SlideShare a Scribd company logo
William H. Linder
1-718-882-5277 whlinder@juno.com
1
PROFILE
 IT Security Risk Manager
 IT Security & Compliance Auditor, using COBIT/COSO standards as a framework, establishing controls
over IT governance/best practices.
 Proven ability to drive controls assessments,conduct riskand gap analysis,and responsible for the
mitigation of security vulnerabilities.
 IT Project Manager, using Project Management Institute methodologies, offering proven skill in system
design development and security architecture, technical documentation, systemmigration, configuration,
and implementation across diverse industries.
 Project lifecycle experience including needs assessments,requirements gathering, development planning,
systemdesign, analysis, testing,implementation, compliance, and support of business systems and security.
 Expert ability to bridge communication gaps between technical teams, end users and compliance personnel.
 Demonstrated talent as a team builder and motivator, capable of creating cohesion and project engagement
across diverse groups.
 High technical aptitude; driven to remain on the cutting edge of new technology products,concepts,and
regulations.
AUDIT and SARBANES-OXLEYAREAS OF EXPERIENCE
Reviewed Processes, Controls and Issues/Gaps for:
Physical security of installations (power, temperature,UPS, access)
Logical security of systems (access)
Change management procedures
System Development Life Cycle (SDLC)
Network security
Backup and restore procedures
Disaster recovery – business continuity
Application systems and software controls
Operations
Problem and incident management
User training
Third party services and Service Level Agreements (SLA)
End Point Security
Auditing Software: CCH TeamMate, Power Broker,various in-house systems
AssessedRisk as a result of the Controls tested in conjunction with the Gaps revealed.
PROFESSIONAL EXPERIENCE
NBC Universal (12/2015 – Present)
Information Risk Management Organization Controllership
 Measure compliance with external regulations (SOX, Privacy, access)
 Advise and educate technical teams, asset owners in control requirements and best practices
 Assess needs and risks across all applications
William H. Linder
1-718-882-5277 whlinder@juno.com
2
 Communicate regulatory requirements and risks
 Test that controls are operating effectively
 Review suppliers for compliance with privacy requirements
Robert Half (8/2015 – 10/2015)
Consultant: Citigroup Citi Technology Infrastructure group of Internal Audit.
Perform internal audit of data protection products: Checkpoint Endpoint Media Encryption, Symantec
DLP,Microsoft PKI,EntrustCA, VenafiSSL.
Experis (ManpowerGroup) (12/2014 – 5/2015)
Consultant: IPG. Performed SOX audit review of user access rights and timely account suspension of
terminated users.
Consultant: United Bank for Africa. Performed Disaster Recovery/Business Continuity review.
Reviewed results of 2014 Disaster Recovery/Business Continuity test results, and action plans to mitigate
findings resulting from this test. Reviewed and verified test results with business continuity management
and staff.
GRMS IT Consulting (6/2013 – 11/2014)
Consultant/Senior Information Systems Risk Officer at Deutsche Bank
Application security assessment:Determined effectiveness of infrastructure application security
controls for global facing applications. Full scale assessments included server security controls,
identifying and segregating various environments (UAT/DEV/DR/PROD)application User and System
accounts, controlling developer access,monitoring: emergency changes keystroke log-in procedures,
server patches,and change request.
Application security remediation: Provided workable solutions for access/environment
segregation/separation, change monitoring, creating change request to implement solutions (implementing
security controls over application accounts and server).
