From: route@monster.com
Sent: Monday,
October 24, 2016 10:31 AM
To: hg@apeironinc.com
Subject: Please
review this candidate for: DNS Secret
This resume has been forwarded to
you at the request of Monster User xapeix03
|
|||||||
|
|||||||
|
|
|
||||||
|
||||||
|
DOREEN ROSE 171 Landing Meadow Road, Smithtown, NY 11787 doreenrose01@gmail.com … Home: 631.979.2039 … Cell:
631.921.0983 … https://www.linkedin.com/in/doreenrose
HIGH-IMPACT
TECHNOLOGY, SECURITY & BUSINESS EXECUTIVE Information Security & Privacy / Global
Architecture & Infrastructure / Project & Program Management
Compliance & Governance / Management Consulting Senior Advisor with extensive experience guiding Fortune 500 Companies
and Government Agencies in delivering comprehensive, scalable, enterprise
aligned technology. Held business critical roles including Acting Chief
Information Security Officer, Senior Security Architect, and Advisory Expert
for Data Security & Privacy. Won $35M in sales in 10 years at IBM and
sold over $50M during prior business engagements. Broad experience in delivering Information Technology and Security
requirements across virtually all industries. Process and detail oriented, a
creative and abstract thinker capable of adapting quickly to changing and
challenging environments while driving for results in an exceedingly
professional and defined manner. A tenacious, resilient, accountable, yet
highly likeable leader. Visionary expert creating technology and security solutions to protect
the data of businesses world-wide. Outstanding technical and business
leadership talents combined with success in: Security and Cybersecurity Transitions & TransformationsSecurity
Standards, Policies, Procedures & Protocols Physical, Logical & Cloud Based SecurityDisaster Recovery
Strategies Identity & Access ManagementSecurity Best Practices, Training
& Awareness Risk, Event & Incident ManagementLAN, WAN,
Networking, Web, Cloud & Mobile Technology Security Operations Center Development US Federal
Government, Agency & State Projects Intrusion Detection & PreventionFinancial
Oversight and Vendor Management Security Audit, Assessment & Gap AnalysisCustomer Management,
Sales and Business Development PROFESSIONAL EXPERIENCE IBM, North America and Global Practice2005 to Present Senior
Security Management Consultant – Responsible for IBM projects, including: DISNEY –
SECURITY COMPLIANCE AND SAN REMEDIATION ·
Directed
comprehensive compliance and remediation project, including user ID
management (RBAC and IDM/IAM), security health checks, risk management,
server and system activation and deactivation, site inventory of managed
systems, change request management, operational controls and server changes,
patch management, security policy controls documentation, backup and
recovery, portable storage media, and anti-virus, ensuring enterprise-wide
governance and security. ·
Managed
and implemented server remediation and SAN storage upgrades for over 1,000
systems, securing the infrastructure. ·
Implemented
security controls, policies and audit evidence retention databases, enabling
Disney to achieve companywide passing audit scores after an extensive history
of audit failures. ·
Created
proof-of-concept for disaster recovery which resulted in winning $1M in new
business on this account. AT&T
– DATA SECURITY AND PRIVACY COMPLIANCE TRANSITION and TRANSFORMATION ·
Oversaw
multiple AT&T security transition and transformation projects including
service activation, ID administration, identity and access management, RBAC,
security policies, physical and logical security, implementation of required
data security and privacy controls, and mitigation of all existing security
gaps. ·
Held
responsibility for transitioning all AT&T, Bell South, Cingular, and SBC
divisions. Managed global resourcing agreements and processes for offshore
data centers and support teams in Canada, India, Brazil, and Argentina. ·
Facilitated
