Visionary | Innovative Thinker | High Impact Leader
Accomplished Information Security Executive with 20+ years of related experiences and excellent track record of Leading, Designing, Implementing, Project managing, Information Security and Internet related infrastructure and systems. Skilled in leadership, project management, methodologies and techniques; excellent analytical and problem solving skills; excellent written and oral communication skills. Broad experience in senior technology management positions providing solid leadership in innovation, industry trend analysis, business development, corporate/product strategy & development, complex architecture solutions, product management, solution development for fortune 500 companies. Excellent communication skills: C-level executives, prospective clients and public speaking. Strong analytical skills: Understanding business requirements, ROI analysis, RFI/RFP creation & vendor management. Strong leadership skills in building & leading synergistic, high performing teams and instilling accountability & customer focus. Proficiency in full project life cycle oversight and business process improvement & change management methodologies in the areas of: Large scale IP Network and IT Systems Security & Compliance Operation Center MPLS & IPSec Network Application Development Platform Customer Implementations Organizational Turnarounds Key Accomplishments Successfully implemented many large scale IP network and systems for Fortune 500 Enterprise customers Started Security and Compliance department for MegaPath with People, Process & technologies Active PCI Security Council Participating Organization member and working with Special Interest Group (SIG) for "Daily Log Monitoring & Managing Shared Responsibilities guidelines. Participated in "Third Party Security Assurance, Best Practice for Maintaining PCI Compliance, Penetration Testing Guidance, Security Awareness Program" guidelines for the PCI Council SIG Maintains Level 1 PCI compliance for MegaPath, including annual Audit with third party Qualified Security Assessors.
|
|
Computer Science
By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy
Resumes, and other information uploaded or provided by the user, are considered User Content governed by our Terms & Conditions. As such, it is not owned by us, and it is the user who retains ownership over such content.
Many factors go into creating a strong resume. Here are a few tweaks that could improve the score of this resume:
resume Strength
By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy