This document provides a summary of Cortnie Guerra's work experience, including positions in IT security, identity and access management, and project management. Key responsibilities involved identifying and resolving issues, system maintenance, user provisioning and de-provisioning, and ensuring compliance. Relevant skills and technologies include Active Directory, LDAP, Aveksa, Cisco, Citrix, JIRA, ServiceNow, and Microsoft Office.
Established 17+ years of solid record: data system administration; technical & project planning support; system analysis / reporting; major system security / maintenance, upgrading, implementation; resource planning, utilization, and maximization; and overseeing directing projects to improve integrity/usefulness of functional database systems. Experience leading projects from conceptual stages through sustainment: major multi-site, multi-state hardware installation, upgrade, and system administration.
International Journal of Engineering Inventions (IJEI) provides a multidisciplinary passage for researchers, managers, professionals, practitioners and students around the globe to publish high quality, peer-reviewed articles on all theoretical and empirical aspects of Engineering and Science.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
Established 17+ years of solid record: data system administration; technical & project planning support; system analysis / reporting; major system security / maintenance, upgrading, implementation; resource planning, utilization, and maximization; and overseeing directing projects to improve integrity/usefulness of functional database systems. Experience leading projects from conceptual stages through sustainment: major multi-site, multi-state hardware installation, upgrade, and system administration.
International Journal of Engineering Inventions (IJEI) provides a multidisciplinary passage for researchers, managers, professionals, practitioners and students around the globe to publish high quality, peer-reviewed articles on all theoretical and empirical aspects of Engineering and Science.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
E-COMB (EDI Compatible Medical Billing) is completely customized & siphoned as a “Practice Management & Revenue cycle management” which has been standardized and developed as per the HIPAA compliance in maintaining the frequencies & accuracies in electronic claims processing and completely mustering against the delinquencies which are more prevalent with most of the Billing providers, Clearing houses, service providers & Payers. In short E-COMB accelerates claim processing and delivers claim data to adjudication systems in the HIPAA-compliant 837 data format (CMS 1500).
Pre-configured business processes and policies, to quickly deliver rich IAM automation using the Hitachi ID Identity and Access Management Suite.
See more at: http://hitachi-id.com/documents/
E-COMB (EDI Compatible Medical Billing) is completely customized & siphoned as a “Practice Management & Revenue cycle management” which has been standardized and developed as per the HIPAA compliance in maintaining the frequencies & accuracies in electronic claims processing and completely mustering against the delinquencies which are more prevalent with most of the Billing providers, Clearing houses, service providers & Payers. In short E-COMB accelerates claim processing and delivers claim data to adjudication systems in the HIPAA-compliant 837 data format (CMS 1500).
Pre-configured business processes and policies, to quickly deliver rich IAM automation using the Hitachi ID Identity and Access Management Suite.
See more at: http://hitachi-id.com/documents/
Để xem full tài liệu Xin vui long liên hệ page để được hỗ trợ
:
https://www.facebook.com/garmentspace/
https://www.facebook.com/thuvienluanvan01
HOẶC
https://www.facebook.com/thuvienluanvan01
https://www.facebook.com/thuvienluanvan01
tai lieu tong hop, thu vien luan van, luan van tong hop, do an chuyen nganh
El diseño organizacional es el proceso que se usa para construir, adaptar y readaptar la estructura de la organizacion, de modo que esta pueda alcanzar sus objetivos
1. Cortnie Guerra
924 Canary Drive
Saginaw, TX 76131
817-999-5115
cortniejs@gmail.com
SOUTHWEST AIRLINES (contracted with Mastech Inc)
Information Security Services/IT Security Engineer – (Security and Identity Management; L4 Senior
Security/Software Engineer)
8/10/15 to 12/31/16
Technologies/Skills: LDAP, ServiceNow/DASH, CyberArk/PrivateArk/ArkUI, SAP, Aveksa, MS Office Suite
2010, LAN, Network, VPN/Remotely Anywhere/RDP/MS Lync, Provisioning, Active Directory, Citrix,
LDAP, Cisco AnyConnect, HP Application Lifecycle Manager, some UNIX, Jabber, Lync, Skype, PuTTy,
WinSCP, SQL Developer, Websense, Sourcefire, Command Prompt, Cygwin, JIRA/Confluence, Multi-
platform access and multilayer user authentication, On-board/Off-board users, Training, Documenting
As one of the Aveksa Senior Security Engineers, I am responsible for identifying issues, validating user
identified problem areas, system troubleshooting, system maintenance/debugging, upgrades, patches,
and communication with customers (end users) as well as other parts of the Business that require
creating, triaging, and resolving software issues. Other responsibilities included working with IT Audit
and Compliance on a quarterly basis to assist in completing quarterly access reviews; identifying,
interviewing/acquiring approvals, performing analysis, and creating Enterprise (Global) Roles within the
tool for increased efficiencies in provisioning and de-provisioning user access.
