:)
The architect
LIFE PHILOSOPHY
The greatest glory in living lies not in never falling, but rising every time we fall
Nelson Mandela.
SOFT SKILLS EXPERTISE
- Storytelling for impact style of communications to executives, business, and peers - PowerPoint presentations (10/10).
- Unbiased analysis, research, and recommendations (10/10).
- Budget and situation sensitive solutions and proposals (10/10).
- Highly efficient problem solving and decision making on any level (10/10).
- Leadership on mission-critical security projects (10/10).
- Negotiation and mediation between teams with opposing objectives (8/10).
TECHNICAL SKILLS EXPERTISE
- Security Strategies and Patterns (100% approval rate on review boards) (10/10).
- Security Industry Technology Point of Views for executives (10/10).
- Security Tool Selections (100% approval rate on the first reading) (10/10).
- Security Architectures (100% approval rate on review boards) (10/10).
MOST PROUD OF
- Reaching the top level of trusted security architecture advisory in the IT team of approx. 10,000 people.
- Being invited to the setup of zero trust architecture certification course by Forester (research company which coined the term Zero Trust).
- Being invited to the setup of cyber risk sharing through Full Homomorphic Encryption initiative by Massachusetts Institute of Technology, MIT (private research university in Cambridge, Massachusetts).
- Being invited to the Google Cloud (GCP) Security Improvements Expert Panel on one of the early Google Cloud Next Conferences.
- Being member of the organizing committee and official IT leadership storyteller for a charity golf tournament raising over $300,000 each year.
- Inspiring the next generation of cyber security leaders by example.
MAJOR INITIATIVES - LAST 5 YEARS
- SCOPE: > 11 million clients, > 55,000 workers, > 1,000 apps, > 25,000 compute nodes / servers.
- STRATEGIES, PATTERNS, ARCHITECTURE and TOOL SELECTION
* FUSION OPERATIONS CENTER (Initial Strategy and Architecture for unified Security, Fraud and Anti-money Laundering Operations Center)
MAJOR INITIATIVES - LAST 5 YEARS
- SCOPE: > 11 million clients, > 55,000 workers, > 1,000 apps, > 25,000 compute nodes / servers.
- STRATEGIES, PATTERNS, ARCHITECTURE and TOOL SELECTION * RUN-TIME PROTECTION
- > New Perimeter - NextGen Firewalls: SSL Decryption, Network IPS, Anti-malware with Sandbox,
- URL Filtering, Application Visibility and Control
- > B2C and B2B Security Patterns (no tool selection): Web Application Firewall, DDoS Protection
- and Bot Protection for B2C and B2B (Akamai)
- > Data Leakage Protection (DLP)
- > Distributed Deception Platform
- > Cloud Access Security Broker (CASB)
- > Micro-segmentation (partial tool selection)
- > Workload as a Basic Unit of Protection: Host IPS, Anti-malware, Host Firewall,
- File Integrity Monitoring, Software and Service Control, Container Run-time Security
- > Worker Endpoint Protection: Host Firewall, Encryption, Anti-malware, Software and
- Service Control
- * SECURITY IN PUBLIC CLOUDS (Strategy, Tools, Roadmap)
The SERVICES
CYBERSECURITY STRATEGIES
Cybersecurity Strategy defines how the Cybersecurity Vision will be translated to technology capabilities and policiesIt is important to always include the Cybersecurity strategy and high-level architectures in case of a regular or post-incident audits. It will show that company is serious about Cybersecurity and protecting client and employee data. It can also help to lower the Cyber insurance costs.
CYBERSECURITY POINT OF VIEWS
Detailed views at segments of cybersecurity landscape for Executives and Senior Management as well as IT personnel. Includes a brief review of main market players.
CYBERSECURITY ARCHITECTURES and
CYBERSECURITY IMPLEMENTATION PLANS
From the Current State (where you are) to the Future State (a.k.a. End State), where you want to be, based on the Strategy, through rarely one or, more common, a series of Transition States that are often linked to Programs and/or Projects. Transition states must be very much budget sensitive.
CYBERSECURITY DESIGN PATTERNS
Reusable Cybersecurity architecture/design pattern provides consistency between different enterprise teams solving a same, recurring security problem.
CYBERSECURITY TOOL SELECTION
Methodology used for tool selection, is one hundred percent successfully proven in trenches, based on complete transparency and teamwork. At the end of the selection, SMEs (Subject Matter Experts) from all involved teams, no matter how different objectives their departments have, stand together behind the recommended product.
CYBERSECURITY RISK ASSESSMENTS
Assessments are based on documentation and clarifications provided by the Client and involved third parties.Assessments of technology, cybersecurity tools, policies, guidelines and best practices for potential cybersecurity threats and weaknesses are based on selected cybersecurity industry frameworks and best practices providing prioritized gap remediations.
THE ACHIEVEMENTS
PERFORMANCE REVIEWS AND AWARDS
Achieved Exceeded Expectations or Exceptional Performance in each of 29 full-time, corporate years in Canada, as well as multiple top awards:CIBC:• One (1) Annual Achiever Award• Seven (7) Quarterly Individual Achiever Awards• Four (4) Quarterly Team Impact AwardsTeranet:• One (1) Annual Achiever Award• Four (4) Project Impact Awards
EXAMPLE OF THANK-YOU NOTES - LAST 5 YEARS
- OMG THANK YOU!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- These two documents are phenomenal. Thanks for all of your leadership and hard work in pulling them together.
- The CIBC team is very lucky to have you on their team.
- Anytime and anything for you.
- Great! Thank you, working with you is such a breeze.
- Amazing, a million thank yous, really appreciate the help.
- Good call. Right call.
THE CONNECTION
You can find the Architect on LinkedIn
Oceans Cyber Tech
Copyright © 2024 Oceans Cyber Tech. All Rights Reserved