An IT security consultant designs, creates and
implements information security system to protect information of client business.
Sources have indicated that the company is planning to
implement information security systems and is currently in the midst of a strategic Oracle Agile planning module project.
Not exact matches
The scary thing is, individuals can
implement all the best
information security practices like strong passwords, two factor authentication, and encryption, but if large organizations fail to secure their
systems, you can be in grave danger.
Hotel has
implemented a
security program with its web design and maintenance firm to keep
information that is stored in our
systems protected from unauthorized access.
The MEIS User Management is a
security system,
implemented and used with various Michigan Department of Education (MDE) and Center for Educational Performance and
Information (CEPI) applications.
IT Administration: administration of Humble Bundle's
information technology
systems; network and device administration; network and device
security;
implementing data
security and
information systems policies; compliance audits in relation to internal policies; identification and mitigation of fraudulent activity; and compliance with legal requirements.
A loan broker shall comply with the provisions of the federal Gramm - Leach - Bliley Act, 15 United States Code, Section 6801 et seq. (1999) and the applicable
implementing federal Privacy of Consumer
Information regulations, as adopted by the Office of the Comptroller of the Currency, 12 Code of Federal Regulations, Part 40 (2001); the Board of Governors of the Federal Reserve
System, 12 Code of Federal Regulations, Part 216 (2001); the Federal Deposit Insurance Corporation, 12 Code of Federal Regulations, Part 332 (2001); the Office of Thrift Supervision, 12 Code of Federal Regulations, Part 573 (2001); the National Credit Union Administration, 12 Code of Federal Regulations, Part 716 (2001); the Federal Trade Commission, 16 Code of Federal Regulations, Part 313 (2001); or the
Securities and Exchange Commission, 17 Code of Federal Regulations, Part 248 (2001), if the loan broker is a financial institution as defined in those regulations.
Hotel has
implemented a
security program with its web design and maintenance firm to keep
information that is stored in our
systems protected from unauthorized access.
Most importantly, organizations must establish an
information security governance framework to ensure that appropriate practices,
systems and procedures for the protection of personal
information are established, consistently understood and effectively
implemented.
The KCSC provided the eight exchanges a 30 - day deadline to
implement necessary
security measures and
systems to prevent the theft of user
information, account data, and funds.
Typical Data Administrator duties are
implementing security measures, updating databases, creating new
systems, writing performance reports, complying with legal requirements, storing and recovering
information and exporting data.
• Develop and
implement policies for the parking lot • Issue parking permits and devise appropriate procedures for distribution of the same • Organize parking registration activities • Collect, count and record the parking fee • Supervise, train and evaluate subordinate employees • Guide and educate the campus community regarding parking procedures and SOPs • Identify and report any suspicious vehicle • Issue and submit periodic parking lot reports to the higher management • Devise and recommend ways to enhance the effectiveness of parking procedures to ensure maximum customer facilitation • Carryout paper work for long term parking requests and issue relevant permit if applicable • Inspect the parking lot physically and ensure proper physical conditions are available for parking • Ensure consumer and vehicle
security in the parking lot • Operate parking lot equipment, drive through gates and car lifters appropriately as and when required • Respond to public inquiries and provide relevant
information regarding parking protocols • Monitor CCTV footage and report any suspicious activity • Regularly update the members» vehicle data and stamp their permits • Oversee parking lot operations, revenue collection and ticketing procedures • Ensure proper book keeping procedures are being carried out • Conduct minor maintenance of parking lot equipment • Promote and demonstrate high standards of customer service • Issue permits to vendors and other visitors after complete validation of their personal data • Oversee flagging and validation code issuance • Organize training sessions for development and grooming of the team • Assign duties to the parking lot employees and evaluate their performance • Serve as point of contact for parking lot procedures, maintenance and permissions • Allocate separate space for visitors, special guests and handicapped individuals • Manage parking lot budget and meet the maintenance requirements within allocated amount • Devise a proper one way route within the parking area and display informative direction boards to
implement the same • Oversee the cleanliness of the parking lot and keep it snow free during winters to facilitate smooth drive in and drive out • Procure and install parking signs and meters etc. • Maintain vehicle owner's data on whose IDs the permits have been issued • Record all drive ins and drive outs with timings in the computerized log
system
•
Implement system backup, virus protection and
security procedures, in regards to protecting hardware, data and confidential
information.
