SlideShare a Scribd company logo
1 of 3
Albert G. Gonzales
#15797 W. Monterey LN.
(559) 567-2940
albertgsalinas1@gmail.com
www.AlbertgGonzales.com
OBJECTIVE: To resume my career as a successful Information Security Analyst in a major global
organization within the greater California, local & National geographical area.
QUALIFICATION SUMMARY: The ability to serve as a corporate security guru by ensuring technical
security planning, testing, verification and risk analysis in accordance with TCP/IP protocols. Capable of
defining, deploying and monitoring risk management, compliance, and information security programs
while functioning as a primary IT disaster recovery coordinator.
RECENT ACTIVITIES:
 The significance of monitoring critical information network vulnerability
 Attendee, Seattle Tech-Security Conference January 2013
 Staying acquainted with current Info SEC technology as well as OSI model technologies
KEY COMPETENCIES:
Monitoring
 Monitor the security of critical systems (e.g., e-mail servers, database servers, web servers, etc)
and changes to highly sensitive computer security controls to ensure appropriate system
administrative actions, investigate and report on noted irregularities.
 Conduct network vulnerability assessments using tools to evaluate attack vectors, identify system
vulnerabilities and develop remediation plans and security procedures.
 Ensure organizational compliance with CFCU information security programs.
 Manage the SIEM infrastructure.
 Conduct routine social engineering tests and clean-desk audits.
 Investigate potential or actual security violations or incidents in an effort to identify issues and areas
that require new security measures or policy changes.
Strategy Development
 Research new developments in IT security in order to recommend, develop and implement
new security policies, standards, procedures and operating doctrines across a major global
enterprise.
 Define, establish and manage security risk metrics and track effectiveness.
 Coordinate with third parties to perform vulnerability tests and create security authorization
agreements and standards.
 The ability to balance risk mitigation with business needs.
Disaster Recovery
 Collaborate with business units to determine continuity requirements.
 Conduct business impact analysis for vital functions; document recovery priorities of the key
processes, applications and data.
 Establish disaster recovery testing methodology.
 Plan and coordinate the testing of recovery support and business resumption procedures while
ensuring the recovery and restoration of key IT resources and data and the resumption of critical
systems within the desired timeframe.
 PROFESSIONAL EXPERINCE:
 Exploit company's AS400 IBM technological advancements, computer systems companywide on
crucial new info sec policies, procedures and technologies.
• Successfully complete all jobs by time requested.
Coordinate and deliver a task when it's needed on time.
 Skills:
• Security Technologies: Retina Network Security Scanner; SSH; SSL; Digital Certificates; Anti-
Virus Tools (Norton, Symantec, Ghost, etc.)
• Software: MS Office (Word, Excel, Outlook, Access, PowerPoint)
• System Monitoring Regulatory Compliance System Integration Planning
 Performed security research, analysis and design for all client computing systems and the network
infrastructure.
 Developed, implemented, and documented formal security programs and policies.
 Monitored events, responded to incidents and reported findings.
 Utilized Security Information and Event Management (SIEM), Intrusion Detection & Prevention (IDS
/ IPS), Data Leakage Prevention (DLP), forensics, sniffers and malware analysis tools.
TECHNICAL SKILLS:
Unix/Linux/Windows /IntruShield / Foundstone Scanner / ePO, Fortify 360, Firewalls, Citrix, Cisco VPN /
Secure, Netilla, Tufin, Envision, BlueCoat, ProofPoint, Voltage, Active Directory and Radius
EDUCATION AND CERTIFICATIONS:
Bachelor’s Degree in Business in Info Systems Computer Science University of Phoenix/Devry
CISSP (Certified Information Systems Security Professional)
Linkedin profile: http://www.linkedin.com/home?trk=hb_tab_home_top
15797 W Monterey Ln | Kerman, Ca.93630 | (000) 567-2940 | albertgsalinas1@gmail.com
www.AlbertgGonzales.com

More Related Content

What's hot

Sivasankaran_9yrs_Information_security V1
Sivasankaran_9yrs_Information_security V1Sivasankaran_9yrs_Information_security V1
Sivasankaran_9yrs_Information_security V1
Sivasankaran Krishnan
 

What's hot (20)

iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Josephiuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
 
Cybersecurity in Acquisition - Kristen J. Baldwin
Cybersecurity in Acquisition - Kristen J. BaldwinCybersecurity in Acquisition - Kristen J. Baldwin
Cybersecurity in Acquisition - Kristen J. Baldwin
 
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020  Groovy SOC Tunes aka Modern SOC TrendsSOCstock 2020  Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
 
