SlideShare a Scribd company logo
1 of 6
TIM JACKSON
13 BeesleyStreet Mobile:0424 504 085
East VictoriaPark6101 Email:timjackson142@hotmail.com
Perth,WA,Australia
__________________________________________________________________________________
Public
Career Summary
 18 month experience as a Security & Quality Coordinator Lotterywest)
 12 months experience as a Technical Architect – Information Security (FMG)
 18 months experience as an Information Security Manager (AaE)
 12 month experience as a Senior IT Consultant (EY)
 2 and a half years experience as an Information Security Analyst (AaE, FMG)
 18 months experience as an IT Auditor (OAG)
 Over 4 years experience in network and computer administration (ORSGroup)
I am an IT professional with over 12 years direct industry experience in Perth and Melbourne. I have worked in
management and leadership roles for much of that time in my positions with AaE, E&Y, FMG and Lotterywest. I
have excellent communication skillsand amableto relay technical concepts in non-technical terms at all levels
of the business.I understand that IT exists to serve the business and my management and technical skills and
training allowme to quickly understand business needs and providetechnical and improved process solution
utilizingexistingtechnologies or ata minimal cost.
I am lookingto further my IT career in a risk,management or architectural capacity and believethat I am a
loyal,valuableand dedicated employee.
Professional Competencies
 Risk and compliancemanagement
 Network Security Architecture
 Information Security Architecture
 Project management
 Application and network penetration testing
 Databasedesign and administration
 Web application security testing
 Network security testing
 SharePointdevelopment and administration
 Computer forensics
 Strategic policy development
 General IT controls auditing
 Security auditing
 Business Continuity and disaster recovery design
 Network administration
 Windows and Linux desktop administration
 Active directory administration
 Linux server administration
Developed Competencies
 Great verbal and written communication skills
 Excellent report writingskills
 Strategic minded with tactical ITplanning and implementation skills
TIM JACKSON
13 BeesleyStreet Mobile:0424 504 085
East VictoriaPark6101 Email:timjackson142@hotmail.com
Perth,WA,Australia
__________________________________________________________________________________
Public
 Collaborativeteam management style
 Experienced in resourceand time management
 Experienced in projectfinancial management
 Experienced atdrivingleadership and decision making workshops
 Experienced, friendly and willingmentor for junior staff
Education
Qualifications
 Bachelor of Science, Communications and Information Technology
 Graduate Diploma of Computer Security
 Foundations of ITIL
 KP: Problem solvingand decision making
 ACE: Computer Forensics
 SABSA Security Architect
 Trained SANS Penetration tester
Ongoing Professional Development
 Diploma of management (2014)
Experience
Lotterywest – (2013 – present)
Security & Quality Coordinator
Integrating security architecture into the project office through the development of business, functional and
non-functional requirements and technical architectures for key projects
I am usingSABSA and TOGAF architectureframeworks to incorporateformal disciplearound the development
of project requirements. Once these requirements aredeveloped I am designingtechnical security
architectures to meet these requirements for the engineers to build.OncebuiltI am security testing the new
systems in test/dev to ensure the actual buildsareconsistentwith the architecture. Where deviations occur I
am performing a risk assessmentto determine the impacton the security of the information assets involved.
Key achievements
- Information Security Strategy and operational plan
- Mobile App Play online security testing
- eDreams ERDMS
- Set up a security testing lab using freeware
- Formalized security architecture governance documentation including principles, procedures and
policy.
TIM JACKSON
13 BeesleyStreet Mobile:0424 504 085
East VictoriaPark6101 Email:timjackson142@hotmail.com
Perth,WA,Australia
__________________________________________________________________________________
Public
Fortescue Metal Group (2012 – 2013)
Technical Architect – Information Security
Architected security solutions to address specific business security requirements as well as policy requirements
across multiple security domains
I integrated SABSA based security architectureinto the existingTOGAF architectureframework. I have used
this framework to architectsecurity controls to address business driversfor security as well as takinginto
accountpolicy acrossmultiplesecurity/organizational domains.
Key Achievements
 SABSA / TOGAF integration.
 Developed security architectural principles
 Developed repeatable controls for projects.
 Developed / implemented and administered SPLUNK security perimeter monitoring solution.
 Current technical lead on ArcSight SEIM project.
iServer, Splunk, ArcSight, TOGAF, SABSA
Fortescue Metal Group (2010 – present)
Information Security Risk Analyst
Consulting on major mining IT projects in support of larger mining expansion initiatives. Providing technical
advice, architectures and designs as well as conducting security testing.
I was instrumental in creatinga management framework for the Information Security business unit.I created
an Information Security Management System (ISMS) consistingof a specialized risk management and controls
framework and associated policies,procedures,standardsand guidelines.I provided technical design and
architectureto major IT projects and performed security testing of new and existingservices.
Key Achievements
 Developed Information Security Management Framework.
 Developed policies,procedures,standards and guidelines
