Experience
What I’ve Done
The below is a high-level summary of my experience. Please feel free to contact me if you would like details.
Electronic Intelligence Analyst
August 1999Â - June 2006
Served as the senior enlisted member of a multi-national intelligence research team
Conducted assessments of efficiency and use of intelligence gathering assets
Supervised and managed a new intelligence research team in execution of new process and new deliverables.
Helped to provide guidance on physical security protocols for a new intelligence operations center
Provided real-world support to deployed Operation Iraqi Freedom and Operation Enduring Freedom units
Provided high-level briefings to senior leadership
Identity & Access Management Analyst
June 2015 - January 2016, March 2018 – April 2019
Creating and maintains all policies, procedures and guidelines related to the Identity and Access Management program.
Carrying out periodic access reviews to ensure end user access is in line with current job responsibilities.
Ensuring Identity and Access Management program controls are incorporated in all relevant systems by working closely with application owners.
Assists with the analysis, design and deployment of IAM architecture and other security projects to proactively identify and mitigate organizational risk, streamline access management activities, ensure resources are secured, and adapt to changing threat landscapes.
Led the role mining effort to onboard a new enterprise claims processing solution
Oversaw the implementation of the Role Base Access best practices for onboarding of new tools.
Supported the continual development of SailPoint as the IAM provisioning tool leading to initial deployment in support of claims solutions
Progressively builds base knowledge/familiarization by assisting with the creation and maintenance of relevant documentation to include, but not limited to, Standard Operating Procedures, and project change control methodologies.
Information Security Supervisor
January 2016 - January 2018
Supervised and hired a team of four who handles SAP Security and Enterprise Identity Management for a company of 33,000 employees;
Received 2016 Rookie of the Year award for implementation and improvement of the access process;
Led a search for a new Identity Management tool in order to centralize and automate birthright entitlements, user access, and privilege access across the enterprise landscape;
Supported and administer the budget for the SAP Security and Identity Management team;
Led a three-month audit to determine technical compliance with Defense Federal Acquisition Regulation Cybersecurity Requirements (DFARS) and National Institute of Standards andTechnology (NIST 800-171).
Risk Management and Oversight Team Lead
February 2020Â - Present
Lead the deployment of a cyber risk model to identify areas of cyber risk to provide oversight, analysis, effectively challenge, and support risk-informed recommendations for enhancement
Lead the activities to effectively assess, measure and communicate cybersecurity risks related to business processes
Recommending and supporting the establishment of governance structures.