Health information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information securityHealth information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information security
 
Health information security session 4 risk management
Health information security session 4 risk managementHealth information security session 4 risk management
Health information security session 4 risk management
 
Sivasankaran_9yrs_Information_security V1
Sivasankaran_9yrs_Information_security V1Sivasankaran_9yrs_Information_security V1
Sivasankaran_9yrs_Information_security V1
 
Specialist security enigneer
Specialist security enigneerSpecialist security enigneer
Specialist security enigneer
 
Resum
ResumResum
Resum
 
Mini IT Security Assessment
Mini IT Security AssessmentMini IT Security Assessment
Mini IT Security Assessment
 
Cyber Security vs.pdf
Cyber Security vs.pdfCyber Security vs.pdf
Cyber Security vs.pdf
 
Introduction to Ethical Hacking
Introduction to Ethical HackingIntroduction to Ethical Hacking
Introduction to Ethical Hacking
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
Security Information and Event Management
Security Information and Event ManagementSecurity Information and Event Management
Security Information and Event Management
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
 
Resume justin kelso 2017
Resume justin kelso 2017Resume justin kelso 2017
Resume justin kelso 2017
 
Unified threat management cisco 5 july 17
Unified threat management cisco 5 july 17Unified threat management cisco 5 july 17
Unified threat management cisco 5 july 17
 
Unified threat management cisco 1 july 17
Unified threat management cisco 1 july 17Unified threat management cisco 1 july 17
Unified threat management cisco 1 july 17
 
Cisco security 27 jun 17
Cisco security 27 jun 17Cisco security 27 jun 17
Cisco security 27 jun 17
 
Cisco security 7 jun 17
Cisco security 7 jun 17Cisco security 7 jun 17
Cisco security 7 jun 17
 
Cisco security3 july17
Cisco security3 july17Cisco security3 july17
Cisco security3 july17
 

Similar to Albert G Info systems resume

08252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA108252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA1
jjdoylecomcast
 
Lancy-Curriculum Vitae
Lancy-Curriculum VitaeLancy-Curriculum Vitae
Lancy-Curriculum Vitae
Lancy Menezes
 
Information Security Officer Internet Resume Leon Blum Copy
Information Security Officer  Internet Resume Leon Blum   CopyInformation Security Officer  Internet Resume Leon Blum   Copy
Information Security Officer Internet Resume Leon Blum Copy
Lblum1234
 
Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin Carrow
 
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
360 BSI
 
Specialist Security Engineer
Specialist Security EngineerSpecialist Security Engineer
Specialist Security Engineer
Mark Long
 
mcdonald.thomas.resume11-15
mcdonald.thomas.resume11-15mcdonald.thomas.resume11-15
mcdonald.thomas.resume11-15
Thomas McDonald
 
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAEIT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
360 BSI
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoring
Tony Kenny
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoring
Tony Kenny
 
RHMR_Consultant_Profile_RRHarris07232016
RHMR_Consultant_Profile_RRHarris07232016RHMR_Consultant_Profile_RRHarris07232016
RHMR_Consultant_Profile_RRHarris07232016
Ronald (RON) Ray Harris
 

Similar to Albert G Info systems resume (20)

Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1
 
08252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA108252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA1
 
Lancy-Curriculum Vitae
Lancy-Curriculum VitaeLancy-Curriculum Vitae
Lancy-Curriculum Vitae
 
Template 30
Template 30Template 30
Template 30
 
Information Security Officer Internet Resume Leon Blum Copy
Information Security Officer  Internet Resume Leon Blum   CopyInformation Security Officer  Internet Resume Leon Blum   Copy
Information Security Officer Internet Resume Leon Blum Copy
 
tarunidhar
tarunidhartarunidhar
tarunidhar
 
Harsha CV
Harsha CVHarsha CV
Harsha CV
 
Thomas reinheimer resume 04152016
Thomas reinheimer resume 04152016Thomas reinheimer resume 04152016
Thomas reinheimer resume 04152016
 
Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015
 
CCA study group
CCA study groupCCA study group
CCA study group
 
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...IT Information Security Management Principles, 28 February - 02 March 2016 Du...
IT Information Security Management Principles, 28 February - 02 March 2016 Du...
 
