Martin Leroux CD (bilingual) Secret Clearance
mleroux007@gmail.com
RESUME
CAREER OBJECTIVES
As a dependable and skilled Network/Security manager/Supervisory, with more
than 18 years of experience, and a consistent record of excellence in IT, I wish to
express my strong interest in seeking a position within your organization
CAREER BACKGROUND
Responsible for securing corporate and Government wired and wireless
networks, offsite storage, acceptable use policies, proper usage of hardware,
protecting the network from hackers and maintaining corporate network security.
This is a position that requires continual vigilance and keeping informed of new
security vulnerabilities as they are discovered.
PROFESSIONAL EXPERIENCE
Shared Services Canada FIPC
2014 Feb– Present 11 Laurier St
Gatineau, Que
Canada,
Shared Services Canada
Senior IT Security Specialist
Provides specialized advice and guidance to management, program specialists to
facilitate the delivery of IT security and Secure Electronic Service Delivery (SESD)
infrastructure, processes and tools; advise on IT Security policies, procedures and
standards; provide advice and promotes communication by interpreting and
disseminating departmental, central agency policies, standard and guidelines. Lead the
development of security directives.
Provides specialized advice and guidance in the investigation of security
incidents/violations and implementation of corrective actions; Advises on the analysis,
selection and delivery of SESD initiatives.
Occasionally leads multi-disciplinary SESD project teams in conducting threat/risk
assessments of IT and voice/data systems; in proposing, planning, designing and testing
procedures and mechanisms to address security problems and issues.
Consults with suppliers and stakeholders to investigate new IT technology trends and
lead studies on best practices and current trends in IT security.
Conducts researches and analysis in the resolution of complex IT security
issues/problems; acts as a subject matter specialist on the development of IT risk and
security, and SESD processes and tools.
Negotiates and participates in discussion with managers and administrative/technical staff
and stakeholders to persuade or obtain agreement on the requirements for services or the
resolution of technical issues.
Maintain knowledge of trends and development in IT security threats, vulnerabilities,
security standards, policies and directions.
- Working with IT Security controls, technology (ie Firewall, VPN,
IDS/IPS/HIDS/HIPS, Content Filtering, DDOS,).
- Working in a Security Incident Response team.
- Supporting LAN's/WANS and zoning protocols.
- Computer Forensics.
- Working with Canadian Government IT Security related standards and policies
(e.g. Government Security Policy, Management of Information Technology
Security (MITS) Standards, etc.).
- Conducting technical research and analysis of cyber threats and IT security
incidents.
- Implementing, supporting or testing IT security solutions within multi-zoned data
centre environments.
- Contributing to the development and management of an IT security program,
including: security awareness, policies, standards, procedures, processes,
monitoring, risk management, and activities surrounding the Certification and
Accreditation (C&A) of IT infrastructure.
- Working with Malware/Anti-virus tools and processes performing installation,
configuration, and/or support.
- working on IT security projects.
- Mentoring a team of IT specialists or personnel.
- Planning, architecting, migrating and/or providing IT Security services.
- Developing and/or leading the development of solutions for Identity, Credential
and Access Management.
- Development of IT Security strategic plans.
- Performing Security Assessment & Authorization for IT and complex IT Security
system/services.
- with data security and/or Data Lost Prevention services and technology.
- Knowledge of Government of Canada Security Policy suite.
- Knowledge of the mandate of Shared services Canada (SSC) as it pertains to IT
Security.
2013 Dec – 2014 Feb 11 Laurier St
Gatineau, Que
Canada,
Shared Services Canada
Provides specialized advice and guidance to management, program specialists to
facilitate the delivery of IT security and Secure Electronic Service Delivery (SESD)
infrastructure, processes and tools; advise on IT Security policies, procedures and
standards; provide advice and promotes communication by interpreting and
disseminating departmental, central agency policies, standard and guidelines. Lead the
development of security directives.
Provides specialized advice and guidance in the investigation of security
incidents/violations and implementation of corrective actions; Advises on the analysis,
selection and delivery of SESD initiatives.
Occasionally leads multi-disciplinary SESD project teams in conducting threat/risk
assessments of IT and voice/data systems; in proposing, planning, designing and testing
procedures and mechanisms to address security problems and issues.
Consults with suppliers and stakeholders to investigate new IT technology trends and
lead studies on best practices and current trends in IT security.