Implemented database
security using Oracle's Transparent Data Encryption based on Database Security Technical Implementation Guide (STIG) developed by Defense Information Systems Agenc
security using Oracle's Transparent Data Encryption based on Database
Security Technical Implementation Guide (STIG) developed by Defense Information Systems Agenc
Security Technical Implementation Guide (STIG) developed by Defense
Information Systems Agency (DISA)
Adebola is a British Standard Institute certified lead auditor with certifications in ISO 9001, ISO 14001, ISO 27001, and OHSAS 18001 seeking position where I can leverage my cybersecurity and problem - solving skill to develop,
implement, monitor and support
information system security programs in areas of vulnerability assessment, penetration testing and managing or deploying identity management solutions.
Areas of expertise include
Information systems security analysis information assurance analysis assessing security events network security network and systems design developing and implementing systems security policies and proc
Information systems security analysis
information assurance analysis assessing security events network security network and systems design developing and implementing systems security policies and proc
information assurance analysis assessing
security events network
security network and
systems design developing and
implementing systems security policies and procedures p...
Information Technology Security Specialist Develop, implement, monitor and support information systems securi
Information Technology
Security Specialist Develop, implement, monitor and support information systems security
Security Specialist Develop,
implement, monitor and support
information systems securi
information systems security security programs
Qualifications: * Designing, installing, administering, securing, monitoring and optimizing server operating
systems, networking devices, storage
systems and related components *
Implementing, reviewing and updating
security policies, controls and cyber incident response plans * Maintaining privacy and protecting Personally Identifiable
Information (PII) and Personal Health
Information (PHI) * Effective communicator - both...
Information Technology (IT) Director — Duties & Responsibilities Manage IT department, customer service technicians, client / staff training, and a multimillion dollar budget Set and strictly adhere to departmental budgets and timelines ensuring timely and cost effective operations Responsible for 150 servers in a VM / SAN environment, Cisco network, and MAN connection between offices Maintain 4 9's uptime on all IT services and attain 100 % SLA compliance with clarification of SOW terms Successfully manage multiple building moves and build outs with zero IT downtime Oversee PBX to Cisco Unified Communications change, VMWare / SAN implementation, and hosting of 20 ASP clients Create and
implement complete helpdesk department and remote resolution of client issues Negotiate and administer contracts and partnerships with vendors, service providers, and other parties Configure, troubleshoot, and support 300 + corporate workstations ensuring efficient, effective, and secure operations Oversee remote network access, VPN support, and phone support for remote executives Install, configure, troubleshoot, and support multiple Windows and SQL servers Design and
implement enterprise disaster recovery
systems, processes, and policies Plan and develop of LAN / WAN hardware and software requirements, updates, and related equipment Facilitate customer contracts / billing, technical support, and end - user training Train large staffs ensuring they understand the brand and adhere to corporate policies and procedures Collaborate with department managers to identify and address
security concerns through IT Security policies Author reports concerning IT department operations, suggested hardware / software updates, and other pertinent data Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technica
security concerns through IT
Security policies Author reports concerning IT department operations, suggested hardware / software updates, and other pertinent data Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technica
Security policies Author reports concerning IT department operations, suggested hardware / software updates, and other pertinent data Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technical skills
Information Technology Security Manager — Duties & Responsibilities Manage IT security, customer service technicians, assets and finances, and client training Responsible for ensuring that multiple IT groups meet finance, audit, and compliance requirements Serve as primary point of contact for customer contracts, technical support, and end - user training Utilize interpersonal and technical skills as liaison between clients, technicians, and subcontractors Train large staffs ensuring they understand the brand and adhere to corporate policies and procedures Oversee the implementation of asset management processes and procedures Coordinate activities with desktop leads to ensure SOX compliance Validate asset information, manage defect reports, and submit correct action recommendations Design and implement enterprise - wide security protocols, mainframe / pc policies, & software / hardware packages Collaborate with department managers to identify and address security concerns through IT Security policies Reduce corporate information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and techn
