Threat Detection/Security Automation ArchitectFeb 2024 - Present
Legal Technology Organization/Federal ContractorLexis Nexus / United States Patent and Trademark Office
Public Trust Clearance
- Implemented and managed IAM solutions using Entra ID, Active Directory, Azure Active Directory, and RSA to establish robust identity and access management protocols.
- Deployed Crowdstrike for advanced threat detection and response, and incorporated SSO and MFA across the enterprise for enhanced security.
- Integrated Zero Trust principles into the existing security infrastructure, focusing on least privilege and role-based access controls.
- Led the migration from legacy IAM products to modern solutions such as the Microsoft Identity Platform and Okta, ensuring a seamless transition.
- Created and maintained automation scripts using Bash, PowerShell, and Python, resulting in improved process efficiency and reliability.
- Architected end-to-end IAM process flows and implemented secure, role-based access management.
- Administered and troubleshot Windows and Linux/Unix servers, ensuring optimal performance and stability.
- Managed PKI and Certificate Authorities, including Microsoft Windows Certificate Services, to secure communications and authentication.
- Implemented NIST and ISO security standards in all IAM solutions, ensuring compliance and enhanced security posture.
- Mentored junior engineers, led security initiatives, and managed projects to ensure successful and timely delivery.
- Produced clear technical documentation and effectively communicated complex technical information to diverse audiences.
Principal Identity and Access Management, Security ArchitectDec 2022 - Feb 2024
Major National Retail CompanyKroger, Technology & Digital Department
- Enhanced organizational security posture and compliance by leveraging Microsoft Azure AD/Entra ID for cloud services, OneIdentity Safeguard and TPAM for IAM, ensuring scalable and secure cloud infrastructure.
- Deployed and managed endpoint security solutions using CrowdStrike, reducing malware incidents by 45%.
- Implemented advanced Active Directory configurations to improve authentication protocols and access controls.
- Led the integration of Okta for SSO and MFA, improving authentication efficiency by 50%.
- Utilized Varonis for data security and analytics, enhancing data governance across the enterprise.
- Spearheaded a provisioning project for over 32,000 users across three organizations, including the US and UK, optimizing processes and addressing technical debt.
- Enhanced organizational security posture and compliance by leveraging Microsoft Azure AD/Entra ID for cloud services, OneIdentity Safeguard, and TPAM for IAM, ensuring scalable and secure cloud infrastructure.
- Led Entra ID and Microsoft Identity project planning and execution, achieving seamless integration and alignment with organizational objectives.
- Automated account lifecycle management tasks using advanced PowerShell scripting, improving efficiency and ensuring compliance with security policies.
- Deployed and managed endpoint security solutions using CrowdStrike, reducing malware incidents by 45%.
- Implemented advanced Active Directory configurations to improve authentication protocols and access controls.
- Led the integration of Okta for SSO and MFA, improving authentication efficiency by 50%.
- Implemented process improvements, remediated legacy provisioning practices, and automated workflows to enhance operational efficiency.
- Utilized Varonis for data security and analytics, enhancing data governance across the enterprise.
- Collaborated with global IT teams to define provisioning requirements, develop and test automation scripts, and streamline tool ownership and processes.
- Prepared status reports, conducted training sessions, and shared knowledge to enhance team productivity and organizational effectiveness.
- Maintained compliance with security policies and governance standards across provisioning operations, minimizing risk and improving audit readiness.
- Demonstrated expertise in IAM leadership, PowerShell scripting, and managing technical debt in enterprise-level environments.
- Proven success delivering IAM solutions through collaboration with international teams, optimizing processes in a global automotive enterprise.
Customer Identity & Access Management, ArchitectFeb 2022 - Dec 2022
FederalDepartment of Homeland Security, OCIO, United States Secret Service
Public Trust Clearance
- Streamlined CyberArk's Privileged Access Management system boosting audit compliance by 50% and cutting response times by 40% through implementing advanced security protocols and integrating automated threat detection features.
- Orchestrated cloud migration using GCP, ensuring secure and efficient transfer of critical systems from on-prem to cloud environments.
- Utilized Agile, SCRUM, and scripting languages including PowerShell, Python, and Java for system resilience and efficiency in accordance with the FISMA framework to meet compliance and security frameworks.
- Designed and implemented identity solutions using Active Directory, OAuth, and SAML emphasizing cloud security.
- Leveraged Fortinet in the transition to a zero-trust network architecture, significantly minimizing potential attack vectors enhancing security posture.