XTO ENERGY/EXXONMOBIL (contracted with Fort Worth Technologies)
IT Security Provisioning Escalations Analyst - (Access Management)
4/14/14 to 9/12/14
12/14/14 to 6/20/15
Technologies/Skills: MS Office 10, Lotus Notes, Active Directory, RDP, VPN, Remedy, IT Service Requests
(Lotus Notes DB for Role-based access), Citrix, Windows Terminal Server, VDI, VMWare, SQL Server
Manager, Oracle Server Manager, LAN access, MS Lync
This position required a tremendous about of adaptability, integrity, use of common sense and problem-
solving skills, as well as high attention to detail to truly understand the customer’s need/s, and translate
those needs into prompt resolution, all while in compliance with IT Security and Risk
Controls/Governance protocols. I provided direct end user support, as well as interfaced with other IT
functional groups(and HR) by researching and requesting for the system data/application needed,
obtain appropriate data owner approvals, then provision access within the application, file share, or
database, as requested. This position was often referred to as the “Hand-Holding” position as analysts in
this role took customers by the hand (figuratively) and walk them through the entire process of
requesting and provisioning (and de-provisioning) access, as well as New Hires, Terminations, and Status
Changes. Reported to IT Security Provisioning Lead Manager.
BUCHANAN TECHNOLOGIES (Internal/Corporate)
2. Product Manager (Software Manager)
(9/14/14 to 12/12/14)
Technologies/Skills: ClickRight v12, JIRA,MS Office Suite 7, MS Lync, Silverlight
I was asked to manage Buchanan’s proprietary suite of business applications, ClickRight, which included
a call tracking system, financials system, accounts payable/receivable, CRM tool, access request, and
managed services (as well as repository for MSA’s, RFQ’s, RFP’s, and SOW’s). Using the call tracking
system (C12) and a team of programmers in Mumbai, India, I managed reported incidents,
enhancements, software upgrades/updates, and bugs, utilizing JIRA and SCRUM methodology. I sat on
the Change Advisory Board and met with Governance at least weekly to provide updates and ascertain
any application needs. Reported directly to CEO.
BELL HELICOPTER (contracted with Buchanan Technologies)
Sr. IT Security Analyst – (AIM) Access and Identity Management
12/12 to 4/14
Technologies/Skills: LDAP, USD, CAMS, SAP, Aveksa, MS FIM (Forefront Identity Manager), LAN,
Network, VPN, Provisioning, Active Directory, Citrix, Enovia, Scrum Methodology, Entrust, Visiprise,
Remedy, Multi-platform access and multilayer user authentication, On-board/Off-board users, Training
This position started out as a “New User” and “Termed User” role and later evolved into enterprise-wide
provisioning and de-provisioning of access, troubleshooting LAN, application, and network access across
multiple domains across the global. This position carried a lot of power (via privileged accounts), and
required close adherence to company (Security Compliance) and US Government protocols. LDAP and
ABAC (Attributed-Based Access Control) were fundamentally important to the assurance that
departments and users were in compliance and in accordance with military defense contract mandates.
Users brought into the environment underwent heavy security checks regarding their access, and
depending on department and level of security clearance. Informal in-house audits were routinely
performed to maintain compliance, even before during, and after R4 BSM (Business Systems
Management) overhaul went live in early 2013. Reported to IT Security Solutions Center Manager.
Additional Security Awareness Programs were the Security Awareness web tool that was sent to any
new contractor to the Bell environment. This was done in conjunction with IT Risk Management to
ensure all new contractors or vendors went through a very brief web-based IT Security Awareness
training module to include with their user profile.