 Provided security design and architecturedocumentation to major miningproj ects.
 Performed security testing for major projects.
 Designed and developed a divisional IntranetSharePointwebsite.
Technologies
Nessus,Nmap, Canvas,Metasploit,Windows,Active Directory, Cisco routers and switches, Checkpoint, Cisco
ASA firewall,MSBA, Symantec Antivirus,Forefront antivirus,SnortIPS, Checkpoint DLP.
Standards
TIM JACKSON
13 BeesleyStreet Mobile:0424 504 085
East VictoriaPark6101 Email:timjackson142@hotmail.com
Perth,WA,Australia
__________________________________________________________________________________
Public
ISO 27001,ISO 27002,ITIL, ISO 4360, HB 436, HB 171
Ernst and Young (2009 – 2010)
Senior IT Consultant
Lead teams providing IT consultancy services to big business including miners, banks, government, insurers and
industry.
As a senior IT consultantI was in chargeof deliveringmultipleconcurrentconsultancy engagements to clients.
I led consultantteams throughout the engagement providingadviceand supportwhen needed. I liaised with
clients to develop and agree engagement scope and budget and I managed internal budgets and resources.I
was responsiblefor writingfinal reports and deliveringrecommendations to clients.Throughout this I have
developed the ability to interpret technical solutionsand deliver them to business stakeholders.
Key Achievements
 Led teams consultingon major projects for Rio Tinto, ANZ, RAC, Main Roads and the Department of
Shared Services.
 Developed a trainingprogramfor risk management delivered to all senior consultants in theAsia
Pacific region.
 Developed new technical test plans and testingmethodologies for future engagements.
 Developed testing lab capabilities.
Technologies
Windows,Linux, Nessus,Cisco routers and switches,Checkpoint firewalls,ActiveDirectory, Nmap, Metasploit,
Nickto, Office.
Standards
ISO 27001,ISO 27002,ITIL, ISO 4360, HB 436, HB 171,PCI ComplianceStandards
Australian Air Express – AaE (2006 – 2009)
Information Security Risk Manager
I developed the Information Security Department from green field, including staff, security processes and
business integration and technical capabilities.
I was promoted to the roleof Information Security Manager to manage security processes as a resultof the
increased maturity of the Information Security business unitand to manage junior staff.I developed the
Information Security Management System includingthe Risk Management Framework and database,and all
policies,procedures,standardsand guidelines.I mentored and guided junior security staff and provided
security adviceto major business initiatives includingbusinesscontinuity and disaster recovery planning.I was
an integral part of the IT leadership team and contributed to the strategic direction of the IT Department.
 Developed the Information Security business unitand management framework.
TIM JACKSON
13 BeesleyStreet Mobile:0424 504 085
East VictoriaPark6101 Email:timjackson142@hotmail.com
Perth,WA,Australia
__________________________________________________________________________________
Public
 Developed the risk management framework and implemented a risk management database.
 Developed policies,procedures,standards and guidelines.
 Integrated IT Security processes with existingbusiness processes.
 Contributed to major projects.
 Contributed to the strategic direction of the IT Department.
Information Security Analyst
I remediated a large number of audit findings, developed projects and initiatives and project managed major
I was brought into this roleto address a largenumber of auditfindings.Through collaboration with key
stakeholders I analyzed the issues and grouped the issues by their root cause.I developed a number of
initiativesand projects designed to address these issues includingprojects to re-architectthe internal network.
I prioritized each project based on the business needs and develop business casesfor each.I acted a project
manager on two of the four major projects and successfully lead engineeringteams in deliveringresults to the
business.Itwas clear that a security division of ITrequired which I recommended to management and was
immediately endorsed and later established.
Key Achievements
 Successfully projectmanaged and implemented two major security upgrade projects.
 Mitigated 80 auditfindings in 18 months.
 Developed policies and procedures.
 Integrated basic security practicewithin existingbusiness processes.
Technologies
Cisco routers and switches, Novell, Bluecoat, Checkpoint, McAfee ePolicy orchestrator,Symantec Anti-virus,F5
load balancers,FoundstoneenterpriseIPS
Standards
ISO 27001,ISO 27002,ITIL, ISO 4360, HB 436, HB 171,PCI ComplianceStandards
Office of the Auditor General (2003 – 2006)
I conducted general IT controls audits on behalf of the Western Australia Government in support of ATTEST
financial auditor.
I conducted numerous audits of IT financial,HRand general business systems in order to provide financial
auditors with assurancethatdata extracted from those system could be relied upon. During my involvement
with the OAG I was exposed to numerous financial systems includingSAP and Alesco.
Technologies
Nessus,Nmap, Wikto, Windows,Mac, Office
Standards
TIM JACKSON
13 BeesleyStreet Mobile:0424 504 085
East VictoriaPark6101 Email:timjackson142@hotmail.com
Perth,WA,Australia
__________________________________________________________________________________
Public
ISO 27001,ISO 27002,ITIL, ISO 4360, HB 436, HB 171,PCI ComplianceStandards
Personal Interests
I am married and have two children.I have a keen interest in dirtand road bike racingand occasionally
participatein club level competition. I am quite physically fitand enjoy exerciseincludingweights and martial
arts.I also enjoy healthy food and am partial to the occasional glassof red.
References
Contact details provided on request:
 TBA
 TBA

