I'll just post the intro and basics.  Currently in Houston, TX, but 
very open to re-location for the right position.  Full resume and 
references upon request.



INFORMATION SYSTEMS SECURITY Results oriented professional with sixteen 
years experience in computer intensive environment.  Security responsibilities 
have encompassed virus control, vulnerability and penetration testing,
firewalls, policies/procedures, testing, evaluation, implementation 
of third party security products, and awareness training.  Extensive 
work experience in a LAN/WAN environment utilizing Windows NT 3.51,
4.0, (both backbone and end use development) and Beta Testing Windows 
NT 5.0/Windows 2000.  Checkpoint, Pix, Gauntlet, Raptor.  Real Secure,
SecureIds, Cyber Trace, TripWire, Dragon Squire.  TCP/IP, OSPF. 
BGP,  Integrity Event Management.  AS400, VMS, Novell, Unix, and 
Linux. Data Base Creation and Maintenance. BIOS analysis and upgrades.
At workstation level, experience with DOS 3.x forward, Windows 
3.x, Windows 95 & 98, Windows NT Workstation, Windows 2000, UNIX,
and Linux. TCP/IP, NetBUI, IPX. Hardware experience includes Compaq 
(desktop and servers), HP (desktop and servers), IBM (desktop and 
servers), Dell, and Gateway. Compaq PCI and Voodoo/3dfx video, in 
addition to standard video controllers. 

Areas of Expertise
�       Information Security Management
�       HIPAA/GBL Experience
�       Physical Security Management and Investigations
�       Penetration Testing and Analysis
�       Disaster Recovery Plans, Development, and Implementation
�       Intrusion Detection System Development
�       Security Policy Development and Implementation
�       Incident Handling and Reporting Procedures
�       Strategic and Operational Planning
�       LAN-WAN- Engineering and Architecture
�       Quality and Performance Improvement
�       Decision Making and Problem Solving

Investigator (LPI) specializing in Computer Crime, Online Fraud, 
Secure Networks, Intrusion Detection/Prevention, Internet Security,
Firewalls, Seminars on Online and Computer Security, Profiling and 
Tracing E-Mail threats, Computer Forensics Recovery.  HIPAA evaluations 
and recommendations.







Reply via email to