comprehensive training of AT&T teams on all data security & privacy
requirements enabling the customer to achieve A ratings on Corporate, KCO and
RRA audits, achieving a milestone improvement from prior ratings, which
included failed audits. ·
Won
new business and multiple extensions, adding revenue to this $400M
engagement. ·
Presented
with IBM Eminence & Excellence award for achievements on these projects. THE STATE
OF NEW YORK – INFORMATION TECHNOLOGY SERVICES ENTERPRISE SECURITY ·
Performed
security assessments and advised the New York State Office of Information
Technology Services of the required standards to secure their consolidation
of 52 agencies and data centers. ·
Created
foundation for security policy and technical specifications, enabling the
customer to become compliant. ·
Coached
Network Architects and the State of New York ITS teams on multi-tenancy,
cloud technologies, segmentation, and security standards. Educated the
Deputy Security CISO, COO and NY State CISO on all facets of governance and
regulatory requirements. ·
Guided
the IBM PMO in winning new projects and two year extension, resulting in
multi-million dollar increase in IBM revenue. WILLIAMS
ENERGY – IDENTITY MANAGEMENT DESIGN IMPLEMENTATION ·
Supervised
projects for Tivoli Identity Management, Tivoli Access Management, RBAC
analysis, auditing processes and identity management strategy. ·
Designed
and implemented security architecture using identity management, access
management and RBAC tools. ·
Established
and implemented strategy, best practices and processes for event correlation,
network profiling, and compliance and standards. Leveraged in-depth knowledge
of single sign on, authorization, authentication, access management,
encryption, and certification processes throughout project. ·
Designed
RBAC development processes and governance model for the life cycle of roles
management. Oversaw management and delivery of proof of concepts, product
evaluation and selection. ·
Highly
knowledgeable of FERC, NERC, and SOX regulations. ·
Won
IBM delivery excellence award on this project and sold new business of over
$3M. SHEARMAN
AND STERLING LLP – SECURITY GLOBAL INFRASTRUCTURE ·
Developed
plans for multiple concurrent projects, including Data Loss Prevention,
Checkpoint next generation firewalls, and the implementation of removable
media storage, cloud filtering and access management. ·
Collaborated
with the Security Architect and third party vendors to ensure that the
implementation was successful. Educated the new CISO and customer’s newly
established security team in all security risks, policies and governance. ·
Supervised
IBM staff, 3rd party vendors, and Shearman personnel throughout security
implementation. ·
Enabled
Shearman and Sterling LLP to pass audits after previously failing audits over
multiple years. ·
The
success of the implementation resulted in winning extensions and revenue
exceeding $600K and related business for IBM. IBM
BIOSPACE – BIOSPACE HIPAA HITECH COMPLIANCE FOR WATSON HEALTH ·
Implemented
security policies and established requirements for adherence with ITCS104,
with HIPAA chapter six and ITCS300 standards. This enabled the BioSpace team
to put their HIPAA BAA clients on the IBM Soft Layer Cloud environment by
using IBM servers instead of the client environments, allowing IBM clients a
soft layer cloud environment to research cancer solutions. ·
Created
training and awareness program to ensure all BioSpace team members were
proficient in all HIPAA controls for compliance. ·
Advised
Access Control Team to verify roles and permissions were met for access to
PHI or ePHI data in future software releases. MORGAN STANLEY / QUICK TRIP / SYSCO FOODS – SOC AND SIEM IMPLEMENTATIONS ·
Created
a repeatable, scalable operations model to improve incident reporting and
incident response. ·
Optimized
vulnerability scanning procedures, metrics and reporting. Oversaw the
