際際滷

際際滷Share a Scribd company logo
John Whitney
645 S. Burk St
Gilbert, AZ 85296
602-513-1207
msisa@usa.com
Experienced IS professional looking to add value and vision to a challenging work environment by applying
experience and expertise from 25 + years in IT including 12 years IT Security.
Professional Experience
Edward Jones Investments:
Security Analyst (System Security) 06/2012 to Present
Symantec Endpoint Protection Manager (SEPM) Administrator
Responsibility Summary:
 My main responibility is Symantec Endpoint Protection Manager (SEPM, SEP)
Administration/Maintenance (SAV, SEP11.0, 12.1..) for the company.
o Version upgrades (SEP11 to SEP12.1, to 121.2, to 12.1.4, & 12.1.6
o Sonar/CIDS updates.
o Create groups, exceptions, firewall rules, policies, MSLs, to keep the SEPM running effectively.
o Analyize and solve SEP problems, implement fixes.
o Work with Symantec Support to resolve situations as quick as possible.
o Verifying that all clients are being update nightly/
o Vertying that clients are getting scanned once a week, and looking for clients that are having
issues with open files during scanning and then resolving the issue.
o Experience with Group Update Provider (GUP) & LiveUpdate Administrator
o I have work with the server team to virtualize the SEPMs.
o Maintain the SEPM in production, the test lab and the development labs.
o Troubleshoot problems to a suceessful resolution.
 Password Vault  creating and maintaining.
 Managed File Transfers  Processing requests.
 Encryption Processing
 Full Disc Encryption for Desktop/Laptop
 I provide excellent Tier 3 support; I have received client service awards for my customer service.
 I work with other IS teams
 On Call support
Skills:
 Experience with Group Update Provider (GUP), SEP service, LiveUpdate Administrator
 I have work with the server team to virtualize the SEPMs.
 Maintain the SEPM in production, the test lab and the development labs.
 I configured the SEPM DB server
 Experience with the SEP service
 Experience with Symantec LiveUpdate Administrator
 Demonstrated experience working with Virtualization
 Experience configuring firewalls and providing wireshark traces for analysis.
 Very familiarity with SEPM/SEP installations and maintenance.
 Have written documents for other team members to follow when issues arrise, as well as provided step-
by-step instructions for the helpdesk to use when assisting the end users.
I have been the SEPM/SEP administrator for three years, I confident that I can meet your needs and more. I
have resolved many issues, some issues I resolved before Symantec support could provide a solution. You
will notice below that when I was a System Admin in Platform services I was responsible for SEP, and then as
a Security Analyst, this was because a decision was made to move SEP to the System Security team, and
they wanted me to continue to support SEP.
Systems Administrator (Platform Services) 09/2007 to 06/2012
Responsibility Summary:
 Symantec Endpoint Protection administration (SAV, SEP11.0, 12.1..)
 Remote Access
 Responsible for applying business and technical knowledge to ensure availability of Edward Jones'
systems, and to provide quality solutions for business and enterprise infrastructure needs.
 Design, assemble, configure, install, maintain and performance tune complex infrastructure components
associated to the specific IS department with minimal guidance.
 Display detailed understanding of Hardware, Operating Systems, Storage, Replication, and Network
Technologies.
 Assist in developing technical requirements
 Develop, package, document, test and implement quality infrastructure within targeted due dates.
 Debug and correct internal infrastructure problems.
 Assist with estimating for assigned deliverables as directed by leader.
 Follow the firms System Development Lifecycle Methodology.
 Provide first-level support for assigned systems, including rotating assignment to provide 24x7 on-call
coverage and monitoring system logs and messages.
 Communicate internally with team and team leader regarding deliverable status.
Skills:
 Operating Systems: Windows, ,XP, Linux, Unix
 Networking Technologies: LAN, WAN, DNS, TCP/IP
 Vendor Components: WebLogic, LDAP, Active Directory, Print Services, Security Concepts, Microsoft
Security Analyst (Perimeter Security) 06/2007  09/2007
Leader: Dave Erler
 I was brought on-board to work with Remote Access and assist in other areas within Perimeter Security
such as the proxy server.
