You are on page 1of 7

SUMMARY OF QUALIFICATIONS * Results-oriented and experienced corporate security professional with excellen t negotiating skills and extensive experience

in providing strategic development s, and management solutions in the areas of information security solution, compu ter forensics investigations, physical security, and general investigations. * Exceptional skills in the areas of investigative interviews, as well as consul ting skills combined with strong interpersonal associations, Intuitive and innov ative problem solver with a keen analytical mind and team-building skills. ACHIEVEMENTS * Authored a book Cybercrime: Incident Response & Digital Forensics sponsored by ISACA (Information System Audit and Control Association) and is available on th e www.isaca.org bookstore link. * Helped setup Chevrons headquarter Digital Forensics lab, as well as regional D igital Forensics labs in Houston and London. Instrumental is setting the labs s ecurity for level 3 security certification. Helped creating the Forensics Opera ting Procedures. Helped in creating the processes for handling the Electronic S tored Information process (eDiscovery) for the new Federal Rule of Civil Procedu res as well as processes to conduct digital forensics investigation for all data related crimes and policy violations. * Selected to conduct digital forensics investigation for the Bureau of Indian A ffairs and Department of Interior, as well as testifying as an expert witness in the federal jurisdiction governing DoI and BIA. * Certified Federal and State Expert Witness in criminal, civil and digital fore nsics investigations. * Building complete security incident response and training programs for some of the top 50 global financial institutions, large US Retail Company, Insurance Co mpany, Telecommunications Company and Federal government agencies. * Developed policy, standards, procedures, and guidelines, along with training p resentations and implementation in the areas of physical security, risk manageme nt, Bomb Threats, Violence in the Workplace, computer, network, Internet, and te lecommunication security and fraud. * Recognized speaker and educational expert in most recognized conferences and a ssociations, nationally and internationally. Presented in the areas of General I nvestigations, Computer Forensics Investigations, network/Internet/Intranet/Extr anet and telecommunication fraud and security, risk management, Identity Theft, violence in the workplace, and bomb threat response awareness. * Published articles for Corrections Today magazine, Better safe than sorry Int ernet Security, for Corrections Technology & Management magazine, Firewalls, Cyb er Security Network Security and When The Hacker Knocks, and for Corrections Te chnology magazine, Safeguarding your Network. Performing high profiles investiga tions for some of the fortune 100 financial institutions. * Conducted multiple internal as well as external investigations for one the lar gest telecommunications companies. * Created training in the areas of Risk Management, Physical Security, and High Tech Incident Response training for MCI and the Denver Downtown Business Associa tion during the Oklahoma bombing federal trial. * Conducted Telecommunications and Data Forensics Investigations training for th e FBIs National Infrastructure Protection Centers NSA team. * Selected to conduct High Tech and Digital Forensics Investigations training fo r some the top selected U.S. Military bases including TransCom, StratCom, CentCo m, and SoCom. * Created a training curriculum class on Computer Forensics Investigations, incl uding case studies, demonstrations and hands on applications practices, for the MIS Training Institute and the FBI. * Instrumental in the inception of the High Tech Crime Investigators Association (HTCIA), Bay-Area chapter. * Served as a staff instructor at the California State University Sacramento. C reated a certified curriculum in the area of Incident Response and digital foren sics investigations.