Conducts researches and analysis in the resolution of complex IT security
issues/problems; acts as a subject matter specialist on the development of IT risk and
security, and SESD processes and tools.
Negotiates and participates in discussion with managers and administrative/technical staff
and stakeholders to persuade or obtain agreement on the requirements for services or the
resolution of technical issues.
Maintain knowledge of trends and development in IT security threats, vulnerabilities,
security standards, policies and directions.
- Working with IT Security controls, technology (ie Firewall, VPN,
IDS/IPS/HIDS/HIPS, Content Filtering, DDOS,).
- Working in a Security Incident Response team.
- Supporting LAN's/WANS and zoning protocols.
- Computer Forensics.
- Working with Canadian Government IT Security related standards and policies
(e.g. Government Security Policy, Management of Information Technology
Security (MITS) Standards, etc.).
- Conducting technical research and analysis of cyber threats and IT security
incidents.
- Implementing, supporting or testing IT security solutions within multi-zoned data
centre environments.
- Contributing to the development and management of an IT security program,
including: security awareness, policies, standards, procedures, processes,
monitoring, risk management, and activities surrounding the Certification and
Accreditation (C&A) of IT infrastructure.
- Working with Malware/Anti-virus tools and processes performing installation,
configuration, and/or support.
- working on IT security projects.
- Mentoring a team of IT specialists or personnel.
- Planning, architecting, migrating and/or providing IT Security services.
- Developing and/or leading the development of solutions for Identity, Credential
and Access Management.
- Development of IT Security strategic plans.
- Performing Security Assessment & Authorization for IT and complex IT Security
system/services.
- with data security and/or Data Lost Prevention services and technology.
- Knowledge of Government of Canada Security Policy suite.
- Knowledge of the mandate of Shared services Canada (SSC) as it pertains to IT
Security.
2011 – 2014 1000 Innovation Drive
Ottawa, Ontario
Canada K2K 3E7
Entrust, Inc. 1
Senior It Security Analyst, Incident Handler, Forensics analyst, VA, AV, Spam,
Phishing, Tech Watch, Content Filtering.
Considered critical infrastructure for the US Government. Responsible for developing,
deploying, managing, and operating the Information Security Management System
(ISMS), the security related processes and technologies to ensure the safety of
organization information assets. Advisor to the organization's business units, providing
recommendations/remediation strategies to enhance overall security for the organization.
Responsibilities included:
− Developing the global Entrust Cyber Security Incident Response Team
− Performing ongoing security control assessments in accordance with the organizational
continuous monitoring strategy
− Performing security investigations, intrusion verifications, analyzing cyber data and
producing intelligence reports and investigative and operational leads, and responding to
cyber security incidents
− Reporting the security state of the information system to appropriate stakeholders
including status regarding the performance of security scans, analysis of alerts, tuning of
signatures and report development, review and analysis
− Performing security incident response activities, recognizes potential, successful and
unsuccessful intrusion attempts and compromises through reviews and analyses of
relevant event detail and summary information
− Ensuring the integrity and protection of networks, systems, and applications by
technical enforcement of organizational security policies and through monitoring of
vulnerability scanning devices
− Performing periodic and on-demand system audits, penetration testing and vulnerability
assessments
− Researching, evaluating, and recommending the implementation of changes to
information security technologies.
2009 – 2011
Industry Canada
IT Security Officer, Incident Handler, Forensics analyst, VA, AV, Spam, Phishing
and Tech watch.
Responsible for providing security services for Industry Canada. This includes,
but is not limited to, Incident handling, Forensics, Vulnerability assessment,
threat risk analysis, architecture & design, security policies, recommendations &
reports, promoting a security philosophy of risk mitigation through proactive
security awareness training, cost-effective security countermeasures, host-level
security, and security planning/integration; ensuring that all systems are
safeguarded against all forms of malicious intrusions; assisting other groups
within the firm in developing secure systems.
- Incident response and incident management
- Review detection and analysis activities through review of large volumes of
summary data via various tools and software; SIEM, Data Base, Scripts.
- Provide the Client Technical Authority or his designated representative
technical and operational support in the analysis of incidents, vulnerabilities and
malicious code;
- Issue alerts and advisories according to the internal warning procedure.
