SlideShare a Scribd company logo
1 of 2
MICHAEL BARHAM 
901 MCDONOUGH ST. 123 • RICHMOND, Virginia 23224 
(804) 833-3764 • barham.m@gmail.com 
Summary of Qualifications 
As a professional information security analyst, I have been responsible for protecting an organization's 
digital information and computer networks. I have accomplished more than 15 years of work 
experience and verifiable achievements in information technology, data security, customer support; as 
well as network and system operations. Expert at generating high-quality solutions that enhanced 
business and IT operations, complemented with expertise in surpassing expectations and rendering 
optimum level of service under time constraints or special considerations. Skilled at conducting 
computer systems audits to ensure security controls and updates. While on active military I held a Top 
Secret Security Clearance which from 1999-2006 has lapsed, but I am “Clearable” for future 
sponsorship. My time in service developed my ability to build strong relationships within team 
members and all levels of management, along with a reputation for dependability and close attention 
to detail. 
 Experience with multiple computer systems and programs. 
 Logical thinking and analytical ability. 
 The ability to solve problems independently. 
 Strong verbal and written communication ability. 
 Sound decision-making ability. 
 Ability to handle sensitive information and maintain established SLA’s. 
Professional Experience 
Wells Fargo & Co. -Contract, Richmond, Virginia 
Enterprise Access Management (EAM), Security Management, UNIX, July 2013 – October 2014 
EAM procedures, along with security management of drive share access and controls. Migration of 42 
terabytes of server data from Wachovia to Wells Fargo & Co. servers, implantation of all new security 
policy and procedures for control of access to the new share. Subinacl & Robocopy scripting procedures, 
data migration and staging process control. 
 Use of SecureCRT in a Microsoft Windows environment as UNIX terminal for secure script runs in 
manual or automation modes. 
 Security controls policy for migration procedures and access management to users 
 Allocation of business information for build-out of new server share location, folders and user 
permissions groups. 
 Subinacl, Robocopy staging of migration controls and securities for overnight data migration. 
 Participating in the evaluation, development, and implementation of security standards, procedures, 
and guidelines for multiple platforms and diverse systems environments 
 Designing network vulnerability scans and providing remediation alternatives 
 Developing specifications for complex network security 
 Identifying emerging vulnerabilities and evaluating associated risks and threats
Bank of America, Richmond, Virginia 
Operations Readiness & Change Oversight, January 2010 – March 2012 
Handle various monitoring activities including website, credit card transaction and stock market server 
assets system, IMB, Solaris, UNIX & Oracle. System administration provided along with implementation 
of hardware and software solutions. Systems support analysis for technology needs and security and 
provided technical support and troubleshooting; customer and end user relations, regulatory 
compliance and standards leadership, training, and team collaboration. 
 Monitored, managed & resolved incoming event viewer for financial market software on a 24/7 
global scale for the Merrill Lynch/BAC data servers. 
 Client access security control, UNIX security backup request, testing development servers 
 Net-cool, Citrix portal, Unix WebTop, Site Scope, GSM, MySQL or Oracle & Sybase portals. 
 Managed daily checks and pass-down & security control on a global 24/7 team. 
 Review Technical Security Controls and provided implementation responses as to if/how the Systems 
are currently meeting the requirements. 
 Installation and maintenance of security software 
 Instructing computer users on security 
 Ensuring networks are free of breaches 
U.S. Army - A.F. Africa, CAN, EU, Mideast 
Communication chief Sergeant E-5, April 1999 – August 2004 
 Primary adviser to Unit Commander on all communications during real world tactical and training 
operations while deployed to foreign countries and in garrison headquarters. 
 Provided satellite, cellular, long/short range radio communications to unit garrison offices for field 
training exercises and real world mission deployments. 
 Top Secret , Sensitive Compartmented Information (TS/SCI) 1999-2006 
 ISSO(Information Systems Security Officer) For the 272nd MP Co. commander staff operations and US 
Army network security measures 
 Encryption Key real world COMSEC security officer for the 272nd MP Co 
Additional Information & Skills 
Structured Thinking and Writing, Interpersonal Communication Skills, Information Security Policies, 
Cost AllocationManagement, Microsoft Office Suite 2010, 2013 , Microsoft Server 2008, 2012, Routers, 
Hubs, and Switches, HTML, CSS, JavaScript, UNIX scripting, Shell & Bash, Enterprise Access 
Management Security, Subinacl & Robocopy server tools, Network Protocols, Network Security 
Education 
University of Phoenix 
Web & Application Development & Design, January 2013 – Present 
University of Phoenix 
Information Technology, Technology Support, August 2010 – November 2012 
Ft. Gordon, GA US Army Signal School 
Signal Support Systems Specialist Certification, Honor Graduate – 1999