Responsibility Summary:
 Establish and review security controls and processes to assist management in the protection of
information system resources and associated assets against accidental or unauthorized modification,
destruction or disclosure.
 Ensure compliance to published Information Security Policies and standards.
 Provide security services that align with business objectives and regulatory requirements.
 Technical Skills
 Knowledge and understanding of security issues, risks, concepts and terminology.
 Knowledgeable of the security aspects of computer platforms and technologies (e.g.,
 Linux, UNIX, MVS, Windows, Web, LDAP, DBMS, Network, Firewalls, IDS/IPS, Authentication).
 A fundamental understanding of project management and system development lifecycle methodologies is
beneficial.
 Working knowledge of applicable programming and scripting languages that support security processes.
 Experience using common security products and tools.
Security Analyst, 4/2004 - 07/07/06
Gilltek Systems, Tempe, Arizona
On-site at APS (local power company), responsible for processing day to day requests for IS Security support
including troubleshooting and administering: new accounts; disabling accounts; application, platform, and
database access requests; account moves and renames; global group management; remote access. Work
will include processing email, providing phone support, analyzing customer requests, assessing security
requirements, documenting requests and approvals. I lead the development and project teams for
documenting all processes to meet Sarbanes-Oxley requirements and to establish the appropriate security
controls. All work must be done in accordance with corporate and security access policies and procedures
and established processes and work instructions to comply with audit and regulatory requirements
Skills required for my job is as follows: Working NT, Active Directory, RACF, MS Exchange
Administration, Windows 2000/XP, and security administration policies.
Security Analyst, 11/1997 - 3/2004
Computer Operator / Production Analyst 4/1988  11/1997
Sierra Health Services, Las Vegas, Nevada
Worked for five years in Security and progressive responsibility in highly technical environments.
 Monitored and maintained the McAfees Virus scanning software for the email servers & EPO.
 Ensured stringent compliance to internal IS Security policies.
 Documented all department procedures for the disaster recovery and SOX.
 Maintained working knowledge of the security requirements concerning HIPAA.
 Lead person for IDS project, which included the installation of all hardware
component, network and software configurations
 Controlled, reported-on setting and maintaining Internet access. (Websense, Bluecoat)
 Proactive in maintaining and monitoring security for 200+ servers through collaboration with the SNA
department and regular security audits.
 Involved in the deployment and security of several new applications. Performed Security audits on all new
system or software installs.
 Administered all domains and software access, which included the maintenance of user accounts, this
included NT/ Active Directory, Oracle, Unix and several others.
 Password management and policy adherence.
 Maintained and granted remote access via VPN and remote keys.
 Assisted in creating a Security policy manual, and help implement these system & physical policies.
Education & Certifications
Master of Science - Information Security and Assurance (MSISA) Western Governors University (WGU)
Salt Lake City, UT.
Bachelor's Degree in IT Management - Western Governors University Salt Lake City, UT.
Endpoint Protection 12.1. Administration.
Endpoint Protection 12.1 Maintain & Troubleshoot.
Certificates: CCENT, CEHv7, CHFI, INFOSEC Professional, NSTISSI No. 4011 & 4012.
MCP & MCSA Windows Server
Essentials of Computer Security (SANS Institute)

More Related Content

What's hot (20)

Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
WrikeTechClub
Agile and Secure SDLC
Agile and Secure SDLCAgile and Secure SDLC
Agile and Secure SDLC
Nazar Tymoshyk, CEH, Ph.D.