- Syslogs analysis
- participate in regular and event-based teleconferences with national
constituents;
- Review Intrusion Detections System (IDS) logs daily and investigate alarms;
- Call Management System (HEAT & Infoweb);
- Monitor and report on Internet acceptable usage;
- Member of the Change Advisory Board (CAB);
- Knowledge expert on IT trends for GOC and private sector;
- Anti Virus, Spam, Phishing analysis;
Mar 2007 to 2008
Manager Security of Operations NUVO
Reporting to the Vice President of Operations; responsible for providing security
services for customers and company, as well promoting security services to
current and potential customers through networking and partnering with sales.
This includes, but is not limited to, vulnerability assessment, threat risk analysis,
architecture & design, security policies, recommendations & reports, promoting a
security philosophy of risk mitigation through proactive security awareness
training, cost-effective security countermeasures, host-level security, and security
planning/integration; ensuring that all systems are safeguarded against all forms
of malicious intrusions; assisting other groups within the firm in developing
secure systems.
• IP Network architecture and technology, protocols, routing, Wireless
Networking;
• Monitoring Software:
• Coordinate Firewall configuration and rule maintenance;
• NIDS/NIPS, HIDS/HIPS ISS RealSecure, Snort, Enterasys, Juniper, Mcafee
etc;
• VPN Communication Protocols and Remote access facilities; VPN, RAS, thin-
client;
• Syslogs analysis from a number of tools; SIEM, scripts, command line;
• Call Management System (Remedy);
• Responsible to meet SLA’s and HA
Anti Virus, Spam, Phishing analysis;
Jul 2005 to Dec 2005
Cyber Duty Officer PSEPC Ottawa CANADA
• Prepare both technical and cyber risk briefs as required;
• Chair/participate in regular and event-based teleconferences with national
constituents;
• Monitor and analyze information and data on cyber threats. This involves
research and investigation of new or up coming threats, vulnerabilities or
malicious code;
• Review daily information from the international community;
• Review Intrusion Detections System (IDS) logs daily and investigate alarms;
• Support detection and analysis activities through review of large volumes of
summary data;
• Provide the Client Technical Authority or his designated representative
technical and operational support in the analysis of incidents, vulnerabilities and
malicious code;
• Intake incident reports from Government of Canada, provincial and territorial
governments, and private sector and report to management on the impact and
risk;
• Coordinate a response to cyber incidents of a national interest and function as
the operational lead within the National Emergency Response System; and
• Issue alerts and advisories according to the internal warning procedure.
Nov 2004 to Dec 2005
Network Security Consultant
As an independent consultant, I provided a vast range of technical advice and
expertise to Public Safety and Emergency Preparedness Canada and IPSS. This
work involved the preparation of technical and cyber risk briefs and monitoring
and analyzing information and data on cyber threats. I was also responsible for
network security analysis, vulnerability assessments and penetration testing. I
directed the research and investigation of new and upcoming threats,
vulnerabilities and malicious code. I also participated in the IPS study for CSE /
Government of Canada where I compiled information, vendor interactions,
researched, reviewed and corrected discrepancies.
Jan 2002 to Jan 2004
CIRT Team Leader (private sector) CGI Information Systems Management
Consultants Inc Ottawa CANADA
CGI Information Systems Management Consultants Inc. As the senior technical
advisor / team leader / analyst, reporting to the Director of Corporate IT, I
monitored network security, researched and investigated threats, vulnerabilities
and malicious code and conducted vulnerability assessments IAW SLAs. I also
directed various security projects in the initial design and implementation of
intrusion and recommended options for strengthening the client's relationship
with operations. I provided guidance to the team lead and analysts, and provided
leadership at weekly corporate conference calls pertaining to projects incident
handling and future security projects.
Jan 2000 Jan 2002
CIRT Computer Response Team Supervisor Department of National Defence
Ottawa CANADA Department of National Defence, Canada Computer Incident
Response Team Supervisor
• CIRT Supervisor;
• Involved with network security monitoring, research and investigations of
threats, vulnerabilities and malicious code;
• Researched and analyzed open source information for emerging threats,
vulnerabilities and tools. Responsible for supervising and training the new
network security analysts to be able to operationally met the goals set by the
Team Manager to provide security and protection services to the Department of
National Defence information systems against intrusions/attacks;
• Was responsible for providing operational support and guidance in incident
investigation, analysis and response and follow up as well as quality control of
reports prior to their release to large audience in the department. Ensured that all
incidents were logged, vulnerabilities were identified, incident database was
updated as and when required, and that incidents were followed up;
• Current knowledge of Intrusion Detection Systems (IDS), anti virus, firewalls,
routers and security policies;
• Liaison with various government and allied agencies to coordinate response to
threats;
• Compiled virus statistics, prepared and wrote reports on new malicious code
that was detected in the wild with a level of impact regarding possible infection
within DND;
• Supported the day-to-day administration of the DND CIRT networking assets;
• Utilized PGP and Entrust PKI encrypted email for secure intra and inter-
department communications; and
• Pre-Y2K threat analysis for the department on malicious code and possible
cyber attacks daily.
