Kelly Nicholson. Summary
|
|
|
- Cameron Cobb
- 10 years ago
- Views:
Transcription
1 Kelly Nicholson Summary Kelly Nicholson is a diligent and motivated professional with over six years of experience in the Security field. She prides herself on her communication and technical skills as well as her analytical ability. With her military background, it comes as no surprise that she found her passion and calling in Cybersecurity. With a proficient attention to detail, Kelly excels at mastering and configuring new software to suit corporate needs while meeting compliance standards. She enjoys researching and discovering security vulnerabilities and recommending best practice methods for remediation. Projects PCI Risk Assessment September 2014 to Present Conduct a risk assessment using the Octave Allegro Risk Assessment Methodology and Practical Threat Analysis software Define assets, threats, and vulnerabilities within cardholder environment Determine appropriate mitigating countermeasures Assess inherent and residual risk before/after countermeasures Recommend and justify mitigation strategy Website Development: Samples of site development expertise, project management & witing abilities 2012 to Present I created this website during my senior year of college to fulfill dual functions for two college courses: Project Management and Integrated Business Concepts. The site was built using JavaScript, Shockwave Flash Objects, CSS, and HTML, all constructed using Adobe Dreamweaver software. Contents within the site include Gantt charts created with Microsoft Projects, as well as various samples of my writing in report format. Project Management Website & Coursework Management Information Systems Website & Coursework Experience July Present (7 months) ISSO at Textron Systems Page1
2 (less than a year) Security Analyst I at Parsons Brinckerhoff (1 year) Information Security Intern at nsylvania (1 year) Security Forces Specialist at United States Air Force Security Forces (4 years) Languages Spanish Skills & Expertise Security System Administration Leadership Management Information Assurance Reporting & Analysis Threat & Vulnerability Management Active Directory SIEM Vulnerability Management Security Policy Incident Response Network Administration Project Management Information Technology Troubleshooting Disaster Recovery Microsoft Office Education University of Maryland University College Bachelor of Science (B.S.), Cybersecurity, Business Administration, Activities and Societies: Upsilon Pi Upsilon International Honor Society EnCase OnDemand Training EnCase Enterprise, Forensic Examiner, SEI Training - Carnegie Mellon University Octave Allegro Risk Assessment Methodology, Page2
3 Computer Information Systems, Activities and Societies: Information Security Intern 2 recommendations available upon request Courses Bachelor of Science (B.S.), Cybersecurity, Business Administration University of Maryland University College Foundations of Cybersecurity CSIA 301 Foundations of Information System Security CSIA 303 Network Security CMIT 320 Relationship Database Concepts & Applications CMIS 285 Computer Systems Architecture CMIS 310 Computer Information Systems Management Information Systems IFS 305 Network Server Design IFS 335 Business Analytics: Data Mining IFS 465 Project Management IFS 435 Business Strategy BUS 495 Integrated Business Experience BUS 494 Honors and Awards Article Published for Politics Interview Louis A. Arana-Barradas July 2008 Interviewed for Vote of Confidence article within United States Air Force Airman Magazine; Received over 9 military challenge coins for outstanding individual achievements Air Force ranks O6 and higher July 2009 Military units and organizations utilize military challenge coins as a method to recognize outstanding individual achievements or show appreciation. Military coins are powerful symbols that promote pride, build cohesion, and increase morale within an organization. Selected to perform 63rd Air Force Anniversary "Cutting of the Cake" Ceremony Lieutenant General Jeffrey Remington and Chief Master Sergeant Stephen Ludwig December 2010 Page3
4 Personally selected to represent and perform Osan Air Base's 63rd Anniversary"Cutting of the Cake" Ceremony at the Air Force Ball with Lt Gen. Remington, 7th Air Force commander, and 7th Air Force Command CMSgt Ludwig Airman of the Quarter 51st Security Forces Squadron April 2010 Recognized and awarded title for superior leadership, job performance, community involvement, and personal achievements. Basic Military Training Honor Graduate USAF April 2008 Air Force Achievement Medal Colonel Roland K. Van Deveenter March 2010 Organizations ISACA January 2012 to Present IEEE May 2011 to Present Honors and Awards Dean's List Page4
5 Kelly Nicholson 2 people have recommended Kelly "Kelly and I engaged in a mentor relationship in Fall 2012 and it's quickly evolved into an entrepreneurial advisory role based on her unique skill set and goals. Kelly demonstrates highly developed time-management skills that compliment her IT security & policy writing experience perfectly. Kelly is a strong communicator and a mature professional for this early stage in her career. I heartily recommend Kelly and hope to continue working on new ideas and projects." Patti Stirk, President & CEO, Star Systems Engineering, Inc., advised Kelly at "Kelly is an intelligent, dynamic, and highly motivated young woman. She helped set the bar for academic performance in the classroom. Her questions were always thoughtful and relevant to the classroom discussion. If my students were a pool of job applicants, I would hire Kelly over 99% of the others." Eric Hostler, Assistant Professor of Information Systems, nsylvania, taught Kelly at Contact Kelly on LinkedIn Page5
University of Central Florida Class Specification Administrative and Professional. Information Security Officer
Information Security Officer Job Code: 2534 Serve as the information security officer for the University. Develop and computer security system standards, policies, and procedures. Serve as technical team
Please contact Cyber and Technology Training at (410)777-1333/[email protected] for registration and pricing information.
