Headline: Edward Turkaly - Deputy CISO

Resume Value: 3iip9m8cwwcvj7bw   

  

 

Edward Turkaly

 

Email: 13fefe1d@opayq.com        Linkdin:  https://www.linkedin.com/in/edward-turkaly-aa64877                     Phone: 720-432-5821

 

 

QUALIFICATIONS

15+ years cyber security experience. Develops & manages new Security Programs for the fortune 500. Policy maker and strategic advisor, specializing in linking security strategy to business goals. Experience commercializing new security products to market, developing and finalizing security request for proposals, and operational security management. Keeps executive’s informed. Expertize in setting multi-year security strategy, protecting critical infrastructure and industrial control systems, developing and improving incident response programs, conducting Emergency Management, performing Vulnerability Management, and ensuring Business Continuity. Provides technical know-how linked to the big picture to promote mature program, processes & policy. Trained in strategic decision-making. Strong leadership traits, team player, excellent knowledge, visionary perspective & communication skills.  

 

TECHNICAL OVERVIEW

Technologies: Windows Server 2000-20016 install/config/hardening, Active Directory Domain Security, Metadata Analysis, AD Schema Extensions & Event log correlation, Identity Management (Microsoft Identity Integration Services), Security in IaaS, PaaS and AaaS, PKI, Certificate Revocation Infrastructures, IDS/IPS, Radius, NAT, VPN, & other Internet Authentication Services.

Operating Systems: Windows Server 2008 - 3.11. Nokia Firewall, Novell 4.11, some Cisco Pix 520, some Linux (Red Hat 5.2), BEOS R4.

Software: Active Directory, MIIS, VMware, Veritas/KVS Enterprise Vault, SAP, Check Point FWl-1 & VPN, CISCO PIX & VPN, Guardian Firewall, Real Secure Network & Host Based Intrusion Detection IIS/IPS, Exchange Server, Internet Information Server (5.0-3.0), SQL Server, Veritas, Microsoft Visio, ODBC compliance, Office Suite(s), DOS, Norton Ghost, Timbuktu, among others.

Security tools: ISS (SiteProtector 6.1), IDS/IPS, HIDS/NIDS, RSA EnVision, SPLUNK, SolarWinds (SIEM), NMAP, McAfee ePO (ePolicy Orchestrator), Cisco CSW, OpenDNS, RedCloak, Blue Coat Proxy, Tenable, HPWebInspect, dbProtect, Nessus, Wireshark, Encase, Spector, CyberCop, Eeye, Hyena, Kane, SnifferPro, Snmpwalk,

Protocols: IPSec, PPtP, TCP/IP, SSH, VPN, LDAP, RADIUS, HTTP/S, NetBEUI, PPP, SLIP, NetBIOS, IPX/SPX among others.

Hardware: LAN/WAN, Routers, Switches, Hubs, PIX/Nokia Firewalls, RAID 5, Fault Redundant NIC’s, among others.

Compliance Experience: FISMA, Certification & Accreditation (C&A), Privacy Impact Assessment (PIA), System Security Plans (SSP), OMB, NIST (800-53), FIPS (199, STIGS), SOX, HIPPA, NERC CIP 02-09, GLBA, and ISO frameworks. 

Government Experience: DHS, ICE, Air Force, NAVAIR, Pentagon, DISA, CIA, DOI – Bureau of Reclamation

High Level Skills: Strategic Advisor, Business Development, Proposal writing, Cloud Computing Security, IR&H, Management, Project Management, Defense in Depth, Business Impact Assessment (BIA), Disaster Recovery/Business Continuity, Security Policy, Assessments, Boundary Protection, Network/Server Administration; Client Facing, Public Speaking, Consulting & Technical Support.

 

CERTIFICATIONS

(ISC)2 Certified Information System Security Professional (CISSP) Cert #: 46026

SCADA Security Architect (CSSA)

Lean Six Sigma Green Belt

Federal IT Security Institute – Federal IT Security Professional Designer (FITSP) Cert # 00672

SANS Global Industrial Cyber Security Professional (GICSP)

Former SANS Security Essentials Certification (GSEC)

Former Microsoft Certified Systems Engineer (MCSE)

NSA INFOSEC Assessment Methodology- IT Security Organization - Critical Infrastructure Protection

Business Continuity Planning Training Certificate, Sentryx; Oct 2005

 

