SlideShare a Scribd company logo
April 7,2016
To whom it may concern:
Michael Gomez has been a superb addition to the Infrastructure Support Services —End User
Technology(ISS-EUT)contract atthe Securities and Exchange Commission (SEC). Mike brings a unique
skillset to our team. In addition to being a skilled application packager,the team has relied heavily on
his ability to organize and steer complex projects.
Since Mike arrived, he has packaged over 85 applicationsfor the SEC. Many ofthe 85 packages have
had multiple iterations due to changing requirementsfrom the customer. Even when requirements
changed, Mike was able to deliver these packages on-time.
In addition to application packaging, Mike has been a great help in regards to eliminating security
vulnerabilitiesfrom the workstation environment. When the team presents him with a security
vulnerability that is not able to be addressed via aMicrosoft orthird-party patch, he researches the
issue and is able to provide a scripted solution to address the vulnerability.
Mike's most impressive accomplishment at the SEC has been his work on the SAS 9.4 project. When
Mike arrived,the project was in trouble and on the verge offailing. Since Mike joined the project, he
has taken over most ofthe project management duties while still leading the technical effort. Mike put
~c~gether an 82step testing plan to ensure all ofthe componentsfunctioned properly. The 82step
testing plan has already caught multiple compatibility and functionality issues. These issues have since
been corrected and the project is on track to be successful. Simply put,this project, which has
extremely high visibility, would have failed if Mike had not been part ofthe team.
Mike is an enormously valuable team member. His high-level output combined with his good-natured
personality has allowed him to thrive in this environment.
Sinc ely,
C~~,~
J nathan Williams
End User Technology Branch — Senior Information Technology Specialist
United States Securities and Exchange Commission
Williamsjon@sec. o~v

More Related Content

What's hot

Open Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure CultureOpen Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure Culture
WhiteSource
 
Ronen chen
Ronen chenRonen chen
Ronen chen
Ronen Chen
 
Managing Traceability in an Agile, Safety-critical Development Environment
Managing Traceability in an Agile, Safety-critical Development EnvironmentManaging Traceability in an Agile, Safety-critical Development Environment
Managing Traceability in an Agile, Safety-critical Development Environment
Intland Software GmbH
 
DevSecOps outline
DevSecOps outlineDevSecOps outline
DevSecOps outline
Nickleus Jimenez
 
The Challenges of Scaling DevSecOps
The Challenges of Scaling DevSecOpsThe Challenges of Scaling DevSecOps
The Challenges of Scaling DevSecOps
WhiteSource
 
New Barriers of Transformation
New Barriers of TransformationNew Barriers of Transformation
New Barriers of Transformation
DevOps Indonesia
 
Tackling the Risks of Open Source Security: 5 Things You Need to Know
Tackling the Risks of Open Source Security: 5 Things You Need to KnowTackling the Risks of Open Source Security: 5 Things You Need to Know
Tackling the Risks of Open Source Security: 5 Things You Need to Know
WhiteSource
 
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
WhiteSource
 
SRE and Security: Natural Force Multipliers
SRE and Security: Natural Force MultipliersSRE and Security: Natural Force Multipliers
SRE and Security: Natural Force Multipliers
Cory Scott
 
OWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
OWASP Chicago Meetup Presentation - Threat Modeling-Process MaturityOWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
OWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
Synopsys Software Integrity Group
 
Continuous Delivery to Continuous Operations, DevOps & SRE = Continuous Culture
Continuous Delivery to Continuous Operations, DevOps & SRE = Continuous CultureContinuous Delivery to Continuous Operations, DevOps & SRE = Continuous Culture
Continuous Delivery to Continuous Operations, DevOps & SRE = Continuous Culture
DevOps Indonesia
 
BitSensor Webwinkel Vakdagen
BitSensor Webwinkel VakdagenBitSensor Webwinkel Vakdagen
BitSensor Webwinkel Vakdagen
webwinkelvakdag
 
Sonatype storybook go fast_be secure
Sonatype storybook go fast_be secureSonatype storybook go fast_be secure
Sonatype storybook go fast_be secure
Debbie Rosen
 
Realizing Near-Zero Security Flaws in Your Software
Realizing Near-Zero Security Flaws in Your SoftwareRealizing Near-Zero Security Flaws in Your Software
Realizing Near-Zero Security Flaws in Your Software
Nicholas Percoco
 
Seric case study Trespass Security Appscan
Seric case study Trespass Security AppscanSeric case study Trespass Security Appscan
Seric case study Trespass Security Appscan
William Macleod
 

What's hot (15)

Open Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure CultureOpen Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure Culture
 
Ronen chen
Ronen chenRonen chen
Ronen chen
 
Managing Traceability in an Agile, Safety-critical Development Environment
Managing Traceability in an Agile, Safety-critical Development EnvironmentManaging Traceability in an Agile, Safety-critical Development Environment
Managing Traceability in an Agile, Safety-critical Development Environment
 
