Raul Infantes
Details
Management Information Systems and Services
Florida International University - College of Business Administration
2012 : 2013
Bachelor of Science (B.S.)
Management Information Systems and Services
Florida International University - College of Business Administration
2010 : 2012
• Perform analysis of log files from a variety of source (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats to network security.
• Execute cyber defense incident triage, to include determining scope, urgency, and potential impact, identifying the specific vulnerability, and making recommendations that enable expeditious remediation
• Perform initial, forensically sound collection of images and inspect to discern possible mitigation/remediation on enterprise systems.
• Collaborating with cross-functional teams to respond to and mitigate security incidents promptly.
2020 : Present
IBM
Cybersecurity Incident Response
Highly motivated and results-driven Cybersecurity Adjunct Professor with a proven track record of effectively imparting knowledge and skills to students at various academic levels. Possessing a solid foundation in network security, ethical hacking, risk assessment, and incident response, I am committed to nurturing students' critical thinking abilities and encouraging them to explore innovative approaches to solving cybersecurity challenges. My extensive background in both industry and academia enables me to bridge the gap between theoretical knowledge and real-world applications, equipping students with practical tools for success in the rapidly evolving cybersecurity landscape.
• Project Management
• Principles of Information Security
• Information Security Management
• Information Storage Management
• Knowledge Management
• Operating Systems
• Ethical Hacking
• Computer Forensics
• Capstone project
2018 :
Miami Dade College
Adjunct Professor
Reported to Director - Improved client satisfaction results with cloud-based agile/lean software delivery. Broke down silos between business, development, and IT operations, by championing collaboration, shared responsibility, and quality feedback.
• Prevented downtime and business disruption by maintaining risk assessment process, policy development, and following root cause analysis and work statements.
• Maintained efficiency by ensuring delivered support to customers 24/7, and by hosting daily scrum meetings to discuss progress and/or find out solutions for specific problems.
2017 : 2020
IBM
DevOps Security Coordinator
Report to Manager of Compliance - Oversaw the confidentiality, integrity, and availability of data services behind the IBM Cloud platform. Maintained platform as a service (PaaS) and infrastructure as a service (IaaS) clients with integrated and automated solutions across globally distributed datacenters. Patched servers, clusters, and nodes with IBM BigFix. Modeled governance policies, composed compliance reports, and prepared for internal and external audits.
• Analyzed Tenable Nessus reports to performed cloud vulnerability assessments. Initiated internal tickets to address vulnerabilities and follow up to conclusion to minimized risks and maintain corporate compliance.
• Followed governance policies, built compliance reports and compliance documentation in preparation for internal and external SOC2 and ISO audits.
2016 : 2017
IBM
Security Compliance Analyst
Report to Senior IT Security Manager IBM - Drove day-to-day team operations and served as ultimate escalation point for support issues and system outages. Developed policies and led cross-functional teams to safeguard IT project delivery for multiple accounts. Conducted risk analyses, documented compliance gaps, and ensured audit-ready posture. Coordinated status meetings, presentations, and performed data reviews. Supervised user IDs and security revalidation as Governance Focal for multiple accounts. Analyze and solve problems by performing root cause analysis. Optimized runbooks with updated procedures to review same occurrences.
• Developed policies and led cross-functional teams to safeguard project delivery for multiple accounts. Conducted risk analysis, documented compliance gaps, and ensured audit-ready posture.
• Performed root cause analyses (RCA) to resolve issues and prevent escalations.
• Ensured compliance with quality standards, deadlines, and procedural requirements.
2014 : 2016
IBM
Identity and Access Management | Security Delivery Coordinator
Skills
Business Process, Cloud Computing, Cloud Security, Databases, Data Center, DevOps, Enterprise Architecture, Hardware, Help Desk Support, Information Security, information technology, Integration, ITIL, ITIL v3 Foundations Certified, IT Management, IT Service Management, IT Strategy, Lotus Notes, Management, Microsoft Excel, Microsoft Project, MS Project, Networking, Operating Systems, Project Management, Project Planning, Quality Assurance, Relational Databases, SDLC, Security, Servers, Software Development, SQL, System Administration, System Deployment, Team Leadership, Technical Support, Troubleshooting, Vendor Management, Virtualization, Visio, Visual Basic, Visual Studio, Windows, ITIL v3 Foundations
About
Highly skilled and motivated Cybersecurity Analyst with a passion for safeguarding digital assets and protecting organizations from cyber threats. Equipped with a strong background in information security, network defense, and incident response, I am committed to implementing robust security measures to ensure the confidentiality, integrity, and availability of critical data. Proficient in conducting thorough security assessments, analyzing vulnerabilities, and formulating effective mitigation strategies. Adept at communicating complex technical concepts to both technical and non-technical audiences, enabling collaboration and fostering a security-conscious culture. Fully bilingual in English and Spanish.
CORE COMPETENCIES
Security Operations & Monitoring | Cyber Threat Analysis | Incident Response & Forensics | Risk Management & Compliance | IT Project Management | Security Awareness Training | Security Frameworks (ISO, NIST, CIS) | Information Security Policies & Procedures