- Orchestrated the organization’s successful FedRAMP authorization process, enabling secure and compliant cloud service offerings to federal agencies.
- Designed and implemented an information security management system (ISMS) that achieved ISO 27001 certification, significantly improving the organization's security posture and client confidence.
- Developed and enforced access policies using Saviynt's policy engine, leading to a 50% reduction in unauthorized access incidents.
- Utilized capabilities in Python and Powershell scripting for automation of security tasks, analysis, and tool development for GCP to create security solutions.
- Managed enterprise network security program, promoting IAM governance and utilizing scripting knowledge for IT infrastructure and operations management.
- Monitored server and firewall logs, analyzed network traffic, and conducted regular vulnerability scans using tools like Qualys for threat detection and vulnerability management to maintain robust security for the customer.
- Implemented robust incident response protocols using Fortinet solutions with GCP, reducing detection and response times for cybersecurity incidents.
Cloud Vulnerability, AnalystJuly 2021 - Dec 2021
Non-profit HealthcareAccessia Healthcare
- Managed vulnerability assessments, remediation strategies, and ensured HIPAA and NIST compliance.
- Engineered comprehensive training modules on EHR tools and health information management practices, enhancing workflow efficiency and compliance across clinical and administrative staff.
- Developed training programs on the use of DICOM standards for imaging data, HL7 for electronic health information exchange, and IHE protocols to ensure interoperable use of healthcare information.
- Implemented and managed Microsoft Defender for Identity across a 10,000-user enterprise, enhancing security posture by detecting and responding to advanced threats and insider actions.
- Designed and deployed multi-factor authentication using Microsoft Defender, reducing unauthorized access incidents by 75% within the first year of implementation.
- Directed the organization-wide SSL/TLS certificate management program, ensuring encryption standards compliance and preventing downtime due to expired certificates.
- Directed the collection, analysis, and reporting of healthcare metrics, utilizing data from EHR and PACS systems to drive improvements in patient health outcomes and service delivery.
- Implemented Auth0 for secure, scalable user authentication, leading to a 99% success rate in logins and halving the development time for new auth features by leveraging customizable workflows and SDKs aligning with HIPPA requirements.
- Coordinated with IT, audit, and compliance teams to ensure CyberArk practices aligned with regulatory requirements, significantly contributing to successful audits under standards such as SOX, GDPR, and HIPAA.
Privileged Access Management, ArchitectSept 2019 - July 2021
Pharmaceutical CompanyIndivior Pharmaceuticals
- Integrated SSO and MFA using Microsoft Azure Active Directory/Entra ID enhancing user verification processes and access management.
- Ensured ePHI data protection and encryption through backups and Bitlocker.
- Designed IAM solutions using Microsoft Intune for efficient mobile device management, ensuring secure and remote access.
- Developed a centralized incident response management system on GitHub.
- Managed user account profiles in Active Directory and Linux Server for access control and security management.
- Spearheaded the migration of identity governance to the cloud with SailPoint IdentityNow, facilitating secure and scalable access management for a distributed workforce.
- Collaborated with IT and security teams to define and map out roles based on job functions, ensuring minimum necessary access rights for over 500 users across various departments.
- Designed a secure GCP architecture using Google IAM and Security Command Center for cloud resource protection.
- Maintained optimized scripts, documented processes, trained staff, significantly improving operational resilience and team autonomy with scripting automation.
- Led the deployment of BeyondTrust to secure privileged accounts, reducing unauthorized access by 75% and enhancing compliance by 80% through strategic account management and audit controls.
- Maintained Carbon Black as comprehensive endpoint security from threat hunting to incident response.
- Designed and executed automated provisioning and deprovisioning processes in SailPoint, reducing manual workload by 70% and improving onboarding/offboarding efficiency.
- Designed role-based, location-based, & device compliance access controls for Entra ID.
Identity and Access Management, AnalystApr 2019 - Sept 2019
Financial ServicesWells Fargo Bank
- Ensured IAM practices were compliant with the bank's operational risk framework and industry best practices, including policies, procedures, and control methodologies.
- Led cybersecurity projects using Agile and Waterfall methodologies, improving team efficiency and adaptability to rapidly changing security threats.
- Maintained user accounts, profiles, network, system security, and access privileges through IAM tools such as Active Directory, Office 365, and SCCM.
- Supported IAM solutions and maintenance, focused on access control systems.
- Oversaw the migration of critical workloads to a vSphere-based virtualized infrastructure, resulting in improved resource utilization and a 20% reduction in data center costs.