Computer system administrator
Computer system administratorComputer system administrator
Computer system administrator
TheZayne92
Resume
ResumeResume
Resume
Durgesh D
MendozaC2res (1)
MendozaC2res (1)MendozaC2res (1)
MendozaC2res (1)
Carlos Mendoza
OctaviusWaltonResume
OctaviusWaltonResumeOctaviusWaltonResume
OctaviusWaltonResume
Octavius Walton
Resume
ResumeResume
Resume
Prakash Biroju
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administration
Khang-Ling Loh
LarryLeon
LarryLeonLarryLeon
LarryLeon
Larry Leon
Secure by Design - Security Design Principles for the Rest of Us
Secure by Design - Security Design Principles for the Rest of UsSecure by Design - Security Design Principles for the Rest of Us
Secure by Design - Security Design Principles for the Rest of Us
Eoin Woods
IbanezResumeUpdatedJul2016
IbanezResumeUpdatedJul2016IbanezResumeUpdatedJul2016
IbanezResumeUpdatedJul2016
Dustin Ibanez
johndemunnik_MAY2016
johndemunnik_MAY2016johndemunnik_MAY2016
johndemunnik_MAY2016
John DeMunnik, CISSP Associate
mary_jhun_macayana
mary_jhun_macayanamary_jhun_macayana
mary_jhun_macayana
Mary Jhun Macayana
Brian updated resume
Brian updated resumeBrian updated resume
Brian updated resume
Brian Simon
08252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA108252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA1
jjdoylecomcast
Secure Software Development Lifecycle
Secure Software Development LifecycleSecure Software Development Lifecycle
Secure Software Development Lifecycle
1&1
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systems
Ben Rothke
mary_jhun_macayana
mary_jhun_macayanamary_jhun_macayana
mary_jhun_macayana
Mary Jhun Macayana
CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security Operations
Karthikeyan Dhayalan
Edward E Copeland_Resume
Edward E Copeland_ResumeEdward E Copeland_Resume
Edward E Copeland_Resume
Edward Copeland
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
Dmitriy Desyatkov "Secure SDLC or Security Culture to be or not to be"
WrikeTechClub
Computer system administrator
Computer system administratorComputer system administrator
Computer system administrator
TheZayne92
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administration
Khang-Ling Loh
Secure by Design - Security Design Principles for the Rest of Us
Secure by Design - Security Design Principles for the Rest of UsSecure by Design - Security Design Principles for the Rest of Us
Secure by Design - Security Design Principles for the Rest of Us
Eoin Woods
IbanezResumeUpdatedJul2016
IbanezResumeUpdatedJul2016IbanezResumeUpdatedJul2016
IbanezResumeUpdatedJul2016
Dustin Ibanez
Brian updated resume
Brian updated resumeBrian updated resume
Brian updated resume
Brian Simon
08252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA108252016 John D Resume ITIL PMP CISSP CSM CISA1
08252016 John D Resume ITIL PMP CISSP CSM CISA1
jjdoylecomcast
Secure Software Development Lifecycle
Secure Software Development LifecycleSecure Software Development Lifecycle
Secure Software Development Lifecycle
1&1
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systems
Ben Rothke
CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security Operations
Karthikeyan Dhayalan
Edward E Copeland_Resume
Edward E Copeland_ResumeEdward E Copeland_Resume
Edward E Copeland_Resume
Edward Copeland

Similar to Resume-John-Whitney (20)

GraceCV
GraceCVGraceCV
GraceCV
Grace Adedotun-Ogundeji
fsp_22Sep15
fsp_22Sep15fsp_22Sep15
fsp_22Sep15
Felicia Pearson
Lionel Deliz resume
Lionel Deliz resumeLionel Deliz resume
Lionel Deliz resume
Lionel Deliz
Grace cv2
Grace cv2Grace cv2
Grace cv2
Grace Adedotun-Ogundeji
GraceCV2
GraceCV2GraceCV2
GraceCV2
Grace Adedotun-Ogundeji
Abdul_Mateen-26082616
Abdul_Mateen-26082616Abdul_Mateen-26082616
Abdul_Mateen-26082616
Abdul Mateen
Nana Owusu resume today
Nana Owusu resume todayNana Owusu resume today
Nana Owusu resume today
Nana Owusu
Darrell_Williams_resume Server
Darrell_Williams_resume ServerDarrell_Williams_resume Server
Darrell_Williams_resume Server
