SlideShare a Scribd company logo
1 of 4
John Whitney
645 S. Burk St
Gilbert, AZ 85296
602-513-1207
msisa@usa.com
Experienced IS professional looking to add value and vision to a challenging work environment by applying
experience and expertise from 25 + years in IT including 12 years IT Security.
Professional Experience
Edward Jones Investments:
Security Analyst (System Security) 06/2012 to Present
Symantec Endpoint Protection Manager (SEPM) Administrator
Responsibility Summary:
• My main responibility is Symantec Endpoint Protection Manager (SEPM, SEP)
Administration/Maintenance (SAV, SEP11.0, 12.1..) for the company.
o Version upgrades (SEP11 to SEP12.1, to 121.2, to 12.1.4, & 12.1.6
o Sonar/CIDS updates.
o Create groups, exceptions, firewall rules, policies, MSL’s, to keep the SEPM running effectively.
o Analyize and solve SEP problems, implement fixes.
o Work with Symantec Support to resolve situations as quick as possible.
o Verifying that all clients are being update nightly/
o Vertying that clients are getting scanned once a week, and looking for clients that are having
issues with open files during scanning and then resolving the issue.
o Experience with Group Update Provider (GUP) & LiveUpdate Administrator
o I have work with the server team to virtualize the SEPM’s.
o Maintain the SEPM in production, the test lab and the development labs.
o Troubleshoot problems to a suceessful resolution.
• Password Vault – creating and maintaining.
• Managed File Transfers – Processing requests.
• Encryption Processing
• Full Disc Encryption for Desktop/Laptop
• I provide excellent Tier 3 support; I have received client service awards for my customer service.
• I work with other IS teams
• On Call support
Skills:
• Experience with Group Update Provider (GUP), SEP service, LiveUpdate Administrator
• I have work with the server team to virtualize the SEPM’s.
• Maintain the SEPM in production, the test lab and the development labs.
• I configured the SEPM DB server
• Experience with the SEP service
• Experience with Symantec LiveUpdate Administrator
• Demonstrated experience working with Virtualization
• Experience configuring firewalls and providing wireshark traces for analysis.
• Very familiarity with SEPM/SEP installations and maintenance.
• Have written documents for other team members to follow when issues arrise, as well as provided step-
by-step instructions for the helpdesk to use when assisting the end users.
I have been the SEPM/SEP administrator for three years, I confident that I can meet your needs and more. I
have resolved many issues, some issues I resolved before Symantec support could provide a solution. You
will notice below that when I was a System Admin in Platform services I was responsible for SEP, and then as
a Security Analyst, this was because a decision was made to move SEP to the System Security team, and
they wanted me to continue to support SEP.
Systems Administrator (Platform Services) 09/2007 to 06/2012
Responsibility Summary:
• Symantec Endpoint Protection administration (SAV, SEP11.0, 12.1..)
• Remote Access
• Responsible for applying business and technical knowledge to ensure availability of Edward Jones'
systems, and to provide quality solutions for business and enterprise infrastructure needs.
• Design, assemble, configure, install, maintain and performance tune complex infrastructure components
associated to the specific IS department with minimal guidance.
• Display detailed understanding of Hardware, Operating Systems, Storage, Replication, and Network
Technologies.
• Assist in developing technical requirements
• Develop, package, document, test and implement quality infrastructure within targeted due dates.
• Debug and correct internal infrastructure problems.
• Assist with estimating for assigned deliverables as directed by leader.
• Follow the firm’s System Development Lifecycle Methodology.
• Provide first-level support for assigned systems, including rotating assignment to provide 24x7 on-call
coverage and monitoring system logs and messages.
• Communicate internally with team and team leader regarding deliverable status.
Skills:
• Operating Systems: Windows, ,XP, Linux, Unix
• Networking Technologies: LAN, WAN, DNS, TCP/IP
