Keep in touch with meI'm using Intch to connect with new people. Use this link to open chat with me via Intch app
Work Background
IT Security Specialist
McAfeeIT Security Specialist
Apr. 2022
Information Security Specialist
OneAZ Credit UnionInformation Security Specialist
Dec. 2014 - Jun. 2018• Ensure the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through the performance of formal Risk Assessments, Policy and Governance, and internal Threat Analysis. • Perform routine and on-demand system audits and vulnerability assessments, including user accounts, application access, file system, firewall rules and policies, access controls and external Web integrity scans to ensure compliance. • Communicate and provide input to the CTO as related to Enterprise Network Security architecture, design, implementation, and ongoing support for the network security devices. • Provide feedback concerning areas for development and accomplishments. • Work closely with the CTO, Network infrastructure team, and business units to provide security planning and technical support. • Develop, update, and assist in maintaining Information Security Awareness training documentation and materials. • Facilitate training sessions on or about Information Security and ensure consistent application of company policy and procedure guidelines. • Prepare incident reports of analysis methodology and results. • Assist with implementation of counter-measures or mitigating controls. • Provide technical expertise for the administration of security management tools. • Develop business cases and conduct presentations to senior IT Leadership of proposed security products and studies. • Analyze and document information for product and process improvements as well as analyze product rejections to create and implement effective corrective and preventive actions. • Works independently or as a lead on projects of medium to high complexity. • Maintains current knowledge of relevant technology as assigned. • Routine audit of network diagrams and documentation.
Senior Security Specialist
T-SystemsSenior Security Specialist
Oct. 2012 - Dec. 2014Scottsdale, Arizona• Managed the Security Operations Team for over 15,000 employees’ healthcare and hospital systems. Monitored network activity to identify issues and correct them in a timely manner. • Handled regular vulnerability scans and penetration testing for the IT Division and analyzed trends, news and changes in threat and compliance environment with respect to organizational risks; managed QualysGuard Vulnerability and Policy Compliance program for over 3000 devices spanning across six different organizational units. • Administered authentication and access controls, including provisioning, changes, and deprovisioning of user and system accounts, security/access roles and access permissions to information assets. • Supported and developed customer security programs including secure software development, security awareness training, change and incident management, vulnerability assessment, patch management, risk assessment, risk mitigation. • Assessed the effectiveness of the existing cyber security program, including identification of the strengths and weaknesses of the infrastructure/network installation, applications and application services, critical utilities and implemented communication technologies.
Owner/Security Consultant
Zebra NS, LLCOwner/Security Consultant
Jan. 2009 - Dec. 2012Phoenix, Arizona Area• Designed, implemented, and maintained security protocols, policies, plans, and systems to cover all possible security threats. • Successfully developed a fully functional security governance framework to support risk management and mitigation for maintaining the confidentiality, integrity and availability of client systems and data such as network security design, privacy and data loss prevention, backup, and business continuity and disaster recovery. • Identified possible threats ad determined the best security measures. Ensured developed frameworks meet clients’ industry specific regulatory compliances or other corporate goals such a PCI-DSS, SOX, HIPAA. • Oversaw internal and external network and client-side vulnerability assessments, compliance and hardening checks, IT security framework and governance review, backup, business continuity and disaster recovery planning and data encryption. • Met with clients to discuss security measures, provide information, and explain the designed systems. Managed relationships with clients and vendors in order to consolidate, educate, and convey clients' security requirements. • Investigated and utilized new technologies, tools and techniques to enhance security capabilities and performance of client systems and overall data.
Directory of Information Technology
Davis|Miles, PLLCDirectory of Information Technology
Jan. 2004 - Mar. 2010Phoenix, Arizona Area• Oversaw technical projects in alignment with organizational goals. Developed and implemented IT infrastructure for corporate growth from 12 to 95 employees in less than 6 months. Continued expansion to include over 200 employees. • Directed the effective delivery of networks, development, and disaster recovery systems and processes. Successfully developed and managed corporate federal IT legislation compliance. • Conceptualized ways to incorporate three business entities’ structure and technology into a single business model. • Resolved all escalation and issues by managing helpdesk and desktop support staff and ticketing systems. • Redesigned and implemented new network architecture, telecommunication systems, server configuration, remote connectivity and backup/disaster recovery systems
Team Lead, Helpdesk Administrator III
Direct AllianceTeam Lead, Helpdesk Administrator III
Aug. 2001 - Jan. 2004Phoenix, Arizona AreaManaged the production environment issue resolution and response team for IBM Japan, IBM India, IBM U.S., IBM Mexico, and IBM Brazil supporting over 800 employees. Included sales and operations support; IT end-user, network, and server support; and activity report generation. Managed IBM Japan’s sales application development team responsible for procedure documentation, security testing, departmental training, program implementation, and issue resolution and escalation. Reported directly to IBM executive management in both the US and Japan. Created the project requirements and managed the development of web-based documentation and escalation software to facilitate distribution of procedural and technical information across all technology groups: approximately 120 technicians; across 12 departments; with over 10,000 individual procedures. Managed and developed the operational and implementation procedures and technical documentation of Hewlett-Packard’s call center and internet sales ordering software.
Intch is a Professional Networking App for the Future of Work
300k+ people
130+ countries
AI matching
See more people like Daniel on Intch
IT
451129 people
18
Technologist, Project/Program Manager
24
Data Scientist Intern @ Newell Brands
16
Program Manager @ DISH Network
ITSecurity Analyst
25270 people
17
Major Crimes Det/CFCSI (Ret.) Business Owner, MBA @ CID / U of A / Rahbuilds.com
16
Programmer @ Castro Studios
23
Director