Darrell Williams
Darrell_Williams_resume Server
Darrell_Williams_resume ServerDarrell_Williams_resume Server
Darrell_Williams_resume Server
Darrell Williams
SWAPNIL Resume
SWAPNIL ResumeSWAPNIL Resume
SWAPNIL Resume
Swapnil Kunjir
Faisal Mukhtar CV
Faisal Mukhtar CVFaisal Mukhtar CV
Faisal Mukhtar CV
Faisal Mukhtar
Logesh Resume
Logesh ResumeLogesh Resume
Logesh Resume
Logesh Kumar
Samranpasha_IT_Engineer
Samranpasha_IT_EngineerSamranpasha_IT_Engineer
Samranpasha_IT_Engineer
samran pasha
RESUME16
RESUME16RESUME16
RESUME16
Alen Lonic
Dan RhodesResume 2192015
Dan RhodesResume 2192015Dan RhodesResume 2192015
Dan RhodesResume 2192015
Daniel Rhodes
Frank Johnston resume
Frank Johnston resumeFrank Johnston resume
Frank Johnston resume
Frank Johnston
Harsha CV
Harsha CVHarsha CV
Harsha CV
Harsha Siddartha Sarjapura
ShaneStevensResume-Mar2016
ShaneStevensResume-Mar2016ShaneStevensResume-Mar2016
ShaneStevensResume-Mar2016
Shane Stevens
IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant
Saravanan Purushothaman
2016_Resume_Brian_Burrington
2016_Resume_Brian_Burrington2016_Resume_Brian_Burrington
2016_Resume_Brian_Burrington
Brian Burrington

Resume-John-Whitney

  • 1. John Whitney 645 S. Burk St Gilbert, AZ 85296 602-513-1207 msisa@usa.com Experienced IS professional looking to add value and vision to a challenging work environment by applying experience and expertise from 25 + years in IT including 12 years IT Security. Professional Experience Edward Jones Investments: Security Analyst (System Security) 06/2012 to Present Symantec Endpoint Protection Manager (SEPM) Administrator Responsibility Summary: My main responibility is Symantec Endpoint Protection Manager (SEPM, SEP) Administration/Maintenance (SAV, SEP11.0, 12.1..) for the company. o Version upgrades (SEP11 to SEP12.1, to 121.2, to 12.1.4, & 12.1.6 o Sonar/CIDS updates. o Create groups, exceptions, firewall rules, policies, MSLs, to keep the SEPM running effectively. o Analyize and solve SEP problems, implement fixes. o Work with Symantec Support to resolve situations as quick as possible. o Verifying that all clients are being update nightly/ o Vertying that clients are getting scanned once a week, and looking for clients that are having issues with open files during scanning and then resolving the issue. o Experience with Group Update Provider (GUP) & LiveUpdate Administrator o I have work with the server team to virtualize the SEPMs. o Maintain the SEPM in production, the test lab and the development labs. o Troubleshoot problems to a suceessful resolution. Password Vault creating and maintaining. Managed File Transfers Processing requests. Encryption Processing Full Disc Encryption for Desktop/Laptop I provide excellent Tier 3 support; I have received client service awards for my customer service. I work with other IS teams On Call support Skills: Experience with Group Update Provider (GUP), SEP service, LiveUpdate Administrator I have work with the server team to virtualize the SEPMs. Maintain the SEPM in production, the test lab and the development labs. I configured the SEPM DB server Experience with the SEP service Experience with Symantec LiveUpdate Administrator Demonstrated experience working with Virtualization Experience configuring firewalls and providing wireshark traces for analysis. Very familiarity with SEPM/SEP installations and maintenance. Have written documents for other team members to follow when issues arrise, as well as provided step- by-step instructions for the helpdesk to use when assisting the end users. I have been the SEPM/SEP administrator for three years, I confident that I can meet your needs and more. I have resolved many issues, some issues I resolved before Symantec support could provide a solution. You will notice below that when I was a System Admin in Platform services I was responsible for SEP, and then as a Security Analyst, this was because a decision was made to move SEP to the System Security team, and they wanted me to continue to support SEP.
