Download PDF


My name is Joy Rogers. I have worked in the information technology field for more than 12 years.I possess vast knowledge in multiple areas of IT.I have held positions as a computer Purchasing Agent, Field Engineer, Systems Engineer, and Information Security Analyst.As a purchasing agent I learned the techniques for identifying computer equipment needs and requirements.As a Field Engineer I gained experience installing, configuring, and troubleshooting computer and peripherals.As a Systems Engineer I designed, implemented, and supported enterprise applications.Experience in these areas helped build the fundamental skills that have helped me excel as an Information Security professional.I have worked as an Information Security Analyst for six years and gained experience on the compliance and operational side of the profession.During the years I have spent as asecurity analyst I performed security audits at an enterprise level using various auditing tools, I have performed vulnerability and risk assessments, and I have implemented and managed security tools such as URL filtering appliances, intrusion prevention Systems, endpoint security agents, forensic software, and content filtering solutions.Over the past 12 years I have strived to improve my technical skills by attending training classes and obtaining industry recognized certifications.In 2009 I began pursuit of my MBA in IT Management in order to obtain the business skills necessary to move into a management position.

Work experience

Nov 1998Jun 2010

Information Security Analyst II

BB&T (formally Colonial Bank)

§ Researched, designed, implemented, maintained, documented installation 

     procedures and system configuration, developed and tested backup and

     restoration procedures for the following systems:

Enterprise Single Sign-on solutionsPrivilege Manager

Cisco Security AgentsIntrusion Prevention System

Proxy solutionURL filtering solution

Multifactor token solution Enterprise PKI

Encrypted file transfer and email solution Vulnerability scanners

Endpoint security agents                  Checkpoint firewall

PKI Multifactor solution external customersEnterprise content filtering

§ Investigated and resolved security issues that occurred within the network and external to the network. 

§ Administered Active Directory including user management, group policy creation and management, auditing and cleanup.

§ Site administrator for SharePoint 2007 including maintaining sites and security administration.

§ Project Manager for multiple information security initiatives and projects.

§ Performed risk assessments, vulnerability assessments and penetration testing on new vendors and applications to verify they met company security requirements before they were allowed to access or store company data.

§ Implemented and updated company policies related to information security to ensure end user compliance with company information security policies as required by external and internal auditors and industry information security best practices.

§ Performed vulnerability assessments on newly released security patches to determine how they affect the enterprise and determined the time frame for installing security patches. 

§ Gathered information needed for audits performed on a routine basis.

§ Performed PCI compliance scans and audits on applications required to meet PCI requirements within the enterprise.

§ Provided customer service on a daily basis to help end users in all bank regions resolve security related issues utilizing a ticketing system for issue tracking.

§ Developed an employee on boarding and termination process for new hires and terminated employees including granting system access to all legacy Colonial applications and disabling access upon migration to BB&T systems.

Nov 2001Aug 2003

Systems Engineer

BB&T (formally Colonial Bank)

§Installed, tested, configured, implemented, and maintained multiple applications for the enterprise.

§Maintained hardware on distributed network systems in the enterprise.

§Developed and tested disaster recovery procedures on distributed systems.

§Worked with the file transfer team to ensure data transmission from a technical as well as security standpoint.

§Maintained system availability including monitoring system performance and troubleshooting and resolving hardware and software related errors.

§Worked with end users in all bank regions on a daily basis to troubleshoot and resolve technical issues.


Field Engineer

BB&T (formally Colonial Bank)

§Installed new software and deployed computer systems.

§Performed maintenance and provided support for all computer hardware and software.


Aug 1998Aug 2000

Adjunct Instructor

Reid State Technical College

§Instructed computer classes for several semesters. Classes included Windows classes, programming classes, and Internet usage classes.


Purchasing Agent

BB&T (formally Colonial Bank)

§Purchased computer equipment for Colonial Mortgage.

§Maintained custom built database for invoicing.

§Remitted payment vouchers to Accounts Payable.



McKenzie High School

Master of Business Administration

Western Governors University


Auburn University at Montgomery


Interpersonal Skills
I possess excellent communication skills.  I have the ability to interpret technical terms, both verbally and written, in a clear and concise manner that both technical and non-technical users can understand.  I work well with others and I am a team player who gives advice and seeks advice from others when needed. 
Microsoft Office Suite
I have worked with the various tools in the Microsoft Office Suite for 12 plus years.  I am very proficient in the latest version of Word, Excel, and Power Point. I have utilized other Microsoft tools, such as, Visio and Microsoft Project for project management and documentation on a regular basis.
Technical Ability
Through my years of experience I have gained a broad knowledge of various Information Technology procedures and processes.  I have spent most of my career troubleshooting and resolving technical issues.  I have the ability to research, identify, and resolve technical issues.  I have developed a strong network of technical peers whom I reach out to in the event I need help resolving technical issues.  I readily admit that I do not know everything and I do not hesitate to contact the vendor or peer to help in resolving critical issues.
Information Security Best Practicies
I have worked as an Information Security professional for six years.  During this time I have developed a passion for information security and I plan to make it my life time career.  I have worked in various aspects of Information Security.  I have experience from the compliance side of information security where I gained knowledge auditing applications, performing vulnerability assessments, creating and enforcing Information Security policies and procedures, and creating and maintaining an information security awareness program.  I also have extensive knowledge from an operational perspective.  I have implemented and maintained various security solutions such as, intrusion preventions systems, end point security agents, URL filtering solutions, email encryption solutions, and identity management solutions.  I plan to continue my quest for obtaining a Chief Information Security role by practicing and improving the business skills I have obtained over the years and through my MBA program.  I plan on staying abreast of the latest trends in the Information Security industry  by attending training classes and obtaining certifications.


Certified Computer Examiner (CCE)

Intense School

Microsoft Certified Professional


Microsoft Certified Systems Engineer Windows 2000


Microsoft Certified Systems Engineer Windows NT

Jul 2006Present

Certified Ethical Hacker (CEH)

Aug 2003Aug 2011

GIAC Security Essentials Certification (GSEC)