KEY PUBLICATIONS & DOCUMENTATIONS

 “Securing Certificate Revocation List Infrastructures” published on SANS

IT Disaster Recovery Plan(s) - CoBank & Coors Brewing Company

Information Security Policies (dozens) - Coors Brewing Company

 

EDUCATION

Bachelor of Arts in Philosophy; George Mason University, Fairfax, Virginia. January 1995

Emergency Management Academy, Disaster Science Fellowship (G-level) - Master of “FEMA Body of Knowledge”

Completed ISC2 courseware for Certified Cloud Security Professional

 

SECURITY CLEARANCES

Inactive DOD Top Secret 3/23/09   -   Inactive DHS Secret Cleared 6/16/09   -   Former United States Postal Service Clearance

 

 

Newmont Mining Corp – Cyber Security Contractor to CISO (BridgeView IT)             Greenwood Village, CO. 11/15 – Current
Deputy to the CISO, implementing a new three year cyber security program and strategy valued over 36M, improving Newmont’s overall operational maturity. Wrote RFP for new strategic provider covering Managed Security Services Provider (MSSP), including SOW, SLA’s, qualifying metric/procurement scorecards, ultimately down selecting out of eight Gartner’s Magic Quadrant bidders. Designed a three year endpoint and network security strategy, building new capital investments. Developed new governance model / organization support chart. Shored up past investments while procuring new capital and strategic providers. Managed entire program costs. Developed investment review requirements, including ROI, gaining Investment Review Board approval.

·               Managed operational tempo including several high priority incidents (e.g., Ransomware, Botnets, Law Enforcement request)

·               Performed Operational Technology (OT – Mine site) security strategy, assessments and roadmap

·               Governed the procurement qualifications for all 3rd Party Cloud Computing adoptions

·               Security Architecture Board Member reviewing/designing/approving all cyber security projects before funding

·               Developed Newmont Information Security Policy & Standards meeting NIST & ISA compliance

·               Tackled a very wide range of Newmont/NIST maturity shortfalls by avoiding point solutions, partnering with strategic sustainable companies that included machine automation, active response, big data, connectivity, and threat intelligence

 

GE Oil & Gas – Industrial Control System Cyber Security – Commercial Application Leader       Longmont, CO. 3/12 – 11/15
Positions cyber security expertize to the Sales team driving global revenue on multi-year support agreements. Grows & enables global commercial teams to obtain cyber-security revenue. Reviews complex Industrial Control System (ICS) environments providing cyber security solutions & services for customers with GE Power Generation, Oil & Gas, Aero & Power Distribution equipment. These Critical Infrastructure facilities primarily have MarkVIe controllers supporting Nuclear, Gas, Steam, Compressor, Wind and Excitation, utilizing CAP, SecurityST, and NetworkST cyber solutions. Translates the customers cyber-security Critical To Quality (CTQ) requirements into GE solutions.

·               Key technologist, subject matter expert, & application engineer for all things cyber-security.

·               Contributed $24+ MM in 2014 YTD in cyber security orders.

·               Trains the global Sales & Commercial Team on customer’s security perspective of critical industrial controls.

·               Provides onsite sales support for customers in North America, Europe, Brazil, Asia, African & Middle East.

·               Commercializes the quoting & scoping of cyber security, enables Conversation Guide Outputs, simplifies appropriate technical selection of base & plus options, along with known engineering contingencies.

·               Key technical resource on all large and/or complex cyber security opportunities.

·               Increases contribution margins by reducing technical inaccurate responses & decreasing specification gathering cycle time (from weeks to days) through a Lean Six Sigma cyber-security project, resulting in Lean Six Sigma Green Belt Certified.

·               Presents to multiple customers, tailoring custom solutions, helping them obtain a high degree of operational maturity, promoting good cyber security strategy & demystifying technical complexity. 

·               Commercialize GE Oil & Gas cyber-security marketing items such as videos & whitepapers for NEI 08-09, NERC, WIB, IEC 62443, ISA, QATAR and others, including customer presentations and GE specific procurement specifications.

