Ed C.
Details
Computer/Information Technology Administration and Management
University
Bartending
Drink Slinging
National Bartending School
* Tier 1 Security Assessor
* 3rd Party Security Assessments
* Enterprise Infrastructure Security Policies and Controls
* Mergers and Acquisitions
* Information and Cybersecurity Consulting
* Controls Creations
* Contract Negotiations
* Data Incident Response
* Global Vendor Access Management
* Security Consultant for Innovation and Emerging Technologies
* Security Consultant for Customer Identity Access Management
* Security Consultant on Organizational Generative AI initiatives
2021 : Present
Private
Information Security, Senior Specialist
Security Architecture and Engineering
Enterprise Architecture
Security/Business Governance
Cloud Security
BIA/RA/BIM
DUA/DAA/dbGaP security reviews
Threat Intelligence Management/Threat Analysis
OSINT/Reconnaissance
Purple/Red/Blue Team Engagements
Vulnerability Management (DAST)
Web Application Security
IoT Security
Wireless Security
Bash/Python
2019 : 2021
The Jackson Laboratory
Information System Security Engineer
Vulnerability Management
SOC Analyst
Threat Management
Network/IP Enumeration and discovery
2014 : 2019
The Jackson Laboratory
Information Systems Security Analyst
Supported 5000+ users and over 10,000+ server endpoints globally.
Supported Global Support Sites, Linux Datacenter installation and Windows Datacenter and support. Enterprise Virtualization, Enterprise Password Management, Amazon AWS, and Physical testing environments for the Software Development team. SOC development, Vulnerability Management, Digital Forensics, Wireless penetration testing.
* SOP's Runbooks, Change Management
2006 : 2014
Esri
Systems Administrator - Enterprise Linux (Information Systems and Technology)
Supported over 200+ clients. Maintained various Microsoft Windows Domains 2000-2003.
2005 : 2006
California Computer Options, Inc.
Advanced Microsoft IT Network Consultant
Skills
3Par, Active Directory, CAP, CentOS, CLIA, Cloud Security, Cybersecurity, Cyber Security Framework, Data Center, DHCP, DNS, Enterprise Software, FreeBSD, Governance, Risk Management, and Compliance (GRC), Group Policy, Identity and Access Management (IAM), Information Security, Linux, NAS, Network Administration, Networking, Network Security, NFS, NIST 800-53, Open Source, PCI DSS, pfSense, Privacy Regulations, Red Hat Linux, Remote Control, SAN, Secure Remote Access, Security, Security Architecture Design, Server Administration, Server Architecture, Servers, System Administration, System Deployment, TCP/IP, Technical Support, Threat & Vulnerability Management, Unix, Virtualization, VMware ESX, VMware vSphere, VPN, Windows, Windows Server
About
Experience in various industries including, Casino Gaming, Managed Services, Global Software Development, Global Laboratory Medical Research, Medical Non-profit, Insurance, Financial, Higher Education.
Information Security, Cyber security, Enterprise Architecture, Solutions Architecture, Technical Architecture, Cloud Security, Business Security Governance, Enterprise Risk Management, Security Assessments, Information and Cyber Security Consulting, Policy Management, Regulatory Compliance, Incident Response and Analysis, SOC Analysis, Security Engineering, Security Architecture, Open Source Intelligence, Threat Management, Vulnerability Management, GRC
Specialties: NIST, Policy creation/alignment, risk assessments, security assessments, Third Party Security Assessments, Tenable.io/Nessus, Qualys OpenVAS, NMAP, Wireless Auditing, PenTesting, Enterprise Linux (RedHat Fedora, RHEL/CentOS, Debian, Ubuntu, Kali) VMware ESXi (4.x, 5.x, 6.x) Windows 2008, 2012, 2016 Server, Windows 7,8,10, Enterprise Password Management, DR/BCP, Incident Response Team, Metasploit, OSINT, Threat Intelligence, Threat Management