David Rose
Details
Electrical/Electronics Maintenance and Repair Technology
Madison Area Technical College
Associate’s Degree
Computer Programming/Programmer, General
Madison Area Technical College
General Studies
General Studies
Madison Area Technical College
Culver's Restaurants
Information Security Architect
The role of an Information Security Engineer involves managing computer systems, networks, and conducting thorough assessments of security concerns related to new hardware or software. This engineer is responsible for recognizing, examining, and addressing information security alerts. They actively participate in analyzing datasets to identify potential threats and irregularities, while also implementing indicators and metrics to ensure the ongoing efficacy of security protocols and controls.
2019 :
Tegria
Information Security Engineer
The Senior Security Analyst holds the responsibility for formulating, advancing, executing, and disseminating the security program and policies. This position performs comprehensive assessments of information security risks and spearheads the mitigation efforts for medium to large-scale projects, involving high levels of complexity. Upholding system security controls and guaranteeing adherence to relevant policies, standards, and regulations, surpassing the requirements of SOX (Sarbanes-Oxley) compliance, are essential tasks of the Senior Security Analyst. Additionally, this role takes the lead in implementing continuous process enhancements to augment current procedures.
2017 : 2019
TDS®
Senior Security Analyst
The objective of the position is to develop and maintain the application strategy necessary to align IT with enterprise business needs. Objective also includes development of company architecture that supports the defined strategy and integrates with enterprise application architecture.
2007 : 2017
Telephone and Data Systems™ (TDS™)
Applications Architect
2007 : 2012
Telephone and Data Systems™ (TDS™)
Senior Applications Administrator
Skills
Active Directory, Applicaiton Security, Architecture, Business Analysis, Business Process, Business Process Improvement, Change Management, Cloud Security, Cybersecurity, Data Center, Disaster Recovery, DLP, Identity & Access Management (IAM), Information Technology, Infrastructure, Integration, ITIL, IT Security Assessments, IT Service Management, IT Strategy, LDAP, Leadership, Microsoft Autopilot, Microsoft Azure, Microsoft Intune, Office 365, Powershell, Process Improvement, Project Management, Requirements Analysis, SDLC, Security, Security Architecture Design, Security Information and Event Management (SIEM), Security Risk Assessments, ShareGate, SharePoint, Software Documentation, System Administration, Telecommunications, Threat & Vulnerability Management, Threat Analysis, Troubleshooting, Vendor Management, Virtualization, Visio, VMware, Vulnerability Assessment, Vulnerability Management, Windows Server
About
Experienced Information Security professional with over 20 years of experience in all areas of security design, risk management, security monitoring, and incident response. Proven ability to design, implement, and support security policies and procedures. Adept at developing security strategies and procedures to ensure the integrity of systems.