1998 - 2000 Department of National Defence
Network Vulnerability Analysis Team Leader (NVAT)
• Used and managed various UNIX (Solaris 2.X) and Linux (Slackware)
workstations on a daily basis to conduct system audits using UNIX based
security scanners;
• Supported and help build a mixed environment test network to support NVAT
operating system vulnerability testing;
• Analyst and a Team Supervisor responsible for auditing DND’s network with
CyberCop (formally Ballista) as well as using non- commercial tools to ensure
system integrity;
• Evaluated the integrity of the various networking Internet protocols using tools
such as SAINT (formally SATAN), Cheops, and Nmap as well as other tools;
• Responsible for the evaluation of new scanners (commercial and freeware) to
be used by the NVAT Team;
• Regularly analyzed the data obtained from vulnerability scanners to detect
signs of systems vulnerabilities. Used tools such as TCPDump or snoop to
gather the necessary information to be used later in post analysis; and
• Responsible for supervising and training new analysts to operationally met the
goals set by the Team Manager to provide security and protection services to the
Department of National Defence information systems against intrusions/attacks.
Education and Credentials
2009 FTK Tool Kit Forensic training, Ottawa, On
2007 Net Forensics training
2003 Enterasys Specialist Dragon Intrusion Detection System course
2002 Forensic, Ottawa Police College
2001 Foundstone Computer Forensic Course, Washington, D.C.
2000 Interconnecting Cisco Network Devices, Ottawa
1999 Information System Security Fundamentals, Algonquin College,
Ottawa
1998 Solaris Sys Admin II Learnix, Ottawa
1996 Linked Ops-Intel Centers Europe Workstation User, Sarajevo,
Bosnia
1993 Trade qualified 6A, Canadian Forces School of Communications
and Electronics, Kingston
1988 Russian Language Course, Canadian Forces Language School,
Ottawa
1981 Communicator Research Qualifications, Kingston
Miscellaneous References Available upon request
Martin_Leroux_2014

More Related Content

PDF
Business cases internet 30 use cases
PDF
Irfan Ur Rehman
PPTX
Cybersecurity Priorities and Roadmap: Recommendations to DHS
PDF
Cybersecurity Roadmap Development for Executives
PDF
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
PDF
Chapter 12 iso 27001 awareness
PDF
Ise viii-information and network security [10 is835]-solution
Business cases internet 30 use cases
Irfan Ur Rehman
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Roadmap Development for Executives
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Chapter 12 iso 27001 awareness
Ise viii-information and network security [10 is835]-solution

What's hot (20)

PDF
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
PDF
Security Audits & Cyber
PPT
Lesson 3- Effectiveness of IDPS
PDF
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
PPTX
Cyber incident response or how to avoid long hours of testimony
PDF
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
PDF
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
PPT
Lesson 1- Intrusion Detection
PDF
Darryl T. Smith Resume (1)
PPT
Lesson 1- Risk Managment
PPT
Ia 124 1621324143 ia_124_lecture_01
PDF
Technology Issues and Cybersecurity Strategies
DOCX
Final Exam Case Study (3)
PDF
Specialist Security Engineer
PPTX
Build an Information Security Strategy
PDF
Specialist security enigneer
PPTX
Cybersecurity Frameworks and You: The Perfect Match
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
Security Audits & Cyber
Lesson 3- Effectiveness of IDPS
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
Cyber incident response or how to avoid long hours of testimony
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
Lesson 1- Intrusion Detection
Darryl T. Smith Resume (1)