Information Technology
Security Manager — Duties & Responsibilities Manage IT security, customer service technicians, assets and finances, and client training Responsible for ensuring that multiple IT groups meet finance, audit, and compliance requirements Serve as primary point of contact for customer contracts, technical support, and end - user training Utilize interpersonal and technical skills as liaison between clients, technicians, and subcontractors Train large staffs ensuring they understand the brand and adhere to corporate policies and procedures Oversee the implementation of asset management processes and procedures Coordinate activities with desktop leads to ensure SOX compliance Validate asset information, manage defect reports, and submit correct action recommendations Design and implement enterprise - wide security protocols, mainframe / pc policies, & software / hardware packages Collaborate with department managers to identify and address security concerns through IT Security policies Reduce corporate information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technica
Security Manager — Duties & Responsibilities Manage IT
security, customer service technicians, assets and finances, and client training Responsible for ensuring that multiple IT groups meet finance, audit, and compliance requirements Serve as primary point of contact for customer contracts, technical support, and end - user training Utilize interpersonal and technical skills as liaison between clients, technicians, and subcontractors Train large staffs ensuring they understand the brand and adhere to corporate policies and procedures Oversee the implementation of asset management processes and procedures Coordinate activities with desktop leads to ensure SOX compliance Validate asset information, manage defect reports, and submit correct action recommendations Design and implement enterprise - wide security protocols, mainframe / pc policies, & software / hardware packages Collaborate with department managers to identify and address security concerns through IT Security policies Reduce corporate information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technica
security, customer service technicians, assets and finances, and client training Responsible for ensuring that multiple IT groups meet finance, audit, and compliance requirements Serve as primary point of contact for customer contracts, technical support, and end - user training Utilize interpersonal and technical skills as liaison between clients, technicians, and subcontractors Train large staffs ensuring they understand the brand and adhere to corporate policies and procedures Oversee the implementation of asset management processes and procedures Coordinate activities with desktop leads to ensure SOX compliance Validate asset
information, manage defect reports, and submit correct action recommendations Design and implement enterprise - wide security protocols, mainframe / pc policies, & software / hardware packages Collaborate with department managers to identify and address security concerns through IT Security policies Reduce corporate information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and techn
information, manage defect reports, and submit correct action recommendations Design and
implement enterprise - wide
security protocols, mainframe / pc policies, & software / hardware packages Collaborate with department managers to identify and address security concerns through IT Security policies Reduce corporate information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technica
security protocols, mainframe / pc policies, & software / hardware packages Collaborate with department managers to identify and address
security concerns through IT Security policies Reduce corporate information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technica
security concerns through IT
Security policies Reduce corporate information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technica
Security policies Reduce corporate
information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and techn
information ricks through implementation of sensitive document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application
security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technica
security Establish and oversee regular
system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technica
security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technical skills
Professional Experience Marine Corps Network Operations
Security Center (Quantico, VA) 12/2008 — Present
Information Technology Project Manager • Serve as Project Manager responsible for Network Enterprise Services strategic plans and process development • Tasked with the engineering and design of enterprise services for the largest IT project facing the Marine Corps • Oversee project acceptance, manage third party contractor relations, identify requirement gaps, evaluate integration requirements, document solutions, and facilitate the turnover to the operations group • Administer email messaging