More Related Content

What's hot

Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTripwire
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from SymantecArrow ECS UK
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsFrederic Roy-Gobeil, CPA, CGA, M.Tax.
 
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...researchinventy
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
Improving Incident Response: Building a More Efficient IT Infrastructure
Improving Incident Response: Building a More Efficient IT InfrastructureImproving Incident Response: Building a More Efficient IT Infrastructure
Improving Incident Response: Building a More Efficient IT InfrastructureEmulex Corporation
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedJerry Paul Acosta
 
Tunnel Vision Is Hurting Your Security: Time to See the Forest for the Trees
Tunnel Vision Is Hurting Your Security: Time to See the Forest for the TreesTunnel Vision Is Hurting Your Security: Time to See the Forest for the Trees
Tunnel Vision Is Hurting Your Security: Time to See the Forest for the TreesEnterprise Management Associates
 
Helen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry CollaborationHelen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry Collaborationcentralohioissa
 
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...infoLock Technologies
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...Andris Soroka
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyLiwei Ren任力偉
 
Enterprise Strategy Group: The Big Data Security Analytics Era is Here
Enterprise Strategy Group: The Big Data Security Analytics Era is HereEnterprise Strategy Group: The Big Data Security Analytics Era is Here
Enterprise Strategy Group: The Big Data Security Analytics Era is HereEMC
 
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...Booz Allen Hamilton
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Symantec
 

What's hot (18)

Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
 
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...An Overview of Information Systems Security Measures in Zimbabwean Small and ...
An Overview of Information Systems Security Measures in Zimbabwean Small and ...
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Improving Incident Response: Building a More Efficient IT Infrastructure
Improving Incident Response: Building a More Efficient IT InfrastructureImproving Incident Response: Building a More Efficient IT Infrastructure
Improving Incident Response: Building a More Efficient IT Infrastructure
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is Implemented
 