• Vendor Components: WebLogic, LDAP, Active Directory, Print Services, Security Concepts, Microsoft
Security Analyst (Perimeter Security) 06/2007 – 09/2007
Leader: Dave Erler
• I was brought on-board to work with Remote Access and assist in other areas within Perimeter Security
such as the proxy server.
Responsibility Summary:
• Establish and review security controls and processes to assist management in the protection of
information system resources and associated assets against accidental or unauthorized modification,
destruction or disclosure.
• Ensure compliance to published Information Security Policies and standards.
• Provide security services that align with business objectives and regulatory requirements.
• Technical Skills
• Knowledge and understanding of security issues, risks, concepts and terminology.
• Knowledgeable of the security aspects of computer platforms and technologies (e.g.,
• Linux, UNIX, MVS, Windows, Web, LDAP, DBMS, Network, Firewalls, IDS/IPS, Authentication).
• A fundamental understanding of project management and system development lifecycle methodologies is
beneficial.
• Working knowledge of applicable programming and scripting languages that support security processes.
• Experience using common security products and tools.
Security Analyst, 4/2004 - 07/07/06
Gilltek Systems, Tempe, Arizona
On-site at APS (local power company), responsible for processing day to day requests for IS Security support
including troubleshooting and administering: new accounts; disabling accounts; application, platform, and
database access requests; account moves and renames; global group management; remote access. Work
will include processing email, providing phone support, analyzing customer requests, assessing security
requirements, documenting requests and approvals. I lead the development and project teams for
documenting all processes to meet Sarbanes-Oxley requirements and to establish the appropriate security
controls. All work must be done in accordance with corporate and security access policies and procedures
and established processes and work instructions to comply with audit and regulatory requirements
Skills required for my job is as follows: Working NT, Active Directory, RACF, MS Exchange
Administration, Windows 2000/XP, and security administration policies.
Security Analyst, 11/1997 - 3/2004
Computer Operator / Production Analyst 4/1988 – 11/1997
Sierra Health Services, Las Vegas, Nevada
Worked for five years in Security and progressive responsibility in highly technical environments.
• Monitored and maintained the McAfee’s Virus scanning software for the email servers & EPO.
• Ensured stringent compliance to internal IS Security policies.
• Documented all department procedures for the disaster recovery and SOX.
• Maintained working knowledge of the security requirements concerning HIPAA.
• Lead person for IDS project, which included the installation of all hardware
component, network and software configurations
• Controlled, reported-on setting and maintaining Internet access. (Websense, Bluecoat)
• Proactive in maintaining and monitoring security for 200+ servers through collaboration with the SNA
department and regular security audits.
• Involved in the deployment and security of several new applications. Performed Security audits on all new
system or software installs.
• Administered all domains and software access, which included the maintenance of user accounts, this
included NT/ Active Directory, Oracle, Unix and several others.
• Password management and policy adherence.
• Maintained and granted remote access via VPN and remote keys.
• Assisted in creating a Security policy manual, and help implement these system & physical policies.
Education & Certifications
Master of Science - Information Security and Assurance (MSISA) Western Governors University (WGU)
Salt Lake City, UT.
Bachelor's Degree in IT Management - Western Governors University Salt Lake City, UT.
Endpoint Protection 12.1. Administration.
Endpoint Protection 12.1 Maintain & Troubleshoot.
Certificates: CCENT, CEHv7, CHFI, INFOSEC Professional, NSTISSI No. 4011 & 4012.
MCP & MCSA Windows Server
Essentials of Computer Security (SANS Institute)