Lesson 1- Risk Managment
Ia 124 1621324143 ia_124_lecture_01
Technology Issues and Cybersecurity Strategies
Final Exam Case Study (3)
Specialist Security Engineer
Build an Information Security Strategy
Specialist security enigneer
Cybersecurity Frameworks and You: The Perfect Match
Ad

Viewers also liked (12)

PDF
Voting for reform
PPTX
品牌形象建立以及網路行銷
PPTX
Slideshare
PPTX
REDES SOCIALES
PDF
blog dalam pendidikan
PPTX
Aldous huxley
PDF
Privé Travel Concierge
PPS
eagle rebirth
DOCX
Energy management.9901366442
PPTX
Ventas de telemercadeo
PPTX
Contoh RAPBM
DOCX
resume 2014 copy
Voting for reform
品牌形象建立以及網路行銷
Slideshare
REDES SOCIALES
blog dalam pendidikan
Aldous huxley
Privé Travel Concierge
eagle rebirth
Energy management.9901366442
Ventas de telemercadeo
Contoh RAPBM
resume 2014 copy
Ad

Similar to Martin_Leroux_2014 (20)

PDF
Mark_Koehler_Resume_JUN2015_v1.1
DOCX
Dhishant -Latest Resume
DOCX
Dl Cowan Resume July 2012
DOCX
Lancy-Curriculum Vitae
PDF
Highly Adaptive Cybersecurity Services (HACS) -- Cyber Hunt
DOC
Resume_STrofimov
PDF
Erwin (Chris) Carrow resume Brief 10-23-2015
DOC
Brenden Brown Resume
DOCX
Harris_Resume_2016_ITS_gmail
DOCX
Resume -Resume -continous monitoring
DOCX
Resume -Resume -continous monitoring
PDF
Resume-DPITVlinkedin
PDF
Super CISO 2020: How to Keep Your Job
DOCX
Steve alameda burlingame ca
DOCX
Albert G Info systems resume
DOC
Knowedge Skills Ability
DOCX
Jenkins_ Carlasha 2016 v1
DOC
Pramod Yadav_Security Operations Center Manager
Mark_Koehler_Resume_JUN2015_v1.1
Dhishant -Latest Resume
Dl Cowan Resume July 2012
Lancy-Curriculum Vitae
Highly Adaptive Cybersecurity Services (HACS) -- Cyber Hunt
Resume_STrofimov
Erwin (Chris) Carrow resume Brief 10-23-2015
Brenden Brown Resume
Harris_Resume_2016_ITS_gmail
Resume -Resume -continous monitoring
Resume -Resume -continous monitoring
Resume-DPITVlinkedin
Super CISO 2020: How to Keep Your Job
Steve alameda burlingame ca
Albert G Info systems resume
Knowedge Skills Ability
Jenkins_ Carlasha 2016 v1
Pramod Yadav_Security Operations Center Manager

Martin_Leroux_2014

  • 1. Martin Leroux CD (bilingual) Secret Clearance mleroux007@gmail.com RESUME CAREER OBJECTIVES As a dependable and skilled Network/Security manager/Supervisory, with more than 18 years of experience, and a consistent record of excellence in IT, I wish to express my strong interest in seeking a position within your organization CAREER BACKGROUND Responsible for securing corporate and Government wired and wireless networks, offsite storage, acceptable use policies, proper usage of hardware, protecting the network from hackers and maintaining corporate network security. This is a position that requires continual vigilance and keeping informed of new security vulnerabilities as they are discovered. PROFESSIONAL EXPERIENCE Shared Services Canada FIPC 2014 Feb– Present 11 Laurier St Gatineau, Que Canada, Shared Services Canada Senior IT Security Specialist Provides specialized advice and guidance to management, program specialists to facilitate the delivery of IT security and Secure Electronic Service Delivery (SESD) infrastructure, processes and tools; advise on IT Security policies, procedures and standards; provide advice and promotes communication by interpreting and disseminating departmental, central agency policies, standard and guidelines. Lead the development of security directives. Provides specialized advice and guidance in the investigation of security incidents/violations and implementation of corrective actions; Advises on the analysis, selection and delivery of SESD initiatives. Occasionally leads multi-disciplinary SESD project teams in conducting threat/risk assessments of IT and voice/data systems; in proposing, planning, designing and testing procedures and mechanisms to address security problems and issues.
