Information Security Officer Internet Resume Leon Blum Copy


Published on

Leon Blum Resume

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Information Security Officer Internet Resume Leon Blum Copy

  1. 1. LEON BLUM Hollis New York PROFESSIONAL PROFILE I bring years of expertise and technical experience in the field of information security and technical support. I am a high energy, results oriented professional with a track record of success with various international banking and software Company. I believe I could be an asset to your company based in my previous experience and accomplishments. LinkedIn: KEY AREAS OF EXPERTISE Operating Systems:Windows 2000, XP, Vista, and Windows 7Server:Windows,2003 and 2008 Software Application:Lotus Notes-6.5,7.0, Outlook-2003,2007,MS Project,Visio,LAN/VPN,SMS,Connect-Wise,Remedy, Citrix,RSA,TSO,VTAM, CICS, ACF2/RACF,ALLTEL,CharlesRivers, PAM, OPICS, Charlotte, Feline Alliance,JP Morgan , SWIFT,E- IBS,IBS,Symantec-Endpoint,CISCO-IPS .G100,NOC,GFI,ISA/VPN, Barracuda-Web-Filter,What-Up-Gold, Active Directory-2000, 2003, (SQL-User Administration-Server 2005)andQuest-Script-Logic applications. Printers: HP LaserJet, Epson,&Brother.Personal Computers/Laptops:Dell, HP and Toshiba.Other: Blackberry, IPhone ACCOMPLISHMENTS  Created MonitoringControls Documentation(Information Risk Assessments Matrix)for the network and applications.  Implemented enterprise Security Monitoring System. The system performed: tracking mechanisms that generated alerts and reported on the activities of the networkwhen changes were made.  Developed and Implemented a Web-BasedSecurity Access Request System for users to request access to the network and various applications.Additional features the system provided;Management approval process, Tracking progress of requests, Notifying userswhen requests were completed .Provided users: login IDs, passwords and access levels.  Created Operations Manuals for Security User’s Administration and the Help Desk system.  Developed and Implementedan Automated Web-Based Help Desk Systemresulting in a more user friendly system for users to report problems,check progress and statusof tickets. LinkedIn:  Developed and Implemented aWeb-Based Help Desk and Knowledge Base System that provided step-by-step basic general problem resolutions for users by resolving their own issues, as aresult cutting help desk staff time on problems resolutionby 39percent.(The system became the benchmark for other help desk units in European, Canadian, and Latin Americas banksoperations.) PROFESSIONALEXPERIENCE BANCO ESTADO DE CHILE, New York, NY 2008 – 2011 Information SecurityOfficer Managed the Logical and Physical Securityin accordance with the established information security program, policies, standards and procedures in compliance with internal and external regulations to safeguard the integrity of the information assetsof the bank;Additional responsibilitiesincluded managing the Internet Customers’ Users Administration. Managedthe LogicalSecurityuser’sadministration for the networkand other proprietary business applications. Managed and monitored the (Physical Security):ADT alarm, cards access, video surveillance cameras, vault room, phone recording, asset protection and building access control systems. Managed the Internet Customers UsersAdministration for accounts and passwords).Resolved connectivity’s issues and assisted users with problems concerning logins, passwords and other related support issues. Maintained and monitored the confidentiality of the bankby utilizing an automated monitoring system that protects the integrity(information assets and systemsinfrastructure) from unauthorized disclosureand unauthorized access from external or internal threats. Maintained the Information security plan, policies, procedures and risk management planin compliance with information security policiestoensure they are kept up to-date to meet Federal and State regulatory requirements. Maintained appropriate security measures and mechanisms to guard againstunauthorized access to electronically stored and, or transmitted data and reasonably protected against anticipated threats and hazards. Interfaced as security liaison to internal, external, Federal Reserve Bank State Banking auditors to insure that the Bank is in compliance with State and Federal regulations based on the ISO 17799/ 27001/2002 frameworks. Worked with the Compliance Officer in developing an awareness program and an Incident response capability plan.
  2. 2. LEON BLUM (Page-2)BANCO ESTADO DE CHILE, New York, NY Cont’d Worked with users, technical groups and management in thedevelopment and the implementation of security strategies designed to provide a high level of security over data and information systems. Worked with all departments’ managers to identify security requirements byusing the business impact analysis. Responsible for the information security awareness training to ensure that employees were aware of how to help ensure privacy of data and unauthorized modification from internal, external treats. Reviewed and interpreted new sources of information security on current and emerging laws, rules, guidelines, regulations, and industry best practices relating to Information technology. Implemented appropriate levels of monitoring controlsto safeguard sensitive data and validate those controls in place were being implemented. Implementeda security system that monitors and prevents unauthorized access, modifications and deletions(Quest- logical Security) related to information security throughout Bank. The system provides alerts and audit reports when changes were made. Administered network useraccounts for;groups, folders, files, and access privileges and business applications. Assisted in coordinating the contingency test at the disaster recovery site. Assisted the incident response team in the investigation of security