Course Name Start Date End Date Start Time End Time Active Directory Services with Windows Server 8/31/2015 9/4/2015 9:00 AM 5:00 PM Active Directory Services with Windows Server 9/28/2015 10/2/2015 9:00
Online Computer Science Degree Programs. Bachelor s and Associate s Degree Programs for Computer Science
Online Computer Science Degree Programs EDIT Online computer science degree programs are typically offered as blended programs, due to the internship requirements for this field. Blended programs will
National Initiative for Cybersecurity Education
THE NICE VISION National Initiative for Cybersecurity Education a national campaign to promote cybersecurity awareness and digital literacy from our boardrooms to our classrooms, and to build a digital
How To Become A Cybersecurity Consultant
Strengthening the Nexus: Government-Business- University cooperation and collaboration on security, training and research November 1, 2011 Susan C. Aldridge, PhD University of Maryland University College
INFORMATION TECHNOLOGY
INFORMATION TECHNOLOGY START HERE. More than 70,000 futures have started at Kirkwood... Yours can be one of them! Get a great start here in an information technology-related field, then go straight into
Click to edit Master title style. How To Choose The Right MSSP
How To Choose The Right MSSP Meet Eric Eric Devansky Director of Global Security Services 15 Years of experience in the Cyber Security industry CISSP Palo Alto CNSE VMWare VCP Connect with me: @TruShield
Italy. EY s Global Information Security Survey 2013
Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information
Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM
Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and
Creating places for people to share activities, data and documents within and between energy companies.
SHAREPOINT SUPPORT ANALYST LET US INTRODUCE OURSELVES NeoStream Technologies Inc. is a Calgary-based energy services software company using SharePoint to provide information management, communication and
Information Technology Division
151 xxx Introduction to IT Division The Higher Colleges of Technology offers one of UAEÕ s largest selections of Information Technology programs. Students study Diploma, Higher Diploma and Bachelor Degree
Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time
Flexible Online Bachelor s Degree Completion Programs Bachelor of Science Degree Cyber Security Advancing the nation s workforce one graduate at a time Cyber Security Major The Program You ve heard about
Information Systems and Tech (IST)
California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey
Demonstrate an ability to utilize generally accepted accounting principles and managerial/cost accounting practices.
