RONNIE BAILEY |BIO

Principal Cybersecurity & IAM Strategist

✉️ opportunities@ronniebailey.cloud | 📞 +1 (804) 803-1311

Schedule Appointment

Download Resume: PDF | WORD

LinkedIn Profile

Core Competencies

Identity and Access Management (IAM)

  • Active Directory and LDAP (8+ years)
  • CyberArk (7+ years)
  • ForgeRock IDM (5+ years)
  • Microsoft Azure AD/Entra ID (7+ years)
  • Microsoft Multi-Factor Authentication (MFA)
  • Okta (6+ years)
  • One Identity
  • OneIdentity Safeguard and TPAM (5+ years)
  • SailPoint (6+ years)
  • Saviynt (3+ years)
  • Varonis (4+ years)

Cloud Security

  • AWS (4+ years)
  • Confluence (5+ years)
  • Entra ID (7+ years)
  • Google Cloud Platform (GCP) (3+ years)
  • Microsoft 365 (7+ years)
  • Microsoft Azure (7+ years)
  • Secureworks
  • SharePoint (5+ years)

Endpoint Security

  • Carbon Black (4+ years)
  • CrowdStrike (Falcon) (5+ years)
  • Infoblox
  • Microsoft Defender for Identity (7+ years)
  • MicrosoftS DLP
  • Palo Alto (6+ years)
  • Sophos MDR

Security Management

  • Bitsight
  • Change Management Process
  • DRATA
  • Fortinet (5+ years)
  • Nessus (6+ years)
  • Qualys (7+ years)
  • Varonis (4+ years)

Collaboration and Project Management

  • Confluence (5+ years)
  • Jira (4+ years)
  • SharePoint/Teams (5+ years)

Scripting and Programming

  • COBOL (3+ years)
  • PowerShell (7+ years)
  • Python (5+ years)
  • HTML (6+ years)

Other Skills

  • Abnormal
  • AD Manager Plus
  • Aristotle Insight
  • Defender
  • Exchange Admin Center
  • Microsoft Exchange Online

Achievements

  • Outstanding Security Consultant Award, (2020)
  • Excellence in Identity Security, (2018)

Awards

  • Security Leadership Award
  • Accessia Health
  • 2021
  • Best Security Team Award
  • Kroger Technology & Digital
  • 2023

Passions

Community Volunteering

Cybersecurity Trends and Developments

Gardening

Scifi Books


Version Française

Professional Overview

Principal Cybersecurity & IAM Strategist dedicated to navigating complex corporate ecosystems with adaptability and a critical eye. I bring over 13 years of experience securing organizations across diverse industries. Passionate about designing innovative security solutions, implementing scalable systems, and empowering businesses to thrive in an increasingly digital world. Recognized for leadership in IAM, Zero Trust strategies, and enhancing cloud security. Dedicated to creating resilient infrastructures and driving operational excellence.

Professional Experience

Threat Detection/Security Automation ArchitectFeb 2024 - Present

Legal Technology Organization/Federal Contractor
Public Trust Clearance

  • Implemented and managed IAM solutions using Entra ID, Active Directory, Azure Active Directory, and RSA to establish robust identity and access management protocols.
  • Deployed Crowdstrike for advanced threat detection and response, and incorporated SSO and MFA across the enterprise for enhanced security.
  • Integrated Zero Trust principles into the existing security infrastructure, focusing on least privilege and role-based access controls.
  • Led the migration from legacy IAM products to modern solutions such as the Microsoft Identity Platform and Okta, ensuring a seamless transition.
  • Created and maintained automation scripts using Bash, PowerShell, and Python, resulting in improved process efficiency and reliability.
  • Architected end-to-end IAM process flows and implemented secure, role-based access management.
  • Administered and troubleshot Windows and Linux/Unix servers, ensuring optimal performance and stability.
  • Managed PKI and Certificate Authorities, including Microsoft Windows Certificate Services, to secure communications and authentication.
  • Implemented NIST and ISO security standards in all IAM solutions, ensuring compliance and enhanced security posture.
  • Mentored junior engineers, led security initiatives, and managed projects to ensure successful and timely delivery.
  • Produced clear technical documentation and effectively communicated complex technical information to diverse audiences.