- Utilized Microsoft Defender’s automated investigation and remediation features to streamline security operations, achieving a 30% reduction in manual security tasks through automation.
- Developed and implemented advanced Splunk dashboards for comprehensive visibility into network traffic, system logs, and user activities, enhancing the security team's analytical capabilities, aiding in proactive threat hunting efforts.
- Utilized COBOL for system updates, bug fixes, and implementing new features to improve efficiency and reliability.
- Participated in cross-departmental projects to extend the functionality of COBOL applications, enabling new banking services and improving customer experience.
- Conducted on/off-boarding and trained 400 employees on security processes, reducing phishing attacks by presenting security awareness and training.
Customer Identity & Access Management, EngineerOct 2015 - Jan 2019
Digital Security Consulting FirmWellsecured IT
- Orchestrated the migration of legacy IAM systems to ForgeRock IDM, improving identity lifecycle management and reducing operational costs.
- Integrated Splunk with IAM solutions to automate the collection and analysis of access logs, streamlining audit processes and significantly improving the efficiency of compliance reporting.
- Provided complex technical guidance, oversight, and enforcement of security directives, policies, standards, plans, and procedures as defined by ISO/IEC 27001 framework.
- Ensured alignment with NIST and ISO 27001 standards by leveraging Microsoft Defender’s security controls to protect sensitive data and maintain high compliance levels.
- Conducted comprehensive security audits using Ping Identity tools to identify and remediate potential vulnerabilities in the IAM infrastructure.
- Optimized application delivery and performance using Citrix, achieving a 99.9% uptime for critical applications and enhancing user satisfaction.
- Installed virtual machines (VMWare, VirtualBox, & Hyper-V) to utilize applications in a test environment of IT Infrastructure and operations management.
- Designed and deployed a suite of PowerShell scripts for automating security tasks, including log analysis, system hardening, and incident detection.
- Integrated a secure, scalable AWS cloud infrastructure with enhanced identity/access management and encryption, boosting efficiency and security.
- Integrated Auth0 for scalable user authentication, enhancing authentication success to 99% and cutting development time by 50% by adopting secure and efficient authentication workflows.
Cloud Security OperationsJune 2011 - Dec 2015
Cybersecurity Consulting FirmCloudcentria Security
- Developed and maintained policies, procedures, and documentation to align with regulatory standards, leading to successful audits and certifications.
- Conducted penetration testing and vulnerability assessments using Kali Linux, identifying critical security weaknesses and recommending mitigation strategies to enhance system resilience.
- Led the integration of Ping Identity with enterprise applications, ensuring secure and efficient user access control to reduce administrative overhead.
- Maintained high-level customer satisfaction by delivering professional and timely support, and documenting processes and service desk records meticulously.
- Created industry leading practices of IAM/Access Control/Change Management through Active Directory and Azure AD/Entra ID PaaS.
- Spearheaded mitigation of sophisticated DDoS attacks, improving organizational threat resilience.
- Directed an enterprise-wide vulnerability management program using Nessus, covering 15,000 assets.
- Conducted a digital forensics investigation of a suspected insider threat, using The Sleuth Kit for disk image analysis and evidence recovery.
- Identified the malicious insider, leading to legal action and the recovery of stolen intellectual property.
- Developed best practices for forensic investigations, significantly improving incident response capabilities.
Systems Administrator IIJun 2009 - Dec 2011
PC RepairuBreakiFix
- Provided first-level technical support to end-users via phone, email, or in-person, addressing issues with hardware and software, and network connectivity.
- Evaluated and prioritized incidents based on impact and urgency, contributing to meeting established service level agreements (SLAs).
- Maintained high-level customer satisfaction by delivering professional and timely support, and documenting processes and service desk records meticulously.
Skills: Governance, Risk Management, and Compliance (GRC) · Strategy and Leadership · Technical Proficiency and Innovation
IT Support Associate IISep 2006 - Jan 2009
Major National Electronics Retail CompanyCircuit City
- Demonstrated basic technical support and troubleshooting for electronics and computer products.
- Assisted customers with product setup and software installations.
- Conducted basic hardware repairs or coordinated with repair services.
- Helped customers understand product features and technology specifications.
- Managed inventory of computer and electronic accessories.
- Kept updated with the latest technology trends and products.
- Collaborated with the sales team to meet customer technology needs.
- Maintained and updated product display and demonstration areas.
Skills: Governance, Risk Management, and Compliance (GRC) · Strategy and Leadership · Technical Proficiency and Innovation