S T E P H E N 622 Madrid Ave Torrance CA 90501 (424) 265-0750 steve@steveweltman.com B W E L T M A N Information Security Management Consulting Architecture Design and Review. IT Infrastructure Design and Support. Project Management. Leadership. Team Building. Proudly served The USA ; ACTIVE DUTY US NAVY 1987-1995 RECENT PROJECTS and ASSIGNMENTS SUMMARY 2011-Present Extensive information security management experiences driving near and remote security resources to project timelines, improving delivery cycles and prudently expanding budgetary requirements across a multi-national global enterprise. Delivering decisive execution of high visibility security project requirements while improving immediate team cross-functional capabilities. Created inter-operational technical working efforts between departmental units to address globally affecting technical security issues. Internal and external client interface duties, provided technical architecture design review, network solution development, infrastructure discovery, review and documentation, road-mapped recommendations through an organized technical assessment built from business drivers. Provided insight to network remediation of technical and environmental controls, assisted clients to meet or exceed industry leading practices and regulatory compliance (HIPAA, SOX, PCI DSS). Implemented Cisco ASA security and remote access services, routing, switching, BYOD and mobility designs. Supporting a hands-on approach and a ‘roll-up-your-sleeves’ manager of technologies. Extensive writing and documentation of recommendations and results. Project management skill sets (design, implementation, review and documentation for enterprise-wide solutions). Innovative uses of technology to efficiently solve complex enterprise-wide business requirements. Providing professional team skill set development (hard skills and soft skills). PROFESSIONAL SUMMARY A current CISSP, Over sixteen years of Information Security, IT, Technical Project Management, Senior/Lead Technical Network Engineer, Intrusion Analysis, Public Key Infrastructure (PKI) and IT Architectural experiences. Strong proficiency in PKI, Incident Response and Detection, Technical Project Management, IT Operations Recommend Leading Practices, Technical Management, and State and Federal Regulatory requirements (GRC Risk Remediation). RECENT EXPERIENCES Sept 2014 to Mattel Corporation, El Segundo, CA (FT consultant, through Absolute Network Solutions) Sept 2015 Information Security Consultant, Technical Lead for Mega Integration, PCI Remediation and Network Security Services Remediation On site, insightful thought and technical leadership in multiple technical disciplines to resolve highly complex, high visibility issues. Responsible for security risk remediation of a recently acquired manufacturing company, integration of IT Security processes, technical controls and security standards across the acquired enterprise environment. Performed internal and external vulnerability scans against Megabrands IT infrastructure to determine the fit for connection to Mattel networks. Performed a full network security infrastructure and services assessment and gap analysis and then designed remediation efforts across multiple functional areas for the Megabrands IT integration effort STEPHEN B WELTMAN Page 2 (including cloud infrastructure components). Oversaw many remediation effort areas within the Mega infrastructure. Oversaw an enterprise global upgrade and filtering remediation efforts of WebSense Triton Manager Identified a critical failure of the Cisco Access Control System’s as-built architecture. Redesigned and proposed remediation options to senior management; implementation of options; oversaw project efforts and report on timeline, budgetary requirements. Evaluated options for an existing neglected PKI solution for process and remediation of roles critical to PKI management in the Mattel environment. Designed several use-cases for internal certificate usage as an access-control simplification effort. Integrated authentication components of enterprise AirWatch into the PKI. Built operational processes for certificate issuance, review, inventory, replacement and revocation. Designed automated AirWatch authentication integration to Mattel PKI to automate issuance of internally signed certificates with AirWatch protected mobile applications. Performed discovery and gap analysis on existing web-app firewall requirements for business critical ecommerce sites. Write up of use cases for replacement of WAF with F5 appliances functions. Evaluated remediation efforts and presented options to management. Led network security firewall remediation efforts across PCI DSS 3.0 remediation within a highly constrained timeline. Proposed technical options to risk remediation and implemented management’s selected options. Oversaw the remediation of enterprise-wide monitoring and alerting solution, SumoLogic. Invited the vendor into the offices to better interoperate with the internal technical