top of page
Keyboard

Experience

What I’ve Done

The below is a high-level summary of my experience. Please feel free to contact me if you would like details.

Electronic Intelligence Analyst

August 1999 - June 2006

  • Served as the senior enlisted member of a multi-national intelligence research team 

  • Conducted assessments of efficiency and use of intelligence gathering assets

  • Supervised and managed a new intelligence research team in execution of new process and new deliverables. 

  • Helped to provide guidance on physical security protocols for a new intelligence operations center

  • Provided real-world support to deployed Operation Iraqi Freedom and Operation Enduring Freedom units

  • Provided high-level briefings to senior leadership

Identity & Access Management Analyst

June 2015 - January 2016, March 2018 – April 2019

  • Creating and maintains all policies, procedures and guidelines related to the Identity and Access Management program.

  • Carrying out periodic access reviews to ensure end user access is in line with current job responsibilities.

  • Ensuring Identity and Access Management program controls are incorporated in all relevant systems by working closely with application owners.

  • Assists with the analysis, design and deployment of IAM architecture and other security projects to proactively identify and mitigate organizational risk, streamline access management activities, ensure resources are secured, and adapt to changing threat landscapes.

  • Led the role mining effort to onboard a new enterprise claims processing solution 

  • Oversaw the implementation of the Role Base Access best practices for onboarding of new tools.

  • Supported the continual development of SailPoint as the IAM provisioning tool leading to initial deployment in support of claims solutions

  • Progressively builds base knowledge/familiarization by assisting with the creation and maintenance of relevant documentation to include, but not limited to, Standard Operating Procedures, and project change control methodologies.

Information Security Supervisor

January 2016 - January 2018

  • Supervised and hired a team of four who handles SAP Security and Enterprise Identity Management for a company of 33,000 employees; 

  • Received 2016 Rookie of the Year award for implementation and improvement of the access process;

  • Led a search for a new Identity Management tool in order to centralize and automate birthright entitlements, user access, and privilege access across the enterprise landscape; 

  • Supported and administer the budget for the SAP Security and Identity Management team;

  • Led a three-month audit to determine technical compliance with Defense Federal Acquisition Regulation Cybersecurity Requirements (DFARS) and National Institute of Standards andTechnology (NIST 800-171).

Risk Management and Oversight Team Lead

February 2020 - Present

  • Lead the deployment of a cyber risk model to identify areas of cyber risk to provide oversight, analysis, effectively challenge, and support risk-informed recommendations for enhancement

  • Lead the activities to effectively assess, measure and communicate cybersecurity risks related to business processes

  • Recommending and supporting the establishment of governance structures.

bottom of page