Maintain metrics dashboard to monitor remediation progress and outstanding issues.
Sony Music Corp
Consultant (Protiviti/Robert Half) (9/2012 – 3/2013)
Perform application compliance review of Hyperion and Eros systems.
United Bank for Africa
Consultant (Experis)(7/2012 – 9/2012)
Performed General Computer Controls and IT security audit.
Atlas Air
Consultant (KForce) (5/2012-6/2012)
End Point security audit and patch management of mobile computing devices.
NewYork Community Bancorp
Consultant (Protiviti/Robert Half) (11/2011 -3/2012)
Performed Application Compliance Review of FIS MISER System. Field work results on
CCH TeamMate.
United Bank for Africa
Consultant (Experis/Jefferson Wells)(7/2011 – 10/2011)
Performed General Computer Controls and IT security audit.
William H. Linder
1-718-882-5277 whlinder@juno.com
3
BBE, Inc.
Consultant (3/2011 – 7/2011)
Perform IT security controls review for major international bank.
 Review SAS 70s for completeness and accuracy
 Review service level agreements (SLA) of third party vendors
 Write security assessments of third party vendors and make remediation
recommendations, including findings.
Citigroup
Consultant (8/2010 –12/2010)(AxisTechnology)
Mainframe Entitlement Simplification Project: Pilot project focusing on credit card business.
EmblemHealth, NewYork, NewYork
Consultant (7/2010 – 8/2010)
Review User access rights on medical health care system.
UBS, Weehawken, NewJersey
Associate Director, ITI Risk Management, Distributed Systems and Storage (2007 – 12/2009)
 Coordinate and monitor internal and external IT audits of Distributed Systems and Storage (Windows,
UNIX, SQL/Oracle databases, AS400) to arrive at a consistent view on technology and risk.
 Reviewed and assessed findings to ensure actions plans were implemented and in compliance with
Sarbanes-Oxley regulations.
 Developed and maintained a strong partnership with platform and application owners of Distributed
Systems and Storage to implement effective observations and timely closure of agreed action plans.
 Reviewed new system implementation and system refresh projects to identify and escalate any
technology risk issues for compliance with Sarbanes-Oxley and corporate standards.
Consulting Assignments, NewYork, NewYork
IT Security Consultant (1999-2006)
Analyze and document diverse IT infrastructures in support of Auditing and Sarbanes-Oxley compliance and
access control for public companies. Included business process and technicalaudits of client systems and
processes. Engagement highlights include:
 Rabobank (Jefferson Wells)
 New York Life Insurance Co. (Jefferson Wells)
 Flushing Savings Bank (Jefferson Wells)
 Citigroup (Jefferson Wells)
 AIG (Jefferson Wells)
 CIT (Jefferson Wells)
 Agere, Inc.
 Hollywood Casino, Division of Penn National Gaming
 Finlay Fine Jewelry Co.
Tiffany & Company – IT Division, Parsippany, NewJersey
Project Leader(1998)
Piloted migration of overseas computer data centers in London and Zurich to U.S. to support goal of providing
better technical support and secure systemreliability.
Yusen Air & Sea Service, Garden City, NewYork
Wide Area Network (WAN) Manager (1992-1998)
 Led software development team to design ocean export system.
William H. Linder
1-718-882-5277 whlinder@juno.com
4
 Consolidated nationwide computer operations onto a centralized IBM AS/400 computer and frame
relay network across North America.
 Managed migration of 6 warehouses spanning the U.S. to new facilities.
EDUCATION & CAREER DEVELOPMENT
Master of Arts, Hunter College of the City University of New York (CUNY)
Bachelor of Arts, Temple University
Diploma in Computer Science,New York University
Oracle Developer Certificate, New Age Training, Inc., New York, New York (2003)
Interconnecting Cisco Networking Devices, Global Knowledge, New York, New York
Foreign Language Skills: Proficiency in German and working knowledge of Polish

