This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

User:GrayDove

From OWASP
Jump to: navigation, search

08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST) Professional Profile 08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST) Senior Business Leader that is adept at building and leading high

      performance technical teams.  Leverages the teamís tribal 
      knowledge to protect customer information and the organizations
      intellectual property.  Key differentiators include enterprise
      and organizational experience in strategic growth through deep
      subject matter expertise in security, database, infrastructure,
      system and network technologies.  Professional vertical 
      experience encompasses financial services, health industry, 
      information technology services, manufacturing and retail.
    * Over 30 years in the information technology arena covering
      modeling, development, database design, high availability 
      architecture, secure database technologies, advanced security
      implementations, obfuscation, and encryption technologies.
    * Authored architecture security models that drove awareness, 
      decreased exposure, and strengthened organizations through
      residual risk management, realistic self-assessments, including
      leveraging and engaging general employee population.
    * Comfortable in matrix organizations leading/negotiating all 
      phases of project efforts, including requirements definition,
      design, architecture, testing, and support.
    * Effectively wrote policy and procedures, project documentation
      and milestones, and technical/design specifications.
    * Successful in responding to and closing operational internal
      audit findings within corrective action periods. 

08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST) Core Competencies 08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)

    * Security: Public and Private Cloud, Infrastructure, Network,
      Vendor Assessment (POC Management), Technical Security
      Requirements, Security Assessments, Threat Matrix and Kill 
      Chain Development
    * Infrastructure: Public and Private Cloud, Virtualization, 
      Server, Integration, Performance Optimization
    * Database: Security, Design, Modeling, Ultra-High Availability,
      Fine Grained Access Controls Data Security
    * Management: Strategic Planning and Management, Team Development
      and Retention, Matrix Management