Printing tool Download PDF

Work experience

Aug 2010Present

IS Lead Security Engineer

U.S. Cellular

Primary Responsibilities: Protection of all internal USCC Assets and Associates. To include but not limited to: Security Consulting & Architecture, Data Loss Prevention, Privileged Identity Management, Vulnerability Assessment, Web Content Filtering, Firewall Configuration and Troubleshooting, Product Evaluation, Selection and Implementation, Intrusion Prevention, Web Application Protection and Penetration Testing, Two Factor Authentication, Data Mulching, Automation and Incident Response.


  • Roger was critical in assisting U.S.Cellular in achieving PCI compliance and receiving their first ROC (2014). 
  • Evaluation, selection and implementation of Vulnerability Assessment tools (Qualys), Data Loss Prevention Tools (Symantec DLP), Web Content Filtering Tools (Websense), Two Factor Authentication Tools (Entrust), SSL Certificate Monitoring Tools (Entrust), Privileged Identity Management (Cyberark) and the evaluation and selection of several others.
  • Security consultation regarding the implementation of all major internal projects including the implementation of a new customer care system for U.S. Cellular.
  • Roger has been crucial in greatly improving the overall security posture of his environment as well as encouraging security focus in the operation teams within his organization.
Aug 2009Aug 2010

Senior Information Specialist

Monsanto Company

Primary Responsibilities: Vulnerability Assessment, Intrusion Detection, Boundary Protection, Network Monitoring, DNS Architecture, Web Content Management, Change Management & Monitoring to support compliance and Network Security Architecture. Provide direct administration of all Monsanto Enterprise Security related equipment to include: Checkpoint firewalls, Qualys Vulnerability Scanners, External Mail Servers (Sendmail), External DNS Servers (Bind), Algosec Firewall Analyzer server, Web Content Management Director and Sensors (Websense), Anti-Virus Servers (Trend Micro and McAfee), Intrusion Detection Director and Sensors (Siteprotect) and Desktop Encryption (Credant). Provide Tier 2 & 3 assistance to all Monsanto customers and associates regarding security related issues.


  • Designed, implemented and maintained Monsanto's first vulnerability assessment program.
  • Baselined and adjusted the intrusion prevention program to enable it to provide valuable actionable data and metrics.
  • Re-implemented monitoring for all Monsanto security perimeter devices to provide consistent awareness.
  • Designed and implemented and maintained a change management process for the Monsanto security perimeter.
  • Wrote and implemented custom tool sets to monitor configuration changes, health and wellness in security perimeter devices which assisted in Monsanto in maintaining PCI compliance and receiving their second ROC.
  • Designed, implemented and maintained a security perimeter audit program.
Jul 2008Jul 2009

Senior Systems Engineer

A.G. Edward / Wachovia / Wells Fargo

Primary Responsibilities: Support for and conversion of Legacy A.G. Edwards security equipment while transition to Wachovia standards during the merger. Provide Firewall Support for Wachovia Devices including monitoring, support upgrades and life-cycle management.


  • Installation and Administration of Symantec SGS, Cisco PIX and Nokia Checkpoint firewalls
  • Installation and Administration of Intrusion Detection Sensors (Custom Snort / Sguil solution)
  • Custom development of Nagios monitoring plugins to support legacy devices.
  • Guided the decommissioning process for all Legacy A.G. equipment and configuration.
Mar 2000Jun 2008

Senior Security Specialist / Contract Team Lead

Air Mobility Command (NCI Information Systems)

Primary Responsibilities: Provide protection for all data, communications and assets for the Air Mobility Command. Boundary Protection, Intrusion Detection, Vulnerability Assessment, Security Architecture and Consultation, DNS and Mail flow administration, Web proxy administration, load balancer administration.


  • Won several appreciation awards as the Team lead for 6 contractors on the ACC DET 3 Network Defense team.
  • Redesigned and replace the security perimeter for AMC.
  • Represented AMC to a Department of Defense level regarding universal security architecture changes.
  • Participated as a primary in several yearly red team events and successfully defended AMC assets.
  • Created a Monitoring / Configuration management suite for Sidewinder firewalls in order to reach five nines availability.
Feb 1996Feb 2000

Intrusion Detection Analyst

United States Air Force (Active Duty)
  • Monitored and investigated security incidents across 19 Air Combat Command (ACC) Bases.
  • In order to properly identify and counteract attempts to violate security, the job required a thorough knowledge of real world security exploits. 
  • Analyzed new security products and designed implementation plans for said products.
  • Performed online security surveying of remote bases.
  • Maintained and distributed the configuration for NORAD encryption systems used to maintain a link between classified networks worldwide. 
  • Maintained a security oriented web page for all Air Combat Command (ACC) bases detailing current security vulnerabilities and the software patches required to fix them. 
  • SECRET / ENTAC , DISCO, 2000 Security Clearance



State University of New York College at Plattsburgh


Dec 2014Jan 2015


Certified Information Systems Security Professional
License 499455

Professional Summary

With more than 18 years of
experience Roger provides
extensive expertise in Security Engineering and Architecture.
His ability to thoroughly and
quickly comprehend new
security solutions and the way they integrate into an
environment makes him an
asset not only to security
teams but whole organizations. His balanced
approach allows him to scale
and customize corporate
security around business
priorities and requirements to
achieve maximum security
protection with minimal
conflict. This makes him
a maturing and
professionalizing force for
existing security programs.
Where current solutions do not exist (or do not meet requirements) Roger's automation and development abilities can bridge the gap and eliminate inefficiencies


Gulf War Veteran, Father of
three and husband for eighteen
years. My hobbies include
Custom electronics projects,
Baking bread, Reading and