More Related Content

What's hot

Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsTripwire
 
security_assessment_slides
security_assessment_slidessecurity_assessment_slides
security_assessment_slidesSteve Arnold
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?Jonathan Sinclair
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceEnergySec
 
Enumerating software security design flaws throughout the ssdlc cosac - 201...
Enumerating software security design flaws throughout the ssdlc   cosac - 201...Enumerating software security design flaws throughout the ssdlc   cosac - 201...
Enumerating software security design flaws throughout the ssdlc cosac - 201...John M. Willis
 
mcdonald.thomas.resume11-15
mcdonald.thomas.resume11-15mcdonald.thomas.resume11-15
mcdonald.thomas.resume11-15Thomas McDonald
 
OWASP based Threat Modeling Framework
OWASP based Threat Modeling FrameworkOWASP based Threat Modeling Framework
OWASP based Threat Modeling FrameworkChaitanya Bhatt
 
AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011dma1965
 
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...Seungjoo Kim
 
Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationTop 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationSridhar Karnam
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)Ben Rothke
 
Integrating Cyber Security Alerts into the Operator Display
Integrating Cyber Security Alerts into the Operator DisplayIntegrating Cyber Security Alerts into the Operator Display
Integrating Cyber Security Alerts into the Operator DisplayEnergySec
 
Accelerating Our Path to Multi Platform Benefits
Accelerating Our Path to Multi Platform BenefitsAccelerating Our Path to Multi Platform Benefits
Accelerating Our Path to Multi Platform BenefitsIntel IT Center
 
State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...at MicroFocus Italy ❖✔
 
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORK
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORKPROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORK
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORKIJCSEA Journal
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devicesMarc Vael
 
Information Security Officer Internet Resume Leon Blum Copy
Information Security Officer  Internet Resume Leon Blum   CopyInformation Security Officer  Internet Resume Leon Blum   Copy
Information Security Officer Internet Resume Leon Blum CopyLblum1234
 
Secure Engineering Practices for Java
Secure Engineering Practices for JavaSecure Engineering Practices for Java
Secure Engineering Practices for JavaTim Ellison
 

What's hot (20)

Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The Experts
 
security_assessment_slides
security_assessment_slidessecurity_assessment_slides
security_assessment_slides
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
 
Enumerating software security design flaws throughout the ssdlc cosac - 201...
Enumerating software security design flaws throughout the ssdlc   cosac - 201...Enumerating software security design flaws throughout the ssdlc   cosac - 201...
Enumerating software security design flaws throughout the ssdlc cosac - 201...
 
mcdonald.thomas.resume11-15
mcdonald.thomas.resume11-15mcdonald.thomas.resume11-15
mcdonald.thomas.resume11-15
 
OWASP based Threat Modeling Framework
OWASP based Threat Modeling FrameworkOWASP based Threat Modeling Framework
OWASP based Threat Modeling Framework
 
Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10
 
AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011
 
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
 
Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationTop 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integration
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
Integrating Cyber Security Alerts into the Operator Display
Integrating Cyber Security Alerts into the Operator DisplayIntegrating Cyber Security Alerts into the Operator Display
Integrating Cyber Security Alerts into the Operator Display
 
Accelerating Our Path to Multi Platform Benefits
Accelerating Our Path to Multi Platform BenefitsAccelerating Our Path to Multi Platform Benefits
Accelerating Our Path to Multi Platform Benefits
 
State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...
 
IT Position of Trust Designation
IT Position of Trust DesignationIT Position of Trust Designation
IT Position of Trust Designation
 
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORK
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORKPROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORK
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORK
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devices
 
Information Security Officer Internet Resume Leon Blum Copy
Information Security Officer  Internet Resume Leon Blum   CopyInformation Security Officer  Internet Resume Leon Blum   Copy
Information Security Officer Internet Resume Leon Blum Copy
 
Secure Engineering Practices for Java
Secure Engineering Practices for JavaSecure Engineering Practices for Java
Secure Engineering Practices for Java
 

Viewers also liked

Guia para-la-atencion-de-personas-agredidas
Guia para-la-atencion-de-personas-agredidasGuia para-la-atencion-de-personas-agredidas
Guia para-la-atencion-de-personas-agredidasRosabell Orfelinda
 
Jigarkumar Dineshbhai Chauhan22
Jigarkumar Dineshbhai Chauhan22Jigarkumar Dineshbhai Chauhan22
Jigarkumar Dineshbhai Chauhan22jigar chauhan
 
Functions of jute drawing
Functions of jute drawingFunctions of jute drawing
Functions of jute drawingAmit Biswas
 
Dicas para implantação de um Programa de Governança de Dados
Dicas para implantação de um Programa de Governança de DadosDicas para implantação de um Programa de Governança de Dados
Dicas para implantação de um Programa de Governança de DadosBergson Lopes Rêgo, PMP
 
