Elvis aka E
Details
History - Minor Business Marketing
Methodist University
Near East Languages and Literature
Arabic Language and Literature
Defense Language Institute
Industries : Global Energy-Utility, Top 5 Global eCommerce, Global Manufacturing, Top 3 Healthcare Organization, Major Oil & Gas Producer, 3 Large Pharmaceutical Companies, Department of Defense, JSOC, Department of Labor, NOAA, Navy, Commerce, and numerous small and medium businesses.
2009 : Present
Preying Mantis
Chief Cybersecurity Practitioner
CenturyLink | Principal Cyber Security Architect – MSS & Cyber Security Consulting Services
Lead the development and Modernization of CenturyLink’s MSSP and Cyber Security Consulting Practice. Enhanced their SIEM platform security event monitoring and Incident Response, integrated Advanced Cyber Threat Intelligence and Machine Learning. Developed CenturyLink’s Cyber Security Program Assessment, Incident Management & Response, and Advanced Breach Response services, adding $15M in new business per year.
• Practice Managed Security Services : Enhanced the Features and Functionality of their MSS Platform, provided cyber security solution concepts and development to over 300 CenturyLink clients. Enhanced CenturyLink’s Incident Management & Response services with Rapid Advanced Breach Response, improving the cyber security posture for over 1500 CenturyLink clients.
• Practice Cyber Security Consulting Services : Developed CenturyLink’s advanced cyber security consulting practice.
• Practice Incident Response/Threat Management : Led Incident Response, Designed Incident Response Process, & Rapid Breach Response.
Key Projects : Developed enhanced concepts and technology for the CenturyLink MSS/SIEM platform (Raised CenturyLink to the Top 10 of Worldwide MSSPs), Developed CenturyLink’s Cyber Security Program Assessment Methodology, Developed and Delivered over 10 new Cyber Security solutions.
2015 :
Preying Mantis
Principal Cyber Security Architect
IT/Cyber Security Consultant for a variety of organizations. Program Manager over multiple security projects and initiatives including : Enterprise Risk Management, Incident Management & Response, SOC-Security Operation Centers, Secure Project Life-Cycle, Secure SDLC, Application Security, Data Security, Privileged Account Management, Security Policy, Security Awareness, Security Training.
Industries : Global Energy-Utility, Top 5 Global eCommerce, Global Manufacturing, Top 3 Healthcare Organization, Major Oil & Gas Producer, 3 Large Pharmaceutical Companies, Department of Defense, JSOC, Department of Labor, NOAA, Navy, Commerce, and numerous small and medium businesses.
2009 : 2015
Preying-Mantis
Chief Cyber Security Practitioner
Led large IT and Security programs for the DoD.
> Secure Systems Deployment and Operations
> Secure Network Deployment and Operations
> Secure ERP Applications Deployment and Operations
> DIACAP & DITSCAP for C&A
2005 : 2009
DoD Contractor
Director IT Governance and ERP Security
Designed Secure SDLC for Systems and Servers
Designed Secure SDLC for Applications
Planned, Designed, Built SOC, Security Operations Center
SME for IT/Cyber Security
2003 : 2005
SAIC
Systems & Application Security C & A Project Manager
Skills
Application Security, Big Data Analytics, Business Development, Cloud Security, COBIT, Computer Security, Consulting, CSIRT, Cyber Defense, Data Science, Data Security, Data Security - DLP PCI/SOX/HIPPA, Deception Security, Enterprise Architecture, Enterprise Security Consultant, Enterprise Software, Governance, Incident Management, Incident Response, Information Security, Information Security Management, Information Technology, Integration, IT/Cyber Security Training, IT Governance, ITIL, Leadership, Management, Microsoft Office, Network Security, Penetration Testing, Program Management, Project Management, Public Speaking, Security, Security Architecture Design, Security Awareness, Security Information and Event Management (SIEM), Security Policy, Security Policy Development, Servers, SOC - Security Operations Center, Social Engineering, Software as a Service (SaaS), Solution Selling, Strategic Planning, Strategy, Team Leadership, Threat Intelligence, Training, Security Architecture, Enterprise Security, SOC - Security, IT/Cyber Security, Data Security - DLP, Customer Service, Microsoft Excel, Microsoft Word, PowerPoint
About
Highly Trained IT/Cyber Security Professional with over 25 years of experience in a variety of Industries; Telco-MSS, eCommerce, Energy-Utility, Manufacturing, Healthcare, Financial, DoD, DOL, JSOC, 4th Psyops Group, NOAA, and other Commercial and Federal organizations. He designs, builds, operates, and maintains effective IT/Cyber Security Solutions to the Enterprise. His initial security roots were as an Intelligence Officer, with specialized training in Interrogation by the US Army and former Mossad members.
Robert has led numerous security programs with a focus on Enterprise Systemic Security Solutions. He accelerates effective security solutions from his experience and expertise in the leading frameworks including:
>ISO 27000
>ISACA
>NIST
>SANS
>COBIT 5 Enterprise Governance
>SABSA
>ITIL Strategy - Design- Service Transition - Operations - Continuous Improvement
>Enterprise Architecture - TOGAF & Zachman
>PMO PMBOK/PMI and Prince
Robert has hands on experience in deploying security programs affecting the critical People - Process - Technologies that span the OSI Model and the array of Security Practice areas including:
> Security Architecture (Mapped to your Enterprise Architecture and Business)
> Incident Response (Incident Management Process, Tools, SOC/iSOC)
> Advanced Adversarial Attack Exercises (Red Team - Blue Team - Social Engineering - APT)
> Data Security Solutions (Data Categorization, DLP, PCI, SOX, HIPPA, Business Critical, PII
> Application Security Solutions (Secure SDLC, Code Scanning, PenTesting, WAF's)
> Infrastructure Security Solutions (Secure CMDB, Secure System Provisioning, HIDS/NIDS)
> Security Policy, Awareness, and Training - PAT
> Privileged Access Management
> Security Application & Tool Vendor Assessment & Selection
> Social Engineering Defense & Attack (Superb Training & Skill as an Interrogator)
> Deception Analysis