Chris Wietharn
Details
Business Administration - Management Information Systems
Kansas State University
1989 : 1993
• Performing Project Management Practices (PMP) processes required for projects and activities.
• Performing analysis of business requirements and the impact to infrastructure.
• Meeting applicable service levels.
• Providing mentoring and training as needed.
• Working with senior management to balance cost and service objectives of the business.
• Performing regular and critical maintenance activities and applying hardware and software sysems upgrades as needed.
• Primary technical lead for Firewall (Policies, URL Filtering, Safe Search, Routing, VPN, Site-to-Site VPN, NAT rules), 2 factor authentication, Secure FTP and Database SIEM involving daily/project/maintenance work.
2016 : Present
Blue Cross and Blue Shield of Kansas
Senoir System Administrator - Information Security
Provide expert level expertise in all areas of information security. Primarily responsible for providing strategic vision and leadership in strengthening the Bank’s overall information security posture. Research emerging threats and trends, and recommend standards and procedures to mitigate risk across the organization. Provide third-tier technical support for advanced security issues.
• Provide strategic vision, direction, and leadership in strengthening the Bank’s overall information security posture through optimization of all areas of its security architecture, including security devices, applications, and processes.
• Research emerging threats and trends. Recommend and implement products, services and procedures to mitigate both current and future threats.
• Secondary administrator for all security devices, applications, and processes, including perimeter security, endpoint security and user access provisioning.
• Recommend standards, conventions, controls, policies, and procedures in all areas of information security. Consult with users across the organization on security-related matters.
• Mentor junior staff and third-tier technical support for advanced security issues.
• Perform other duties as assigned.
2014 : 2016
Federal Home Loan Bank of Topeka
IT Security Analyst
Work in a team environment to maintain Enterprise Security Environments. Possess expert-level technical knowledge in Application Security, Mainframe Security, Server/System Security (AIX, LINUX, Windows Server) and train in cross platform security operating systems, related software, and hardware components.
• Oversee the account administration process, ensuring that account creations, modifications, and deletions occur in a timely and appropriate manner.
• Ensure that appropriate roles, permission lists, and row level security exists for all functional areas.
• Work with stakeholders, customers, and technical resources to design, implement, and maintain security structures for delivered and customized PeopleSoft applications.
• Routinely audit security in all environments, ensuring that all users are appropriately provisioned for their work function.
• Acts as top tier support for critically escalated issues related to security.
• Analyze and resolves security and access problems
• Assist with rationalizing the cost of exposure/prevention vs. response/recovery to prioritize areas for security investment.
2011 : 2014
Payless ShoeSource
Senior Security Administrator (Team Lead)
Dedicated to administrating security for the departments business critical applications. In charge of safeguarding Revenue’s Personal Identifiable Information (PII), IRS Federal Tax Information (FTI), and Social Security Administration (SSA) records.
• Responsible for the day-to-day performance and goals of the System Security team comprised of 3 Security Analysts.
• Member of the Kansas IT Security Council which recommends and reviews policies, guidelines, and best practices for the overall security of information technology systems, infrastructure and data within Kansas state government.
• Performs advanced specialized work and responsible for the planning, development, implementation, and ongoing analysis of the KDOR Enterprise Security Policy (as defined by KDOR, IRS and the State of Kansas) and the detailed Security Procedures.
• Administer security requirements for KDOR IT Resources that includes physical security, user security, application security, system security, data security, network security, and security administration.
• Evaluate risk for the IT resources, establishes the appropriate security controls for them, provides assistance in the selection, installation, and implementation of controls, and monitors for compliance.
• Coordinates independent, third-party review of security measures or, as applicable, certification of IT process internal controls, security and compliance with external requirements for example : IRS Safeguard Review audit, SAS 70 audit, and Social Security Administration audit.
• Oversee the ongoing activities of Business Contingency and Continuity Planning within the IT department.
2010 : 2011
Kansas Department of Revenue
Information Services Security Officer/IT Security Manager
Handled day to day support for KHPA associates from desktop to server applications using unique and innovative approaches while providing first class customer service.
• Valued IT project member and technical lead of the Kansas Access to Comprehensive Health Program (KATCH) to support expanding or starting programs that would provide insurance for the uninsured.
• Transitioned to lead SharePoint Administrator to fulfill document sharing requirements for various project tasks.
• Assisted in network redesign dealing with hands on desktop support to ensure connectivity to network and application resources.
• Involved in design for an outreach program to allow remote user connectivity to network applications in order to determine Medicaid eligibility while in the field.
• Involved in the patching of Windows servers on a monthly and as needed basis to provide an up to date and secure network infrastructure.
2010 : 2010
Kansas Health Policy Authority
Technology Support Consultant III
Skills
Active Directory, Business Process Improvement, CISSP, Computer Security, DHCP, DNS, Email Encryption, Group Policy, Information Security, Information Technology, Infrastructure, Microsoft Exchange, Networking, Network Security, Sarbanes-Oxley, Security, Servers, SharePoint, TCP/IP, Technical Support, Troubleshooting, Two-factor Authentication, VPN, Windows Server
About
Information Technology Professional with proven track record in supporting all phases of operational technology systems requirements from start-up through maintenance. Proven abilities in IT Security, emerging trends, planning and implementation, and training/development. Client-focused with strong relationship building and strategic planning skills. Focused on Information Security standards while still emphasizing on customer service.
TECHNICAL EXPERIENCE
• Platforms: Microsoft Windows operating systems, Linux, AIX, MAC OS
• Networking: TCP/IP, Ethernet, VPN, SSH, DNS, DHCP, WINS, Microsoft Active Directory, Group Policy Objects, Citrix MetaFrame, St. Bernard Iprism, Microsoft Remote Access Server, Microsoft Terminal Server, McAfee IntruShield, McAfee IronMail, McAfee IronMail Secure Web Delivery, Cisco ASA, Cisco PIX, Check Point, Palo Alto Next Generation Firewall
• Tools: McAfee Active Virus Defense Suite, McAfee ePolicy Orchestrator, McAfee/Norton Virus Protection, McAfee IntruShield, eEye Retina Scanner, Tenable Nessus Scanner, TrueCrypt, Microsoft Exchange, Microsoft OWA, Wireless, Symantec Ghost, Microsoft Office Suite, Microsoft Live Communication Server, Aladdin SafeWord, Omtool FaxSr, Backup Exec, SharePoint 2007, Microsoft Internet Information Services, Lotus Notes, Teradata, PeopleSoft, Phone Factor, Mainframe TSO, Bulk AD Updater, AirWatch, Sophos, Shavlik, Juniper SSL VPN, RSA, IPSwitch Moveit Secure FTP, Imprivata OneSign, IBM Guardium