Specialist Security Engineer
Specialist Security EngineerSpecialist Security Engineer
Specialist Security Engineer
 
mcdonald.thomas.resume11-15
mcdonald.thomas.resume11-15mcdonald.thomas.resume11-15
mcdonald.thomas.resume11-15
 
Cybersecurity Assessment Framework - Slideshare.pptx
Cybersecurity Assessment Framework - Slideshare.pptxCybersecurity Assessment Framework - Slideshare.pptx
Cybersecurity Assessment Framework - Slideshare.pptx
 
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAEIT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
IT Information Security Management Principles, 15 - 18 May 2016 Dubai UAE
 
NIST CSF review - Essential Protections (a K12 perspective)
NIST CSF review - Essential Protections (a K12 perspective)NIST CSF review - Essential Protections (a K12 perspective)
NIST CSF review - Essential Protections (a K12 perspective)
 
Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoring
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoring
 
RHMR_Consultant_Profile_RRHarris07232016
RHMR_Consultant_Profile_RRHarris07232016RHMR_Consultant_Profile_RRHarris07232016
RHMR_Consultant_Profile_RRHarris07232016
 

Albert G Info systems resume

  • 1. Albert G. Gonzales #15797 W. Monterey LN. (559) 567-2940 albertgsalinas1@gmail.com www.AlbertgGonzales.com OBJECTIVE: To resume my career as a successful Information Security Analyst in a major global organization within the greater California, local & National geographical area. QUALIFICATION SUMMARY: The ability to serve as a corporate security guru by ensuring technical security planning, testing, verification and risk analysis in accordance with TCP/IP protocols. Capable of defining, deploying and monitoring risk management, compliance, and information security programs while functioning as a primary IT disaster recovery coordinator. RECENT ACTIVITIES:  The significance of monitoring critical information network vulnerability  Attendee, Seattle Tech-Security Conference January 2013  Staying acquainted with current Info SEC technology as well as OSI model technologies KEY COMPETENCIES: Monitoring  Monitor the security of critical systems (e.g., e-mail servers, database servers, web servers, etc) and changes to highly sensitive computer security controls to ensure appropriate system administrative actions, investigate and report on noted irregularities.  Conduct network vulnerability assessments using tools to evaluate attack vectors, identify system vulnerabilities and develop remediation plans and security procedures.  Ensure organizational compliance with CFCU information security programs.  Manage the SIEM infrastructure.  Conduct routine social engineering tests and clean-desk audits.  Investigate potential or actual security violations or incidents in an effort to identify issues and areas that require new security measures or policy changes. Strategy Development  Research new developments in IT security in order to recommend, develop and implement new security policies, standards, procedures and operating doctrines across a major global enterprise.  Define, establish and manage security risk metrics and track effectiveness.  Coordinate with third parties to perform vulnerability tests and create security authorization agreements and standards.
  • 2.  The ability to balance risk mitigation with business needs. Disaster Recovery  Collaborate with business units to determine continuity requirements.  Conduct business impact analysis for vital functions; document recovery priorities of the key processes, applications and data.  Establish disaster recovery testing methodology.  Plan and coordinate the testing of recovery support and business resumption procedures while ensuring the recovery and restoration of key IT resources and data and the resumption of critical systems within the desired timeframe.  PROFESSIONAL EXPERINCE:  Exploit company's AS400 IBM technological advancements, computer systems companywide on crucial new info sec policies, procedures and technologies. • Successfully complete all jobs by time requested. Coordinate and deliver a task when it's needed on time.  Skills: • Security Technologies: Retina Network Security Scanner; SSH; SSL; Digital Certificates; Anti- Virus Tools (Norton, Symantec, Ghost, etc.) • Software: MS Office (Word, Excel, Outlook, Access, PowerPoint) • System Monitoring Regulatory Compliance System Integration Planning  Performed security research, analysis and design for all client computing systems and the network infrastructure.  Developed, implemented, and documented formal security programs and policies.  Monitored events, responded to incidents and reported findings.  Utilized Security Information and Event Management (SIEM), Intrusion Detection & Prevention (IDS / IPS), Data Leakage Prevention (DLP), forensics, sniffers and malware analysis tools. TECHNICAL SKILLS: Unix/Linux/Windows /IntruShield / Foundstone Scanner / ePO, Fortify 360, Firewalls, Citrix, Cisco VPN / Secure, Netilla, Tufin, Envision, BlueCoat, ProofPoint, Voltage, Active Directory and Radius EDUCATION AND CERTIFICATIONS: Bachelor’s Degree in Business in Info Systems Computer Science University of Phoenix/Devry CISSP (Certified Information Systems Security Professional) Linkedin profile: http://www.linkedin.com/home?trk=hb_tab_home_top
  • 3. 15797 W Monterey Ln | Kerman, Ca.93630 | (000) 567-2940 | albertgsalinas1@gmail.com www.AlbertgGonzales.com