 

Manager of Security Operations Center/Computer Security Incident Response Center (SOC/CSIRC); Infrastructure Defense Manager; Information Systems Security Officer (ISSO)
Contract for Immigration & Customs Enforcement; Dept of Homeland Security – Broomfield, CO. 6/09 – 2/24/12
Responsible for daily security operations management of the Infrastructure Defense & Security Operations Center (SOC) for Production Operations of the Department of Homeland Security (DHS), Immigration and Customs Enforcement (ICE) network consisting of 35,000 users, including leading security and federal compliance requirements:
·       Key customer relationship manager between multiple highly political & sometimes very divided government leads. Provided sound guidance without damaging political relationships. Liaison between Operations, Engineering, Architecture & Information Assurance Division. Managed the inter-activity between SAIC sub-teams (NOC, IDG, ADEX & Service Desk) and communication with their government clients. Lead communication & resolution of complex and cross-team problems.
·       Managed the Enterprise Operations Center FISMA Compliance Program - gaining authority to operate (ATO @ 91% for 35,000 endpoints) to include negotiating FIPS-199 (EOC boundary definitions), performing & writing Contingency Plans, Disaster Recovery Test, completing Interconnection Service Agreements, PIA, Risk Assessment(s) and managing vendors performing ST&E activities, finally completing POA&M actions. Other management actions include mitigation from routine Vulnerability Assessment Security Scans and other reports for government officials.
·       Reorganized the EOC SOC/CSIRC 24/7 operations into a much more efficient machine by prioritizing key processes by; level of complexity, primary shift dependence, primary and desired SME’s and remediation time for future Service Level Agreements. Managed 18 EOC SOC/CSIRC individuals in two different time zones, including 3 sub-contractors. Managed training, leave time, personal issues and performance reviews. Maintained respect from employees by leading from example (getting hands dirty), providing a mid-term vision and, most importantly, from listening. Implemented daily customer operation calls (stand up calls); focusing in on last 24 hours of most significant events, situational awareness and tool/health concerns. This greatly increased senior level customer involvement, trust, and understanding of environment.
·       Gained senior level approval and kicked off Critical Infrastructure Assets (CIA) project from building key trust relationships with ICE Field ISO’s and ISSO’s. Sold our 24/7 monitoring as a service to help protect CIA. Gathered field infrastructure details; identifying future placement of HIDS/NIDS and for inclusion of host info into SOC/CSIRC incident monitoring tools – zeroing in on true security concerns/alerts. 
·       Expanded and improved RSA EnVision SIEM coverage/correlation for the SOC/CSIRC.
·       Provide internal SAIC Business Development services such as RFP writing (ICE, ICE ITFO, EPA, US Forest Service, FEMA and NASA), Proposal Red/Blue and Technical Readiness Reviews.
·       Provided SAIC ICE Contract-Wide Security Refresher Training. Received countless praise on the quality, which was based off real life DHS/ICE SOC/CSIRC incidents and the trouble contractors find themselves in.
·       Awarded opportunity / completed Emergency Management Academy Fellowship Program (Master Level) –specifically studying the “FEMA body of knowledge”.
·       Performed internal audit and process mapping utilizing CERT Coordination Center (CERT/CC) process mapping methodology for Incident Response centers to map all “as-is” state processes – enabling examination of process routers (inputs, outputs, handoffs, roles, responsibilities, cross organization boundaries, et.). Re-worked poorly defined handoffs, missing process activity, bottlenecks and single points of failure.  Identified SOC key business functions and further identified the subprocess supporting these business functions. Categorized subprocess as high, med and low for better incident response time. This effort allowed me to then create visual SOP’s, known as “swim-lanes”, for each process allowing executive leadership visibility, understanding and a better commitment for process improvements. 
·       Patch Management (Information Security Vulnerability Management) design improvements; implemented a new process of patch analysis to help build “business justification” for emergency change management decisions
·       Created SOC vulnerability management and incident response and handling SOP’s, PlayBooks, RunBook guidelines and manuals.
·       Created a “knowledge management wiki” internal for the ICE SOC, based on Media Wiki, allowing for “on-the-fly” changes to occur without interfering with published documentation.
·       Identified gap and lead effort zeroing in of true ICE mission critical system overshight - obtained critical infrastructure FIPS I99 lists inputting IP’s into network/host based intrusion detection tools  and Vulnerability Management Tools.
·       Created an Open Source Monitoring process to “jump ICE decision making forward”. Developed an algorithm to examine individual patch CVE numbers and calculate risks, including Common Vulnerability Scoring Systems (CVSS).
 