  • 2. Consults with suppliers and stakeholders to investigate new IT technology trends and lead studies on best practices and current trends in IT security. Conducts researches and analysis in the resolution of complex IT security issues/problems; acts as a subject matter specialist on the development of IT risk and security, and SESD processes and tools. Negotiates and participates in discussion with managers and administrative/technical staff and stakeholders to persuade or obtain agreement on the requirements for services or the resolution of technical issues. Maintain knowledge of trends and development in IT security threats, vulnerabilities, security standards, policies and directions. - Working with IT Security controls, technology (ie Firewall, VPN, IDS/IPS/HIDS/HIPS, Content Filtering, DDOS,). - Working in a Security Incident Response team. - Supporting LAN's/WANS and zoning protocols. - Computer Forensics. - Working with Canadian Government IT Security related standards and policies (e.g. Government Security Policy, Management of Information Technology Security (MITS) Standards, etc.). - Conducting technical research and analysis of cyber threats and IT security incidents. - Implementing, supporting or testing IT security solutions within multi-zoned data centre environments. - Contributing to the development and management of an IT security program, including: security awareness, policies, standards, procedures, processes, monitoring, risk management, and activities surrounding the Certification and Accreditation (C&A) of IT infrastructure. - Working with Malware/Anti-virus tools and processes performing installation, configuration, and/or support. - working on IT security projects. - Mentoring a team of IT specialists or personnel. - Planning, architecting, migrating and/or providing IT Security services.
  • 3. - Developing and/or leading the development of solutions for Identity, Credential and Access Management. - Development of IT Security strategic plans. - Performing Security Assessment & Authorization for IT and complex IT Security system/services. - with data security and/or Data Lost Prevention services and technology. - Knowledge of Government of Canada Security Policy suite. - Knowledge of the mandate of Shared services Canada (SSC) as it pertains to IT Security. 2013 Dec – 2014 Feb 11 Laurier St Gatineau, Que Canada, Shared Services Canada Provides specialized advice and guidance to management, program specialists to facilitate the delivery of IT security and Secure Electronic Service Delivery (SESD) infrastructure, processes and tools; advise on IT Security policies, procedures and standards; provide advice and promotes communication by interpreting and disseminating departmental, central agency policies, standard and guidelines. Lead the development of security directives. Provides specialized advice and guidance in the investigation of security incidents/violations and implementation of corrective actions; Advises on the analysis, selection and delivery of SESD initiatives. Occasionally leads multi-disciplinary SESD project teams in conducting threat/risk assessments of IT and voice/data systems; in proposing, planning, designing and testing procedures and mechanisms to address security problems and issues. Consults with suppliers and stakeholders to investigate new IT technology trends and lead studies on best practices and current trends in IT security. Conducts researches and analysis in the resolution of complex IT security issues/problems; acts as a subject matter specialist on the development of IT risk and security, and SESD processes and tools. Negotiates and participates in discussion with managers and administrative/technical staff and stakeholders to persuade or obtain agreement on the requirements for services or the resolution of technical issues.
  • 4. Maintain knowledge of trends and development in IT security threats, vulnerabilities, security standards, policies and directions. - Working with IT Security controls, technology (ie Firewall, VPN, IDS/IPS/HIDS/HIPS, Content Filtering, DDOS,). - Working in a Security Incident Response team. - Supporting LAN's/WANS and zoning protocols. - Computer Forensics. - Working with Canadian Government IT Security related standards and policies (e.g. Government Security Policy, Management of Information Technology Security (MITS) Standards, etc.). - Conducting technical research and analysis of cyber threats and IT security incidents. - Implementing, supporting or testing IT security solutions within multi-zoned data centre environments. - Contributing to the development and management of an IT security program, including: security awareness, policies, standards, procedures, processes, monitoring, risk management, and activities surrounding the Certification and Accreditation (C&A) of IT infrastructure. - Working with Malware/Anti-virus tools and processes performing installation, configuration, and/or support. - working on IT security projects. - Mentoring a team of IT specialists or personnel. - Planning, architecting, migrating and/or providing IT Security services. - Developing and/or leading the development of solutions for Identity, Credential and Access Management. - Development of IT Security strategic plans. - Performing Security Assessment & Authorization for IT and complex IT Security system/services. - with data security and/or Data Lost Prevention services and technology. - Knowledge of Government of Canada Security Policy suite.
