Passionate Sr Director Research analyst that actively researches Security Operation topics such as:
Incident response technologies and processes
Modernizing SOCs
Evolving SIEM technologies and architectures
Evolution of Vulnerability management to Exposure management including adopting new technologies and techniques and how to effectively implement them for various organizations.
Security automation leveraging current and new automation techniques that are enabled by AI.
Network Security topics such as:
Network Segmentation techniques and architecture that vary from traditional methods to agent based options
Network Access Control from scoping to effective deployment. Contrast against alternative architectures and technologies such as UTZNA.
Zero trust architecture and effective implementation based well defined scopes.
Secure Services edge design and implementations.
I did consulting in the NYC area that was heavily involved in network engineering and network security engineering for midsize and fortune 500 organizations. This included global network security designs and implementations.
Afterwards I implemented security controls and best practices across various domains from Identity, endpoint security, networking and data security for several years in charlotte.
Afterwards I ran network security engineering for 5 years at Ally bank through a large organization changes and data center consolidation projects. Spearheaded network security implementations for Ally's initial implementation in cloud services.
I ran application security and vulnerability management practice at Ally and reduced overall exposure risk considerably by refining processes and technology used.
Ally Bank, Director of Security Engineering, 5 years
Ally Bank, Director of Vulnerability management, 4 years
Security Operations for Technical Professionals
Security Technology and Infrastructure for Technical Professionals
B.S. Electrical Engineering
B.A. Computer Science Engineering
Developing and Implementing a Exposure management and CTEM
Developing and Implementing a Modern SOC
Creating and Implementing Security Incident response plans
How to implement a vulnerability and attack surface management program
How to implement zero trust architecture