Accounting NAU s Bachelor of Science degree in Accounting is designed to help students prepare for the Certified Public Accountant (CPA) exam and have an exciting career in the financial sector. Currently,
CyberSkills Management Support Initiative
CyberSkills Management Support Initiative GROWING THE PIPELINE FOR CYBERTALENT THROUGH VOLUNTEER OPPORTUNITIES November 6, 2014 November 6, 2014 Background In June 2012, Secretary Napolitano announced
Cyber security tackling the risks with new solutions and co-operation Miikka Pönniö 22.9.2015
Siemens Osakeyhtiö Cyber security tackling the risks with new solutions and co-operation Miikka Pönniö 22.9.2015 Restricted Siemens Osakeyhtiö 2015. All Rights Reserved. siemens.fi/answers Cyber security
Connecting PTE to Careers in Idaho
1 Connecting PTE to Careers in Idaho Wendi Secrist Director, Business Outreach July 21, 2015 www.pte.idaho.gov 2 School Portals NextSteps Career Information Where do I start? SkillStack lmi.idaho.gov College/University
Allegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and
Cybersecurity comes to Allegany College of Maryland 107 Intro to Cybersecurity Offered fall and spring semesters. This course provides a broad overview of computer security, ethical issues and information
Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
Director, IT Security District Office Kern Community College District JOB DESCRIPTION
Director, IT Security District Office Kern Community College District JOB DESCRIPTION Definition Reporting to the Chief Information Officer, the Director of IT Security develops and implements procedures,
Case Study: Hiring a licensed Security Provider
Case Study: Hiring a licensed Security Provider Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge computer forensics
Software Development
Software Development Associate s Degree The ITT Technical Institutes offer a variety of career-focused curricula. This sheet helps describe the associate s degree program in Software Development 1 offered
EMBA DELIVERED IN PARTNERSHIP WITH UIBE
UNIVERSITY OF MARYLAND ROBERT H. SMITH SCHOOL OF BUSINESS EXECUTIVE MBA IN BEIJING SMART READY EXPERIENCED SUCCESSFUL JUST LIKE YOU RELEVANT LEADER INSPIRED MOTIVATED SMITH AMBITIOUS FOCUSED EMBA DELIVERED
Pi Epsilon-at-Large Chapter Sigma Theta Tau International Honor Society of Nursing
Pi Epsilon-at-Large Chapter Sigma Theta Tau International Honor Society of Nursing Regis College 235 Wellesley Street Weston, MA 02193 781-768-7090 Emmanuel College 400 The Fenway Boston, MA 02115 617-735-9935
North American Electric Reliability Corporation (NERC) Cyber Security Standard
North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation
Network Management and Defense Telos offers a full range of managed services for:
Network Management and Defense Telos offers a full range of managed services for: Network Management Operations Defense Cybersecurity and Information Assurance Software and Application Assurance Telos:
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security
Governance, Risk, and Compliance (GRC) White Paper
Governance, Risk, and Compliance (GRC) White Paper Table of Contents: Purpose page 2 Introduction _ page 3 What is GRC _ page 3 GRC Concepts _ page 4 Integrated Approach and Methodology page 4 Diagram:
Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.
Corporate Overview MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.com IS&P Practice Areas Core Competencies Clients & Services
Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform
Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Solution Brief Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Finding
Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE
RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Fernanda Tapia Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS Apply today: strayer.edu/apply FLEXIBLE / AFFORDABLE
Risk Calculation and Predictive Analytics: Optimizing Governance, Risk and Compliance.
Risk Calculation and Predictive Analytics: Optimizing Governance, Risk and Compliance. Prevari makes organizations safer by providing instrumentation for managing risks to information. Prevari solutions
LYNN ROY THACKERAY 615 South 680 East Payson, UT 84651
LYNN ROY THACKERAY 615 South 680 East Payson, UT 84651 CAREER SUMMARY LinkedIn Profile TEACHING & INSTRUCTION Experienced University level instructor. Have taught computer science and Information Technology
Vendor Risk Management Financial Organizations
Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current
Report on CAP Cybersecurity November 5, 2015
Agenda Number 7. Report on CAP Cybersecurity November 5, 2015 Phil Cook CISSP, CISM Manager, Information Technologies Risk #1 External Attacks PR 81 Protect and secure CAP's Information Technology assets
IT Risk & Security Specialist Position Description
Specialist Position Description February 9, 2015 Specialist Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level
smith EMBA just like you steady driven Determined Motivated confident Ambitious
University of Maryland Robert H. Smith School of Business Executive MBA Smart ready Experienced Successful just like you steady Determined confident Motivated smith Ambitious driven EMBA Our students and
The Benefits of Managed Services at
The Benefits of Managed Services at When I first joined Kinross in early 2009, I realized we had a lot of work to do to improve our deployment and utilization of JD Edwards. The only area related to JDE
Caretower s SIEM Managed Security Services
Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During
Police Organization and Administration. CJ 3600 Professor James J. Drylie Week 6
Police Organization and Administration CJ 3600 Professor James J. Drylie Week 6 Leadership The police leader is responsible for three equally important but essentially different broad responsibilities:
Joshua Tuscan. Summary. Experience. Creative Technologist and UI Developer at KNI [email protected]
Joshua Tuscan Creative Technologist and UI Developer at KNI [email protected] Summary User interface developer and creative technologist focused on developing engaging, cross platform, and standards
defense through discovery
defense through discovery about krypton krypton is an advisory and consulting services firm, specialized in the domain of information technology (it) and it-related security krypton is a partnership amongst
1. Software Engineer (I, II, and III)
1. Software Engineer (I, II, and III) We don t hire coders 1.1 Introduction 5AM s primary mission is to build software solutions for our clients. At 5AM, software engineers build those software solutions.