improvement and enhanced utilization of SIEM tools. Advised on the
development and delivery of incident management processes and procedures. ·
Guided
gap analysis and designed transition roadmaps. Directed creation of
deliverables including new organizational documents, recommendations for
optimized SIEM toolsets, ticketing systems, vulnerability scanning, reporting
systems, and operations manuals. ·
Simultaneously
mentored IBM team members on all facets of managing equivalent projects. ·
Won
the IBM Managers Choice Award for achievements on these projects. ·
Highly
knowledgeable of PCI and SOX regulations and compliance. KPMG –
MALWARE PREVENTION AND SYMANTEC ENDPOINT PROTECTION IMPLEMENTATION ·
Guided
KPMG on implementation of data privacy, endpoint security, malware
prevention, identity and access management and comprehensive security
compliance and governance project. CITIGROUP
/ HUNTINGTON NATIONAL BANK – TOTAL AUTHENTICATION SOLUTION PROJECTS ·
Managed
vendors in Singapore and France, along with US IBM staff, in the design and
implementation of concurrent Total Authentication Solution (TAS) projects for
both financial institutions. Directed development of TAS complaint mobile
applications. ·
Highly
knowledgeable of PCI, ISO, and NIST regulations and compliance. COMPUTER SCIENCES CORPORATION1997
to 2004 SENIOR
MEMBER EXECUTIVE STAFF / SENIOR TECHNICAL ARCHITECT IRS PRIME
(INTERNAL REVENUE SERVICE) – COMPREHENSIVE E-SERVICES IMPLEMENTATION PROGRAM
- 2000 to 2004 Directed concurrent and sequential CSC projects for the IRS
implementation of electronic tax filing, including: ·
SYSTEMS
ENTERPRISE ARCHITECTURE OFFICE AND E-SERVICES PROJECT - Served as Lead Technical Architect guiding the
Technology Refresh Team for the IRS upgrade to enterprise modernized
infrastructure. Led team of 50 in successive projects including the Customer
Communications IRFOF (Internet Refund Fact of Filing), e-Services
(PeopleSoft), IFS (SAP), e-File, and F&PC (Filing, Payment &
Compliance) to ensure those projects met requirements in support of 120
million users nationwide. Awarded the Excellence in Enterprise Architecture
Leadership Award with the IRS PRIME. ·
BUSINESS
RULES ENTERPRISE MANAGEMENT PROJECT
- Responsible for the formulation and writing of the vision and strategy
proposal for the Business Rules Enterprise Management project. This proposal
was awarded over $1M and funded to do further analysis to designate the
appropriate tool for Business Rules Enterprise Management. ·
FILING
AND PAYMENT COMPLIANCE SCOPE EXPANSION PROJECT - Directed the technical architecture design for the
Filing and Payment Compliance re-planning effort to cost out future funding.
Ensured that all technical, functional and business requirements were
identified and priced correctly in order to advise the IRS on the impact of
dramatically expanded project scope. Responsible for managing all vendors on
the team including AMS, Fair Isaac, TRW, Northrop Grumman, and Booz
Allen-Hamilton. This proposal was successfully funded, resulting in the award
of incremental multi-million dollar business for CSC. ·
SECURITY
AND TECHNOLOGY INFRASTRUCTURE RELEASE PROJECT - Led the Security and Technology Infrastructure Release
team in the design, development, and implementation of new technology
infrastructure and web portals for the entire IRS environment. Liaised with
the System Engineering Office, Security and Privacy Office, Infrastructure
Shared Services, Development, Integration and Test Environment vendors and
IRS personnel to create the project program and subsidiary plans. Developed
and wrote the Process Overview deliverable, which described all business
process flows for the IRS in support of additional projects using the STIR
infrastructure architecture. The implementation of this infrastructure
supported all future IRS projects leveraging the new architecture to
modernize all applications, Web hosting environments, databases, telecom
systems and data centers. ·
