SlideShare a Scribd company logo
1 of 3
Download to read offline
 (321) 501-1380
                                                                                           thomas@thomasdelaine.com
                                                                                                www.thomasdelaine.com
                                                                                        www.linkedin.com/in/thomasdelaine
                                                                                             Currently reside in Melbourne, FL.




STRATEGICALLY FOCUSED INFORMATION ASSURANCE & DATA SECURITY DIRECTOR
benchmarking the necessary technology governance and processes to avert information security risk and profit loss


     executive summary

   Critical-thinking technology strategist and Certified Information Systems Security Professional (CISSP) with Top Security
   Clearance and master-level expertise in information assurance (IA) and information security (IS). Consistently called
   upon to solve the most complex technology issues surrounding operational effectiveness, cost, and risk. Trusted,
   respected advisor to leadership teams, integral in establishing and maintaining enterprise vision, strategy, programs and
   solutions to prevent internal and external security breaches and compliance issues. Well versed in diverse regulatory
   touch points for defense, government and commercial organizations. Person of action, adept at maximizing resources
   on complex, mission-critical projects and rallying success-focused teams around a unified vision of achievement.

     critical skill set

        Strategic Business Planning               7-Figure Budget Management             Test Development/Management
        Operations Leadership                     Team Leadership                        Training Development
        Governance/Policy Making                  Disaster Recovery Planning             IS Risk & Gap Analysis
        Business Continuity Planning              Auditing/Compliance                    Logistics Planning
        Project/Program Management                Incident Management                    Executive Client Engagement


     professional employment history


   IT SECURITY GOVERNANCE ANALYST                                                  2011 – Present                                                         NOTES
                                                                                                              ability, accommodate, accountability, accountable, accreditation,
                                                                                                              adapt, advisor, align, aligned, analytical, analyze, assessment, asset,


   JetBlue Airways                                                                                            assets, assurance, audit, awareness, bachelor's degree, business,
                                                                                                              capability, certification, certified, challenging, CISSP, clarifying,
                                                                                                              collaborate, collaborative, communicate, communicating,
                                                                                                              communication, compliance, computer science, computing,
                                                                                                              concept, conceptual, confidentiality, configure, configured,
                                                                                                              consensus, consultant, continuity, control, coordinate,


   Engaged to entrench Payment Card Industry Data Security Standards (PCI-DSS) culture across                 coordinating, coordination, create, culture, database, datum, day-
                                                                                                              to-day, deadline, define, defining, demonstrate, demonstrated,
                                                                                                              department of defense, detection, develop, developing, director,
                                                                                                              DOD, drive line, effectively, effectiveness, employee, enable,
                                                                                                              enabling, encryption, engage, enhancement, ensure, enterprise,


   the enterprise and overcome 4-year history of non-compliance. Immediately strengthened                     environment, evaluation, evolve, experience, expertise, familiarity,
                                                                                                              functional, governance, guideline, HIPPA, identify, implement,
                                                                                                              implementation, industry, information, information system,
                                                                                                              information technology, information assurance, infrastructure,
                                                                                                              initiative, innovative, integrate, integrated, interact, interpersonal,

   PCI environment with new governance, controls, documentation management system and                         ISO 27001, lead, leadership, level, leveraging, line of business,
                                                                                                              manage, management, master's degree, metric, metrics, mitigation,
                                                                                                              monitor, monitoring, morale, motivate, motivated, NIST, on-going,
                                                                                                              operation, operations, organize, outreach, oversee, oversight, PCI-


   information security training program—crucial to preventing additional tens of thousands in
                                                                                                              DSS, personnel, PII, plan, policy, practice, presentation, privacy,
                                                                                                              prioritize, proactive, problem solving, process, proficiency,
                                                                                                              program, proven, provide, regulatory, relate, related, report,
                                                                                                              reporting, require, requirement, resource, responsible, responsible
                                                                                                              for, risk, role, savvy, scorecard, security, security department,


   bank fines and shielding sensitive customer information assets across all enterprise networks.             security measure, security measures, security system, senior,
                                                                                                              service, services, skill, solution, solve, solving, SOX, spoken
                                                                                                              communication, standard, statues, steering committee, strategic,
                                                                                                              strong, system, tactical, TCP, TCP/IP, team, technical, technology,
                                                                                                              timely, translate, training, understand, understandable,
                                                                                                              understanding, update, vendor, vulnerability, work load