Presentation - Gear train
Presentation - Gear trainPresentation - Gear train
Presentation - Gear trainAmit Biswas
 
TEXTILE INDUSTRY Misbaa zaheer khan
TEXTILE INDUSTRY Misbaa zaheer khanTEXTILE INDUSTRY Misbaa zaheer khan
TEXTILE INDUSTRY Misbaa zaheer khanMisbaa khan
 
Operation Buhtrap - AVAR 2015
Operation Buhtrap - AVAR 2015Operation Buhtrap - AVAR 2015
Operation Buhtrap - AVAR 2015ESET
 
Data Breaches and the EU GDPR
Data Breaches and the EU GDPRData Breaches and the EU GDPR
Data Breaches and the EU GDPRIT Governance Ltd
 
Textile Machinery Industry - Current Scenario & Future Prospects
Textile Machinery Industry - Current Scenario & Future ProspectsTextile Machinery Industry - Current Scenario & Future Prospects
Textile Machinery Industry - Current Scenario & Future ProspectsSuvin Advisors Pvt. Ltd.
 
コミュニティーマネージャー
コミュニティーマネージャーコミュニティーマネージャー
コミュニティーマネージャーしくみ製作所
 
i.school, The University of Tokyo "Methods of concept designing and user surv...
i.school, The University of Tokyo "Methods of concept designing and user surv...i.school, The University of Tokyo "Methods of concept designing and user surv...
i.school, The University of Tokyo "Methods of concept designing and user surv...schoowebcampus
 
気象予報士 河島未怜が語る 3分で相手の心をぐっとつかむ「お天気ネタ」
気象予報士 河島未怜が語る 3分で相手の心をぐっとつかむ「お天気ネタ」気象予報士 河島未怜が語る 3分で相手の心をぐっとつかむ「お天気ネタ」
気象予報士 河島未怜が語る 3分で相手の心をぐっとつかむ「お天気ネタ」schoowebcampus
 
「英語の挨拶」で押さえておきたい5つの英会話フレーズをマスターする 先生:小林 あつし
「英語の挨拶」で押さえておきたい5つの英会話フレーズをマスターする 先生:小林 あつし「英語の挨拶」で押さえておきたい5つの英会話フレーズをマスターする 先生:小林 あつし
「英語の挨拶」で押さえておきたい5つの英会話フレーズをマスターする 先生:小林 あつしschoowebcampus
 

Viewers also liked (14)

Guia para-la-atencion-de-personas-agredidas
Guia para-la-atencion-de-personas-agredidasGuia para-la-atencion-de-personas-agredidas
Guia para-la-atencion-de-personas-agredidas
 
Jigarkumar Dineshbhai Chauhan22
Jigarkumar Dineshbhai Chauhan22Jigarkumar Dineshbhai Chauhan22
Jigarkumar Dineshbhai Chauhan22
 
Functions of jute drawing
Functions of jute drawingFunctions of jute drawing
Functions of jute drawing
 
Dicas para implantação de um Programa de Governança de Dados
Dicas para implantação de um Programa de Governança de DadosDicas para implantação de um Programa de Governança de Dados
Dicas para implantação de um Programa de Governança de Dados
 
Presentation - Gear train
Presentation - Gear trainPresentation - Gear train
Presentation - Gear train
 
TEXTILE INDUSTRY Misbaa zaheer khan
TEXTILE INDUSTRY Misbaa zaheer khanTEXTILE INDUSTRY Misbaa zaheer khan
TEXTILE INDUSTRY Misbaa zaheer khan
 
Operation Buhtrap - AVAR 2015
Operation Buhtrap - AVAR 2015Operation Buhtrap - AVAR 2015
Operation Buhtrap - AVAR 2015
 
Data Breaches and the EU GDPR
Data Breaches and the EU GDPRData Breaches and the EU GDPR
Data Breaches and the EU GDPR
 