DevSecOps outline
DevSecOps outlineDevSecOps outline
DevSecOps outline
 
The Challenges of Scaling DevSecOps
The Challenges of Scaling DevSecOpsThe Challenges of Scaling DevSecOps
The Challenges of Scaling DevSecOps
 
New Barriers of Transformation
New Barriers of TransformationNew Barriers of Transformation
New Barriers of Transformation
 
Tackling the Risks of Open Source Security: 5 Things You Need to Know
Tackling the Risks of Open Source Security: 5 Things You Need to KnowTackling the Risks of Open Source Security: 5 Things You Need to Know
Tackling the Risks of Open Source Security: 5 Things You Need to Know
 
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
From Zero to DevSecOps: How to Implement Security at the Speed of DevOps
 
SRE and Security: Natural Force Multipliers
SRE and Security: Natural Force MultipliersSRE and Security: Natural Force Multipliers
SRE and Security: Natural Force Multipliers
 
OWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
OWASP Chicago Meetup Presentation - Threat Modeling-Process MaturityOWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
OWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
 
Continuous Delivery to Continuous Operations, DevOps & SRE = Continuous Culture
Continuous Delivery to Continuous Operations, DevOps & SRE = Continuous CultureContinuous Delivery to Continuous Operations, DevOps & SRE = Continuous Culture
Continuous Delivery to Continuous Operations, DevOps & SRE = Continuous Culture
 
BitSensor Webwinkel Vakdagen
BitSensor Webwinkel VakdagenBitSensor Webwinkel Vakdagen
BitSensor Webwinkel Vakdagen
 
Sonatype storybook go fast_be secure
Sonatype storybook go fast_be secureSonatype storybook go fast_be secure
Sonatype storybook go fast_be secure
 
Realizing Near-Zero Security Flaws in Your Software
Realizing Near-Zero Security Flaws in Your SoftwareRealizing Near-Zero Security Flaws in Your Software
Realizing Near-Zero Security Flaws in Your Software
 
Seric case study Trespass Security Appscan
Seric case study Trespass Security AppscanSeric case study Trespass Security Appscan
Seric case study Trespass Security Appscan
 

Similar to Letter

DevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together LogDevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together Log
Stefan Streichsbier
 
Parth-Resume_1-2[1]
Parth-Resume_1-2[1]Parth-Resume_1-2[1]
Parth-Resume_1-2[1]
Parth Rao
 
About Michael Ellowitz
About Michael EllowitzAbout Michael Ellowitz
About Michael Ellowitz
ellowim
 
A Gentle Introduction To Agile
A Gentle Introduction To AgileA Gentle Introduction To Agile
A Gentle Introduction To Agile
Michael Sahota
 
David_Walaski_Resume
David_Walaski_ResumeDavid_Walaski_Resume
David_Walaski_Resume
David Walaski
 
Yee Sian Chua_V2_2016
Yee Sian Chua_V2_2016Yee Sian Chua_V2_2016
Yee Sian Chua_V2_2016
Yee Sian Chua
 
David Adams - Linkedin Information Architect Business Analyst - Web / Social ...
David Adams - Linkedin Information Architect Business Analyst - Web / Social ...David Adams - Linkedin Information Architect Business Analyst - Web / Social ...
David Adams - Linkedin Information Architect Business Analyst - Web / Social ...
David Adams
 
Sathish Prabhu Resume
Sathish Prabhu ResumeSathish Prabhu Resume
Sathish Prabhu Resume
sathy_prabhu
 
Abstract
AbstractAbstract
Abstract
Trevor Moon
 
Thomas R Graham bio
Thomas R Graham bioThomas R Graham bio
Thomas R Graham bio
Tom Graham
 
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 AdoptionQuest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest
 
Akin Akintayo CV Nov12 04 LinkedIn
Akin Akintayo CV Nov12 04 LinkedInAkin Akintayo CV Nov12 04 LinkedIn
Akin Akintayo CV Nov12 04 LinkedIn
Akinola1
 
Democratizing security
Democratizing securityDemocratizing security
Democratizing security
Sanjeev Sharma
 
Resume_Regalbuto_DeAnna_SE_20161108
Resume_Regalbuto_DeAnna_SE_20161108Resume_Regalbuto_DeAnna_SE_20161108
Resume_Regalbuto_DeAnna_SE_20161108
DeAnna Regalbuto
 
Brief Intro to Agile, Benefits & Transition
Brief Intro to Agile, Benefits & TransitionBrief Intro to Agile, Benefits & Transition
Brief Intro to Agile, Benefits & Transition
Michael Sahota
 
Building a Foundation for NetSecOps Partnerships with Network Automation
Building a Foundation for NetSecOps Partnerships with Network AutomationBuilding a Foundation for NetSecOps Partnerships with Network Automation
Building a Foundation for NetSecOps Partnerships with Network Automation
Enterprise Management Associates
 