Information Security FISMA & NERC Program Manager
Contract for Bureau Of Reclamation, Department of Interior – Lakewood, CO. 10/08 – 6/09
Managed compliance program for NERC CIP Critical Cyber Asset Controls & FISMA Certification & Accreditation (C&A) for Electronic Access Control and Surveillance Systems (EACSS) at National Critical Infrastructure facilities; Glen Canyon Dam, Grand Coulee Dam, Shasta/Trinity/Keswick Dams, and PASS - Snake River Area Office regions. These physical protection systems provide interrelated methods for detection, delay, and response to alarms, threats, and other adversarial actors utilizing access control, ground based radar, and video surveillance. This position directly dealt with real national security concerns to critical infrastructure:
·       Utilizing enterprise security risk frameworks (NERC CIP 02-09 – Critical Cyber Assets and NIST 800-53) identified those controls having specific applicability, and then further clarified the implementation of those controls into Industrial Control Systems (ICS), while incorporating operational and finical realties. Identified enhancing actions to security posture.
·       Mapped common NERC CIP to NIST 800-53 controls to help consolidate compliance management program. Identified and improved EACSS Physical Security & Electronic Security Perimeters.
·       Audited each EACSS (dam security) installation. Addressed cyber deficiencies identified in Technical Vulnerability Assessments and prioritized project around "greatest potential impact" to implemented NERC CIP and NIST security controls. Managed preparation and operations for Privacy Impact Assessments (PIA), System Security Plans (SSP), FIPS 199 impact categorization, & Risk Assessments (RA). Provided Privacy Impact Assessment (PIA) for entire program.
·       Architected network security layer with CISCO 1841 Integrated Security Services and redesign of flat IP subnets. Provided Server Hardening per STIGS, AD Domain Security, audit policies and event logging. Per DHS Privacy workshops, created Video Surveillance Policy and Procedures for operational EACSS.
·       Provides each client technical support/architecture design & consulting to include; detailed network diagrams per Nessus scans,  site specific System Security Plans & System Restoration Plans, selection/implementation of Malicious Code Protections & Flaw Remediation, site specific standard operating procedures & rules of behavior.
 
Disaster Recovery Coordinator
Contract for CoBank – Greenwood Village, CO. 11/05 – 3/06
Analyzed current CoBank IT Disaster recovery readiness, plans and recovery strategies. Delivered a new step by step “master disaster recovery plan” capturing the entire IT “restoration order” (recovery procedures for people, process and technology) organized in the most logical order of events - from disaster to recovery – for any “disruption scenario”.
·      Mirrored VMware from production into hot site and warm site DR environment.
·      As a bank many Recovery Time Objectives (RTO’s) where under 4 hours (per law), consultant to various business leaders identifying perceived vs. actual recovery time objectives and resource or financial plans to address any gaps.
·      Managed business continuity contracts with all third parties; including SunGard Authorization Profile, Schedule A; Iron Mountain, SunGard, Sprint, and VMware.
·      Created scheduled for several unique DR test plans including staff mock tests, isolated system tests, and large scale “surprise” DR drills - testing staff and vendor readiness.
 
IT Security Engineer
Coors Brewing Company– Golden, CO. 10/02-11/05
Working under the Chief IT Security Officer responsible for setting overall corporate security strategies. Technical Review Board Member reviewing all proposed IT changes (for new projects) and Change Control Boards (enhancements). Created IT Security charter and launched the new Coors Information Security Board.
·       Created and implemented Microsoft Identity Integration Service (Identity Management) business case/project; business case proved a major cost savings for password resets and allow for more security. Experience with MIIS and AD Schema metadata analysis and re-configuration more clearly represent organization master data requirements. 
·       Reviews and approves all firewall policies and change requests (Pix & Checkpoint), for web hosting/app hosting LAN environments. Reviews and makes recommendations to Vulnerability scan reports/logs. Continually provided internal assessments, identifying threats to be reviewed (mitigated, accepted, or transferred) and presented to board. 
·       Served as Disaster Recovery Coordinator. Wrote IT Contingency DR Plan. Managed DR schedule; which services, servers, components are in recovery center; SunGard Hot-Site in Philadelphia. Performed yearly DR drills, identifying IT testing scope (such as proving SAP transaction integrity) and criticality scorecards. Monitored/Improved DR Service Level Agreement; drafted Business Continuity Business Case identifying Business Impact Analysis (BIA)& Maximum Tolerable Downtimes (MTD) for more effective SLA;s.
·       HIPPA Security Officer, performed internal audit on entire enterprise identifying all EPHI data and controls in place or lacking. Maintained remediation plan of action; ensured continual compliance.
·       Developed RFP for enterprise vaulting strategy due to a legal underage drinking lawsuit aimed at Coors. Obtained/Implemented Symantec/Veritas Enterprise Vault & NetBackup product hands on training. Lawsuit provided 50 key words for a number of key employees: our challenge was to collect enormous/terabit’s of data across unique storage platforms (SharePoint, file servers, email and personal laptops). Created two classification levels of vaulted data, one internal and one for the lawyers. The first containing "all data" collected from pst/nsf migrations; file system archiving; tape backups; share point archiving components. Using discovery accelerator "abstracted just the results" into another archived/vault thus ensuring not too much information was provided (or inappropriate - confidential information) to lawyers. The layers in turn used discovery accelerator on there end (a separate instance). Created data retention polices, Storage Lifecycle Polices & backup policies for integration with NetBackup (from disk archive to tape library) to disk) – for automated backup of different types of data/retention periods – improving cost effectiveness.
·       Drafted all Coors Information Security Policies & Procedures (password; encryption; contractor; wireless and many more corporate polices/procedures).
·       Privacy & compliance advisor for Coors Legal dept.
 