Information Technology 2015 Programmes
Information Technology 2015 Programmes Well connected. Right here Innovation, intelligence and ingenuity. Do you have what it takes to make technology work? IT is a booming industry worth an estimated
THE NATIONAL CYBERSECURITY WORKFORCE FRAMEWORK. USER GUIDE Employers
THE NATIONAL CYBERSECURITY WORKFORCE FRAMEWORK USER GUIDE Employers Workforce Framework User Guide Welcome to the User Guide! The Workforce Framework helps Employers to recruit from a larger pool of more
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) Addressing the PCI DSS with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 [email protected]
CLASSIFICATION SPECIFICATION FORM
www.mpi.mb.ca CLASSIFICATION SPECIFICATION FORM Human Resources CLASSIFICATION TITLE: POSITION TITLE: (If different from above) DEPARTMENT: DIVISION: LOCATION: Executive Director Executive Director, Information
Auditing emerging cyber threats and IT controls
Auditing emerging cyber threats and IT controls Robert Baldi Director of IT Audit, ACI Worldwide Warren Fish Manager of IT Audit, ACI Worldwide Competency The trouble with competence is that it is always
How To Become A Computer Scientist
PROFESSIONAL SUMMARY Brian R. Salmans 1024 Summerfield Way Lawrence, KS 66049 334 652 9777 [email protected] Over 25 years of leadership and management experience in Department of Defense-level computer
OVERVIEW DEGREES & CERTIFICATES
OVERVIEW DEGREES & CERTIFICATES 015 The best. Made better. SANS graduate programs are the ultimate expression of our 25 years dedicated to the education and development of information security professionals.
William E. Ayen, Ph.D. Department of Information Systems College of Business and Administration University of Colorado at Colorado Springs
William E. Ayen, Ph.D. Department of Information Systems College of Business and Administration University of Colorado at Colorado Springs Education University of Wisconsin at Platteville, Chemistry, B.S.,
MAQ Software is a digital marketing and technology company that helps customers reach markets effectively on time and on budget.
Open Position: Project Manager/ Program Lead MAQ Software is a digital marketing and technology company that helps customers reach markets effectively on time and on budget. As a Microsoft Preferred Vendor
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series
TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE ebook Series 2 Headlines have been written, fines have been issued and companies around the world have been challenged to find the resources, time and capital
Job description. Job title: Server Infrastructure Analyst 1
Job description Job title: Server Infrastructure Analyst 1 Department: Resources Service: IT Service Grade: G Post reference number: 1 Job purpose To provide specialist enterprise level design, planning,
Continuous Network Monitoring
Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment
NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice
NERC Cyber Security Compliance Consulting Services HCL Governance, Risk & Compliance Practice Overview The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
Graduate Business Programs
Graduate Business Programs S D S U CO L L E G E O F B U S I N E S S A D M I N I S T R AT I O N CONRAD PREBYS AZTEC STUDENT UNION ABOUT THE COLLEGE OF BUSINESS ADMINISTRATION AT SDSU Dennis Cradit, Dean
SIEM 2.0: AN IANS INTERACTIVE PHONE CONFERENCE INTEGRATING FIVE KEY REQUIREMENTS MISSING IN 1ST GEN SOLUTIONS SUMMARY OF FINDINGS
SIEM 2.0: INTEGRATING FIVE KEY REQUIREMENTS MISSING IN 1ST GEN SOLUTIONS AN IANS INTERACTIVE PHONE CONFERENCE SUMMARY OF FINDINGS OCTOBER 2009 Chris Peterson, LogRhythm CTO, Founder Chris brings a unique
Kiefer Consulting, Inc. 2012 Job Opportunities
Kiefer Consulting, Inc. 2012 Job Opportunities 1 Company Background Kiefer Consulting is a distinguished and innovative Microsoft Gold Partner, who works closely with their local government and commercial
We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review
We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review The security threat landscape is constantly changing and it is important to periodically review a business
Associate s Degree Program
Information Technology-Computer Network Systems Associate s Degree Program The ITT Technical Institutes offer a variety of career-focused curricula. This sheet helps describe the Associate s Degree program
Required Software Product List
Symantec ($3.2 million, 35% weight) AdVantage AdvisorMail AntiVirus (Endpoint Protection) AntiVirus Enterprise Edition App Center Application HA Arellia Application Control Solution Arellia Endpoint Security
Professional Services Overview
Professional Services Overview INFORMATION SECURITY ASSESSMENT AND ADVISORY NETWORK APPLICATION MOBILE CLOUD IOT Praetorian Company Overview HISTORY Founded in 2010 Headquartered in Austin, TX Self-funded
Online Master of Business Administration (MBA)
Online Master of Business Administration (MBA) Dear Prospective Student, Thank you for contacting the University of Maryland s Robert H. Smith School of Business. By requesting this brochure you ve taken
CONTENT. King Hussein Faculty of Computing Sciences
CONTENT About Mission, Vision & Goals Computing Sciences Faculty Computing Sciences Resources Bachelors Degree Programs B. Sc. Program in Computer Science B. Sc. Program in Software Engineering B. Sc.