    Set foundation for enterprise-wide PCI-DSS compliance by creating and formalizing
     document management system for 10 separate information security domains and
     outlining policies, standards and procedures to simplify process management reporting.
    Authored Corporate Information Security Policy, 9 supporting information security policies
     and 30 information security standards in adherence with stringent PCI-DSS requirements.
    Positioned company to meet statutory privacy laws and information security and PCI-DSS
     regulatory requirements by restructuring and standardizing upgraded information security
     training program.
                                                                                             Thomas P. DeLaine, Jr. | Page 1 of 3
SENIOR CONSULTANT                                                                 2000 – 2011
A&N Associates, Inc.                                                                                                NOTES
Recruited to assist this $3M public-sector technical consulting firm to penetrate Department of
Defense (DoD) and Federal markets based on TS Clearance and previous DoD and 22-year
Communications Security (COMSEC) experience. Applied skill in cryptologic key management,
policy/standard development, training development and documentation management across
varied assignments during tenure. Forged long-term industry relationships with vendors to
include Raytheon and General Dynamics. Select projects and enterprise impact:
 Assumed role as key liaison to U.S. Defense Department program management offices
  (PMOs) in various capacities—from IT transition, ITIL-based system engineering and
  acquisition management to risk/gap/economic analysis, testing strategy and database
  implementations.
 Overcame critical gaps in DoD COMSEC accounting system, realized $224K cost savings in
  test development and cut redesign time 75% by overhauling data collection process and
  creating new test report template for key management system.
 Met 9-month deadline for Analysis of Alternatives (AoA) development project for DoD
  Public Key Infrastructure (PKI) program by combating issues of DoD identity management
  infrastructure impacting entire DoD.
 Proved instrumental in shaping policy and technical development strategy in pivotal areas
  including digital signatures, network policy and software certificate usage as advisor to
  U.S. Army Chief Information Officer/G6 Cyber Directorate (headquarters).
 Ensured DoD-wide compliance with strict HIPAA requirements as human identity
  verification source.

COMMUNICATIONS SECURITY OFFICER                                                  1998 – 2000
U.S. Navy Washington, DC
Counseled Chief of Naval Operations on information assurance strategy while overseeing 20-
strong team, $600K budget as well as technical operations and related projects. Select
projects and enterprise impact:
 Solved prevailing data translation issues and coordinated efforts of National Security
  Agency and service teams, ensuring zero disruption to mission-critical operations across
  900+ sites during DoD-wide migration of legacy system to COMSEC accounting system.
  Launched first-ever U.S. Navy user certification program.
 Called in at the eleventh hour to conduct mandatory security assessment and generate
  inspection report for U.S. Naval Postgraduate School. Met aggressive 3-week target with
  18 days to spare and advised on shaping systems integration plan to incorporate
  information security as a key priority.


  additional career history


SIGNALS WARFARE OFFICER                                                                             USS LAKE ERIE (CG 70)
Optimized $400K budget and performance of 16 staff while carrying out highly classified cryptologic key management,
electronic warfare and signal intelligence projects for DoD. Advised key leadership on USS LAKE ERIE and battle group
accountable for Persian Gulf theater of war operations.

                                                                                         Thomas P. DeLaine, Jr. | Page 2 of 3
LOGISTICS SUPPORT DIVISION OFFICER                                          Naval Security Group Activity, Pearl Harbor, HI
 Prompted $3.5M annual cost savings for Fleet Electronic Support Department by consolidating calibration lab facilities
 and refurbishing equipment. Saved $25K+ per year in testing by collaborating with Naval Magazine Lualualei to initiate
 test equipment calibration. Trimmed excess equipment holdings 32% by recycling $900K+ in obsolete electronic
 equipment and supplies to support foreign military efforts, key to winning “Best Large Maintenance Activity” recognition.
“[T.J.’s] distinctive accomplishments, unrelenting perseverance and steadfast devotion to duty reflected credit upon himself
and were in keeping with the highest traditions of the United States Naval Service.”—Commander in Chief, U.S. Pacific Fleet


