Download PDF

Objective

Information Security 

Work History

2000Present

Systems Programmer/Administrator

Rutgers University
  • Performs digital forensic examinations 
  • Provides technical leadership for Information Protection and Security Division specializing in security management, incident handling and incident response, and project management of associated activities
  • Project leader for university implementation of data encryption
  • Acts as liaison to law enforcement agencies
  • Installs and administers Windows and Linux workstations
  • Supervises student staff for incident triage and follow up
  • Advises University departments on operating systems security
  • Maintains internal documentation for incident handling process
  • Develops security metrics to chart incident handling trends
  • Attends professional meetings such as EDUCAUSE, High Technology Crime Investigation Association, Infragard, and the New York Electronic Crimes Task Force
19972000

Systems Programmer I

Rutgers University
  • Administered eden.rutgers.edu, the student computing cluster of about 30 Sun Microsystems hosts running Solaris with more than 40,000 user accounts.Maintained 99% uptime (less than 1% unplanned downtime).
  • Installed and upgraded operating systems and maintained current patch levels
  • Developed scripts in perl, expect and Bourne shell for system administration tasks
  • Supervised 2 FTE systems administrators
  • Investigated and resolved computer abuse incidents along with NBCS User Support (help@eden.rutgers.edu), the Office of Judicial Affairs, the Rutgers University Police and other law enforcement agencies as was needed
19871997

Systems Programmer II

Rutgers University
  • Unix system administration duties for various Telecommunications Division workstations and servers
  • Kerberos and whitepages administration
19841987

Systems Programmer III

Rutgers University
  • Unix systems administrator for Pyramid Technologies computers
19821984

Programmer/Analyst

Rutgers University
  • System administrator for PDP 11/44 running RSTS/E

Interest

Association for Computing Machinery, Member

ASIS International Member

GIAC Advisory Boards Member

GIAC Ethics Council Vice Chair, 2009-2010; Chair 2011 to present 

High Tech Crime Consortium Member

High Technology Crime Investigation Association Member

Infragard Member

Institute of Electrical and Electronics Engineers (IEEE) Member

(ISC)2 (nternational Information Systems Security Certification Consortium) Member 

MS-ISAC (Multi-States Information Sharing and Analysis Center) Member

New Brunswick Free Public Library Board of Trustees, August 2011 to present 

REN-ISAC (Research and Education Networking Information Sharing and Analysis Center) Member

Education

Certifications

Oct 2009Oct 2021

GIAC Penetration Tester (GPEN)

SANS

The GPEN certification is for security personnel whose job duties involve assessing target networks and systems to find security vulnerabilities.

Aug 2001Aug 2021

GIAC Security Essentials (GSEC)

SANS

Security Professionals that want to demonstrate they are qualified for IT systems hands-on roles with respect to security tasks. Candidates are required to demonstrate an understanding of information security beyond simple terminology and concepts.

Jan 2009Jan 2021

GIAC Systems and Network Auditor (GSNA)

SANS
GIAC Systems and Network Auditors (GSNAs) have the knowledge, skills and abilities to apply basic risk analysis techniques and to conduct a technical audit of essential information systems.
Jun 2004Jun 2020

GIAC Certified Forensic Analyst (GCFA)

SANS

The GCFA certification is for professionals working in the information security, computer forensics, and incident response fields.

Jun 2003Jun 2019

GIAC Certified Intrusion Analyst (GCIA)

SANS

GIAC Certified Intrusion Analysts (GCIAs) have the knowledge, skills, and abilities to configure and monitor intrusion detection systems, and to read, interpret, and analyze network traffic and related log files.

Dec 2010Dec 2018

GIAC Web Application Penetration Tester (GWAPT)

SANS
This certification measures and individuals understanding of web application exploits and penetration testing methodology.
Sep 2006Sep 2021

GIAC Certified Incident Handler (GCIH)

SANS
The GCIH certification focuses on detecting, responding, and resolving computer security incidents.
Jan 2012Jan 2018

CISSP

(ISC)2
CISSP® certification is a globally recognized standard of achievement that confirms an individual's knowledge in the field of information security.
Jul 2011Dec 2017

Certified Protection Professional

ASIS International
The Certified Protection Professional (CPP) credential provides demonstrable proof of knowledge and management skills in eight key domains of security.  Badge available for viewing: https://vault.proexam.org/Badge/View/lNzwsHmhTfa3Vw32OSYW6AyqYDONRS0XHKAaa8P0X47ZrmidkA?v=635574354037343750
May 2010Present

Teaching English as a Foreign Language

Program in American Language Studies, Department of English, Rutgers University
Preparation for teaching English to speakers of other languages.