business teams and engineering staff. Facilitated improvements in solution use and vendor trust across departmental lines. Managed the integration of FireMon firewall monitoring to identify and address excessive firewall rule complexity within the enterprise. In process of building additional processes to simplify and add consistency to rule changes within firewalls enterprise wide. Identified investigated and proposed a proof of concept for a two form factor (2FA) authentication solution enterprise wide. Identified the existing 2FA systems limitations and process issues causing client dissatisfaction. Performed an overall financial comparison of the proposed system to existing favoring the new system when all areas were considered. July 2013 to OpenSky Corporation, Tolland, CT (Los Angeles based, Full Time employee) May 2014 Regional Lead, Information Security Practice; Consulting, Pre-Sales, Information Security Performed on site operational information security support to enterprise, responding to and resolving numerous incidents. Evaluated enterprise information security tools portfolio (including DLP, MDM, Log centralization, security boundary toolsets, and change notification solutions). Provided recommendations that joined operational monitoring systems into risk mitigation monitoring and reporting solutions. Alleviated several issues with sustainability of tools operation and portfolio complexity. Designed and socialized a risk mitigation strategy for enterprise that mitigated data retention, data classification and categorization issues which exceeded managerial expectations and alleviated legal and regulatory pressures for critical data retention. Provided insight to network remediation of environmental controls, helping clients to meet or exceed recommended practices and regulatory compliance (e.g., HIPAA, GLBA, SOX, PCI DSS). Performed an ISO27002 security assessment against a merging company’s data centers and security practices. Implemented Intrusion Prevention Services (IPS) solution and services for a San Diego bio-science client. STEPHEN B WELTMAN Page 3 Performed targeted external vulnerability assessment and manually validated results; performed indepth information security policy review for a San Francisco based law firm. Assessed evaluated and recommended wireless network environment solution to a hospital system in Los Angeles. Conducted change and project management projects (design, plan, implementation, review and documentation for enterprise-wide solutions). Proposed innovative uses of technology to efficiently solve complex enterprise-wide business requirements. Jun 2011 to Experis IDS, Los Angeles, CA (Full Time employee) May 2013 Network Design Architect Consultant, Project Management, Technical Business Analysis, Consultative Design, Implementation Support and Staffing Support services Developing technical services and brand support to a newly created line of business Interact with Enterprise leadership on a business-requirements evaluation Develop scopes of work, design plan(s) for large network environments, estimates of effort (margin support), evaluating business value per engagement Collaborative work environment with several lines of technology are involved with efforts (DC, storage, virtualization, network, VDI, access control) and supporting their effort whether staffing support or design participation Propose high-level design efforts to business leadership, whether wired or wireless networks, supporting business requirement, offering viable options, analysis Assess environments via interview, analysis or review for meeting business requirements, validating technical business decisions for end clients. Network design contributor to application onboarding to a cloud services solution offering Peer review of (and participating in a peer review process) for assessment efforts of evaluated environments Document and report on these environments, supporting management’s business requirement objectives. Network design, plan and implement configurations for ARC Richmond, VA -- hands-on configuration of Cisco ASA5510, 3500, 3700 series Cisco switches, WLC2504, APs (3500 series, 1400 series) End to end design of scalable network for Live Oak Bank in Wilmington NC, Cisco 2921NG routing, ASA 5510x, Cat4500x core, Cat 2960S, WLC2500, Cisco Identity Services Engine –This is a fully redundant, highly resilient network, multi-homed, many VLANs, and pre-designed the bank’s next generation of building infrastructure (power management, cooling, equipment templates, connectivity, access controls for BYOD and guests). Assessed and evaluated Emmanuel Community College in Boston for all web and cloud-based applications for an SSO requirement delivering a set of best practice recommendations, a practical roadmap with technical implementation recommendations. Aug 2010 to Disney Corp Glendale, CA (Comsys/Experis Contract Consultant) Jun 2011 Network Design Architect Consultant, Project Management, Technical Business Analysis, Consultative design