Tunnel Vision Is Hurting Your Security: Time to See the Forest for the Trees
Tunnel Vision Is Hurting Your Security: Time to See the Forest for the TreesTunnel Vision Is Hurting Your Security: Time to See the Forest for the Trees
Tunnel Vision Is Hurting Your Security: Time to See the Forest for the Trees
 
ITSPEC~1
ITSPEC~1ITSPEC~1
ITSPEC~1
 
Helen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry CollaborationHelen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry Collaboration
 
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
 
Gill_Pat.2016.Resume.CISO.1
Gill_Pat.2016.Resume.CISO.1Gill_Pat.2016.Resume.CISO.1
Gill_Pat.2016.Resume.CISO.1
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
Enterprise Strategy Group: The Big Data Security Analytics Era is Here
Enterprise Strategy Group: The Big Data Security Analytics Era is HereEnterprise Strategy Group: The Big Data Security Analytics Era is Here
Enterprise Strategy Group: The Big Data Security Analytics Era is Here
 
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 

Viewers also liked

General Description Detail Groto
General Description Detail GrotoGeneral Description Detail Groto
General Description Detail GrotoThe House of Perle
 
IEC 61850 Lessons Learned 2016 04-11
IEC 61850 Lessons Learned 2016 04-11IEC 61850 Lessons Learned 2016 04-11
IEC 61850 Lessons Learned 2016 04-11Kevin Mahoney
 
Prada sp '14 pop up shop concept
Prada sp '14 pop up shop conceptPrada sp '14 pop up shop concept
Prada sp '14 pop up shop conceptThe House of Perle
 

Viewers also liked (6)

Bobby Backyard remodel final
Bobby Backyard remodel finalBobby Backyard remodel final
Bobby Backyard remodel final
 
General Description Detail Groto
General Description Detail GrotoGeneral Description Detail Groto
General Description Detail Groto
 
Welcome to theHOBMOB
Welcome to theHOBMOBWelcome to theHOBMOB
Welcome to theHOBMOB
 
IEC 61850 Lessons Learned 2016 04-11
IEC 61850 Lessons Learned 2016 04-11IEC 61850 Lessons Learned 2016 04-11
IEC 61850 Lessons Learned 2016 04-11
 
Prada sp '14 pop up shop concept
Prada sp '14 pop up shop conceptPrada sp '14 pop up shop concept
Prada sp '14 pop up shop concept
 
One piece
One pieceOne piece
One piece
 

Similar to mresumelatest

IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...360 BSI
 
Elbert stonom it lead -resume 2016
Elbert stonom   it lead -resume 2016Elbert stonom   it lead -resume 2016
Elbert stonom it lead -resume 2016Elbert Stonom
 
Elbert stonom it lead -resume 2016
Elbert stonom   it lead -resume 2016Elbert stonom   it lead -resume 2016
Elbert stonom it lead -resume 2016Elbert Stonom
 
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAEIT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE360 BSI
 
Visual_ CV_of_Umesh ranade
Visual_ CV_of_Umesh ranadeVisual_ CV_of_Umesh ranade
Visual_ CV_of_Umesh ranadeUmesh ranade
 
10 Essentials Of Effective Cyber Security Strategy
10 Essentials Of Effective Cyber Security Strategy10 Essentials Of Effective Cyber Security Strategy
10 Essentials Of Effective Cyber Security StrategyCentextech
 
Resume of md. ataul islam
Resume of md. ataul islamResume of md. ataul islam
Resume of md. ataul islamMd. Ataul Islam
 
Byron Jackson Resume - 2016
Byron Jackson Resume - 2016Byron Jackson Resume - 2016
Byron Jackson Resume - 2016Byron Jackson
 
Andrea J Merenda Resume 2015v2
Andrea J  Merenda Resume 2015v2Andrea J  Merenda Resume 2015v2
Andrea J Merenda Resume 2015v2Andrea Merenda
 
Germaine Woods Resume 6_2016
Germaine Woods Resume 6_2016Germaine Woods Resume 6_2016
Germaine Woods Resume 6_2016Germaine Woods
 
Pkf advant edge_orientation3
Pkf advant edge_orientation3Pkf advant edge_orientation3
Pkf advant edge_orientation3pkfavantedge
 