More Related Content

What's hot

Software Security Training
Software Security TrainingSoftware Security Training
Software Security Training
Bryan Len
 
IT Help Desk General_Resume1
IT Help Desk General_Resume1IT Help Desk General_Resume1
IT Help Desk General_Resume1
Ray Shatto
 
Richard Andrews Resume 2016-sr-admin-boa-3
Richard Andrews Resume 2016-sr-admin-boa-3Richard Andrews Resume 2016-sr-admin-boa-3
Richard Andrews Resume 2016-sr-admin-boa-3
Rich Andrews
 

What's hot (20)

Terrance A. 10.20.15
Terrance A. 10.20.15Terrance A. 10.20.15
Terrance A. 10.20.15
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Lesson 1- Intrusion Detection
Lesson 1- Intrusion DetectionLesson 1- Intrusion Detection
Lesson 1- Intrusion Detection
 
17 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_201217 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_2012
 
Information security
Information security Information security
Information security
 
Ise viii-information and network security [10 is835]-solution
Ise viii-information and network  security [10 is835]-solutionIse viii-information and network  security [10 is835]-solution
Ise viii-information and network security [10 is835]-solution
 
Lesson 2 Cryptography tools
Lesson 2 Cryptography toolsLesson 2 Cryptography tools
Lesson 2 Cryptography tools
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Software Security Training
Software Security TrainingSoftware Security Training
Software Security Training
 
Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2
 
Information Security
Information SecurityInformation Security
Information Security
 
Mini IT Security Assessment
Mini IT Security AssessmentMini IT Security Assessment
Mini IT Security Assessment
 
IT Help Desk General_Resume1
IT Help Desk General_Resume1IT Help Desk General_Resume1
IT Help Desk General_Resume1
 
Security Analysis Findings and Recommendations for the Department of Veterans...
Security Analysis Findings and Recommendations for the Department of Veterans...Security Analysis Findings and Recommendations for the Department of Veterans...
Security Analysis Findings and Recommendations for the Department of Veterans...
 
Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1
 
Information security
Information securityInformation security
Information security
 
Network Security Projects Research Assistance
Network Security Projects Research AssistanceNetwork Security Projects Research Assistance
Network Security Projects Research Assistance
 
Lesson 3- Remote Access
Lesson 3- Remote AccessLesson 3- Remote Access
Lesson 3- Remote Access
 
Richard Andrews Resume 2016-sr-admin-boa-3
Richard Andrews Resume 2016-sr-admin-boa-3Richard Andrews Resume 2016-sr-admin-boa-3
Richard Andrews Resume 2016-sr-admin-boa-3
 

Viewers also liked (10)

Maria palacios cepeda 803 12-06-16 [autoguardado]
Maria palacios cepeda 803 12-06-16 [autoguardado]Maria palacios cepeda 803 12-06-16 [autoguardado]
Maria palacios cepeda 803 12-06-16 [autoguardado]
 
Klonopin in children
Klonopin in childrenKlonopin in children
Klonopin in children
 
2006./07. mācību gads 1.semestris Malnavas koledžā
2006./07. mācību gads 1.semestris Malnavas koledžā2006./07. mācību gads 1.semestris Malnavas koledžā
2006./07. mācību gads 1.semestris Malnavas koledžā
 
Grains
GrainsGrains
Grains
 
2007./08. mācību gads 1.semestris Malnavas koledžā
2007./08. mācību gads 1.semestris Malnavas koledžā2007./08. mācību gads 1.semestris Malnavas koledžā
2007./08. mācību gads 1.semestris Malnavas koledžā
 
Cv Ibrahim Askar ( updated )
Cv Ibrahim Askar ( updated )Cv Ibrahim Askar ( updated )
Cv Ibrahim Askar ( updated )
 
Maroun Nassar CV
Maroun Nassar CVMaroun Nassar CV
Maroun Nassar CV
 
Lemon Physiological Disorders A Lecture By Allah Dad Khan To FFS Trainee
Lemon Physiological Disorders   A Lecture By Allah Dad Khan To FFS Trainee Lemon Physiological Disorders   A Lecture By Allah Dad Khan To FFS Trainee
Lemon Physiological Disorders A Lecture By Allah Dad Khan To FFS Trainee
 
الجداول
الجداولالجداول
الجداول
 
DK_222
DK_222DK_222
DK_222
 

Similar to Michael Barham Resume 2014 ISA

Michael L Sawall INFOSEC
Michael L Sawall INFOSECMichael L Sawall INFOSEC
Michael L Sawall INFOSEC
Mike Sawall
 