Principal Identity and Access Management, Security ArchitectDec 2022 - Feb 2024

Major National Retail Company

  • Enhanced organizational security posture and compliance by leveraging Microsoft Azure AD/Entra ID for cloud services, OneIdentity Safeguard and TPAM for IAM, ensuring scalable and secure cloud infrastructure.
  • Deployed and managed endpoint security solutions using CrowdStrike, reducing malware incidents by 45%.
  • Implemented advanced Active Directory configurations to improve authentication protocols and access controls.
  • Led the integration of Okta for SSO and MFA, improving authentication efficiency by 50%.
  • Utilized Varonis for data security and analytics, enhancing data governance across the enterprise.
  • Spearheaded a provisioning project for over 32,000 users across three organizations, including the US and UK, optimizing processes and addressing technical debt.
  • Enhanced organizational security posture and compliance by leveraging Microsoft Azure AD/Entra ID for cloud services, OneIdentity Safeguard, and TPAM for IAM, ensuring scalable and secure cloud infrastructure.
  • Led Entra ID and Microsoft Identity project planning and execution, achieving seamless integration and alignment with organizational objectives.
  • Automated account lifecycle management tasks using advanced PowerShell scripting, improving efficiency and ensuring compliance with security policies.
  • Deployed and managed endpoint security solutions using CrowdStrike, reducing malware incidents by 45%.
  • Implemented advanced Active Directory configurations to improve authentication protocols and access controls.
  • Led the integration of Okta for SSO and MFA, improving authentication efficiency by 50%.
  • Implemented process improvements, remediated legacy provisioning practices, and automated workflows to enhance operational efficiency.
  • Utilized Varonis for data security and analytics, enhancing data governance across the enterprise.
  • Collaborated with global IT teams to define provisioning requirements, develop and test automation scripts, and streamline tool ownership and processes.
  • Prepared status reports, conducted training sessions, and shared knowledge to enhance team productivity and organizational effectiveness.
  • Maintained compliance with security policies and governance standards across provisioning operations, minimizing risk and improving audit readiness.
  • Demonstrated expertise in IAM leadership, PowerShell scripting, and managing technical debt in enterprise-level environments.
  • Proven success delivering IAM solutions through collaboration with international teams, optimizing processes in a global automotive enterprise.

Customer Identity & Access Management, ArchitectFeb 2022 - Dec 2022

Federal
Public Trust Clearance

  • Streamlined CyberArk's Privileged Access Management system boosting audit compliance by 50% and cutting response times by 40% through implementing advanced security protocols and integrating automated threat detection features.
  • Orchestrated cloud migration using GCP, ensuring secure and efficient transfer of critical systems from on-prem to cloud environments.
  • Utilized Agile, SCRUM, and scripting languages including PowerShell, Python, and Java for system resilience and efficiency in accordance with the FISMA framework to meet compliance and security frameworks.
  • Designed and implemented identity solutions using Active Directory, OAuth, and SAML emphasizing cloud security.
  • Leveraged Fortinet in the transition to a zero-trust network architecture, significantly minimizing potential attack vectors enhancing security posture.
  • Orchestrated the organization’s successful FedRAMP authorization process, enabling secure and compliant cloud service offerings to federal agencies.
  • Designed and implemented an information security management system (ISMS) that achieved ISO 27001 certification, significantly improving the organization's security posture and client confidence.
  • Developed and enforced access policies using Saviynt's policy engine, leading to a 50% reduction in unauthorized access incidents.
  • Utilized capabilities in Python and Powershell scripting for automation of security tasks, analysis, and tool development for GCP to create security solutions.
  • Managed enterprise network security program, promoting IAM governance and utilizing scripting knowledge for IT infrastructure and operations management.
  • Monitored server and firewall logs, analyzed network traffic, and conducted regular vulnerability scans using tools like Qualys for threat detection and vulnerability management to maintain robust security for the customer.
  • Implemented robust incident response protocols using Fortinet solutions with GCP, reducing detection and response times for cybersecurity incidents.