  • 2. Systems Administrator (Platform Services) 09/2007 to 06/2012 Responsibility Summary: Symantec Endpoint Protection administration (SAV, SEP11.0, 12.1..) Remote Access Responsible for applying business and technical knowledge to ensure availability of Edward Jones' systems, and to provide quality solutions for business and enterprise infrastructure needs. Design, assemble, configure, install, maintain and performance tune complex infrastructure components associated to the specific IS department with minimal guidance. Display detailed understanding of Hardware, Operating Systems, Storage, Replication, and Network Technologies. Assist in developing technical requirements Develop, package, document, test and implement quality infrastructure within targeted due dates. Debug and correct internal infrastructure problems. Assist with estimating for assigned deliverables as directed by leader. Follow the firms System Development Lifecycle Methodology. Provide first-level support for assigned systems, including rotating assignment to provide 24x7 on-call coverage and monitoring system logs and messages. Communicate internally with team and team leader regarding deliverable status. Skills: Operating Systems: Windows, ,XP, Linux, Unix Networking Technologies: LAN, WAN, DNS, TCP/IP Vendor Components: WebLogic, LDAP, Active Directory, Print Services, Security Concepts, Microsoft Security Analyst (Perimeter Security) 06/2007 09/2007 Leader: Dave Erler I was brought on-board to work with Remote Access and assist in other areas within Perimeter Security such as the proxy server. Responsibility Summary: Establish and review security controls and processes to assist management in the protection of information system resources and associated assets against accidental or unauthorized modification, destruction or disclosure. Ensure compliance to published Information Security Policies and standards. Provide security services that align with business objectives and regulatory requirements. Technical Skills Knowledge and understanding of security issues, risks, concepts and terminology. Knowledgeable of the security aspects of computer platforms and technologies (e.g., Linux, UNIX, MVS, Windows, Web, LDAP, DBMS, Network, Firewalls, IDS/IPS, Authentication). A fundamental understanding of project management and system development lifecycle methodologies is beneficial. Working knowledge of applicable programming and scripting languages that support security processes. Experience using common security products and tools. Security Analyst, 4/2004 - 07/07/06 Gilltek Systems, Tempe, Arizona On-site at APS (local power company), responsible for processing day to day requests for IS Security support including troubleshooting and administering: new accounts; disabling accounts; application, platform, and database access requests; account moves and renames; global group management; remote access. Work will include processing email, providing phone support, analyzing customer requests, assessing security requirements, documenting requests and approvals. I lead the development and project teams for documenting all processes to meet Sarbanes-Oxley requirements and to establish the appropriate security controls. All work must be done in accordance with corporate and security access policies and procedures and established processes and work instructions to comply with audit and regulatory requirements Skills required for my job is as follows: Working NT, Active Directory, RACF, MS Exchange
  • 3. Administration, Windows 2000/XP, and security administration policies.
  • 4. Security Analyst, 11/1997 - 3/2004 Computer Operator / Production Analyst 4/1988 11/1997 Sierra Health Services, Las Vegas, Nevada Worked for five years in Security and progressive responsibility in highly technical environments. Monitored and maintained the McAfees Virus scanning software for the email servers & EPO. Ensured stringent compliance to internal IS Security policies. Documented all department procedures for the disaster recovery and SOX. Maintained working knowledge of the security requirements concerning HIPAA. Lead person for IDS project, which included the installation of all hardware component, network and software configurations Controlled, reported-on setting and maintaining Internet access. (Websense, Bluecoat) Proactive in maintaining and monitoring security for 200+ servers through collaboration with the SNA department and regular security audits. Involved in the deployment and security of several new applications. Performed Security audits on all new system or software installs. Administered all domains and software access, which included the maintenance of user accounts, this included NT/ Active Directory, Oracle, Unix and several others. Password management and policy adherence. Maintained and granted remote access via VPN and remote keys. Assisted in creating a Security policy manual, and help implement these system & physical policies. Education & Certifications Master of Science - Information Security and Assurance (MSISA) Western Governors University (WGU) Salt Lake City, UT. Bachelor's Degree in IT Management - Western Governors University Salt Lake City, UT. Endpoint Protection 12.1. Administration. Endpoint Protection 12.1 Maintain & Troubleshoot. Certificates: CCENT, CEHv7, CHFI, INFOSEC Professional, NSTISSI No. 4011 & 4012. MCP & MCSA Windows Server Essentials of Computer Security (SANS Institute)