Similar to mresumelatest (20)

It resume
It resumeIt resume
It resume
 
Resume
ResumeResume
Resume
 
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
 
Elbert stonom it lead -resume 2016
Elbert stonom   it lead -resume 2016Elbert stonom   it lead -resume 2016
Elbert stonom it lead -resume 2016
 
Elbert stonom it lead -resume 2016
Elbert stonom   it lead -resume 2016Elbert stonom   it lead -resume 2016
Elbert stonom it lead -resume 2016
 
Lokesh vanjani
Lokesh vanjaniLokesh vanjani
Lokesh vanjani
 
Lokesh vanjani
Lokesh vanjaniLokesh vanjani
Lokesh vanjani
 
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAEIT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
 
September11Flatirons
September11FlatironsSeptember11Flatirons
September11Flatirons
 
Visual_ CV_of_Umesh ranade
Visual_ CV_of_Umesh ranadeVisual_ CV_of_Umesh ranade
Visual_ CV_of_Umesh ranade
 
10 Essentials Of Effective Cyber Security Strategy
10 Essentials Of Effective Cyber Security Strategy10 Essentials Of Effective Cyber Security Strategy
10 Essentials Of Effective Cyber Security Strategy
 
Ann Marie Cody Resume
Ann Marie Cody ResumeAnn Marie Cody Resume
Ann Marie Cody Resume
 
Resume of md. ataul islam
Resume of md. ataul islamResume of md. ataul islam
Resume of md. ataul islam
 
Byron Jackson Resume - 2016
Byron Jackson Resume - 2016Byron Jackson Resume - 2016
Byron Jackson Resume - 2016
 
NorlyQuiatchon
NorlyQuiatchonNorlyQuiatchon
NorlyQuiatchon
 
Farzan bilimoria resume
Farzan bilimoria resumeFarzan bilimoria resume
Farzan bilimoria resume
 
S bailey resume
S bailey resumeS bailey resume
S bailey resume
 
Andrea J Merenda Resume 2015v2
Andrea J  Merenda Resume 2015v2Andrea J  Merenda Resume 2015v2
Andrea J Merenda Resume 2015v2
 
Germaine Woods Resume 6_2016
Germaine Woods Resume 6_2016Germaine Woods Resume 6_2016
Germaine Woods Resume 6_2016
 
Pkf advant edge_orientation3
Pkf advant edge_orientation3Pkf advant edge_orientation3
Pkf advant edge_orientation3
 

