Industry Expertise Options:
[{"label":"Adobe","value":"Adobe"},{"label":"Amazon Web Services (AWS)","value":"Amazon Web Services (AWS)"},{"label":"Apple","value":"Apple"},{"label":"Archibus","value":"Archibus"},{"label":"Arista Networks","value":"Arista Networks"},{"label":"Atlassian","value":"Atlassian"},{"label":"BMC","value":"BMC"},{"label":"Box","value":"Box"},{"label":"Broadcom","value":"Broadcom"},{"label":"CA","value":"CA"},{"label":"Check Point Software","value":"Check Point Software"},{"label":"Cisco","value":"Cisco"},{"label":"Citrix Systems","value":"Citrix Systems"},{"label":"Dell","value":"Dell"},{"label":"Dell Technologies","value":"Dell Technologies"},{"label":"DocuSign","value":"DocuSign"},{"label":"Dorado","value":"Dorado"},{"label":"Elastic NV","value":"Elastic NV"},{"label":"EMC","value":"EMC"},{"label":"Epic Systems","value":"Epic Systems"},{"label":"F5 Networks","value":"F5 Networks"},{"label":"ForgeRock","value":"ForgeRock"},{"label":"Fortinet","value":"Fortinet"},{"label":"Google","value":"Google"},{"label":"HP","value":"HP"},{"label":"HP (Hewlett-Packard)","value":"HP (Hewlett-Packard)"},{"label":"HubSpot","value":"HubSpot"},{"label":"IBM","value":"IBM"},{"label":"Informatica","value":"Informatica"},{"label":"InfoVista","value":"InfoVista"},{"label":"Intuit","value":"Intuit"},{"label":"Juniper Networks","value":"Juniper Networks"},{"label":"Micro Focus","value":"Micro Focus"},{"label":"Microsoft","value":"Microsoft"},{"label":"MongoDB","value":"MongoDB"},{"label":"MuleSoft","value":"MuleSoft"},{"label":"NetApp","value":"NetApp"},{"label":"New Relic","value":"New Relic"},{"label":"OpenSource","value":"OpenSource"},{"label":"OpenText","value":"OpenText"},{"label":"Oracle","value":"Oracle"},{"label":"Others","value":"Others"},{"label":"Palo Alto Networks","value":"Palo Alto Networks"},{"label":"Planon","value":"Planon"},{"label":"Progress Software","value":"Progress Software"},{"label":"Qualys","value":"Qualys"},{"label":"Red Hat","value":"Red Hat"},{"label":"Salesforce","value":"Salesforce"},{"label":"SAP","value":"SAP"},{"label":"SAS Institute","value":"SAS Institute"},{"label":"Serena","value":"Serena"},{"label":"ServiceNow","value":"ServiceNow"},{"label":"Shopify","value":"Shopify"},{"label":"Snowflake","value":"Snowflake"},{"label":"SolarWinds","value":"SolarWinds"},{"label":"Splunk","value":"Splunk"},{"label":"Square (Block, Inc.)","value":"Square (Block, Inc.)"},{"label":"Symantec","value":"Symantec"},{"label":"Tableau Software","value":"Tableau Software"},{"label":"Teradata","value":"Teradata"},{"label":"Trend Micro","value":"Trend Micro"},{"label":"VMware","value":"VMware"},{"label":"Workday","value":"Workday"},{"label":"Zoom Video Communications","value":"Zoom Video Communications"},{"label":"Zuora","value":"Zuora"}]
Description:
Seasoned Information Security Executive. Resourceful, organized and results driven information security/information technology expert with excellent project leadership, problem solving, supervision, time management and interpersonal skills. Proven ability to work globally across disparate functional groups to build consensus and enable new lines of business using creative technologies and solutions. Rich expertise in successful execution of Information Security programs in multi-national, multi-cultural organizations. Strong background in electronic engineering. Innovative and diligent team member who is committed, motivating, optimistic and reliable. Responsible, community-service minded individual who devotes personal time in the service of worthwhile efforts and conducts all endeavors with integrity and a dedication to the highest standards of personal performance. Support information security awareness through metrics, creative communications and cross-organizational education programs. Manage and bring together all security determinations crosswise enterprise business units, together with internal and remote clients. Lineup with Legal and Compliance requirements with company’s partners and customers. Recognize possible weakest points related to the security of the electronic data at all levels of the operation, put on place security measures to minimize risks, and increase the consistency, confidentiality, availability, and integrity of the electronic data. Continuously managing risks and improving cyber security posture in complex enterprises is what I do best.