More Related Content

What's hot

Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"WrikeTechClub
 
Computer system administrator
Computer system administratorComputer system administrator
Computer system administratorTheZayne92
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administrationKhang-Ling Loh
 
Secure by Design - Security Design Principles for the Rest of Us
Secure by Design - Security Design Principles for the Rest of UsSecure by Design - Security Design Principles for the Rest of Us
Secure by Design - Security Design Principles for the Rest of UsEoin Woods
 
IbanezResumeUpdatedJul2016
IbanezResumeUpdatedJul2016IbanezResumeUpdatedJul2016
IbanezResumeUpdatedJul2016Dustin Ibanez
 
Brian updated resume
Brian updated resumeBrian updated resume
Brian updated resumeBrian Simon
 
08252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA108252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA1jjdoylecomcast
 
Secure Software Development Lifecycle
Secure Software Development LifecycleSecure Software Development Lifecycle
Secure Software Development Lifecycle1&1
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systemsBen Rothke
 
CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsKarthikeyan Dhayalan
 
Edward E Copeland_Resume
Edward E Copeland_ResumeEdward E Copeland_Resume
Edward E Copeland_ResumeEdward Copeland
 

What's hot (20)

Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
 
Agile and Secure SDLC
Agile and Secure SDLCAgile and Secure SDLC
Agile and Secure SDLC
 
Computer system administrator
Computer system administratorComputer system administrator
Computer system administrator
 
Resume
ResumeResume
Resume
 
MendozaC2res (1)
MendozaC2res (1)MendozaC2res (1)
MendozaC2res (1)
 
OctaviusWaltonResume
OctaviusWaltonResumeOctaviusWaltonResume
OctaviusWaltonResume
 
Resume
ResumeResume
Resume
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administration
 
LarryLeon
LarryLeonLarryLeon
LarryLeon
 
Secure by Design - Security Design Principles for the Rest of Us
Secure by Design - Security Design Principles for the Rest of UsSecure by Design - Security Design Principles for the Rest of Us
Secure by Design - Security Design Principles for the Rest of Us
 
IbanezResumeUpdatedJul2016
IbanezResumeUpdatedJul2016IbanezResumeUpdatedJul2016
IbanezResumeUpdatedJul2016
 
johndemunnik_MAY2016
johndemunnik_MAY2016johndemunnik_MAY2016
johndemunnik_MAY2016
 
mary_jhun_macayana
mary_jhun_macayanamary_jhun_macayana
mary_jhun_macayana
 
Brian updated resume
Brian updated resumeBrian updated resume
Brian updated resume
 
08252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA108252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA1
 
Secure Software Development Lifecycle
Secure Software Development LifecycleSecure Software Development Lifecycle
Secure Software Development Lifecycle
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systems
 
mary_jhun_macayana
mary_jhun_macayanamary_jhun_macayana
mary_jhun_macayana
 
CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security Operations
 
Edward E Copeland_Resume
Edward E Copeland_ResumeEdward E Copeland_Resume
Edward E Copeland_Resume
 

Similar to Resume-John-Whitney (20)

GraceCV
GraceCVGraceCV
GraceCV
 
fsp_22Sep15
fsp_22Sep15fsp_22Sep15
fsp_22Sep15
 
Lionel Deliz resume
Lionel Deliz resumeLionel Deliz resume
Lionel Deliz resume
 
GraceCV2
GraceCV2GraceCV2
GraceCV2
 
Grace cv2
Grace cv2Grace cv2
Grace cv2
 
Abdul_Mateen-26082616
Abdul_Mateen-26082616Abdul_Mateen-26082616
Abdul_Mateen-26082616
 
Nana Owusu resume today
Nana Owusu resume todayNana Owusu resume today
Nana Owusu resume today
 
Darrell_Williams_resume Server
Darrell_Williams_resume ServerDarrell_Williams_resume Server
Darrell_Williams_resume Server
 
Darrell_Williams_resume Server
Darrell_Williams_resume ServerDarrell_Williams_resume Server
Darrell_Williams_resume Server
 
SWAPNIL Resume
SWAPNIL ResumeSWAPNIL Resume
SWAPNIL Resume
 
Faisal Mukhtar CV
Faisal Mukhtar CVFaisal Mukhtar CV
Faisal Mukhtar CV
 
Logesh Resume
Logesh ResumeLogesh Resume
Logesh Resume
 
Samranpasha_IT_Engineer
Samranpasha_IT_EngineerSamranpasha_IT_Engineer
Samranpasha_IT_Engineer
 