and support services Extremely complex worldwide enterprise network. Highly diverse and specialized requirements for each business unit (there are many BUs). Primarily Cisco environment with thousands of active elements and hundreds of locations. Providing financial analysis of each technical recommendation as well as a complete cycle management for implementation. STEPHEN B WELTMAN Page 4 Equipment designs consisted of Cisco large scale routing, switching, load balancing (Riverbed), NAS through Isilon/EMC, high resilience designs Managing multiple outside vendor relationships with internal end-user client expectations Gathering technical requirements as well as business constraints as parameters of project limitations. Managing timelines, resource allocations (when needed) and providing technical escalation expedites when required. Documentation of “as-built” and proposed network design solutions. Managing financial year impact per project (as-built vs. proposed, year to year) A thorough understanding of right-sizing solutions. A complete understanding of economy of effort and efficiencies gained (and traded) with technology implementations. Thinking outside of the box, ‘Hands-on’ and architecture experience with many areas of expertise. July 2007 to Absolute Network Solutions Rancho Palos Verdes, CA July 2010 Independent Technology Consulting, Value Added Reseller, Network Convergence, Surrogate CIO Services, Design, Support, Implementation Business Continuity and Disaster Recovery live performance best practices gap analysis, network and system evaluation and associated in depth review of findings for Fortune 1000 vitamin company Disaster Recovery Solution architecture design development and assessment of alternatives for Fortune 2000 Energy company Regulatory compliance reporting systems redesign, gap analysis, project planning, priorities assessment, and scope development for Fortune 100 news company Consulting and Speaking opportunities to train executives and leadership about IP protection, best security practices, and regulatory compliance requirements and relevance to audience’s risk mitigation strategy, best IT technology services mapped against best IT information security practices Broad and deep level of Cisco Systems Routing and switching. Significant work on Cisco IOS product sets, including CME, CUE (Voice over IP services), Catalyst layer 2 and layer3 switching, Cisco ASA 5500 series security appliances, WLC equipment. I have extensive experience with the Cisco post-sales support mechanisms (TAC, website, documented solutions, etc), and thousands of hours of hands-on coding with Cisco IOS to correct or modify configurations. Microsoft Server solutions, Windows 2008, Windows 2003 and many versions. Supported Active Directory in enterprise level organizations (from an audit/assessment level) as well as overseen AD from an InfoSec perspective. I understand the use of the tool suite in an identity management and access control requirement, managing day two support. Knowledgeable with Citrix XenServer virtualization software. Experience with delivery of solutions (hands-on, validation, architecture) based on leading virtualization practices, essential to delivering effective, efficient resilient solutions in the server infrastructure space. Hands-on and architecture experience with SAN technologies from Dell Equalogic, Isolon (EMC) tool sets. Recommended Disaster Recovery (DR) solutions (pre and post-sales) based on business needs, design implementation plans as well as needed underlying infrastructures. Critical Solution Guidance in Disaster Recovery project involving critical VoIP solutions and associated CRM solutions supporting client access. (Medium sized energy client, Security architecture, Process Design, and Recovery scripting). Designed and Implemented support requirements for SMB clients experiencing issues with file servers, backup solutions, client access modes. Provided world-class solutions expertise, design, architecture, guidance, and implementations services to SMB and Enterprise clients cost effectively and sized appropriately. Delivered Conceptual Design of fully integrated solutions, including solution management and monitoring, application resilience, technology implementation progression path. STEPHEN B WELTMAN Concept Design to full cycle implementation of multi-organizational affecting solutions on budget and on schedule. A thorough understanding of right-sizing solutions. A complete understanding of economy of effort and efficiencies gained (and traded) with technology implementations. Delivered Solutions ranging from multiple wireless AP requirements, to security overlay efforts, CRM implementation consulting Server, workstation, laptop, network device support and maintenance (local and remote support services). Basic desktop support to full-scale enterprise disaster recovery planning and policies. Apr 2009 to July 2009 Ironbow Technologies, (SoCal Based) Chantilly, VA DoD/Civilian Technology Consulting, Design and