Textile Machinery Industry - Current Scenario & Future Prospects
Textile Machinery Industry - Current Scenario & Future ProspectsTextile Machinery Industry - Current Scenario & Future Prospects
Textile Machinery Industry - Current Scenario & Future Prospects
 
コミュニティーマネージャー
コミュニティーマネージャーコミュニティーマネージャー
コミュニティーマネージャー
 
SUT1.RESUME
SUT1.RESUMESUT1.RESUME
SUT1.RESUME
 
i.school, The University of Tokyo "Methods of concept designing and user surv...
i.school, The University of Tokyo "Methods of concept designing and user surv...i.school, The University of Tokyo "Methods of concept designing and user surv...
i.school, The University of Tokyo "Methods of concept designing and user surv...
 
気象予報士 河島未怜が語る 3分で相手の心をぐっとつかむ「お天気ネタ」
気象予報士 河島未怜が語る 3分で相手の心をぐっとつかむ「お天気ネタ」気象予報士 河島未怜が語る 3分で相手の心をぐっとつかむ「お天気ネタ」
気象予報士 河島未怜が語る 3分で相手の心をぐっとつかむ「お天気ネタ」
 
「英語の挨拶」で押さえておきたい5つの英会話フレーズをマスターする 先生:小林 あつし
「英語の挨拶」で押さえておきたい5つの英会話フレーズをマスターする 先生:小林 あつし「英語の挨拶」で押さえておきたい5つの英会話フレーズをマスターする 先生:小林 あつし
「英語の挨拶」で押さえておきたい5つの英会話フレーズをマスターする 先生:小林 あつし
 

Similar to Linder,William H IT Auditor 0216

Thomas reinheimer resume 04152016
Thomas reinheimer resume 04152016Thomas reinheimer resume 04152016
Thomas reinheimer resume 04152016Tom Reinheimer
 
Resume-APOORVA KABRA
Resume-APOORVA KABRAResume-APOORVA KABRA
Resume-APOORVA KABRAApoorva Kabra
 
Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin Carrow
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoringTony Kenny
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoringTony Kenny
 
Vijay Amarnath - Updated
Vijay Amarnath - UpdatedVijay Amarnath - Updated
Vijay Amarnath - UpdatedVijay Amarnath
 
DevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps.com
 
Claire Buckley Resume
Claire Buckley ResumeClaire Buckley Resume
Claire Buckley Resumecjennyb
 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldArun Prabhakar
 
August 2016 resume kevin langston
August 2016 resume   kevin langstonAugust 2016 resume   kevin langston
August 2016 resume kevin langstonKevin Langston
 
Frederick M. Peters Resume - 150115
Frederick M. Peters Resume - 150115Frederick M. Peters Resume - 150115
Frederick M. Peters Resume - 150115Mike Peters
 
IGSS Corporate Briefing
IGSS Corporate BriefingIGSS Corporate Briefing
IGSS Corporate Briefingmrsjennbrown
 

Similar to Linder,William H IT Auditor 0216 (20)

Thomas reinheimer resume 04152016
Thomas reinheimer resume 04152016Thomas reinheimer resume 04152016
Thomas reinheimer resume 04152016
 
Resume-APOORVA KABRA
Resume-APOORVA KABRAResume-APOORVA KABRA
Resume-APOORVA KABRA
 
Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoring
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoring
 
Vijay Amarnath - Updated
Vijay Amarnath - UpdatedVijay Amarnath - Updated
Vijay Amarnath - Updated
 
CV_Anil K Dubey V1.1
CV_Anil K Dubey V1.1CV_Anil K Dubey V1.1
CV_Anil K Dubey V1.1
 
Jason Allred Resume
Jason Allred ResumeJason Allred Resume
Jason Allred Resume
 
Template 30
Template 30Template 30
Template 30
 
Hayat resume 1
Hayat resume 1Hayat resume 1
Hayat resume 1
 
DevOps for Highly Regulated Environments
DevOps for Highly Regulated EnvironmentsDevOps for Highly Regulated Environments
DevOps for Highly Regulated Environments
 
Gregory C. Witcher Full CV
Gregory C. Witcher Full CV Gregory C. Witcher Full CV
Gregory C. Witcher Full CV
 
