This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
User:GrayDove
08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST) Professional Profile 08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST) Senior Business Leader that is adept at building and leading high
performance technical teams. Leverages the teamís tribal
knowledge to protect customer information and the organizations
intellectual property. Key differentiators include enterprise
and organizational experience in strategic growth through deep
subject matter expertise in security, database, infrastructure,
system and network technologies. Professional vertical
experience encompasses financial services, health industry,
information technology services, manufacturing and retail.
* Over 30 years in the information technology arena covering
modeling, development, database design, high availability
architecture, secure database technologies, advanced security
implementations, obfuscation, and encryption technologies.
* Authored architecture security models that drove awareness,
decreased exposure, and strengthened organizations through
residual risk management, realistic self-assessments, including
leveraging and engaging general employee population.
* Comfortable in matrix organizations leading/negotiating all
phases of project efforts, including requirements definition,
design, architecture, testing, and support.
* Effectively wrote policy and procedures, project documentation
and milestones, and technical/design specifications.
* Successful in responding to and closing operational internal
audit findings within corrective action periods.
08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST) Core Competencies 08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)08:38, 11 February 2016 (CST)
* Security: Public and Private Cloud, Infrastructure, Network,
Vendor Assessment (POC Management), Technical Security
Requirements, Security Assessments, Threat Matrix and Kill
Chain Development
* Infrastructure: Public and Private Cloud, Virtualization,
Server, Integration, Performance Optimization
* Database: Security, Design, Modeling, Ultra-High Availability,
Fine Grained Access Controls Data Security
* Management: Strategic Planning and Management, Team Development
and Retention, Matrix Management