system, active directory infrastructure, storage area networks, and virtual server infrastructure • Additional systems of responsibility include DMS (Defense Messaging System), DAR (Data at Rest, Guardian Edge's enterprise encryption), HBSS (Host Based Security System), MOSS 2003/2007 (Microsoft SharePoint), SCOM (System Center Operations Manager, Enterprise Event Monitoring) • Provide full time Tier II & III Help Desk Support for the ~ 50,000 users in both the classified and unclassified networks • Directly manage subordinate IT supervisors determining workflow and ensuring efficient and effective operations • Serve as a member of external boards, committees and working groups representing the USMC and the MCNOSC • Champion the MCNOSC's adoption of the ITIL (Information Technology Infrastructure Library) processes, implement the MCNOSC's Change Management Process, and establish the first enterprise level Change Management Approval Board • Serve as Project Manager during the Marine Corps first implementation of HBSS on the classified and unclassified networks • Responsible for the Marine Corps» Network Consolidation of the SIPRNet involving the collapsing over 36 separate Active Directory Domains into one forest and a single domain structure and the migration of over 300 servers and every workstation on the USMC S
system, active directory infrastructure, storage area networks, and virtual server infrastructure • Additional
systems of responsibility include DMS (Defense Messaging
System), DAR (Data at Rest, Guardian Edge's enterprise encryption), HBSS (Host Based Security System), MOSS 2003/2007 (Microsoft SharePoint), SCOM (System Center Operations Manager, Enterprise Event Monitoring) • Provide full time Tier II & III Help Desk Support for the ~ 50,000 users in both the classified and unclassified networks • Directly manage subordinate IT supervisors determining workflow and ensuring efficient and effective operations • Serve as a member of external boards, committees and working groups representing the USMC and the MCNOSC • Champion the MCNOSC's adoption of the ITIL (Information Technology Infrastructure Library) processes, implement the MCNOSC's Change Management Process, and establish the first enterprise level Change Management Approval Board • Serve as Project Manager during the Marine Corps first implementation of HBSS on the classified and unclassified networks • Responsible for the Marine Corps» Network Consolidation of the SIPRNet involving the collapsing over 36 separate Active Directory Domains into one forest and a single domain structure and the migration of over 300 servers and every workstation on the USMC S
System), DAR (Data at Rest, Guardian Edge's enterprise encryption), HBSS (Host Based
Security System), MOSS 2003/2007 (Microsoft SharePoint), SCOM (System Center Operations Manager, Enterprise Event Monitoring) • Provide full time Tier II & III Help Desk Support for the ~ 50,000 users in both the classified and unclassified networks • Directly manage subordinate IT supervisors determining workflow and ensuring efficient and effective operations • Serve as a member of external boards, committees and working groups representing the USMC and the MCNOSC • Champion the MCNOSC's adoption of the ITIL (Information Technology Infrastructure Library) processes, implement the MCNOSC's Change Management Process, and establish the first enterprise level Change Management Approval Board • Serve as Project Manager during the Marine Corps first implementation of HBSS on the classified and unclassified networks • Responsible for the Marine Corps» Network Consolidation of the SIPRNet involving the collapsing over 36 separate Active Directory Domains into one forest and a single domain structure and the migration of over 300 servers and every workstation on the USMC S
System), MOSS 2003/2007 (Microsoft SharePoint), SCOM (
System Center Operations Manager, Enterprise Event Monitoring) • Provide full time Tier II & III Help Desk Support for the ~ 50,000 users in both the classified and unclassified networks • Directly manage subordinate IT supervisors determining workflow and ensuring efficient and effective operations • Serve as a member of external boards, committees and working groups representing the USMC and the MCNOSC • Champion the MCNOSC's adoption of the ITIL (Information Technology Infrastructure Library) processes, implement the MCNOSC's Change Management Process, and establish the first enterprise level Change Management Approval Board • Serve as Project Manager during the Marine Corps first implementation of HBSS on the classified and unclassified networks • Responsible for the Marine Corps» Network Consolidation of the SIPRNet involving the collapsing over 36 separate Active Directory Domains into one forest and a single domain structure and the migration of over 300 servers and every workstation on the USMC S
System Center Operations Manager, Enterprise Event Monitoring) • Provide full time Tier II & III Help Desk Support for the ~ 50,000 users in both the classified and unclassified networks • Directly manage subordinate IT supervisors determining workflow and ensuring efficient and effective operations • Serve as a member of external boards, committees and working groups representing the USMC and the MCNOSC • Champion the MCNOSC's adoption of the ITIL (
Information Technology Infrastructure Library) processes,
implement the MCNOSC's Change Management Process, and establish the first enterprise level Change Management Approval Board • Serve as Project Manager during the Marine Corps first implementation of HBSS on the classified and unclassified networks • Responsible for the Marine Corps» Network Consolidation of the SIPRNet involving the collapsing over 36 separate Active Directory Domains into one forest and a single domain structure and the migration of over 300 servers and every workstation on the USMC SIPRNet