mresumelatest

  • 1. TIM JACKSON 13 BeesleyStreet Mobile:0424 504 085 East VictoriaPark6101 Email:timjackson142@hotmail.com Perth,WA,Australia __________________________________________________________________________________ Public Career Summary  18 month experience as a Security & Quality Coordinator Lotterywest)  12 months experience as a Technical Architect – Information Security (FMG)  18 months experience as an Information Security Manager (AaE)  12 month experience as a Senior IT Consultant (EY)  2 and a half years experience as an Information Security Analyst (AaE, FMG)  18 months experience as an IT Auditor (OAG)  Over 4 years experience in network and computer administration (ORSGroup) I am an IT professional with over 12 years direct industry experience in Perth and Melbourne. I have worked in management and leadership roles for much of that time in my positions with AaE, E&Y, FMG and Lotterywest. I have excellent communication skillsand amableto relay technical concepts in non-technical terms at all levels of the business.I understand that IT exists to serve the business and my management and technical skills and training allowme to quickly understand business needs and providetechnical and improved process solution utilizingexistingtechnologies or ata minimal cost. I am lookingto further my IT career in a risk,management or architectural capacity and believethat I am a loyal,valuableand dedicated employee. Professional Competencies  Risk and compliancemanagement  Network Security Architecture  Information Security Architecture  Project management  Application and network penetration testing  Databasedesign and administration  Web application security testing  Network security testing  SharePointdevelopment and administration  Computer forensics  Strategic policy development  General IT controls auditing  Security auditing  Business Continuity and disaster recovery design  Network administration  Windows and Linux desktop administration  Active directory administration  Linux server administration Developed Competencies  Great verbal and written communication skills  Excellent report writingskills  Strategic minded with tactical ITplanning and implementation skills
  • 2. TIM JACKSON 13 BeesleyStreet Mobile:0424 504 085 East VictoriaPark6101 Email:timjackson142@hotmail.com Perth,WA,Australia __________________________________________________________________________________ Public  Collaborativeteam management style  Experienced in resourceand time management  Experienced in projectfinancial management  Experienced atdrivingleadership and decision making workshops  Experienced, friendly and willingmentor for junior staff Education Qualifications  Bachelor of Science, Communications and Information Technology  Graduate Diploma of Computer Security  Foundations of ITIL  KP: Problem solvingand decision making  ACE: Computer Forensics  SABSA Security Architect  Trained SANS Penetration tester Ongoing Professional Development  Diploma of management (2014) Experience Lotterywest – (2013 – present) Security & Quality Coordinator Integrating security architecture into the project office through the development of business, functional and non-functional requirements and technical architectures for key projects I am usingSABSA and TOGAF architectureframeworks to incorporateformal disciplearound the development of project requirements. Once these requirements aredeveloped I am designingtechnical security architectures to meet these requirements for the engineers to build.OncebuiltI am security testing the new systems in test/dev to ensure the actual buildsareconsistentwith the architecture. Where deviations occur I am performing a risk assessmentto determine the impacton the security of the information assets involved. Key achievements - Information Security Strategy and operational plan - Mobile App Play online security testing - eDreams ERDMS - Set up a security testing lab using freeware - Formalized security architecture governance documentation including principles, procedures and policy.
  • 3. TIM JACKSON 13 BeesleyStreet Mobile:0424 504 085 East VictoriaPark6101 Email:timjackson142@hotmail.com Perth,WA,Australia __________________________________________________________________________________ Public Fortescue Metal Group (2012 – 2013) Technical Architect – Information Security Architected security solutions to address specific business security requirements as well as policy requirements across multiple security domains I integrated SABSA based security architectureinto the existingTOGAF architectureframework. I have used this framework to architectsecurity controls to address business driversfor security as well as takinginto accountpolicy acrossmultiplesecurity/organizational domains. Key Achievements  SABSA / TOGAF integration.  Developed security architectural principles  Developed repeatable controls for projects.  Developed / implemented and administered SPLUNK security perimeter monitoring solution.  Current technical lead on ArcSight SEIM project. iServer, Splunk, ArcSight, TOGAF, SABSA Fortescue Metal Group (2010 – present) Information Security Risk Analyst Consulting on major mining IT projects in support of larger mining expansion initiatives. Providing technical advice, architectures and designs as well as conducting security testing. I was instrumental in creatinga management framework for the Information Security business unit.I created an Information Security Management System (ISMS) consistingof a specialized risk management and controls framework and associated policies,procedures,standardsand guidelines.I provided technical design and architectureto major IT projects and performed security testing of new and existingservices. Key Achievements  Developed Information Security Management Framework.  Developed policies,procedures,standards and guidelines  Provided security design and architecturedocumentation to major miningproj ects.  Performed security testing for major projects.  Designed and developed a divisional IntranetSharePointwebsite. Technologies Nessus,Nmap, Canvas,Metasploit,Windows,Active Directory, Cisco routers and switches, Checkpoint, Cisco ASA firewall,MSBA, Symantec Antivirus,Forefront antivirus,SnortIPS, Checkpoint DLP. Standards