Cloud Vulnerability, AnalystJuly 2021 - Dec 2021

Non-profit Healthcare

  • Managed vulnerability assessments, remediation strategies, and ensured HIPAA and NIST compliance.
  • Engineered comprehensive training modules on EHR tools and health information management practices, enhancing workflow efficiency and compliance across clinical and administrative staff.
  • Developed training programs on the use of DICOM standards for imaging data, HL7 for electronic health information exchange, and IHE protocols to ensure interoperable use of healthcare information.
  • Implemented and managed Microsoft Defender for Identity across a 10,000-user enterprise, enhancing security posture by detecting and responding to advanced threats and insider actions.
  • Designed and deployed multi-factor authentication using Microsoft Defender, reducing unauthorized access incidents by 75% within the first year of implementation.
  • Directed the organization-wide SSL/TLS certificate management program, ensuring encryption standards compliance and preventing downtime due to expired certificates.
  • Directed the collection, analysis, and reporting of healthcare metrics, utilizing data from EHR and PACS systems to drive improvements in patient health outcomes and service delivery.
  • Implemented Auth0 for secure, scalable user authentication, leading to a 99% success rate in logins and halving the development time for new auth features by leveraging customizable workflows and SDKs aligning with HIPPA requirements.
  • Coordinated with IT, audit, and compliance teams to ensure CyberArk practices aligned with regulatory requirements, significantly contributing to successful audits under standards such as SOX, GDPR, and HIPAA.

Privileged Access Management, ArchitectSept 2019 - July 2021

Pharmaceutical Company

  • Integrated SSO and MFA using Microsoft Azure Active Directory/Entra ID enhancing user verification processes and access management.
  • Ensured ePHI data protection and encryption through backups and Bitlocker.
  • Designed IAM solutions using Microsoft Intune for efficient mobile device management, ensuring secure and remote access.
  • Developed a centralized incident response management system on GitHub.
  • Managed user account profiles in Active Directory and Linux Server for access control and security management.
  • Spearheaded the migration of identity governance to the cloud with SailPoint IdentityNow, facilitating secure and scalable access management for a distributed workforce.
  • Collaborated with IT and security teams to define and map out roles based on job functions, ensuring minimum necessary access rights for over 500 users across various departments.
  • Designed a secure GCP architecture using Google IAM and Security Command Center for cloud resource protection.
  • Maintained optimized scripts, documented processes, trained staff, significantly improving operational resilience and team autonomy with scripting automation.
  • Led the deployment of BeyondTrust to secure privileged accounts, reducing unauthorized access by 75% and enhancing compliance by 80% through strategic account management and audit controls.
  • Maintained Carbon Black as comprehensive endpoint security from threat hunting to incident response.
  • Designed and executed automated provisioning and deprovisioning processes in SailPoint, reducing manual workload by 70% and improving onboarding/offboarding efficiency.
  • Designed role-based, location-based, & device compliance access controls for Entra ID.

Identity and Access Management, AnalystApr 2019 - Sept 2019

Financial Services

  • Ensured IAM practices were compliant with the bank's operational risk framework and industry best practices, including policies, procedures, and control methodologies.
  • Led cybersecurity projects using Agile and Waterfall methodologies, improving team efficiency and adaptability to rapidly changing security threats.
  • Maintained user accounts, profiles, network, system security, and access privileges through IAM tools such as Active Directory, Office 365, and SCCM.
  • Supported IAM solutions and maintenance, focused on access control systems.
  • Oversaw the migration of critical workloads to a vSphere-based virtualized infrastructure, resulting in improved resource utilization and a 20% reduction in data center costs.
  • Utilized Microsoft Defender’s automated investigation and remediation features to streamline security operations, achieving a 30% reduction in manual security tasks through automation.
  • Developed and implemented advanced Splunk dashboards for comprehensive visibility into network traffic, system logs, and user activities, enhancing the security team's analytical capabilities, aiding in proactive threat hunting efforts.
  • Utilized COBOL for system updates, bug fixes, and implementing new features to improve efficiency and reliability.
  • Participated in cross-departmental projects to extend the functionality of COBOL applications, enabling new banking services and improving customer experience.
  • Conducted on/off-boarding and trained 400 employees on security processes, reducing phishing attacks by presenting security awareness and training.

Customer Identity & Access Management, EngineerOct 2015 - Jan 2019

Digital Security Consulting Firm

  • Orchestrated the migration of legacy IAM systems to ForgeRock IDM, improving identity lifecycle management and reducing operational costs.
  • Integrated Splunk with IAM solutions to automate the collection and analysis of access logs, streamlining audit processes and significantly improving the efficiency of compliance reporting.
  • Provided complex technical guidance, oversight, and enforcement of security directives, policies, standards, plans, and procedures as defined by ISO/IEC 27001 framework.
  • Ensured alignment with NIST and ISO 27001 standards by leveraging Microsoft Defender’s security controls to protect sensitive data and maintain high compliance levels.
  • Conducted comprehensive security audits using Ping Identity tools to identify and remediate potential vulnerabilities in the IAM infrastructure.
  • Optimized application delivery and performance using Citrix, achieving a 99.9% uptime for critical applications and enhancing user satisfaction.
  • Installed virtual machines (VMWare, VirtualBox, & Hyper-V) to utilize applications in a test environment of IT Infrastructure and operations management.
  • Designed and deployed a suite of PowerShell scripts for automating security tasks, including log analysis, system hardening, and incident detection.
  • Integrated a secure, scalable AWS cloud infrastructure with enhanced identity/access management and encryption, boosting efficiency and security.
  • Integrated Auth0 for scalable user authentication, enhancing authentication success to 99% and cutting development time by 50% by adopting secure and efficient authentication workflows.