 ENLISTED EDUCATIONAL ADVANCEMENT PROGRAM (EEAP) DIVISION OFFICER                           Naval Station, Pearl Harbor, HI
 Juggled full-time work and academic priorities while raising training commitment of 37-member EEAP team enrolled in 5
 state bachelor programs. Established division-wide scholastic precedent and compelled 56% of crew to earn 3.8 GPA or
 higher by earning both BA and MBA in 2 years, maintaining personal GPA requirements and graduating Magna Cum
 Laude with Leadership Distinction. Influenced policy decisions as Student Body President and Strategic Planning
 Committee member.




   credentials and technology skills

  MBA, Human Resources Management, Magna Cum Laude with Leadership Distinction, Chaminade University of
   Honolulu, School of Business, Honolulu, HI
  BA in Business Administration, Chaminade University of Honolulu, School of Business, Honolulu, HI
  Certified Information Systems Security Professional (CISSP) - ISC (#120222)
                                                                    2


  Provisional Auditor, Information Security Management Systems Scheme (ISO 27001) - RABQSA International
   (#110754)


 —Technical Snapshot—
  MS Active Directory, X.500, X.509, Online Certificate Status Protocol (OCSP), Certificate Revocation List (CRL), PKCS #7,
   PKCS #12, and Lightweight Directory Access Protocol (LDAP).
  Information Technology Infrastructure Library (ITIL) framework in systems engineering and acquisition management
   support.
  U.S. Defense Department PMO Environments: user requirement; concept of operations; analysis of operational
   effectiveness, cost, risks of proposed material/non-material solutions to gaps and shortfalls; economic analysis,
   capability development and test/evaluation documentation.
  PCI-required Controls: access management, network security, system security, risk assessment, data security and
   management, incident response, network monitoring, testing and information security.


   contact

  (321) 501-1380
  thomas@thomasdelaine.com
  www.thomasdelaine.com
   www.linkedin.com/in/thomasdelaine

 Currently reside in Melbourne, FL. Open to relocation within Central Florida and 30% business travel.

                                                                                           Thomas P. DeLaine, Jr. | Page 3 of 3

More Related Content

What's hot

Safety Culture Definitions and Enhancement Process
Safety Culture Definitions and Enhancement ProcessSafety Culture Definitions and Enhancement Process
Safety Culture Definitions and Enhancement ProcessISOB
 
Comprehensive integrated reporting fei article by david phillips mike willis ...
Comprehensive integrated reporting fei article by david phillips mike willis ...Comprehensive integrated reporting fei article by david phillips mike willis ...
Comprehensive integrated reporting fei article by david phillips mike willis ...Workiva
 
Florida Association of Community Colleges, Council of Student Affairs Present...
Florida Association of Community Colleges, Council of Student Affairs Present...Florida Association of Community Colleges, Council of Student Affairs Present...
Florida Association of Community Colleges, Council of Student Affairs Present...Margolis Healy
 
Information Security Maturity Model
Information Security Maturity ModelInformation Security Maturity Model
Information Security Maturity ModelCSCJournals
 
#sitbru Session 3 IT Governance for sap practitioners by Prof. G. Ataya
#sitbru Session 3 IT Governance for sap practitioners by Prof. G. Ataya#sitbru Session 3 IT Governance for sap practitioners by Prof. G. Ataya
#sitbru Session 3 IT Governance for sap practitioners by Prof. G. Atayamgillet
 
Risk Management
Risk ManagementRisk Management
Risk Managementrobertgk00
 

What's hot (9)

Warning Development Process Article
Warning Development Process ArticleWarning Development Process Article
Warning Development Process Article
 
Safety Culture Definitions and Enhancement Process
Safety Culture Definitions and Enhancement ProcessSafety Culture Definitions and Enhancement Process
Safety Culture Definitions and Enhancement Process
 
Comprehensive integrated reporting fei article by david phillips mike willis ...
Comprehensive integrated reporting fei article by david phillips mike willis ...Comprehensive integrated reporting fei article by david phillips mike willis ...
Comprehensive integrated reporting fei article by david phillips mike willis ...
 
Florida Association of Community Colleges, Council of Student Affairs Present...
Florida Association of Community Colleges, Council of Student Affairs Present...Florida Association of Community Colleges, Council of Student Affairs Present...
Florida Association of Community Colleges, Council of Student Affairs Present...
 
