|
|
Skills | Experience | Total Years | Last Used | |||
---|---|---|---|---|---|---|
Windows, Unix, Linux, Mac OSX, VMWare | ||||||
Security Policy Development | ||||||
Qualys Vulnerability Scanner | ||||||
Tennable Nessus Vulnerability Scanner |
Managed a forensics investigation in 2012, which ultimately cleared the company of any wrong-doing.
Dramatically improved physical security controls to our California and New York City office that included CCTV installation, badge reader installation, and a glass wall partition.
Change management, consulting, contracts, customer care, email delivery, Disaster Recovery, documentation, email, Executive Management, Internal Audit, Internet mail, ISP, ISO27001, legal, Linux, Mergers, mail, Enterprise, network, networks, NIST frameworks, Penetration testing, Security policy development, processes, RedHat, reporting, RFP, Risk Assessment, Security Governance, vulnerability scanners, SLA, strategy, troubleshooting, UNIX
Resumes, and other information uploaded or provided by the user, are considered User Content governed by our Terms & Conditions. As such, it is not owned by us, and it is the user who retains ownership over such content.
Many factors go into creating a strong resume. Here are a few tweaks that could improve the score of this resume:
School Attended
Job Titles Held:
Degrees