Another example of data compliance understanding was to work side by side on audits of user accounts
and user access with a Compliance Analyst who would review Sarbanes Oxley
While working side by side with IT Security Risk and Compliance, I was made privy to the Sarbanes Oxley
elements, modules, and guidelines to frequently review user access (or groups of users) to confirm that
only approved data could be accessible or disclosed.
I attended a very, confidential seminar that outlined the security protocols and specs for a very specific,
very new helicopter that was still listed as “sensitive and confidential,” and I learned how emails sent to
external accounts must have a standard disclosure in their email signature as a final “check” before data
leaves the environment. We utilized Aveksa for the company’s Role-Based Access Control system of
3. choice where all access granted or stripped would be recorded in the data tables. I have also assisted in
providing required reports and data for ISO audits.
Another project I managed was the deployment of 7-9 US persons (mostly desktop support analysts) to
military bases across the world to replace the old Windows NT OS’s on their POS machines with the
newer, more secure Linux LCE. I coordinated all flight and transportation to the bases, mileage for rental
cars, expenses for food and gas, I was their “Houston Space Center” while they did all the legwork. I
would speak with the team each day to assess their progress and regroup and refocus, as needed.
BELL HELICOPTER (contracted with Buchanan Technologies)
Data Loss Prevention (IT Risk and Security Management)
11/11 to 05/12
Monitored internal cyber and email activity using a data loss prevention tool called Trustwave
(previously Vericept), and reported potential threats to IT Risk and Security Management. Once the
project was completed, my contract was extended to assist with the coordinated efforts to migrate
some 30,000 global RSA tokens to an enterprise-wide VPN soft/virtual token authentication (Cisco
AnyConnect VPN Client). Reported to IT Risk and Security Compliance.
BUCHANAN TECHNOLOGIES (Internal/Corporate)
Service Desk Resource Manager/Recruiter/Project Manager (Buchanan Corporate – Internal)
10/07 to 10/09
Technologies/Skills: ClickRight v9, Sonic Recruit, MS Office 2003-07
Recruited and managed a team of 50+ employees over three locations in the US, Europe, and Canada.
Performed HR functions for service desk including: Hiring, on-boarding, off-boarding, performance
evaluation/improvement plan, training, counseling, intervention, timekeeping, benefits, payroll, special
projects management, career pathing, disciplinary and policy implementation. Reported to IT ISC
Director.
Office Admin/Marketing Coordinator (Buchanan Corporate – Internal)
04/07 to 10/07
Managed all office business, including meeting existing and new customers and vendors, ordered and
stocked office supplies, coordinated all internal corporate and customer meetings and events, managed
the front desk and all inbound company phone calls, created marketing material, including internal
handbooks/announcements, newsletters, and manuals. Reported directly to the CEO.
CITI FINANCIAL AUTO
Senior Client Relations Specialist
3/06 to 12/06
Verify customer application information; sell auto finance options; review credit; work with
underwriting and funding to close loans; train new employees and other departments on customer
service and loan processes; trained customer service department on refinance processes; manage
outbound and sales calls.
4. Education/Certification
Bachelor's Degree: Public Relations and Spanish, University of Texas at Arlington
Associates of Arts: Communications, Tarrant County College
Human Resource Certification Institute in Fundamentals of Employee Relations: Guide to Litigation-Free
Management
Best Practices: ITIL v3 certified
Additional Skills List
~ Recruiting and Talent Sourcing
~ Office Administration/Office Management
~ Human Resources/Employee Relations
~ Marketing/Merchandising/PR/Journalism
~ IT Security, Identity and Access Management (IAM, IdAM, IDM)
~ Personnel Training/Supervision
~ Retail Store Management
~ Copy Editing/Proofreading – MLA and AP Styles
~ Account Management
~ Exemplary Sales and Customer Service
~ Quality Assurance/Compliance
~ Project Management
~ Active Directory Administrator
~ Vericept/Trustwave Data Loss Prevention
~ MS Office Suite 2007 (Excel, Powerpoint)
~ Various Applicant & Ticket Tracking Tools
~ VPN/Remotely Anywhere/RDP/MS Lync
~ RSA/Aveksa
~ LDAP – Softerra and Apache (Administrative)
~ Active Directory (Administrative)