CUSTOMER
COMMUNICATIONS INTERNET REFUND STATUS FACT OF FILING PROJECT - Served as Principle Consultant/Senior Technical
Architect for the Customer Communications Internet Refund Status (IRFOF)
projects. Managed a team of technical architects, data architects,
application architects, performance engineers, and system engineers in
designing the technical architecture for Web Internet Refund Status
applications. Responsible for the selection of hardware, software and
procurement. Directed the research, design, development, testing, deployment,
and documentation of all Customer Communications Voice systems, including
VoIP for the IRS. TECHNOLOGY PORTFOLIO SYSTEMS
AND NETWORK HARDWARE: CISCO, routers,
switches, hubs, bridges, firewalls, Checkpoint Next Generation Firewalls,
HIDS, NIDS, IDS, IPS, RSA technology / SecurID, CITRIX, Nortel, Ethernet,
Fast Switch Ethernet, Token Ring, Frame Relay, FDDI, VPN, ATM, Gigabit
Ethernet, wireless communications, telecommunications equipment, voice and
telephony systems, ACD’s, VRU’s, ICM, sniffers for network traffic, print
servers, IBM midrange servers, SUN servers, HP Servers, Unisys, web servers,
Intel PC’s, Toshiba, Lenovo, Apple, SAN technology, BYOD, cloud and mobile
computing protection, User Entity Behavior Analytics (UEBA). SOFTWARE: Tivoli Identity & Access Management, RBAC tools, BridgeStream,
Netegrity, Siteminder, eTrust, CyberArk, SIEM, QRadar, ArcSight, Splunk,
multifactor authentication, data loss prevention (DLP), Trend Micro, Symantec
Endpoint Protection, malware and email protection, vulnerability scanning,
incident management and emergency response, Service Now, cloud filtering,
XForce, intrusion detection, enterprise virus protection, E-Business and
E-Commerce tools, network management and performance engineering tools,
application security, SaaS, PaaS, IaaS ,Bea WebLogic, Tuxedo, WebSphere,
MQSeries, Middleware software, VMware, IIS, JSP, J2EE, Verisign, SSL, ASP,
AMS, Real Secure, Checkpoint, IDS systems, PeopleSoft, SAP, LDAP, SOAP,
HTTPs, HTTP, NETID, DHCP, DNS, WINS, SNMP, PPP, SLIP, PPTP, SMTP, TCP/IP,
IPX/SPX, NetBIOS, NetBEUI, RIP, OSPF, BGP, Samba for UNIX, Oracle Financials,
Oracle, DB2, C++, Java, Basic, Erwin, Lotus Notes, MS Exchange server,
Rational Rose, Veritas Backup, MS Visio, MS Project, MS PowerPoint, MS Office
(all versions). OPERATING
SYSTEMS: SUSE Linux, UNIX, HP-UX, SUN Solaris, Windows
server/client (all versions), Apple, iOS, Micro Focus Netware. SECURITY,
REGULATORY, COMPLIANCE AND GOVERNANCE: HIPAA
HITECH, NIST 800 series, ISO/IEC 17799 and 27000 series, PCI-DSS, FERC, NERC
and SOX, FFIEC, FISMA, Single Sign On, authorization, authentication, access
management, encryption, and digital certification processes, cybersecurity
and threat prevention, penetration testing, security monitoring and threat
management, biometrics, intrusion detection, physical security systems,
UEBA/UBA (User and Entity Behavior Analysis). METHODOLOGIES: IBM and Carnegie Mellon Methodologies, IBM Data Security and Privacy
Framework, Catalyst (SM), Catalyst 4D. EDUCATION, CERTIFICATIONS, AFFILIATIONS & CLEARANCE EDUCATION: State University of New York at Farmingdale - A.A.S Computer Science CERTIFICATIONS:
Novell, Apple, AT&T, Solaris UNIX, IBM
Project Management; IBM Leadership; IBM HIPAA; IBM Methodology Architecture
Secure Solutions; Tivoli Federated Identity Manager; IBM Ethical Hacking; in
preparation for CISSP certification AFFILIATIONS: (ISC)²; Instructor for IBM CISSP Study Community; PMI (Project
Management Institute) SECURITY
CLEARANCE: United States Department of Defense -
Secret Clearance, Top Secret Clearance TS/SCI - (eligible for reactivation),
MBI (Minimal Background Investigation Clearance) for IRS OPEN TO
TRAVEL EXTENSIVE
REFERENCES AVAILABLE UPON REQUEST |
|
|
||||||||
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Languages: |
Languages |
Proficiency Level |
|
English |
Fluent |
|
|
|