08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview
Data protection and compliance In the cloud and in your data center 1 November 2013 Agenda 1 Introduction 2 Data protection overview 3 Understanding the cloud 4 Where do I start? 5 Wrap-up Page 2 Data
Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology
Testimony of Dan Nutkis CEO of HITRUST Alliance Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Hearing entitled: Cybersecurity: The Evolving Nature of Cyber
Resume and cover letter writing are part of STEP #5: Pre-Employment/Job-Hunting of the Career Development process.
Writing Resumes and Cover Letters Resume and cover letter writing are part of STEP #5: Pre-Employment/Job-Hunting of the Career Development process. A. Resume A brief written summary of one's professional
As an added value, you ll be able to take advantage of our reasonable NYS tuition rates.
1. SUNY Empire State College s RN to BSN program prides itself on seeing our students as individuals. We recognize that everyone s needs and goals are different, and we respect those differences. ------------------------------
IBM Rational AppScan: Application security and risk management
IBM Software Security November 2011 IBM Rational AppScan: Application security and risk management Identify, prioritize, track and remediate critical security vulnerabilities and compliance demands 2 IBM
The Department of the Army Public Affairs Intern Program
The Department of the Army Public Affairs Intern Program The Department of the Army Internship Program offers the Office of the Chief of Public Affairs an effective means of attracting future members of
Computer Information Technology
Computer Information Technology Business and Social Sciences Division, Room A44, (847) 543-04 The Computer Information Technology degree programs provide five specialty options with a common core of general
Online Master of Business Administration (MBA)
Online Master of Business Administration (MBA) Dear Prospective Student, Thank you for contacting the University of Maryland s Robert H. Smith School of Business. By requesting this brochure you ve taken
Required Software Product List
Symantec ($3.2 million, 35% weight) AdVantage AdvisorMail AntiVirus (Endpoint Protection) AntiVirus Enterprise Edition App Center Application HA Asset Management Suite Backup Exec Certificate Intelligence
The Emergence of Security Business Intelligence: Risk
The Emergence of Security Business Intelligence: Risk Management through Deep Analytics & Automation Mike Curtis Vice President of Technology Strategy December, 2011 Introduction As an industry we are
Jibran Ilyas DIRECTOR
PROFESSIONAL EXPERIENCE STROZ FRIEDBERG, LLC Director, Incident Response, July 2015 to Present Assistant Director, Incident Response, August 2014 to July 2015 Assist in development of incident response
Systems Programmer/Analyst (12203) (31002632)
GENERAL DESCRIPTION OF WORK Positions in this banded class perform specialized work in supporting information technology equipment and systems for the business, research, and instructional functions of
Closure - participate in post-project debrief sessions and provide knowledge transfer as appropriate.
CDW MAJORS: TITLE: Associate Engineer (Cisco UC, RS Wireless) JOB DESCRIPTION: We have a passion for solving problems. We believe that technology is ever changing and companies need CDW to help them navigate
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT
MySQL Web Development PHP. System Administration XML APIs. Large Scale Systems Implementation. Amazon Web Services (AWS) Shell Scripting
Robert Taylor Sr Site Reliability Engineer at Adobe Currently Senior Site Reliability Engineer building on prior experience as a Solution Architect, Sr Cloud Engineer, Technical Account Manager of Strategic
Executive Management of Information Security
WHITE PAPER Executive Management of Information Security _experience the commitment Entire contents 2004, 2010 by CGI Group Inc. All rights reserved. Reproduction of this publication in any form without