Amit Chaubey
Amit ChaubeyAmit Chaubey
Amit Chaubey
 
Claire Buckley Resume
Claire Buckley ResumeClaire Buckley Resume
Claire Buckley Resume
 
Michael Bowers Resume
Michael Bowers ResumeMichael Bowers Resume
Michael Bowers Resume
 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps World
 
August 2016 resume kevin langston
August 2016 resume   kevin langstonAugust 2016 resume   kevin langston
August 2016 resume kevin langston
 
Frederick M. Peters Resume - 150115
Frederick M. Peters Resume - 150115Frederick M. Peters Resume - 150115
Frederick M. Peters Resume - 150115
 
IGSS Corporate Briefing
IGSS Corporate BriefingIGSS Corporate Briefing
IGSS Corporate Briefing
 
Saipraveen_Cirrculum_Vitae
Saipraveen_Cirrculum_VitaeSaipraveen_Cirrculum_Vitae
Saipraveen_Cirrculum_Vitae
 

Linder,William H IT Auditor 0216

  • 1. William H. Linder 1-718-882-5277 whlinder@juno.com 1 PROFILE  IT Security Risk Manager  IT Security & Compliance Auditor, using COBIT/COSO standards as a framework, establishing controls over IT governance/best practices.  Proven ability to drive controls assessments,conduct riskand gap analysis,and responsible for the mitigation of security vulnerabilities.  IT Project Manager, using Project Management Institute methodologies, offering proven skill in system design development and security architecture, technical documentation, systemmigration, configuration, and implementation across diverse industries.  Project lifecycle experience including needs assessments,requirements gathering, development planning, systemdesign, analysis, testing,implementation, compliance, and support of business systems and security.  Expert ability to bridge communication gaps between technical teams, end users and compliance personnel.  Demonstrated talent as a team builder and motivator, capable of creating cohesion and project engagement across diverse groups.  High technical aptitude; driven to remain on the cutting edge of new technology products,concepts,and regulations. AUDIT and SARBANES-OXLEYAREAS OF EXPERIENCE Reviewed Processes, Controls and Issues/Gaps for: Physical security of installations (power, temperature,UPS, access) Logical security of systems (access) Change management procedures System Development Life Cycle (SDLC) Network security Backup and restore procedures Disaster recovery – business continuity Application systems and software controls Operations Problem and incident management User training Third party services and Service Level Agreements (SLA) End Point Security Auditing Software: CCH TeamMate, Power Broker,various in-house systems AssessedRisk as a result of the Controls tested in conjunction with the Gaps revealed. PROFESSIONAL EXPERIENCE NBC Universal (12/2015 – Present) Information Risk Management Organization Controllership  Measure compliance with external regulations (SOX, Privacy, access)  Advise and educate technical teams, asset owners in control requirements and best practices  Assess needs and risks across all applications
  • 2. William H. Linder 1-718-882-5277 whlinder@juno.com 2  Communicate regulatory requirements and risks  Test that controls are operating effectively  Review suppliers for compliance with privacy requirements Robert Half (8/2015 – 10/2015) Consultant: Citigroup Citi Technology Infrastructure group of Internal Audit. Perform internal audit of data protection products: Checkpoint Endpoint Media Encryption, Symantec DLP,Microsoft PKI,EntrustCA, VenafiSSL. Experis (ManpowerGroup) (12/2014 – 5/2015) Consultant: IPG. Performed SOX audit review of user access rights and timely account suspension of terminated users. Consultant: United Bank for Africa. Performed Disaster Recovery/Business Continuity review. Reviewed results of 2014 Disaster Recovery/Business Continuity test results, and action plans to mitigate findings resulting from this test. Reviewed and verified test results with business continuity management and staff. GRMS IT Consulting (6/2013 – 11/2014) Consultant/Senior Information Systems Risk Officer at Deutsche Bank Application security assessment:Determined effectiveness of infrastructure application security controls for global facing applications. Full scale assessments included server security controls, identifying and segregating various environments (UAT/DEV/DR/PROD)application