  • 5. - Knowledge of the mandate of Shared services Canada (SSC) as it pertains to IT Security. 2011 – 2014 1000 Innovation Drive Ottawa, Ontario Canada K2K 3E7 Entrust, Inc. 1 Senior It Security Analyst, Incident Handler, Forensics analyst, VA, AV, Spam, Phishing, Tech Watch, Content Filtering. Considered critical infrastructure for the US Government. Responsible for developing, deploying, managing, and operating the Information Security Management System (ISMS), the security related processes and technologies to ensure the safety of organization information assets. Advisor to the organization's business units, providing recommendations/remediation strategies to enhance overall security for the organization. Responsibilities included: − Developing the global Entrust Cyber Security Incident Response Team − Performing ongoing security control assessments in accordance with the organizational continuous monitoring strategy − Performing security investigations, intrusion verifications, analyzing cyber data and producing intelligence reports and investigative and operational leads, and responding to cyber security incidents − Reporting the security state of the information system to appropriate stakeholders including status regarding the performance of security scans, analysis of alerts, tuning of signatures and report development, review and analysis − Performing security incident response activities, recognizes potential, successful and unsuccessful intrusion attempts and compromises through reviews and analyses of relevant event detail and summary information − Ensuring the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies and through monitoring of vulnerability scanning devices − Performing periodic and on-demand system audits, penetration testing and vulnerability assessments − Researching, evaluating, and recommending the implementation of changes to information security technologies. 2009 – 2011 Industry Canada IT Security Officer, Incident Handler, Forensics analyst, VA, AV, Spam, Phishing and Tech watch. Responsible for providing security services for Industry Canada. This includes, but is not limited to, Incident handling, Forensics, Vulnerability assessment,
  • 6. threat risk analysis, architecture & design, security policies, recommendations & reports, promoting a security philosophy of risk mitigation through proactive security awareness training, cost-effective security countermeasures, host-level security, and security planning/integration; ensuring that all systems are safeguarded against all forms of malicious intrusions; assisting other groups within the firm in developing secure systems. - Incident response and incident management - Review detection and analysis activities through review of large volumes of summary data via various tools and software; SIEM, Data Base, Scripts. - Provide the Client Technical Authority or his designated representative technical and operational support in the analysis of incidents, vulnerabilities and malicious code; - Issue alerts and advisories according to the internal warning procedure. - Syslogs analysis - participate in regular and event-based teleconferences with national constituents; - Review Intrusion Detections System (IDS) logs daily and investigate alarms; - Call Management System (HEAT & Infoweb); - Monitor and report on Internet acceptable usage; - Member of the Change Advisory Board (CAB); - Knowledge expert on IT trends for GOC and private sector; - Anti Virus, Spam, Phishing analysis; Mar 2007 to 2008 Manager Security of Operations NUVO Reporting to the Vice President of Operations; responsible for providing security services for customers and company, as well promoting security services to current and potential customers through networking and partnering with sales. This includes, but is not limited to, vulnerability assessment, threat risk analysis, architecture & design, security policies, recommendations & reports, promoting a security philosophy of risk mitigation through proactive security awareness training, cost-effective security countermeasures, host-level security, and security planning/integration; ensuring that all systems are safeguarded against all forms of malicious intrusions; assisting other groups within the firm in developing secure systems. • IP Network architecture and technology, protocols, routing, Wireless Networking; • Monitoring Software: • Coordinate Firewall configuration and rule maintenance; • NIDS/NIPS, HIDS/HIPS ISS RealSecure, Snort, Enterasys, Juniper, Mcafee etc;
  • 7. • VPN Communication Protocols and Remote access facilities; VPN, RAS, thin- client; • Syslogs analysis from a number of tools; SIEM, scripts, command line; • Call Management System (Remedy); • Responsible to meet SLA’s and HA Anti Virus, Spam, Phishing analysis; Jul 2005 to Dec 2005 Cyber Duty Officer PSEPC Ottawa CANADA • Prepare both technical and cyber risk briefs as required; • Chair/participate in regular and event-based teleconferences with national constituents; • Monitor and analyze information and data on cyber threats. This involves research and investigation of new or up coming threats, vulnerabilities or malicious code; • Review daily information from the international community; • Review Intrusion Detections System (IDS) logs daily and investigate alarms; • Support detection and analysis activities through review of large volumes of summary data; • Provide the Client Technical Authority or his designated representative technical and operational support in the analysis of incidents, vulnerabilities and malicious code; • Intake incident reports from Government of Canada, provincial and territorial governments, and private sector and report to management on the impact and risk; • Coordinate a response to cyber incidents of a national interest and function as the operational lead within the National Emergency Response System; and • Issue alerts and advisories according to the internal warning procedure. Nov 2004 to Dec 2005 Network Security Consultant As an independent consultant, I provided a vast range of technical advice and expertise to Public Safety and Emergency Preparedness Canada and IPSS. This work involved the preparation of technical and cyber risk briefs and monitoring and analyzing information and data on cyber threats. I was also responsible for network security analysis, vulnerability assessments and penetration testing. I directed the research and investigation of new and upcoming threats, vulnerabilities and malicious code. I also participated in the IPS study for CSE / Government of Canada where I compiled information, vendor interactions, researched, reviewed and corrected discrepancies.