Information Assurance Senior Systems Engineer   EDS – United States Nationwide - Projects from 4/2000-10/2002
·       Security Engineer: Coors Brewing Company: Provided an independent security assessment across multiple client facing platforms and vendors, providing mitigation solutions for Cornerstone Project. Resolved gaps. Participated in design of 3-teir environment/positioning of firewalls, routers and v-lan switches. Architect Wireless Networks for encryption (WEP), device authentication (Mac address) and user authentication with a RADIUS server, while planning for digital certificates and SAP authentication. Created Information Security Polices & Standards. The Polices & Standards severed as the foundation of the Cornerstone Project & formed the platform for Coors Brewing Company IS department adoption.
·       Security Design: Cooperative.comProvided client RFP support then designed & implemented the Windows Active Directory LDAP Schema and Namespace for the Cooperative.com portal -- a one-stop website helping Cooperative.com partners in the new deregulated US energy environment. I ensured LDAP Active Directory would include, mirror, & replicate user info to the four current and all future Cooperative partners. Our design allowed applications to read fully qualified namespaces or flat, non-LDAP aware, namespaces. By arranging schema extensions under the UserClass, we allowed for future single-sign-on & targeted user translation, for example, by allowing content apps such as Eprise to obtain targeted views for individual users. We designed LDAP to be centrally controllable, to facilitate major changes, provide replication, to provide a single POC, yet to allow partners to control their own apps. During online self-registration, we designed the schema to allow import of existing user data from a proprietary database (Ablaze) for verification and transition into a new Active Directory user account. We provided indexing on attributes requiring web searches. By installing new attributes & classes from LDIF Script, we completed the schema implementation. Additionally, we ensured LDAP would provide future secure methods of authentication, such as storage of digital certificates & directory-enabling a PKI solution.
·        Security Assessment: USG 400:  USG400 Special Applications Group, focusing on the security assessment, proposal efforts, technical designing & packet/sniffing analysis (Eeye, SinfferPro) for a new secure HTTP/SSL/SHH VPN Tunnel called ICE (Intelligent Communication Environment). ICE is essentially SSH within SSL with “double 128 bit encryption”), a new technology created within the EDS labs.  My packet level security assessment verified the connection “appeared” just like any typical SSL transmission. My participation  helped ICE receive the potential to become a new protocol/VPN for use at the CIA.  I provided nine proposal initiatives to the Central Intelligence Agency. Now ICE is under review by IN-Q-TEL, a private organization supporting the CIA. ICE is a SSH encrypted and secure shell/tunnel that travels within any SSL at 128 bit encryption, effectively providing a discrete level of communication, double encryption, and concealing the SSH packet header, destination & source address. ICE includes items such as Private Certificate Authorities, NAT and PKI services. Most importantly, ICE is platform independent, working with any Internet connectivity device (PDA, WAP, LAPTOP) without requiring any additional software or hardware.
·       Security Assessment/Consultant: DISA Field Security Operations:  Provided RFP details, then independently did a security assessment for clients PKI Certificate Revocation List (CRL) checking tools and solutions, to ensure each web users session are authenticated against revocation information on every separate connection made to the DISA Field Security Operations systems.  This assessment will serve to identify the most secure solution available from vendors such as Entrust, Baltimore, KyberPASS, VeriSign, CertCo, ValiCert and Microsoft. The findings serve both for DISA/DITSCAP as well as EDS PKI Information Assurance.
See my SANS publication on this topic: http://rr.sans.org/encryption/revocation_list.php
·       Security Implementation: VenServ:  Provided RFP then completed CISCO boundary protection  & Windows Server Hardening. Updated a PIX 520 firewall, added another for fail-over redundancy, configured NAT & firewall policies, and added CISCO VPN 3DES. Migrated all IIS 5.0 web and servers and Windows 2000 DNS servers from routable IP’s to internal private IP’s.  Web servers resided in Windows 2000 active directory, configured each for Internet Authentication Services. CISCO VPN clients now authenticate through the PIX to the Windows 2000 RADIUS server, allowing remote users to log in directly using Active Directory. Implemented each server to use fault-redundant NIC’s and configured paths to two separate redundant switches, and then to the two firewalls, for complete redundancy. Reviewed Active Directory & DNS Event Logs addressing discrepancies. Finally, implemented Windows 2000 Server hardening, removing unused services, applications and ports.
·       Security Consultant: United States Postal Service:  Drafted RFP. Technical Team leader providing management and technical documentation for Server hardening; including testing scripts for deployment on NT, Unix, Red Hat & Solaris servers, included Application Hardening for Internet Information Server (IIS 4.0), Systems Management Server (SMS) & Netscape Enterprise Server.  Led development for the Security Monitoring Office, Raleigh, NC. Designing an Intrusion Detection System (IDS) infrastructure including monitoring & reporting of incidents tied into the Server Hardening Configuration Audit Process. Used Real Secure Host Based & Network Based Intrusion Detection (IPS/IDS) on five subnets with over 150 NT and Unix Web Servers. The SMO included remote management for two CheckPoint Firewall-1 servers.  Served as technical POC for all hardware & software purchasing requirements. Provided CheckPoint Firewall-1 training for SMO staff. Obtained a USPS Security Clearance. 