  • 4. TIM JACKSON 13 BeesleyStreet Mobile:0424 504 085 East VictoriaPark6101 Email:timjackson142@hotmail.com Perth,WA,Australia __________________________________________________________________________________ Public ISO 27001,ISO 27002,ITIL, ISO 4360, HB 436, HB 171 Ernst and Young (2009 – 2010) Senior IT Consultant Lead teams providing IT consultancy services to big business including miners, banks, government, insurers and industry. As a senior IT consultantI was in chargeof deliveringmultipleconcurrentconsultancy engagements to clients. I led consultantteams throughout the engagement providingadviceand supportwhen needed. I liaised with clients to develop and agree engagement scope and budget and I managed internal budgets and resources.I was responsiblefor writingfinal reports and deliveringrecommendations to clients.Throughout this I have developed the ability to interpret technical solutionsand deliver them to business stakeholders. Key Achievements  Led teams consultingon major projects for Rio Tinto, ANZ, RAC, Main Roads and the Department of Shared Services.  Developed a trainingprogramfor risk management delivered to all senior consultants in theAsia Pacific region.  Developed new technical test plans and testingmethodologies for future engagements.  Developed testing lab capabilities. Technologies Windows,Linux, Nessus,Cisco routers and switches,Checkpoint firewalls,ActiveDirectory, Nmap, Metasploit, Nickto, Office. Standards ISO 27001,ISO 27002,ITIL, ISO 4360, HB 436, HB 171,PCI ComplianceStandards Australian Air Express – AaE (2006 – 2009) Information Security Risk Manager I developed the Information Security Department from green field, including staff, security processes and business integration and technical capabilities. I was promoted to the roleof Information Security Manager to manage security processes as a resultof the increased maturity of the Information Security business unitand to manage junior staff.I developed the Information Security Management System includingthe Risk Management Framework and database,and all policies,procedures,standardsand guidelines.I mentored and guided junior security staff and provided security adviceto major business initiatives includingbusinesscontinuity and disaster recovery planning.I was an integral part of the IT leadership team and contributed to the strategic direction of the IT Department.  Developed the Information Security business unitand management framework.
  • 5. TIM JACKSON 13 BeesleyStreet Mobile:0424 504 085 East VictoriaPark6101 Email:timjackson142@hotmail.com Perth,WA,Australia __________________________________________________________________________________ Public  Developed the risk management framework and implemented a risk management database.  Developed policies,procedures,standards and guidelines.  Integrated IT Security processes with existingbusiness processes.  Contributed to major projects.  Contributed to the strategic direction of the IT Department. Information Security Analyst I remediated a large number of audit findings, developed projects and initiatives and project managed major I was brought into this roleto address a largenumber of auditfindings.Through collaboration with key stakeholders I analyzed the issues and grouped the issues by their root cause.I developed a number of initiativesand projects designed to address these issues includingprojects to re-architectthe internal network. I prioritized each project based on the business needs and develop business casesfor each.I acted a project manager on two of the four major projects and successfully lead engineeringteams in deliveringresults to the business.Itwas clear that a security division of ITrequired which I recommended to management and was immediately endorsed and later established. Key Achievements  Successfully projectmanaged and implemented two major security upgrade projects.  Mitigated 80 auditfindings in 18 months.  Developed policies and procedures.  Integrated basic security practicewithin existingbusiness processes. Technologies Cisco routers and switches, Novell, Bluecoat, Checkpoint, McAfee ePolicy orchestrator,Symantec Anti-virus,F5 load balancers,FoundstoneenterpriseIPS Standards ISO 27001,ISO 27002,ITIL, ISO 4360, HB 436, HB 171,PCI ComplianceStandards Office of the Auditor General (2003 – 2006) I conducted general IT controls audits on behalf of the Western Australia Government in support of ATTEST financial auditor. I conducted numerous audits of IT financial,HRand general business systems in order to provide financial auditors with assurancethatdata extracted from those system could be relied upon. During my involvement with the OAG I was exposed to numerous financial systems includingSAP and Alesco. Technologies Nessus,Nmap, Wikto, Windows,Mac, Office Standards
  • 6. TIM JACKSON 13 BeesleyStreet Mobile:0424 504 085 East VictoriaPark6101 Email:timjackson142@hotmail.com Perth,WA,Australia __________________________________________________________________________________ Public ISO 27001,ISO 27002,ITIL, ISO 4360, HB 436, HB 171,PCI ComplianceStandards Personal Interests I am married and have two children.I have a keen interest in dirtand road bike racingand occasionally participatein club level competition. I am quite physically fitand enjoy exerciseincludingweights and martial arts.I also enjoy healthy food and am partial to the occasional glassof red. References Contact details provided on request:  TBA  TBA