Architecture, Pre-Sales Support Building primarily Cisco solutions for military installations in the Southern CA region. PreSales activities such as design and proposal of Cisco Unity/CallManager/CER, including all phones, servers, support to El Segundo AFB, Cisco UCS to Hospital Ft Irwin, Secure VDI to Base Ops, and others. Using tools such as NetFormx DesignXpert to augment a BoM or system configuration including all Cisco components and services. Provide onsite guidance and direction for network convergence, wireless at client’s location. Chalk Talk to every level of interest, from financial to technical to current IT support staff. July 2005 to June 2007 Page 5 DIRECTV, El Segundo, CA Enterprise Information Security Manager, Architecture, Design and Testing Oversight and key design review, infrastructure and solution design review and contribution Enterprise level influence over technology decisions based on security models supporting compliance and security best practices Regulatory compliance remediation efforts with Sarbanes-Oxley 404 Controls, PCI DSS1.0 controls, and HIPAA controls (not to mention GLBA and SB1386 assurance review). Responded to critical (material) control issues and developed working plans and creative approaches to remediate and offer out of the box compensating controls in critical business systems, which met the control’s intent. Assisted in driving changes to SDLC of critical application handling and management of change effort. Implemented Testing program for information security reporting and metrics of improvement. Implemented Archer Incident Management solution and reporting framework Implemented several testing servers infrastructure containing MS SQL, VM Ware Server, MS Server 2003, Nessus, AppDetective, WebInspect, CoreImpact, Archer SmartSuite and other testing/reporting tools. $700,000+ project Resolved SAP Enterprise Portal Architecture Security issues for partner portal. $4.3 million project Tested critical business solutions and presented results of tests to senior management for value proposition verification with immediate buy-in and approval for continued testing on in-scope systems. Reviewed and tested critical network infrastructure configurations, made change recommendations to management to improve compliance and security standpoints. Reviewed Overall Administration of Active Directory and made recommendations on improvement of security process (Segregation of duties, review of rights, change management and privilege escalation). Designed, architected, defined Siebel Field Services security and access control models which resolved a long term design issue and enabled over 11,200 non-employee service installers to enter order information online, wirelessly, and receive updated dispatch reports on demand. $14.8 million project Reviewed module by module all of DIRECTV.com website during a crucial framework replacement. $2.8 million project STEPHEN B WELTMAN Page 6 Designed, implemented and configured CA Network Forensics for internal network policy abuse detection across multiple data centers. Included an Active Directory Domain for Access by listed personnel only. $500,000 project. Determined best practices on partner connections via middleware and reviewed implementation efforts on ALL inbound connections from partners. $25-40 million projects Evaluating ISO 27002 for an Information Security Program Enterprise-wide. Complete review of standard revealed that it was not a clean fit for full implementation. ITIL Chosen in lieu. Senior management briefings, technology symposiums, innovative solution architectures gathering executive buy-in and improving confidence in technical directions for security models Managed Enterprise security inter-technology working team Mar 2004 to Tetra Consulting, Sherman Oaks, CA July 2005 Project Manager-IT Auditing Services /Network Infrastructure Consultant SOX Clients include TV Guide (Los Angeles, CA), I-Flow Corporation, QLogic Inc, (Irvine and Lake Forest, CA) Audited network infrastructure in conjunction with assessing client’s regulatory and informational security compliance. Documented deficiencies and remediation steps as part of customer deliverables. Assisted, and wrote validation documentation for on-going monitoring of customer’s internal audit controls and control frameworks for network security systems. Utilized the COBiT Framework to facility the service delivery of IT audits for customers. Project managed several customer business process and procedure maturity assessments. Developed business solutions for client requirements cost and time effectively. Developed, participated and wrote extensive customer documentation related to the results of Tetra’s security and HIPAA audit results. Delivered formal presentations to Tetra’s customers to disseminate Tetra’s Audit findings and recommended remediation efforts. Developed Customer “recommended practices” for the implementation of wide-area ATM and SONET implementations. Projects included: QLogic Corp 404 Assessment, I-Flow 404 