Cloud Security OperationsJune 2011 - Dec 2015

Cybersecurity Consulting Firm

  • Developed and maintained policies, procedures, and documentation to align with regulatory standards, leading to successful audits and certifications.
  • Conducted penetration testing and vulnerability assessments using Kali Linux, identifying critical security weaknesses and recommending mitigation strategies to enhance system resilience.
  • Led the integration of Ping Identity with enterprise applications, ensuring secure and efficient user access control to reduce administrative overhead.
  • Maintained high-level customer satisfaction by delivering professional and timely support, and documenting processes and service desk records meticulously.
  • Created industry leading practices of IAM/Access Control/Change Management through Active Directory and Azure AD/Entra ID PaaS.
  • Spearheaded mitigation of sophisticated DDoS attacks, improving organizational threat resilience.
  • Directed an enterprise-wide vulnerability management program using Nessus, covering 15,000 assets.
  • Conducted a digital forensics investigation of a suspected insider threat, using The Sleuth Kit for disk image analysis and evidence recovery.
  • Identified the malicious insider, leading to legal action and the recovery of stolen intellectual property.
  • Developed best practices for forensic investigations, significantly improving incident response capabilities.

Systems Administrator IIJun 2009 - Dec 2011

PC Repair

  • Provided first-level technical support to end-users via phone, email, or in-person, addressing issues with hardware and software, and network connectivity.
  • Evaluated and prioritized incidents based on impact and urgency, contributing to meeting established service level agreements (SLAs).
  • Maintained high-level customer satisfaction by delivering professional and timely support, and documenting processes and service desk records meticulously.

Skills: Governance, Risk Management, and Compliance (GRC) · Strategy and Leadership · Technical Proficiency and Innovation

IT Support Associate IISep 2006 - Jan 2009

Major National Electronics Retail Company

  • Demonstrated basic technical support and troubleshooting for electronics and computer products.
  • Assisted customers with product setup and software installations.
  • Conducted basic hardware repairs or coordinated with repair services.
  • Helped customers understand product features and technology specifications.
  • Managed inventory of computer and electronic accessories.
  • Kept updated with the latest technology trends and products.
  • Collaborated with the sales team to meet customer technology needs.
  • Maintained and updated product display and demonstration areas.

Skills: Governance, Risk Management, and Compliance (GRC) · Strategy and Leadership · Technical Proficiency and Innovation

Volunteer

Events CoordinatorJuly 2024 - Present

Technology Organization/Non-Profit Volunteer
Volunteer

  • Plan and execute technology-focused events such as webinars, workshops, and networking meetups.
  • Coordinate with tech speakers, sponsors, and volunteers to ensure smooth event operations.
  • Promote events through social media and other tech marketing channels, maximizing attendance and engagement.
  • Manage event logistics, including venue selection, scheduling, and registration processes.
  • Collect and analyze feedback to continuously improve the quality and impact of tech events.
  • Perform light journalistic duties, such as writing event summaries, interviewing tech speakers and attendees, and producing content for newsletters and blog posts.

Education

  • Bachelor’s of Science in Cybersecurity, University of Richmond March 2025
    • Relevant Coursework: Network Security, Cryptography, Ethical Hacking
  • Associate of Applied Science in Information Systems, Reynolds College May 2021
    • Relevant Coursework: Database Management, Web Development, Programming Fundamentals

Certifications

  • AZ-900, Microsoft Azure Fundamentals March 2025
  • Cybersecurity Essentials, Cisco Oct 2021
  • IBM Cloud Essentials, IBM Oct 2021
  • Network Administration, Reynolds College July 2020

Awards and Honors

  • Human Rights Education Training: US Institute of Diplomacy and Human Rights Dec 2023
  • Phi Theta Kappa Honor Society, International Honor Society April 2018
  • Dean’s List, Reynolds College June 2018