User and System accounts, controlling developer access,monitoring: emergency changes keystroke log-in procedures, server patches,and change request. Application security remediation: Provided workable solutions for access/environment segregation/separation, change monitoring, creating change request to implement solutions (implementing security controls over application accounts and server). Maintain metrics dashboard to monitor remediation progress and outstanding issues. Sony Music Corp Consultant (Protiviti/Robert Half) (9/2012 – 3/2013) Perform application compliance review of Hyperion and Eros systems. United Bank for Africa Consultant (Experis)(7/2012 – 9/2012) Performed General Computer Controls and IT security audit. Atlas Air Consultant (KForce) (5/2012-6/2012) End Point security audit and patch management of mobile computing devices. NewYork Community Bancorp Consultant (Protiviti/Robert Half) (11/2011 -3/2012) Performed Application Compliance Review of FIS MISER System. Field work results on CCH TeamMate. United Bank for Africa Consultant (Experis/Jefferson Wells)(7/2011 – 10/2011) Performed General Computer Controls and IT security audit.
  • 3. William H. Linder 1-718-882-5277 whlinder@juno.com 3 BBE, Inc. Consultant (3/2011 – 7/2011) Perform IT security controls review for major international bank.  Review SAS 70s for completeness and accuracy  Review service level agreements (SLA) of third party vendors  Write security assessments of third party vendors and make remediation recommendations, including findings. Citigroup Consultant (8/2010 –12/2010)(AxisTechnology) Mainframe Entitlement Simplification Project: Pilot project focusing on credit card business. EmblemHealth, NewYork, NewYork Consultant (7/2010 – 8/2010) Review User access rights on medical health care system. UBS, Weehawken, NewJersey Associate Director, ITI Risk Management, Distributed Systems and Storage (2007 – 12/2009)  Coordinate and monitor internal and external IT audits of Distributed Systems and Storage (Windows, UNIX, SQL/Oracle databases, AS400) to arrive at a consistent view on technology and risk.  Reviewed and assessed findings to ensure actions plans were implemented and in compliance with Sarbanes-Oxley regulations.  Developed and maintained a strong partnership with platform and application owners of Distributed Systems and Storage to implement effective observations and timely closure of agreed action plans.  Reviewed new system implementation and system refresh projects to identify and escalate any technology risk issues for compliance with Sarbanes-Oxley and corporate standards. Consulting Assignments, NewYork, NewYork IT Security Consultant (1999-2006) Analyze and document diverse IT infrastructures in support of Auditing and Sarbanes-Oxley compliance and access control for public companies. Included business process and technicalaudits of client systems and processes. Engagement highlights include:  Rabobank (Jefferson Wells)  New York Life Insurance Co. (Jefferson Wells)  Flushing Savings Bank (Jefferson Wells)  Citigroup (Jefferson Wells)  AIG (Jefferson Wells)  CIT (Jefferson Wells)  Agere, Inc.  Hollywood Casino, Division of Penn National Gaming  Finlay Fine Jewelry Co. Tiffany & Company – IT Division, Parsippany, NewJersey Project Leader(1998) Piloted migration of overseas computer data centers in London and Zurich to U.S. to support goal of providing better technical support and secure systemreliability. Yusen Air & Sea Service, Garden City, NewYork Wide Area Network (WAN) Manager (1992-1998)  Led software development team to design ocean export system.
  • 4. William H. Linder 1-718-882-5277 whlinder@juno.com 4  Consolidated nationwide computer operations onto a centralized IBM AS/400 computer and frame relay network across North America.  Managed migration of 6 warehouses spanning the U.S. to new facilities. EDUCATION & CAREER DEVELOPMENT Master of Arts, Hunter College of the City University of New York (CUNY) Bachelor of Arts, Temple University Diploma in Computer Science,New York University Oracle Developer Certificate, New Age Training, Inc., New York, New York (2003) Interconnecting Cisco Networking Devices, Global Knowledge, New York, New York Foreign Language Skills: Proficiency in German and working knowledge of Polish