William H Cooke resume 1
William H Cooke resume 1William H Cooke resume 1
William H Cooke resume 1
William Cooke
 
Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin Carrow
 
rafael_pabon_20160524
rafael_pabon_20160524rafael_pabon_20160524
rafael_pabon_20160524
Rafael Pabon
 
Information Security Officer Internet Resume Leon Blum Copy
Information Security Officer  Internet Resume Leon Blum   CopyInformation Security Officer  Internet Resume Leon Blum   Copy
Information Security Officer Internet Resume Leon Blum Copy
Lblum1234
 
End.Eng._Scott Bier_VA
End.Eng._Scott Bier_VAEnd.Eng._Scott Bier_VA
End.Eng._Scott Bier_VA
Scott Bier
 
Alans Resume 2017
Alans Resume 2017Alans Resume 2017
Alans Resume 2017
Alan Gray
 
Davila_Bryan_resume
Davila_Bryan_resumeDavila_Bryan_resume
Davila_Bryan_resume
Bryan Davila
 
Davila Bryan resume
Davila Bryan resumeDavila Bryan resume
Davila Bryan resume
Bryan Davila
 
Sam Roby Resume
Sam Roby ResumeSam Roby Resume
Sam Roby Resume
Sam Roby
 
Davila_Bryan_resume
Davila_Bryan_resumeDavila_Bryan_resume
Davila_Bryan_resume
Bryan Davila
 
Christina Carson Resume 2016
Christina Carson Resume 2016Christina Carson Resume 2016
Christina Carson Resume 2016
Christina Carson
 
Randy Poehl Resume 2015E
Randy Poehl Resume 2015ERandy Poehl Resume 2015E
Randy Poehl Resume 2015E
Randy Poehl
 
Randy Poehl Resume 2015E
Randy Poehl Resume 2015ERandy Poehl Resume 2015E
Randy Poehl Resume 2015E
Randy Poehl
 
Jesse Hinton Resume
Jesse Hinton ResumeJesse Hinton Resume
Jesse Hinton Resume
Jesse Hinton
 

Similar to Michael Barham Resume 2014 ISA (20)

Michael L Sawall INFOSEC
Michael L Sawall INFOSECMichael L Sawall INFOSEC
Michael L Sawall INFOSEC
 
Zavala Pena, Crisogono
Zavala Pena, CrisogonoZavala Pena, Crisogono
Zavala Pena, Crisogono
 
William H Cooke resume 1
William H Cooke resume 1William H Cooke resume 1
William H Cooke resume 1
 
Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015
 
rafael_pabon_20160524
rafael_pabon_20160524rafael_pabon_20160524
rafael_pabon_20160524
 
Information Security Officer Internet Resume Leon Blum Copy
Information Security Officer  Internet Resume Leon Blum   CopyInformation Security Officer  Internet Resume Leon Blum   Copy
Information Security Officer Internet Resume Leon Blum Copy
 
End.Eng._Scott Bier_VA
End.Eng._Scott Bier_VAEnd.Eng._Scott Bier_VA
End.Eng._Scott Bier_VA
 
Alans Resume 2017
Alans Resume 2017Alans Resume 2017
Alans Resume 2017
 
Llewellyn Link Resume
Llewellyn Link ResumeLlewellyn Link Resume
Llewellyn Link Resume
 
Hayat resume 1
Hayat resume 1Hayat resume 1
Hayat resume 1
 
Davila_Bryan_resume
Davila_Bryan_resumeDavila_Bryan_resume
Davila_Bryan_resume
 
Davila Bryan resume
Davila Bryan resumeDavila Bryan resume
Davila Bryan resume
 
Sam Roby Resume
Sam Roby ResumeSam Roby Resume
Sam Roby Resume
 
Davila_Bryan_resume
Davila_Bryan_resumeDavila_Bryan_resume
Davila_Bryan_resume
 
Christina Carson Resume 2016
Christina Carson Resume 2016Christina Carson Resume 2016
Christina Carson Resume 2016
 
Randy Poehl Resume 2015E
Randy Poehl Resume 2015ERandy Poehl Resume 2015E
Randy Poehl Resume 2015E
 
Randy Poehl Resume 2015E
Randy Poehl Resume 2015ERandy Poehl Resume 2015E
Randy Poehl Resume 2015E
 