issues. Conducted annual review of the Information security risk assessments program and the security plan with thecompliance officer to update the information security policies and associated security procedures. Conducted meetings with management to report on incidents that occurred for the (Logical and Physical) Security. Served on the security committee board to report on the activities and incidents that occurred eachmonth. Served as security representative to designated bank committees in order to provide advice and professional consultation on security issues, policies and procurements being considered. Performed internal securityrisk assessments audits for the network and business applications. Monitored logins and access violations using internet security acceleration system and VPN manager. Monitored, analyzed (Cisco Intrusion prevention system) systems logs for events of unauthorized access to detect security threats, vulnerability and collaborate with management and systems administrators to resolve issues. Monitored and audited the activities of (NetworkActive Directory) using Quest-Script logic applicationsfor;accounts, groups, folders, files and network connecteddevices including business applications as well. Promoted and distributed applicable information security awareness materials and publications within the bank. Assisted IT staff in resolving on-site computer user’sissueswhen short of staff.BANK HAPOALIM. B.M,New York,NY 2001 – 2008 ITOperations OfficerManaged theHelpDeskTechnical Support and theSecurity Users Administration. Additional responsiblyincludedmanaging theInternet Customers Technical Support department. Managed and performed Users Security Administrationfor the Network, Citrix, and Mainframe, Lotus Notes and internet Mail and other proprietary business applications. Assisted the Chief Information Security Officer in the day-to-day operations for the security administration for groups, folders, files and access privileges for active directory and other applications. Reviewed access security systems log reports to check for unauthorized access from the network and business applications. Maintained and reviewed system user’s access rights and privilegesfor the network and applications. Performed level-1 and 2 functionsby providing technical support to users in person, by telephone, tickets or email. Used Citrix to remote access user desktop computers in order to resolve log-in network/applications and software issues fromusers for the United States, Canada, the Americas and Europe. Performed Security Administration and problem resolution relating tointernet access, Lotus Notes, Office- 2003, 2007, Citrix, LAN,Mainframe, local/network printing issues, recycles VTAM nodes and CICSactivation of CISC sessions using RACF/Fidelity application. Prepared standard statistical reports (Analyzed and evaluated incident reported and make recommendations to reduce the incident rate of problems).Conducted review meeting with department’s managers regarding technical issues that impact their departments. Managed the Internet Customers Users Administration for accounts and passwords). Resolved connectivity’s issues, and assisted users and customers with their problems concerning logins, passwords and other related support issues. Assisted technical support groupfor installing personal computers, and peripheral equipment’s when short of staff.
  3. 3. LEON BLUM (Page-3)Cont’dCOMPUTER ASSOCIATES INTERNATIONAL Inc. New York, NY 2000 – 2001Technical Relationship Account Manager My responsibilities were to manage the clients’ technical issues in order to insure the maximum value and satisfaction from the use of Computer Associates software and services which includedevaluating the impact of IT technical issues related to Computer Associates technology. Conducted on-site review meetings with clients and team members regarding technical issues. Acted as liaison between technical support groups and field services staff. Managed and planned escalations for major technical issues which had impacted the clients’ business. Maintained regular communication with clients and established relationships with key technical contacts within my territory. Drafted and coordinated recovery services plans, which included bringing technical resources on site. Provided information regarding new software products and upgrades, and scheduled technology day at the client site. Provided status reports to management regarding activities within my territory.CHASE BANK.New York, NY 2000System Security Administrator(Consultant)INACOM/VANSTAR. (American Express),New York, NY 1998 - 1999Help-Desk Support Analyst(Consultant)CITIBANK (Global Network Center), Weehawken, NJ 1996 -1998Help-Desk-Network Analyst(Consultant) EDUCATION&PROFESSIONAL CREDENTIALSWharton School of Business, Philadelphia.PA(Courses in Business Management)Queens, College Flushing. NY (Management Information Systems).Accredited97 College credits by the(UnitedFederal Reserve Bank)of New York for my education at Queens College, Wharton School, including Technical Schools,Professional work experience and serving in the United State Army and the United State Army Reserve. Queens College, New York, NY Microsoft Networking Technologies for Windows 2000 Client and Server Administration. Microsoft Active Directory Administration, Technologies, and System Network Architecture. Installation and Configurationof computerOperating Systems. Fundamental of Data Communications and Local Area Network Mainframe:TSO/RACF, CICS, VTAM/SNAand IM, MVS/JCL, ANS/Cobol programming, VM/CMS Citrix Learning Center, Wall Street, New York Citrix Meta-Frame for windows, Active Directory Administration. Foreign Language:French PROFESSIONAL AFFILIATIONS Association Polytechnique, Paris, France Courses, Workshops, and Seminars on topics of computer technology. United State Military Service.Veteran (FrenchInterpreter)