Information Security Maturity Model
Information Security Maturity ModelInformation Security Maturity Model
Information Security Maturity Model
 
#sitbru Session 3 IT Governance for sap practitioners by Prof. G. Ataya
#sitbru Session 3 IT Governance for sap practitioners by Prof. G. Ataya#sitbru Session 3 IT Governance for sap practitioners by Prof. G. Ataya
#sitbru Session 3 IT Governance for sap practitioners by Prof. G. Ataya
 
Ohsms geotech risk_acg_fillseminar_june2013_alexatkins
Ohsms geotech risk_acg_fillseminar_june2013_alexatkinsOhsms geotech risk_acg_fillseminar_june2013_alexatkins
Ohsms geotech risk_acg_fillseminar_june2013_alexatkins
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Convergence of Security Risks
Convergence of Security RisksConvergence of Security Risks
Convergence of Security Risks
 

Viewers also liked

Thomas P. DeLaine Jr.
Thomas P. DeLaine Jr.Thomas P. DeLaine Jr.
Thomas P. DeLaine Jr.tjdelaine
 
Winter deliverables ii
Winter deliverables iiWinter deliverables ii
Winter deliverables iiBrent_Gifford
 
Thomas P DeLaine Jr Resume
Thomas P DeLaine Jr ResumeThomas P DeLaine Jr Resume
Thomas P DeLaine Jr Resumetjdelaine
 
Srhe newer researchers 2013 conference
Srhe newer researchers 2013 conferenceSrhe newer researchers 2013 conference
Srhe newer researchers 2013 conferenceemilydanvers
 
Proposal presentation lab on chip
Proposal presentation lab on chipProposal presentation lab on chip
Proposal presentation lab on chipBrent_Gifford
 
η προεδρία της εε
η προεδρία της εεη προεδρία της εε
η προεδρία της εεΥΠΕΠΘ
 
Thomas P DeLine Jr Resume
Thomas P DeLine Jr ResumeThomas P DeLine Jr Resume
Thomas P DeLine Jr Resumetjdelaine
 
φυσικοί αριθμοί 1.docx
φυσικοί αριθμοί 1.docxφυσικοί αριθμοί 1.docx
φυσικοί αριθμοί 1.docxΥΠΕΠΘ
 
Text complexityces.gps.part1pdf.2
Text complexityces.gps.part1pdf.2Text complexityces.gps.part1pdf.2
Text complexityces.gps.part1pdf.2Mitchell6872
 
προσχολική αγωγή και δημιουργικότητα
προσχολική αγωγή και δημιουργικότηταπροσχολική αγωγή και δημιουργικότητα
προσχολική αγωγή και δημιουργικότηταΥΠΕΠΘ
 
Niveles y tipos de lenguajes de programación
Niveles y tipos de lenguajes de programaciónNiveles y tipos de lenguajes de programación
Niveles y tipos de lenguajes de programaciónJafet Duran
 
ESTRES - PROCESO DE ATENCION DE ENFERMERIA
ESTRES - PROCESO DE ATENCION DE ENFERMERIAESTRES - PROCESO DE ATENCION DE ENFERMERIA
ESTRES - PROCESO DE ATENCION DE ENFERMERIAMaria Victoria Padilla
 
Plagiarism awareness pack_activities
Plagiarism awareness pack_activitiesPlagiarism awareness pack_activities
Plagiarism awareness pack_activitiesemilydanvers
 
μαθηματικά: γεωμετρικά σχήματα και στερεά
μαθηματικά: γεωμετρικά σχήματα και στερεάμαθηματικά: γεωμετρικά σχήματα και στερεά
μαθηματικά: γεωμετρικά σχήματα και στερεάΥΠΕΠΘ
 
τα μαθηματικά στο νηπιαγωγείο
τα μαθηματικά στο νηπιαγωγείοτα μαθηματικά στο νηπιαγωγείο
τα μαθηματικά στο νηπιαγωγείοΥΠΕΠΘ
 
Aplicaciones Ecuaciones Diferenciales Resueltos
Aplicaciones Ecuaciones Diferenciales ResueltosAplicaciones Ecuaciones Diferenciales Resueltos
Aplicaciones Ecuaciones Diferenciales ResueltosJafet Duran
 

Viewers also liked (19)

Thomas P. DeLaine Jr.
Thomas P. DeLaine Jr.Thomas P. DeLaine Jr.
Thomas P. DeLaine Jr.
 