 

 

PERSONAL ACHIVEMENTS

 

Emergency Management Academy, Disaster Science Fellowship, Mastery of “FEMA Body of Knowledge”

One of a small group from around the US & Canada selected to participate in the Emergency Management Academy’s Disaster Science Fellowship program. This prestigious graduate-level program requires the mastery of the Emergency Management Body of Knowledge, a set of 36 books recognized by industry leaders as the definitive works on disaster science. In December 2011, after completing an intensive year-long program, Ed was designated a Fellow of the Academy of Emergency Managers (FAcEM). One of only 12 fellows worldwide!

 

Completed the 2011 Colorado Trail Race 500+ miles and 65,000' of elevation gain through the Colorado Rocky Mountains from Durango to Denver. Race Time: 10 Days, 16 Hours & 59 Minutes.

 

Completed the 2013 Tour Divide – 2800+ miles mountain bike race from Canada to Mexico (Banff, AB to Antelope Wells, NM) with 200,000 feet of vertical - equivalent to summiting Mount Everest from sea-level 7 times.

Raised $10K+ in charitable donations.  Race Time: 24.5 Days.

 

AFFILIATED ORGANIZATIONS

 

 

Email: 13fefe1d@opayq.com        Linkdin:  https://www.linkedin.com/in/edward-turkaly-aa64877                     Phone: 720-432-5821



Experience

BACK TO TOP

 

Job Title

Company

Experience

Deputy CISO

Newmont Mining Corporation

- Present

 

Additional Info

BACK TO TOP

 

Current Career Level:

Executive (SVP, VP, Department Head, etc)

Years of relevant work experience:

10+ to 15 Years

Date of Availability:

Immediately

Work Status:

US - I am authorized to work in this country for any employer.

Active Security Clearance:

Active Top Secret

US Military Service:

Citizenship:

US citizen

 

 

Target Job:

Target Job Title:

CISO

Desired Status:

Full-Time

 

Target Company:

Company Size:

Occupation:

Sales/Retail/Business Development

·         Technical Presales Support & Technical Sales

IT/Software Development

·         Computer/Network Security

Marketing/Product

·         Product Management

 

Target Locations:

Selected Locations:

US-CO-Denver

Relocate:

No

Willingness to travel:

Up to 50% travel