Assessment and Remediation, TV Guide SOX 404 Readiness Testing, Several other contributing efforts Sep 2002 to Absolute Networks and Sales, Los Angeles, CA Jan 2004 Sr. Sales Engineering-Consultant Providing Project Management Leadership and solutions support to Small/medium businesses requiring technical guidance Converging Voice and Data networks, Network Security, IPSec VPN Implementations. Design security assessment efforts Worked directly with customers to negotiate contracts, provide weekly status reports. Provided customer facing pre and post-sales support for customer implementations. Scoped, Design and developed project charter and official statement of work (SOW) for project planning and execution. SOW’s contained information such as the Project Schedule, resources, costs, and task interdependencies Conducted weekly project status report meetings with clients. Utilized MS-Project 2002 to plan and manage multiple concurrent customer projects. Developed customer Service Delivery SLA to ensure the quality of specific network service offerings. SLA’s included escalation procedures and internal notification process to ensure SLA compliance. Mentored Service Delivery technical staff. STEPHEN B WELTMAN Assisted in the hands-on Implementation of various contracts. Technologies included Win2K, Win2K3 Active Directory Solutions for Access Control, Rights and Permissions, SonicWall appliances, CheckPoint NG, RedHat/Mandrake, Cisco routers and switches. F5 L4-7 app switches, Linux SAMBA servers, Linux SNORT/NTP servers, MySQL, WhatsUp Gold, MRTG, Lucent Switches, Extreme switches, terminal servers, Retina Security Scanner Preformed and coordinated customer IT audits based upon CobIT framework. Documented “gapanalysis” and evaluated the maturity of customer’s IT Polices and procedures. Oct 2000 to July 2001 Page 7 Cisco Systems (Full Time Employee) Consulting Systems Engineer – Presales Support for Enterprise Accounts Solutions expert with dial aggregation, concentration, Voice/Data dial offload (from voice networks), SIP/H323/VoATM/VoDSL/VoIP/GR303 and SS7 utilization to allow IP-Based equipment and technologies introduction Assisted $6-7 million dollars of sales revenue with design proofs, recommendations, and presentations that drew decision-maker approval Trained and coached field personnel on solutions. Provide my Subject Matter Expert for Voice/Dial Aggregation with presentations and Q/A sessions for field System Engineers. Member of the Service Provider Aggregation Virtual Team. Updated lectures, Verified contents and Reformat presentations for the Engineering field team. July 1999 to Oct 2000 Ascend/Lucent Technologies (Full Time Employee) Broadband Network Engineer, Rapid Deployment Team. Sept 1997 to Brooks/MCI Worldcom (Full Time Employee) July 1999 Data Systems Specialist. May 1996 to July 1998 Weltman Computer Consulting Independent Consultant HIGHLIGHTS Technology Support Infrastructure Support and Oversight, review and management Monitoring and Response to critical systems (Troubleshooting, escalations, Fault Reporting) Regulatory Compliance focus for Risk Management Building Information Security programs with ISO 27002 (formerly ISO 17799) standards Windows and Unix based servers, backup systems, SAN sub systems Routing, Switching, Firewalls, Load balancing (Primarily Cisco Systems) Leadership Mentoring and development support of several engineers Professional Presentation skills, capable of any size group or audience and information Strength, skill identification, professional path identification, coaching Innovative, assertive, compassionate, caring friendly and willing to serve at any level STEPHEN B WELTMAN Page 8 President of Toastmasters Club 174 for 2006-2007 (33 members, weekly meetings) 2007-2008 Toastmasters Area D3 Governor with 6 clubs reporting responsibility; top performing area in the division. Project Management Working Project Manager with several years’ experience, projects up to $5M and 50 resources Resource Management and Leveling Project and Project Portfolio Management Software – Microsoft Project 07, PlanView Effort and Resource Driven project planning Critical Path identification and remediation Scope, time, cost, quality, resource, communication, & risk management Technical & Business Writing Technology Infrastructure, development, and security standards Project Customer Status Reports Departmental and Workgroup Service Level Agreements Implementation and Operational Installation and Supporting Documentation Enterprise Class Infrastructure Auditing Documentation Project Statement of Work, Requirements and Scoping Documents Application Experiences WebSense AP-Email, AP-Data (DLP), AP-Web, Triton; full cycle installation, configuration and management Qualysguard Qualys Scan (Vulnerability scanning tool) SumoLogic SEIM logging aggregator, reporting and monitoring engine FIreMon Firewall policy analyzer and monitoring tool. Sumo Logic SEIM toolset for logging aggregation, monitoring analysis and alerting Enterprise antivirus