Winter deliverables ii
Winter deliverables iiWinter deliverables ii
Winter deliverables ii
 
Thomas P DeLaine Jr Resume
Thomas P DeLaine Jr ResumeThomas P DeLaine Jr Resume
Thomas P DeLaine Jr Resume
 
Srhe newer researchers 2013 conference
Srhe newer researchers 2013 conferenceSrhe newer researchers 2013 conference
Srhe newer researchers 2013 conference
 
Proposal presentation lab on chip
Proposal presentation lab on chipProposal presentation lab on chip
Proposal presentation lab on chip
 
η προεδρία της εε
η προεδρία της εεη προεδρία της εε
η προεδρία της εε
 
Thomas P DeLine Jr Resume
Thomas P DeLine Jr ResumeThomas P DeLine Jr Resume
Thomas P DeLine Jr Resume
 
φυσικοί αριθμοί 1.docx
φυσικοί αριθμοί 1.docxφυσικοί αριθμοί 1.docx
φυσικοί αριθμοί 1.docx
 
Academic Writing
Academic WritingAcademic Writing
Academic Writing
 
Text complexityces.gps.part1pdf.2
Text complexityces.gps.part1pdf.2Text complexityces.gps.part1pdf.2
Text complexityces.gps.part1pdf.2
 
προσχολική αγωγή και δημιουργικότητα
προσχολική αγωγή και δημιουργικότηταπροσχολική αγωγή και δημιουργικότητα
προσχολική αγωγή και δημιουργικότητα
 
Niveles y tipos de lenguajes de programación
Niveles y tipos de lenguajes de programaciónNiveles y tipos de lenguajes de programación
Niveles y tipos de lenguajes de programación
 
ESTRES - PROCESO DE ATENCION DE ENFERMERIA
ESTRES - PROCESO DE ATENCION DE ENFERMERIAESTRES - PROCESO DE ATENCION DE ENFERMERIA
ESTRES - PROCESO DE ATENCION DE ENFERMERIA
 
Plagiarism awareness pack_activities
Plagiarism awareness pack_activitiesPlagiarism awareness pack_activities
Plagiarism awareness pack_activities
 
MODO DE PRODUCCIÓN CAPITALISTA
MODO DE PRODUCCIÓN CAPITALISTAMODO DE PRODUCCIÓN CAPITALISTA
MODO DE PRODUCCIÓN CAPITALISTA
 
μαθηματικά: γεωμετρικά σχήματα και στερεά
μαθηματικά: γεωμετρικά σχήματα και στερεάμαθηματικά: γεωμετρικά σχήματα και στερεά
μαθηματικά: γεωμετρικά σχήματα και στερεά
 
τα μαθηματικά στο νηπιαγωγείο
τα μαθηματικά στο νηπιαγωγείοτα μαθηματικά στο νηπιαγωγείο
τα μαθηματικά στο νηπιαγωγείο
 
Aplicaciones Ecuaciones Diferenciales Resueltos
Aplicaciones Ecuaciones Diferenciales ResueltosAplicaciones Ecuaciones Diferenciales Resueltos
Aplicaciones Ecuaciones Diferenciales Resueltos
 
PRIMEROS AUXILIOS
PRIMEROS AUXILIOSPRIMEROS AUXILIOS
PRIMEROS AUXILIOS
 

Similar to Thomas DeLaine’s Resume

Ron Bingham Professional Resume
Ron Bingham Professional ResumeRon Bingham Professional Resume
Ron Bingham Professional Resumeronbingham
 
Resume of Todd Olsen
Resume of Todd OlsenResume of Todd Olsen
Resume of Todd OlsenTodd Olsen
 
Ron bingham resume
Ron bingham resumeRon bingham resume
Ron bingham resumeronbingham
 
Alan leal resume (Jan2013)
 Alan leal resume (Jan2013) Alan leal resume (Jan2013)
Alan leal resume (Jan2013)agleal
 
ISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTINGISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTINGArul Nambi
 
Business continuity management fundamentals update
Business continuity management fundamentals updateBusiness continuity management fundamentals update
Business continuity management fundamentals updateExo Futures
 
