|
|
Skills | Experience | Total Years | Last Used | |||
---|---|---|---|---|---|---|
Windows, Unix, Linux, Mac OSX, VMWare | ||||||
Security Policy Development | ||||||
Qualys Vulnerability Scanner | ||||||
Tennable Nessus Vulnerability Scanner |
Managed a forensics investigation in 2012, which ultimately cleared the company of any wrong-doing.
Dramatically improved physical security controls to our California and New York City office that included CCTV installation, badge reader installation, and a glass wall partition.
Change management, consulting, contracts, customer care, email delivery, Disaster Recovery, documentation, email, Executive Management, Internal Audit, Internet mail, ISP, ISO27001, legal, Linux, Mergers, mail, Enterprise, network, networks, NIST frameworks, Penetration testing, Security policy development, processes, RedHat, reporting, RFP, Risk Assessment, Security Governance, vulnerability scanners, SLA, strategy, troubleshooting, UNIX
Resumes, and other information uploaded or provided by the user, are considered User Content governed by our Terms & Conditions. As such, it is not owned by us, and it is the user who retains ownership over such content.
Companies Worked For:
School Attended
Job Titles Held:
Degrees
© 2021, Bold Limited. All rights reserved.