2017 skills resume
2017 skills resume2017 skills resume
2017 skills resume
 
Jesse Hinton Resume
Jesse Hinton ResumeJesse Hinton Resume
Jesse Hinton Resume
 
B Parker Resume rev 2
B Parker Resume rev 2B Parker Resume rev 2
B Parker Resume rev 2
 

Michael Barham Resume 2014 ISA

  • 1. MICHAEL BARHAM 901 MCDONOUGH ST. 123 • RICHMOND, Virginia 23224 (804) 833-3764 • barham.m@gmail.com Summary of Qualifications As a professional information security analyst, I have been responsible for protecting an organization's digital information and computer networks. I have accomplished more than 15 years of work experience and verifiable achievements in information technology, data security, customer support; as well as network and system operations. Expert at generating high-quality solutions that enhanced business and IT operations, complemented with expertise in surpassing expectations and rendering optimum level of service under time constraints or special considerations. Skilled at conducting computer systems audits to ensure security controls and updates. While on active military I held a Top Secret Security Clearance which from 1999-2006 has lapsed, but I am “Clearable” for future sponsorship. My time in service developed my ability to build strong relationships within team members and all levels of management, along with a reputation for dependability and close attention to detail.  Experience with multiple computer systems and programs.  Logical thinking and analytical ability.  The ability to solve problems independently.  Strong verbal and written communication ability.  Sound decision-making ability.  Ability to handle sensitive information and maintain established SLA’s. Professional Experience Wells Fargo & Co. -Contract, Richmond, Virginia Enterprise Access Management (EAM), Security Management, UNIX, July 2013 – October 2014 EAM procedures, along with security management of drive share access and controls. Migration of 42 terabytes of server data from Wachovia to Wells Fargo & Co. servers, implantation of all new security policy and procedures for control of access to the new share. Subinacl & Robocopy scripting procedures, data migration and staging process control.  Use of SecureCRT in a Microsoft Windows environment as UNIX terminal for secure script runs in manual or automation modes.  Security controls policy for migration procedures and access management to users  Allocation of business information for build-out of new server share location, folders and user permissions groups.  Subinacl, Robocopy staging of migration controls and securities for overnight data migration.  Participating in the evaluation, development, and implementation of security standards, procedures, and guidelines for multiple platforms and diverse systems environments  Designing network vulnerability scans and providing remediation alternatives  Developing specifications for complex network security  Identifying emerging vulnerabilities and evaluating associated risks and threats
  • 2. Bank of America, Richmond, Virginia Operations Readiness & Change Oversight, January 2010 – March 2012 Handle various monitoring activities including website, credit card transaction and stock market server assets system, IMB, Solaris, UNIX & Oracle. System administration provided along with implementation of hardware and software solutions. Systems support analysis for technology needs and security and provided technical support and troubleshooting; customer and end user relations, regulatory compliance and standards leadership, training, and team collaboration.  Monitored, managed & resolved incoming event viewer for financial market software on a 24/7 global scale for the Merrill Lynch/BAC data servers.  Client access security control, UNIX security backup request, testing development servers  Net-cool, Citrix portal, Unix WebTop, Site Scope, GSM, MySQL or Oracle & Sybase portals.  Managed daily checks and pass-down & security control on a global 24/7 team.  Review Technical Security Controls and provided implementation responses as to if/how the Systems are currently meeting the requirements.  Installation and maintenance of security software  Instructing computer users on security  Ensuring networks are free of breaches U.S. Army - A.F. Africa, CAN, EU, Mideast Communication chief Sergeant E-5, April 1999 – August 2004  Primary adviser to Unit Commander on all communications during real world tactical and training operations while deployed to foreign countries and in garrison headquarters.  Provided satellite, cellular, long/short range radio communications to unit garrison offices for field training exercises and real world mission deployments.  Top Secret , Sensitive Compartmented Information (TS/SCI) 1999-2006  ISSO(Information Systems Security Officer) For the 272nd MP Co. commander staff operations and US Army network security measures  Encryption Key real world COMSEC security officer for the 272nd MP Co Additional Information & Skills Structured Thinking and Writing, Interpersonal Communication Skills, Information Security Policies, Cost AllocationManagement, Microsoft Office Suite 2010, 2013 , Microsoft Server 2008, 2012, Routers, Hubs, and Switches, HTML, CSS, JavaScript, UNIX scripting, Shell & Bash, Enterprise Access Management Security, Subinacl & Robocopy server tools, Network Protocols, Network Security Education University of Phoenix Web & Application Development & Design, January 2013 – Present University of Phoenix Information Technology, Technology Support, August 2010 – November 2012 Ft. Gordon, GA US Army Signal School Signal Support Systems Specialist Certification, Honor Graduate – 1999