  • 8. Jan 2002 to Jan 2004 CIRT Team Leader (private sector) CGI Information Systems Management Consultants Inc Ottawa CANADA CGI Information Systems Management Consultants Inc. As the senior technical advisor / team leader / analyst, reporting to the Director of Corporate IT, I monitored network security, researched and investigated threats, vulnerabilities and malicious code and conducted vulnerability assessments IAW SLAs. I also directed various security projects in the initial design and implementation of intrusion and recommended options for strengthening the client's relationship with operations. I provided guidance to the team lead and analysts, and provided leadership at weekly corporate conference calls pertaining to projects incident handling and future security projects. Jan 2000 Jan 2002 CIRT Computer Response Team Supervisor Department of National Defence Ottawa CANADA Department of National Defence, Canada Computer Incident Response Team Supervisor • CIRT Supervisor; • Involved with network security monitoring, research and investigations of threats, vulnerabilities and malicious code; • Researched and analyzed open source information for emerging threats, vulnerabilities and tools. Responsible for supervising and training the new network security analysts to be able to operationally met the goals set by the Team Manager to provide security and protection services to the Department of National Defence information systems against intrusions/attacks; • Was responsible for providing operational support and guidance in incident investigation, analysis and response and follow up as well as quality control of reports prior to their release to large audience in the department. Ensured that all incidents were logged, vulnerabilities were identified, incident database was updated as and when required, and that incidents were followed up; • Current knowledge of Intrusion Detection Systems (IDS), anti virus, firewalls, routers and security policies; • Liaison with various government and allied agencies to coordinate response to threats; • Compiled virus statistics, prepared and wrote reports on new malicious code that was detected in the wild with a level of impact regarding possible infection within DND; • Supported the day-to-day administration of the DND CIRT networking assets; • Utilized PGP and Entrust PKI encrypted email for secure intra and inter- department communications; and • Pre-Y2K threat analysis for the department on malicious code and possible cyber attacks daily.
  • 9. 1998 - 2000 Department of National Defence Network Vulnerability Analysis Team Leader (NVAT) • Used and managed various UNIX (Solaris 2.X) and Linux (Slackware) workstations on a daily basis to conduct system audits using UNIX based security scanners; • Supported and help build a mixed environment test network to support NVAT operating system vulnerability testing; • Analyst and a Team Supervisor responsible for auditing DND’s network with CyberCop (formally Ballista) as well as using non- commercial tools to ensure system integrity; • Evaluated the integrity of the various networking Internet protocols using tools such as SAINT (formally SATAN), Cheops, and Nmap as well as other tools; • Responsible for the evaluation of new scanners (commercial and freeware) to be used by the NVAT Team; • Regularly analyzed the data obtained from vulnerability scanners to detect signs of systems vulnerabilities. Used tools such as TCPDump or snoop to gather the necessary information to be used later in post analysis; and • Responsible for supervising and training new analysts to operationally met the goals set by the Team Manager to provide security and protection services to the Department of National Defence information systems against intrusions/attacks. Education and Credentials 2009 FTK Tool Kit Forensic training, Ottawa, On 2007 Net Forensics training 2003 Enterasys Specialist Dragon Intrusion Detection System course 2002 Forensic, Ottawa Police College 2001 Foundstone Computer Forensic Course, Washington, D.C. 2000 Interconnecting Cisco Network Devices, Ottawa 1999 Information System Security Fundamentals, Algonquin College, Ottawa 1998 Solaris Sys Admin II Learnix, Ottawa 1996 Linked Ops-Intel Centers Europe Workstation User, Sarajevo, Bosnia 1993 Trade qualified 6A, Canadian Forces School of Communications and Electronics, Kingston 1988 Russian Language Course, Canadian Forces Language School, Ottawa 1981 Communicator Research Qualifications, Kingston Miscellaneous References Available upon request