Resume Lisa deGuzman
Resume Lisa deGuzmanResume Lisa deGuzman
Resume Lisa deGuzmanldeguzman
 
From technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontierFrom technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontierRamsés Gallego
 
High Level Intro
High Level IntroHigh Level Intro
High Level Introfaisalsadaf
 
IBM Social Business Development for CXOs
IBM Social Business Development for CXOsIBM Social Business Development for CXOs
IBM Social Business Development for CXOsFriedel Jonker
 
Common Objectives of the CRO and the CAE
Common Objectives of the CRO and the CAECommon Objectives of the CRO and the CAE
Common Objectives of the CRO and the CAEWheelhouse Advisors LLC
 
Is3 Capabilities Brief
Is3 Capabilities BriefIs3 Capabilities Brief
Is3 Capabilities Briefmageeb
 
Public safety and intellectual capital
Public safety and intellectual capitalPublic safety and intellectual capital
Public safety and intellectual capitalDavid G. Jones
 
Nassers Pitchbook 112109 Blue1
Nassers Pitchbook 112109 Blue1Nassers Pitchbook 112109 Blue1
Nassers Pitchbook 112109 Blue1Nasser J Khan
 
DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013DFLABS SRL
 
Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By DesignNalneesh Gaur
 

Similar to Thomas DeLaine’s Resume (20)

Ron Bingham Professional Resume
Ron Bingham Professional ResumeRon Bingham Professional Resume
Ron Bingham Professional Resume
 
Resume of Todd Olsen
Resume of Todd OlsenResume of Todd Olsen
Resume of Todd Olsen
 
Ron bingham resume
Ron bingham resumeRon bingham resume
Ron bingham resume
 
Alan leal resume (Jan2013)
 Alan leal resume (Jan2013) Alan leal resume (Jan2013)
Alan leal resume (Jan2013)
 
Handling risk
Handling riskHandling risk
Handling risk
 
ISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTINGISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTING
 
Business continuity management fundamentals update
Business continuity management fundamentals updateBusiness continuity management fundamentals update
Business continuity management fundamentals update
 
Resume Lisa deGuzman
Resume Lisa deGuzmanResume Lisa deGuzman
Resume Lisa deGuzman
 
From technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontierFrom technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontier
 
High Level Intro
High Level IntroHigh Level Intro
High Level Intro
 
IBM Social Business Development for CXOs
IBM Social Business Development for CXOsIBM Social Business Development for CXOs
IBM Social Business Development for CXOs
 
Common Objectives of the CRO and the CAE
Common Objectives of the CRO and the CAECommon Objectives of the CRO and the CAE
Common Objectives of the CRO and the CAE
 
Is3 Capabilities Brief
Is3 Capabilities BriefIs3 Capabilities Brief
Is3 Capabilities Brief
 
Public safety and intellectual capital
Public safety and intellectual capitalPublic safety and intellectual capital
Public safety and intellectual capital
 
Allgress Brochure
Allgress BrochureAllgress Brochure
Allgress Brochure
 
PB CV v0.4
PB CV v0.4PB CV v0.4
PB CV v0.4
 
M.phil management
M.phil  managementM.phil  management
M.phil management
 
Nassers Pitchbook 112109 Blue1
Nassers Pitchbook 112109 Blue1Nassers Pitchbook 112109 Blue1
Nassers Pitchbook 112109 Blue1
 
DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013
 
Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By Design
 

Thomas DeLaine’s Resume

  • 1.  (321) 501-1380  thomas@thomasdelaine.com  www.thomasdelaine.com www.linkedin.com/in/thomasdelaine Currently reside in Melbourne, FL. STRATEGICALLY FOCUSED INFORMATION ASSURANCE & DATA SECURITY DIRECTOR benchmarking the necessary technology governance and processes to avert information security risk and profit loss executive summary Critical-thinking technology strategist and Certified Information Systems Security Professional (CISSP) with Top Security Clearance and master-level expertise in information assurance (IA) and information security (IS). Consistently called upon to solve the most complex technology issues surrounding operational effectiveness, cost, and risk. Trusted, respected advisor to leadership teams, integral in establishing and maintaining enterprise vision, strategy, programs and solutions to prevent internal and external security breaches and compliance issues. Well versed in diverse regulatory touch points for defense, government and commercial organizations. Person of action, adept at maximizing resources on complex, mission-critical projects and rallying success-focused teams around a unified vision of achievement. critical skill set  Strategic Business Planning  7-Figure Budget Management  Test Development/Management  Operations Leadership  Team Leadership  Training Development  Governance/Policy Making  Disaster Recovery Planning  IS Risk & Gap Analysis  Business Continuity Planning  Auditing/Compliance  Logistics Planning  Project/Program Management  Incident Management  Executive Client Engagement professional employment history IT SECURITY GOVERNANCE ANALYST 2011 – Present NOTES ability, accommodate, accountability, accountable, accreditation, adapt, advisor, align, aligned, analytical, analyze, assessment, asset, JetBlue Airways assets, assurance, audit, awareness, bachelor's degree, business, capability, certification, certified, challenging, CISSP, clarifying, collaborate, collaborative, communicate, communicating, communication, compliance, computer science, computing, concept, conceptual, confidentiality, configure, configured, consensus, consultant, continuity, control, coordinate, Engaged to entrench Payment Card Industry Data Security Standards (PCI-DSS) culture across coordinating, coordination, create, culture, database, datum, day- to-day, deadline, define, defining, demonstrate, demonstrated, department of defense, detection, develop, developing, director, DOD, drive line, effectively, effectiveness, employee, enable, enabling, encryption, engage, enhancement, ensure, enterprise, the enterprise and overcome 4-year history of non-compliance. Immediately strengthened environment, evaluation, evolve, experience, expertise, familiarity, functional, governance, guideline, HIPPA, identify, implement, implementation, industry, information, information system, information technology, information assurance, infrastructure, initiative, innovative, integrate, integrated, interact, interpersonal, PCI environment with new governance, controls, documentation management system and ISO 27001, lead, leadership, level, leveraging, line of business, manage, management, master's degree, metric, metrics, mitigation, monitor, monitoring, morale, motivate, motivated, NIST, on-going, operation, operations, organize, outreach, oversee, oversight, PCI- information security training program—crucial to preventing additional tens of thousands in DSS, personnel, PII, plan, policy, practice, presentation, privacy, prioritize, proactive, problem solving, process, proficiency, program, proven, provide, regulatory, relate, related, report, reporting, require, requirement, resource, responsible, responsible for, risk, role, savvy, scorecard, security, security department, bank fines and shielding sensitive customer information assets across all enterprise networks. security measure, security measures, security system, senior, service, services, skill, solution, solve, solving, SOX, spoken communication, standard, statues, steering committee, strategic, strong, system, tactical, TCP, TCP/IP, team, technical, technology, timely, translate, training, understand, understandable, understanding, update, vendor, vulnerability, work load  Set foundation for enterprise-wide PCI-DSS compliance by creating and formalizing document management system for 10 separate information security domains and outlining policies, standards and procedures to simplify process management reporting.  Authored Corporate Information Security Policy, 9 supporting information security policies and 30 information security standards in adherence with stringent PCI-DSS requirements.  Positioned company to meet statutory privacy laws and information security and PCI-DSS regulatory requirements by restructuring and standardizing upgraded information security training program. Thomas P. DeLaine, Jr. | Page 1 of 3
