- Working on his Subject Matter expert for all Cyber /Network Security related projects in IT/OT Environments
- Perdue Model design and implementation
- Design and implement security measures to safeguard industrial control systems (ICS) and OT networks from cyber threats
- Conduct risk assessments and vulnerability assessments to identify weaknesses and recommend remediation strategies
- Develop and maintain security policies, procedures, and standards tailored to OT environments
- Monitor OT networks for suspicious activities and respond to security incidents in a timely manner
- Collaborate with cross-functional teams to integrate security controls into OT systems without disrupting operations
- Stay abreast of emerging cyber threats and industry best practices to continuously improve cybersecurity posture
- Proficient in industrial control systems (ICS) security principles and protocols (e.g., Modbus, DNP3
- Strong understanding of network security concepts (firewalls, IDS/IPS, VPNs), TxOne and protocols (TCP/IP, Ethernet
- Experience with security tools such as Wireshark, Nessus, Snort, and Nazomi Network
- Familiarity with regulatory requirements and standards relevant to OT cybersecurity (e.g., NIST SP 800-82, IEC 62443
- Excellent communication and teamwork skills, with the ability to effectively collaborate with stakeholders at all levels
J
Jera Americas
Senior Engineer Network AND Security
June 2022 - January 2024
D
DISH TV
Senior Security Engineer
Denver, CO, US
September 2021 - June 2022
C
Cyber Security Division
Senior Network Security Architect
Washington, DC, US
June 2020 - August 2021
B
BHP Billiton
Lead Network Cyber Security Architect
Houston, TX, US
August 2018 - May 2020
Skills
24/7 ServicesAccess ControlsAdvanced Cardiovascular Life Support (ACLS)Agile MethodologyAmazon Web ServicesAnomaly DetectionAntivirus SoftwaresApple IOSApplication LayersArchitectureAsymmetric Digital Subscriber LineAuditing SkillsAudit TrailBackup and RestoreBackup DevicesBorder Gateway ProtocolBusiness Continuity PlanningCable ModemCactiCatalyst (Software)Certified Ethical HackerCiscoCisco CertificationCisco Certified Internetwork ExpertCisco Certified Network AssociateCisco Nexus SwitchesCisco PIXCisco SwitchesCisco Unified Communications ManagerClosed-circuit TelevisionCloud ComputingCloud ServicesCommunication SkillsComputer ForensicsComputer NetworksComputer SecurityConfiguration ManagementConstructionContinuous MonitoringControl Objectives for Information and Related Technology (COBIT)CryptographyCyberarkCybercrimeDashboardsData CentersData ClassificationData LossData ProtectionDigital Subscriber Line Access MultiplexerDisaster Recovery PlanDocsisDocumentumDomain ControllersDynamic Host Configuration ProtocolDynamic Multipoint Virtual Private NetworksElasticsearchElectrical SwitchesElectronicsEmployee OnboardingEncapsulation (Networking)Enhanced Interior Gateway Routing ProtocolEthernetFamily Educational Rights and Privacy ActFederal Information Processing Standards (FIPS)Federal Information Security Management ActFile TransferFirepowerFirewalls (Computer Science)Forensic SciencesFortinetFrame RelayHealth Insurance Portability and Accountability Act ComplianceHelp DeskHot Standby Router ProtocolIdentity and Access ManagementIEC 62443Impact AnalysisIncident ManagementIncident ReportIncident ResponseInformation TechnologyInformation Technology Infrastructure Libraries (ITIL)Information Technology Security AuditingInfrastructure as a Service (IaaS)Infrastructure ManagementInstallation TestingInternal Accounting ControlsInternet Protocol Security (IP SEC)InternetworkingIntrusion Detection and PreventionIntrusion Detection SystemsIP CamerasIS-ISISO/IEC 27002IT Security StandardsIT Service ManagementJuniperJuniper Networks Certified Internet AssociateJunosKnowledge of Electrical EngineeringKnowledge of EngineeringKnowledge of FinanceKnowledge of Standards ComplianceKnowledge of StatisticsLeased LinesLightweight Directory Access Protocols (LDAP)LinuxLoad BalancingLocal Area NetworksLogistics OperationsLTE (Telecommunication)MaintenanceMalwareManagement of ChangesMedia Gateway Control Protocol (MGCP)Mesh NetworkingMetro EthernetMicrosoft AccessMicrosoft AzureMicrosoft VisioMicrosoft WindowsModbusModelling SkillsModemsMulti-Factor AuthenticationMultiplexersMultiplexingMulti-protocol SystemsMulti Router Traffic GrapherNational Institute of Standards and TechnologyNessusNetwork AddressNetwork AdministrationNetwork ArchitectureNetworking SkillsNetwork Management SystemNetwork ProtocolsNetwork RoutersNetwork SecurityNetwork TestingNmapOAuthOktaOpenid ConnectOpen Shortest Path FirstOperation CentersOptical Fiber CablingOptical Time-Domain ReflectometerOptics and EyewearOutsourcingPCI Data Security StandardsPhysical SecurityPRINCE2Prioritization of RequirementsPrivate Automatic Branch ExchangeProblem SolvingProcess Control SystemsProfessional ResponsibilityProject ManagementProof of ConceptProxy ServersPython (Programming Language)RedlineRegulatory RequirementsRemote Access TechnologyRemote Authentication Dial in User Service (RADIUS)Remote MonitoringReverse EngineeringRisk AnalysisRoutingRTSPRubySafety PrinciplesSales ManagementSarbanes-Oxley Act (SOX) ComplianceSecure Hash AlgorithmSecurities MarketSecurity Assertion Markup Language (SAML)Security AwarenessSecurity ControlsSecurity DevicesSecurity Information and Event ManagementSecurity ManagingSecurity PoliciesSecurity SystemsSecurity TestingService DeliveryService QualitySignalling Connection Control Part (SCCP)Snort (Software)Social EngineeringSoftware ApplicationsSoftware Design DocumentsSoftware EngineeringSolarWinds (Software)SplunkSpywareSQL AzureStakeholder ManagementStrategic ThinkingSupervisory Control and Data Acquisition (SCADA)Synchronous Optical NetworkingSystem AvailabilitySystem SafetyTCP/IPTeam WorkingTelecommunicationsTelephone SkillsTerminal Access Controller Access-Control System (TACACS)Testing SkillsThreat ModelingTransport Layer SecurityTrend MicroTunnelsUser AuthenticationVirtual Local Area NetworksVirtual Private Networks (VPN)Virtual Router Redundancy ProtocolsVLAN Trunking Protocol (VTP)VmwareVoIPVulnerabilityVulnerability AnalysisWavelength-Division MultiplexingWeb Application SecurityWeb ServicesWide Area NetworksWi-Fi TechnologyWindows PowerShellWireless Access PointWireless CommunicationsWireless NetworksWireshark