Guest User

Untitled

a guest
Feb 14th, 2018
341
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.89 KB | None | 0 0
  1. # Bryse Roeben
  2. ### *Roseville, CA 95678*
  3. ### *(916) 953-9199*
  4. ### *bryse.roeben@gmail.com*
  5.  
  6.  
  7. An accomplished and integrity-driven system’s analyst and IT professional with a passion for programming and experience in compliance, risk analysis, vulnerability analysis and data integrity. Extensive experience in direct and remote analysis with great critical thinking and meticulous attention to detail. Able to thrive in difficult and dynamic environments where efficiency and accuracy are keys to success.
  8.  
  9. ### Core Competencies
  10.  
  11. * Data Implementation Strategies
  12. * End User Support
  13. * Strategic Planning
  14. * Secure Infrastructure Design
  15. * Production Planning
  16. * Interface Design
  17. * Implementation Engineer
  18. * Workflow Development
  19. * Database Management
  20.  
  21.  
  22. ### Education
  23.  
  24. **Coding Dojo, McLean, VA: 2017**
  25. *Full Stack Software Engineer Certification*
  26.  
  27. **Western Governor’s University, Salt Lake City, UT: 2015**
  28. *Master of Business Administration: IT Management*
  29.  
  30. **Western Governor’s University, Salt Lake City, UT: 2014**
  31. *Bachelor of Science: Computer Information Systems*
  32.  
  33. ### Professional Experience
  34.  
  35. **IBO Solutions**
  36. San Francisco, CA
  37. 2017
  38. *Security Engineer*
  39.  
  40. * Design and implement client security architecture in accordance with NIST, FISMA and ISO frameworks
  41. * Provide Proof of Concepts (PoC) for new architecture designs and future technologies
  42. * Participate in enterprise-wide vulnerability assessments and provide insight into threats and risk management
  43. * Develop Incident Response policies and procedures based on the NIST 800 controls and guidelines
  44. * Identify, hunt and evaluate Indicators of Compromise (IOC) – and give recommendations on remediation
  45. * Update stakeholders on the latest vulnerabilities and attack vectors and give recommendation on risk mitigation
  46. * Conduct application threat modeling based on OWASP standards
  47. * Perform penetration testing on PoC architecture and applications prior to incorporation in the live environment
  48.  
  49.  
  50. **ASRC Federal Data Networks Corporation**
  51. Reston, VA
  52. 2016
  53. *Security Engineer*
  54.  
  55. * Provide security posture guidance on enterprise application implementation and integration
  56. * Created Python scripts to automate daily tasks and increase day-to-day productivity
  57. * Design Proof of Concept and Concept of Operations (ConOps) documentation from a security standpoint for proposed enterprise technology
  58. * Recommend patches and remediation from scans based on NIST/FISMA and industry best practices
  59. * Currently moving the entire on-premise security stack to a cloud environment; working with security, engineering, operations and management to deploy
  60. * Work directly with CISO and CIO to develop application and hardware requirements based on the mission and business needs
  61. * Provide cyber security guidance and recommendations to CISO based on government policy and mandates
  62. * Review penetration testing reports and recommend remediation for findings based on entity policy and/or federal guidelines
  63.  
  64. **California Department of Education**
  65. Sacramento, CA
  66. 2015 – 2016
  67. *Systems Analyst*
  68.  
  69. * Transformed obsolete Access databases into user-friendly Web Applications utilizing Python Flask with a MySQL backend
  70. * Recommended changes in security, development, maintenance and system standards to senior management and key stakeholders; develop system implementation plans and create business/technical artifacts for archive
  71. * Applied logic rules to the SIEM based on traffic findings and abnormalities
  72. * Perform ST&E and IV&V for upgraded and new applications going into the production environment
  73. * Lead the implementation and integration testing for COTS and internal application interfacing
  74. * Actively engaged with programmers and engineers using SCRUM methodology to better our client’s experience
  75. * Performed QA and vulnerability testing during SCRUM sprints using Safe3 and SQLmap to detect possible vulnerabilities in JavaScript and SQL statements
  76. * Automated more than 75% of the daily unit tasks by designing and implementing Python and NodeJS scripts
  77. * Established technical requirements, business rules, validation rules and file specifications for the customer’s online reporting application
  78. * Lead the division in designing, developing, testing and implementing the change/issue management databases for 4,000 employees
  79.  
  80. **Siemens**
  81. Tulare, CA
  82. 2013 – 2015
  83. *Systems Analyst*
  84.  
  85. * Configured application interface needs via International Health Standards (HL7), Medicare and HIPAA
  86. * Performed vulnerability scans and recommended patches and remediation as part of a ST&E and IV & V team
  87. * Provided comprehensive second-level assistance for EHR and general financial systems
  88. * Effectively managed a variety of technical projects such as system upgrades, go-lives and implementations
  89. * Monitored traffic logs (ArcSight) for 10 different applications and escalated abnormalities
  90. * Experienced in conducting analysis, designing, building, testing, configuring system settings and implementing business solutions using information technology in a large organization
  91. * Served as a critical liaison between IT and business end-users; collaborate closely with business partners to elicit business requirements and analyze business processes to understand the business needs/challenges and to determine how technology can best solve those problems
  92. * Responsible for multiple hospitals and all aspects of application configuration, implementations, integration, data analysis and validation testing; experienced planning for automation, load/performance and security testing while providing technical support to internal and external customers as needed
  93. * Installed numerous different vendor software onto servers, workstations, mobile devices, handheld scanners and more; this included evaluating and recommending security posture
  94.  
  95. **Kaweah Delta Healthcare District**
  96. Visalia, CA
  97. 2007 – 2013
  98. *Implementation Engineer*
  99.  
  100. * Provided guidance and insight on network and data security in accordance with HIPAA regulations
  101. * Perform ST&E and IV&V for upgraded and new applications going into the production environment
  102. * Member of the hospital Soarian EHR implementation team: designed workflows, tested workflows and interfacing to ancillary departments and gathered reports for auditing purposes
  103. * Designed and maintained alpha and beta test plans for all implementation projects
  104. * Administered complete troubleshooting support for the EHR and all ancillary systems
  105. * Functioned as a liaison between the clinical staff and IT to ensure top productivity and efficiency
  106. * Created all EHR education literature for system upgrades, implementations and special projects
  107. * Coordinated with engineers to develop the system architecture to meet customer requirements and government healthcare regulations
  108.  
  109. ### Technical Skills
  110.  
  111. * ArcSight
  112. * Burp Suite
  113. * Lean/Agile/SCRUM
  114. * PHP/MySQL
  115. * JIRA
  116. * Splunk
  117. * Cylance
  118. * Python
  119. * PostgreSQL
  120. * Docker
  121. * Nessus
  122. * Tanium
  123. * MEAN
  124. * Apache
  125. * Chef
  126. * Kali Linux
  127. * AWS
  128. * VM Ware
  129. * ServiceNow
  130. * Neo4j
Add Comment
Please, Sign In to add comment