  • 2. SENIOR CONSULTANT 2000 – 2011 A&N Associates, Inc. NOTES Recruited to assist this $3M public-sector technical consulting firm to penetrate Department of Defense (DoD) and Federal markets based on TS Clearance and previous DoD and 22-year Communications Security (COMSEC) experience. Applied skill in cryptologic key management, policy/standard development, training development and documentation management across varied assignments during tenure. Forged long-term industry relationships with vendors to include Raytheon and General Dynamics. Select projects and enterprise impact:  Assumed role as key liaison to U.S. Defense Department program management offices (PMOs) in various capacities—from IT transition, ITIL-based system engineering and acquisition management to risk/gap/economic analysis, testing strategy and database implementations.  Overcame critical gaps in DoD COMSEC accounting system, realized $224K cost savings in test development and cut redesign time 75% by overhauling data collection process and creating new test report template for key management system.  Met 9-month deadline for Analysis of Alternatives (AoA) development project for DoD Public Key Infrastructure (PKI) program by combating issues of DoD identity management infrastructure impacting entire DoD.  Proved instrumental in shaping policy and technical development strategy in pivotal areas including digital signatures, network policy and software certificate usage as advisor to U.S. Army Chief Information Officer/G6 Cyber Directorate (headquarters).  Ensured DoD-wide compliance with strict HIPAA requirements as human identity verification source. COMMUNICATIONS SECURITY OFFICER 1998 – 2000 U.S. Navy Washington, DC Counseled Chief of Naval Operations on information assurance strategy while overseeing 20- strong team, $600K budget as well as technical operations and related projects. Select projects and enterprise impact:  Solved prevailing data translation issues and coordinated efforts of National Security Agency and service teams, ensuring zero disruption to mission-critical operations across 900+ sites during DoD-wide migration of legacy system to COMSEC accounting system. Launched first-ever U.S. Navy user certification program.  Called in at the eleventh hour to conduct mandatory security assessment and generate inspection report for U.S. Naval Postgraduate School. Met aggressive 3-week target with 18 days to spare and advised on shaping systems integration plan to incorporate information security as a key priority. additional career history SIGNALS WARFARE OFFICER USS LAKE ERIE (CG 70) Optimized $400K budget and performance of 16 staff while carrying out highly classified cryptologic key management, electronic warfare and signal intelligence projects for DoD. Advised key leadership on USS LAKE ERIE and battle group accountable for Persian Gulf theater of war operations. Thomas P. DeLaine, Jr. | Page 2 of 3
  • 3. LOGISTICS SUPPORT DIVISION OFFICER Naval Security Group Activity, Pearl Harbor, HI Prompted $3.5M annual cost savings for Fleet Electronic Support Department by consolidating calibration lab facilities and refurbishing equipment. Saved $25K+ per year in testing by collaborating with Naval Magazine Lualualei to initiate test equipment calibration. Trimmed excess equipment holdings 32% by recycling $900K+ in obsolete electronic equipment and supplies to support foreign military efforts, key to winning “Best Large Maintenance Activity” recognition. “[T.J.’s] distinctive accomplishments, unrelenting perseverance and steadfast devotion to duty reflected credit upon himself and were in keeping with the highest traditions of the United States Naval Service.”—Commander in Chief, U.S. Pacific Fleet ENLISTED EDUCATIONAL ADVANCEMENT PROGRAM (EEAP) DIVISION OFFICER Naval Station, Pearl Harbor, HI Juggled full-time work and academic priorities while raising training commitment of 37-member EEAP team enrolled in 5 state bachelor programs. Established division-wide scholastic precedent and compelled 56% of crew to earn 3.8 GPA or higher by earning both BA and MBA in 2 years, maintaining personal GPA requirements and graduating Magna Cum Laude with Leadership Distinction. Influenced policy decisions as Student Body President and Strategic Planning Committee member. credentials and technology skills  MBA, Human Resources Management, Magna Cum Laude with Leadership Distinction, Chaminade University of Honolulu, School of Business, Honolulu, HI  BA in Business Administration, Chaminade University of Honolulu, School of Business, Honolulu, HI  Certified Information Systems Security Professional (CISSP) - ISC (#120222) 2  Provisional Auditor, Information Security Management Systems Scheme (ISO 27001) - RABQSA International (#110754) —Technical Snapshot—  MS Active Directory, X.500, X.509, Online Certificate Status Protocol (OCSP), Certificate Revocation List (CRL), PKCS #7, PKCS #12, and Lightweight Directory Access Protocol (LDAP).  Information Technology Infrastructure Library (ITIL) framework in systems engineering and acquisition management support.  U.S. Defense Department PMO Environments: user requirement; concept of operations; analysis of operational effectiveness, cost, risks of proposed material/non-material solutions to gaps and shortfalls; economic analysis, capability development and test/evaluation documentation.  PCI-required Controls: access management, network security, system security, risk assessment, data security and management, incident response, network monitoring, testing and information security. contact  (321) 501-1380  thomas@thomasdelaine.com  www.thomasdelaine.com www.linkedin.com/in/thomasdelaine Currently reside in Melbourne, FL. Open to relocation within Central Florida and 30% business travel. Thomas P. DeLaine, Jr. | Page 3 of 3