reporting engines (McAfee ePolicy Orchestrator) Microsoft Windows 2008/2012 Active Directory, DNS, DHCP, file/print/IIS services Unix/Linux Services (LDAP, DNS, SMTP, SAMBA, SNORT, NTP, others) Windows and Linux Shell Scripting to automate management Archer Technologies Incident Management Module and SmartSuite Framework Veritas/Symantec Backup Symantec Endpoint Protection (SMB and Enterprise) Symantec Data Loss Prevention Suite Tripwire File Integrity and Enterprise, v7 AppDetective: application security testing WebInspect: network based security assessment testing tool Nessus: Network security assessment tool WireShark: (formerly Ethereal) network packet capturing and logging AirMagnet WiFi Test and Auditing tools MS Office 2010, 2013, Project, Visio, Word, Excel, PowerPoint HP OpenView, NNM, Mercury Business Availability Center, CA UniCenter CA Network Forensics, Secure Proxy Server, Directory Server, eTrust Admin Operating System Experiences MS Windows 2008/2012 Server, Active Directory services, Certificate Services, others STEPHEN B WELTMAN Page 9 MS Windows (XP, Vista, Win7, Win8, Win10) VMWare ESXi, Workstation and Fusion virtualization environments Linux (Redhat Enterprise, Ubuntu) Mac OS X Unix (Solaris 2.6, 2.7 HPUX) Network Services Extensive knowledge of Cisco Products included common LAN and WAN routing and switching protocols. Cisco ASA firewalls, SonicWall Firewalls, IDS Load Balancers (Top Layer) F5 L4-7 Load balancers Multi-Site Enterprise WAN connectivity to data centers, office campuses Practical experience and understanding of Web-based network infrastructure services and technologies such as Content Switch, Caching Servers, DNS Services, SMTP Services, Application Servers, Payment Processing Systems. HTTP, HTTPS (MS IIS), FTP, SMTP, Proxy, DNS, DHCP, Syslog Avocent IP KVM Systems (DSView and standalone) Remote Access (Telnet, SSH, PCAnywhere, VNC, Terminal Services) Lucent ATM/Frame Relay switches, Nokia routers, CBX 500, GX 550, B-STDX 9000, PSAX 100/600/1200, Avaya switches (voice), Nortel Passport ATM switches, 5ESS, Tellabs Titan 5500 (DACS), Lucent DDM/FT/SLC 2000 Additional Soft Skills Developing technology requirements and organization focus strategies derived from business vision and customer needs. Assisting clients in taking a proactive focus in identifying and managing organizational, workflow and technology risks. Excellent presentation, oral and written communication skills. Comfortable with working, communicating and presenting to all levels of management, administrative and technical resources. Consultative Approach. Customer Value point Sales approach. Able to appropriately identify barriers or issues, communicate to the appropriate customer management, and recommend remediation efforts PROFESSIONAL DEVELOPMENT 2015 2014 2013 2013 2013 2012 2010 2010 2009 2009 2009 2008 2007 Attended RSA Security conference CISSP Bootcamp and self-study Microsoft PKI Solutions self-study Cisco TeleMedicine Implementation (SE) Cisco Nexus Operation and Implementation Cisco IPv6 Fundamentals EMC Sales & Sales Engineer training VMWare SE and Sales training ISC2 CISSP Self Studies; Prepare for September 2010 certification Dell Equalogic SAN implementation and admin Citrix XenServer Virtualization solution Implementation and management Cisco Certified Select Unified Communications (SE and AM) SunOne LDAP training self study STEPHEN B WELTMAN 2007 2006 2006 2006 2005 2004 2003 2002 to 2003 2002 2002 2001 2000 1998 1998 1998 1997 1997 Page 10 WebGoat WebApp Solution Security training self study Application Web/OS testing for Compliance, InfoSec Risk Mitigation auditing Computer Associates Network Forensics Implementation SAP infrastructure security solutions SANS 503 Intrusion Detection, packet decoding, In Depth Security Training CISSP Self Study; BS 7799 Self Study (ISO 17799, now 27002) SSM and Carnegie Mellon Capability Maturity Model Assessments. HIPAA Security Compliance Audit Training COBiT IT Audit Training CLI, (IOS 12.2T-12.3) GR303, and SS7 Cisco Trained Numerous Video On Demand training courses along with texts from Cisco Intranet LUCENT Project management and leadership Lucent Core ATM/Frame Relay Servicing and Troubleshooting Lucent Trained on ATM/FR equipment, GX-550, CBX-500, B-STDX9000, PSAX Line Lucent Trained on Solaris, HPOV, NavisCore, Sybase, NavisXtend, NavisTools Lucent Trained on all DDM/FT/SLC systems SONET based systems Lucent DDM-2000, FT-2000, SLC-2000, and 5ESS Training EDUCATION 2014 2009-2010 2005-2006 2000 1996-1997 1987-1988 1986-1987 InfoSec Institute CISSP Bootcamp Microsoft MCITP in progress Capella University, online (progress in BS-IT) Cisco Layer 2 and 3 trained, OSPF and MPLS VPN trained Microsoft MCSE Trained US Navy Electronics Technician School (Basic and Specialty) Cleveland State University, 1st and 2nd year CERTIFICATIONS 2014 2002 2001 1997 CISSP passed 140324, Certificate 348794 Cisco Certified Network Associate (CCNA 1.0) SonicWall CSSA Certified Security Administrator Microsoft MCSE (Windows 4.0)