Company Info for securecomputing.com | IcebreakerMembers

"We set the vision. I see root causes, break constraints, and execute a realistic path to achieve our vision."
Senior Technology Leader with agility to manage all aspects of the information technology spectrum and SAAS product life cycle.
Strong, hands-on leader establishes reality-based processes, execution, and decision-making. Analytical systems thinker develops optimal, achievable plans to deliver near-term tactical results that also drive towards strategic goals. Versatile manager and individual contributor uses deep experience in multiple markets, large and small companies, and wide-ranging technologies to successfully manage the business, people, project, and technology aspects of information technology organizations. Business-aware technologist systematically matches innovation with business realities to maximize earned value. Passionate mentor and communicator builds alliances and develops strong team interactions. Team builder constructs effective teams of employees, offshore resources, contractors, and consultants to match each situation.
Specialties:
Strategic and Tactical Planning
Leadership Development
Offshore Team Liaison
Information Technology Process Improvement
Software Quality Assurance and Testing
Staff Hiring, Training, Appraisal, Motivation
Analytical Evaluation and Problem Solving
Project and Portfolio Management
Product Management and Release Planning
Project Estimation, Metrics, and Risk Management
System and Solutions Architecture
IP and Patents
Budgeting and Fiscal Management
Technical Sales
Solution Development & System Integration
Multidisciplinary Collaboration & Alliance Building
Team Building, Coaching, and Mentoring
Agile Software and System Lifecycle
Quality Assurance and Testing
DevOps Leadership and Implementation
Data Modeling & Database Design
Data Migration & Validation
Business Intelligence
Data Warehouse Design
Reporting System Development
Linux/UNIX System Administration
Advanced Scripting
Monitoring Systems 
Helping executives optimize their information security programs, securely empower cloud and mobile, detect and stop advanced threats and protect critical assets.
IBM Security offers the most robust, comprehensive integrated security products and services portfolio to arm organizations to deter, stop, detect, defend and recover from malicious activity whether from internal, external or global threats.
As information security and cyber security executives mature their programs and move along the continuum of security posture maturation from compliance-based to risk-based management, it is important to develop a holistic, comprehensive, intelligence-based program using the appropriate people, processes and technologies.
US Navy Veteran. Served aboard the fast attack submarine USS Key West (SSN-722) - Launching Crew and Commissioning Crew. Briefly served aboard the Guided Missile Cruiser USS Mississippi (CGN-40).
_________________________________
Risk Assessment
Security Operations
Security Information and Event Management (SIEM)
Data Security
Database security
database activity monitoring
encryption
IAM - Identity and Access Management
SSO - Single Sign On
Network security
critical infrastructure protection
IPS - Intrusion Prevention System
XGS
QRadar
Guardium
ISAM
ISIG
identity governance
privileged identity management - PIM
Application Security
AppScan
Vulnerability Management
Endpoint management
patch management
life cycle management
BigFix
Enterprise Mobility Management - EMM
BYOD
MaaS360
Cloud Security Enforcer
Security as a Service