RESUME16
RESUME16RESUME16
RESUME16
 
Dan RhodesResume 2192015
Dan RhodesResume 2192015Dan RhodesResume 2192015
Dan RhodesResume 2192015
 
Frank Johnston resume
Frank Johnston resumeFrank Johnston resume
Frank Johnston resume
 
Harsha CV
Harsha CVHarsha CV
Harsha CV
 
ShaneStevensResume-Mar2016
ShaneStevensResume-Mar2016ShaneStevensResume-Mar2016
ShaneStevensResume-Mar2016
 
IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant
 
2016_Resume_Brian_Burrington
2016_Resume_Brian_Burrington2016_Resume_Brian_Burrington
2016_Resume_Brian_Burrington
 

Resume-John-Whitney

  • 1. John Whitney 645 S. Burk St Gilbert, AZ 85296 602-513-1207 msisa@usa.com Experienced IS professional looking to add value and vision to a challenging work environment by applying experience and expertise from 25 + years in IT including 12 years IT Security. Professional Experience Edward Jones Investments: Security Analyst (System Security) 06/2012 to Present Symantec Endpoint Protection Manager (SEPM) Administrator Responsibility Summary: • My main responibility is Symantec Endpoint Protection Manager (SEPM, SEP) Administration/Maintenance (SAV, SEP11.0, 12.1..) for the company. o Version upgrades (SEP11 to SEP12.1, to 121.2, to 12.1.4, & 12.1.6 o Sonar/CIDS updates. o Create groups, exceptions, firewall rules, policies, MSL’s, to keep the SEPM running effectively. o Analyize and solve SEP problems, implement fixes. o Work with Symantec Support to resolve situations as quick as possible. o Verifying that all clients are being update nightly/ o Vertying that clients are getting scanned once a week, and looking for clients that are having issues with open files during scanning and then resolving the issue. o Experience with Group Update Provider (GUP) & LiveUpdate Administrator o I have work with the server team to virtualize the SEPM’s. o Maintain the SEPM in production, the test lab and the development labs. o Troubleshoot problems to a suceessful resolution. • Password Vault – creating and maintaining. • Managed File Transfers – Processing requests. • Encryption Processing • Full Disc Encryption for Desktop/Laptop • I provide excellent Tier 3 support; I have received client service awards for my customer service. • I work with other IS teams • On Call support Skills: • Experience with Group Update Provider (GUP), SEP service, LiveUpdate Administrator • I have work with the server team to virtualize the SEPM’s. • Maintain the SEPM in production, the test lab and the development labs. • I configured the SEPM DB server • Experience with the SEP service • Experience with Symantec LiveUpdate Administrator • Demonstrated experience working with Virtualization • Experience configuring firewalls and providing wireshark traces for analysis. • Very familiarity with SEPM/SEP installations and maintenance. • Have written documents for other team members to follow when issues arrise, as well as provided step- by-step instructions for the helpdesk to use when assisting the end users. I have been the SEPM/SEP administrator for three years, I confident that I can meet your needs and more. I have resolved many issues, some issues I resolved before Symantec support could provide a solution. You will notice below that when I was a System Admin in Platform services I was responsible for SEP, and then as a Security Analyst, this was because a decision was made to move SEP to the System Security team, and they wanted me to continue to support SEP.
  • 2. Systems Administrator (Platform Services) 09/2007 to 06/2012 Responsibility Summary: • Symantec Endpoint Protection administration (SAV, SEP11.0, 12.1..) • Remote Access • Responsible for applying business and technical knowledge to ensure availability of Edward Jones' systems, and to provide quality solutions for business and enterprise infrastructure needs. • Design, assemble, configure, install, maintain and performance tune complex infrastructure components associated to the specific IS department with minimal guidance. • Display detailed understanding of Hardware, Operating Systems, Storage, Replication, and Network Technologies. • Assist in developing technical requirements • Develop, package, document, test and implement quality infrastructure within targeted due dates. • Debug and correct internal infrastructure problems. • Assist with estimating for assigned deliverables as directed by leader. • Follow the firm’s System Development Lifecycle Methodology. • Provide first-level support for assigned systems, including