Habib-Khan-Resume-Updated-692016N
Habib-Khan-Resume-Updated-692016NHabib-Khan-Resume-Updated-692016N
Habib-Khan-Resume-Updated-692016N
Habib Khan
 
CV IBM i
CV IBM iCV IBM i
Profile of Bala
Profile of BalaProfile of Bala
Profile of Bala
N Balasubramaniam
 
Profile of Bala
Profile of BalaProfile of Bala
Profile of Bala
N Balasubramaniam
 

Similar to Letter (20)

DevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together LogDevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together Log
 
Parth-Resume_1-2[1]
Parth-Resume_1-2[1]Parth-Resume_1-2[1]
Parth-Resume_1-2[1]
 
About Michael Ellowitz
About Michael EllowitzAbout Michael Ellowitz
About Michael Ellowitz
 
A Gentle Introduction To Agile
A Gentle Introduction To AgileA Gentle Introduction To Agile
A Gentle Introduction To Agile
 
David_Walaski_Resume
David_Walaski_ResumeDavid_Walaski_Resume
David_Walaski_Resume
 
Yee Sian Chua_V2_2016
Yee Sian Chua_V2_2016Yee Sian Chua_V2_2016
Yee Sian Chua_V2_2016
 
David Adams - Linkedin Information Architect Business Analyst - Web / Social ...
David Adams - Linkedin Information Architect Business Analyst - Web / Social ...David Adams - Linkedin Information Architect Business Analyst - Web / Social ...
David Adams - Linkedin Information Architect Business Analyst - Web / Social ...
 
Sathish Prabhu Resume
Sathish Prabhu ResumeSathish Prabhu Resume
Sathish Prabhu Resume
 
Abstract
AbstractAbstract
Abstract
 
Thomas R Graham bio
Thomas R Graham bioThomas R Graham bio
Thomas R Graham bio
 
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 AdoptionQuest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
 
Akin Akintayo CV Nov12 04 LinkedIn
Akin Akintayo CV Nov12 04 LinkedInAkin Akintayo CV Nov12 04 LinkedIn
Akin Akintayo CV Nov12 04 LinkedIn
 
Democratizing security
Democratizing securityDemocratizing security
Democratizing security
 
Resume_Regalbuto_DeAnna_SE_20161108
Resume_Regalbuto_DeAnna_SE_20161108Resume_Regalbuto_DeAnna_SE_20161108
Resume_Regalbuto_DeAnna_SE_20161108
 
Brief Intro to Agile, Benefits & Transition
Brief Intro to Agile, Benefits & TransitionBrief Intro to Agile, Benefits & Transition
Brief Intro to Agile, Benefits & Transition
 
Building a Foundation for NetSecOps Partnerships with Network Automation
Building a Foundation for NetSecOps Partnerships with Network AutomationBuilding a Foundation for NetSecOps Partnerships with Network Automation
Building a Foundation for NetSecOps Partnerships with Network Automation
 
Habib-Khan-Resume-Updated-692016N
Habib-Khan-Resume-Updated-692016NHabib-Khan-Resume-Updated-692016N
Habib-Khan-Resume-Updated-692016N
 
CV IBM i
CV IBM iCV IBM i
CV IBM i
 
Profile of Bala
Profile of BalaProfile of Bala
Profile of Bala
 
Profile of Bala
Profile of BalaProfile of Bala
Profile of Bala
 

Letter

  • 1. April 7,2016 To whom it may concern: Michael Gomez has been a superb addition to the Infrastructure Support Services —End User Technology(ISS-EUT)contract atthe Securities and Exchange Commission (SEC). Mike brings a unique skillset to our team. In addition to being a skilled application packager,the team has relied heavily on his ability to organize and steer complex projects. Since Mike arrived, he has packaged over 85 applicationsfor the SEC. Many ofthe 85 packages have had multiple iterations due to changing requirementsfrom the customer. Even when requirements changed, Mike was able to deliver these packages on-time. In addition to application packaging, Mike has been a great help in regards to eliminating security vulnerabilitiesfrom the workstation environment. When the team presents him with a security vulnerability that is not able to be addressed via aMicrosoft orthird-party patch, he researches the issue and is able to provide a scripted solution to address the vulnerability. Mike's most impressive accomplishment at the SEC has been his work on the SAS 9.4 project. When Mike arrived,the project was in trouble and on the verge offailing. Since Mike joined the project, he has taken over most ofthe project management duties while still leading the technical effort. Mike put ~c~gether an 82step testing plan to ensure all ofthe componentsfunctioned properly. The 82step testing plan has already caught multiple compatibility and functionality issues. These issues have since been corrected and the project is on track to be successful. Simply put,this project, which has extremely high visibility, would have failed if Mike had not been part ofthe team. Mike is an enormously valuable team member. His high-level output combined with his good-natured personality has allowed him to thrive in this environment. Sinc ely, C~~,~ J nathan Williams End User Technology Branch — Senior Information Technology Specialist United States Securities and Exchange Commission Williamsjon@sec. o~v