rotating assignment to provide 24x7 on-call coverage and monitoring system logs and messages. • Communicate internally with team and team leader regarding deliverable status. Skills: • Operating Systems: Windows, ,XP, Linux, Unix • Networking Technologies: LAN, WAN, DNS, TCP/IP • Vendor Components: WebLogic, LDAP, Active Directory, Print Services, Security Concepts, Microsoft Security Analyst (Perimeter Security) 06/2007 – 09/2007 Leader: Dave Erler • I was brought on-board to work with Remote Access and assist in other areas within Perimeter Security such as the proxy server. Responsibility Summary: • Establish and review security controls and processes to assist management in the protection of information system resources and associated assets against accidental or unauthorized modification, destruction or disclosure. • Ensure compliance to published Information Security Policies and standards. • Provide security services that align with business objectives and regulatory requirements. • Technical Skills • Knowledge and understanding of security issues, risks, concepts and terminology. • Knowledgeable of the security aspects of computer platforms and technologies (e.g., • Linux, UNIX, MVS, Windows, Web, LDAP, DBMS, Network, Firewalls, IDS/IPS, Authentication). • A fundamental understanding of project management and system development lifecycle methodologies is beneficial. • Working knowledge of applicable programming and scripting languages that support security processes. • Experience using common security products and tools. Security Analyst, 4/2004 - 07/07/06 Gilltek Systems, Tempe, Arizona On-site at APS (local power company), responsible for processing day to day requests for IS Security support including troubleshooting and administering: new accounts; disabling accounts; application, platform, and database access requests; account moves and renames; global group management; remote access. Work will include processing email, providing phone support, analyzing customer requests, assessing security requirements, documenting requests and approvals. I lead the development and project teams for documenting all processes to meet Sarbanes-Oxley requirements and to establish the appropriate security controls. All work must be done in accordance with corporate and security access policies and procedures and established processes and work instructions to comply with audit and regulatory requirements Skills required for my job is as follows: Working NT, Active Directory, RACF, MS Exchange
  • 3. Administration, Windows 2000/XP, and security administration policies.
  • 4. Security Analyst, 11/1997 - 3/2004 Computer Operator / Production Analyst 4/1988 – 11/1997 Sierra Health Services, Las Vegas, Nevada Worked for five years in Security and progressive responsibility in highly technical environments. • Monitored and maintained the McAfee’s Virus scanning software for the email servers & EPO. • Ensured stringent compliance to internal IS Security policies. • Documented all department procedures for the disaster recovery and SOX. • Maintained working knowledge of the security requirements concerning HIPAA. • Lead person for IDS project, which included the installation of all hardware component, network and software configurations • Controlled, reported-on setting and maintaining Internet access. (Websense, Bluecoat) • Proactive in maintaining and monitoring security for 200+ servers through collaboration with the SNA department and regular security audits. • Involved in the deployment and security of several new applications. Performed Security audits on all new system or software installs. • Administered all domains and software access, which included the maintenance of user accounts, this included NT/ Active Directory, Oracle, Unix and several others. • Password management and policy adherence. • Maintained and granted remote access via VPN and remote keys. • Assisted in creating a Security policy manual, and help implement these system & physical policies. Education & Certifications Master of Science - Information Security and Assurance (MSISA) Western Governors University (WGU) Salt Lake City, UT. Bachelor's Degree in IT Management - Western Governors University Salt Lake City, UT. Endpoint Protection 12.1. Administration. Endpoint Protection 12.1 Maintain & Troubleshoot. Certificates: CCENT, CEHv7, CHFI, INFOSEC Professional, NSTISSI No. 4011 & 4012. MCP & MCSA Windows Server Essentials of Computer Security (SANS Institute)