* Possess and understand computer hardware and networking, computer operating sy stems and investigative principles. AWARDS * Received MCIs highest awards Hero of the Year and Ring Of Champion. * Received multiple Law Enforcement Forensics Investigator of the year awards. * Received several Chevron R & As (Recognition & Award) EDUCATION * CISM (Certified Information Security Manager) certification * CRISC (Certified in Risk and Information Systems Control) * EnCEP (EnCase Certified eDiscovery Professional) certification * B.S., Computer Science, Columbia College * Over 20 Professional Certificates awarded by the FBI, Secret Service, Federal and Californias Department Of Justice (available upon request). COMPUTERS/SPECIAL SKILLS * Training Certificates from Guidance Software, EnCase 6.x and eDiscovery 3.x a nd Access Datas Forensics Tool Kit (FTK) 1.8x and 3.x * Most Digital Forensics investigative software, including Guidance Softwares En Case Examiner 6.8, EnCase Enterprise 6.8, eDiscovery 3.x, Access Data FTK 3.x 1 .8 and 2.0 * Certification in NT Server and Workstation and NT TCP/IP. * Proficiency in Windows Vista, XP and previous releases * Fluent in French, Arabic, and Greek ASSOCIATIONS * HTCIA (High Technology Crime Investigation Association) * HTCC (High Tech Cyber Crime) * ISACA (Information Systems Auditors and Controllers Association) * CSI (Computer Security Institute) * Infragard (FBI Partnership with Corporate Security Professionals Association) * ISSA (Information Systems Security Association) PROFESSIONAL EXPERIENCE Chevron Corporation Global IT Forensics Lead, Global Information Risk Management 2/26/2007-Present * Serve as Chevrons global lead for matters related to digital forensics investi gation and any litigation dealing with electronic stored information. * Serve as Chevrons Expert Witness for litigation matters dealing with electroni c discovery and digital forensics investigations. * Instrumental in the setup of Chevrons global and regional Digital Forensics la bs and the Electronic Stored Information process based on the new Federal Rule o f Civil Procedures as well as processes to conduct digital forensics investigati on for all data related crimes and policy violations. * Technical authority for computer forensics, incident response and Global Secur ity related data investigations. * Instrumental in the set up a worldwide Guidance Software EnCase Enterprise con necting through multiple SAFE servers (Secure Authentication For EnCase) residi ng in multiple international hubs, to enable connectivity for remote acquisition s of physical hard drives or logical drives. * Built digital forensics laptop with mobile SAFEs, to act as conduit to the sou rce computer and media while serving as the target computer to the acquisition. * Instrumental in the development, implementation, maintenance, and enhancement of systems, programs, policies, procedures, and tools used to respond to inciden ts and perform forensic analysis. * Experience in uncovering, identifying, defining, correlating and developing in vestigative data, determining the relevancy of data, and deducing reasonable inv estigative conclusions. * Implement and maintain the digital forensic laboratory plans, standard operati ng procedures and reporting.

* Supervised and conducted multiple large digital forensics investigations acros s the world. TeleDesign Security, Inc. (Principal) 4/1/2002-1/31/2007 Representative Work Accomplishments for SAIC and Siemens * Digital Forensics Investigative projects: * Actively involved in a HIPAA related Digital Forensics investigation. An empl oyee quits his employment with a top Medical Database provider company. The emp loyee downloads all proprietary information and intellectual property prior to l eaving his employer. The employee joins a major competitor and brings on-board the victim companys material. * Large US Diamond House victim of counterfeit certificates. An unauthorized di amond house competitor counterfeited diamond certificates to inflate the value o f diamonds. * Large Insurance House exonerated by SEC. A third party telemarketer was retai ned and authorized to distribute exoneration letter to all clients, insurance re sellers and independent resellers. Disgruntled reseller breached the telemarket ers database and changed the wording in the exoneration letter. * Microsoft spam campaign and unauthorized use of Microsoft logos. A large comp any dealing primarily with Spam used unauthorized Microsoft logos in their Spam literature. Some of the logos would redirect the reader to the Microsoft websit es, others would redirect the reader to the Spammers website. * Tripled the companys revenue in two years. * Conduct digital forensics investigation for the Bureau of Indian Affairs vs. D epartment of Interior, as well as testifying as an expert witness in the federal jurisdiction governing DoI and BIA. * Authored a book titled Cybercrime: Incident Response & Digital Forensics. * Conducted security audits, risk assessments and helped creating, developing, a nd implementing policies, standards, guidelines, and procedures. * Created Incident Response and mitigation processes for Fortune 50, 100 and 500 companies. * Faculty member of the California State University, Sacramento. Providing curr iculums in How to Create an Incident Response Process and How to Conduct Forensi cs Investigations, Effective Security Assessment, Creating Security Policies. * Managed and advised tactical, investigative, high tech, and digital forensics deployment teams * Selected to conduct High Tech & Digital Forensics investigations training for some of the top selected U.S. Military bases. * Performed general and digital forensics investigations for multiple Fortune 50 , 100 & 500 companies. SAIC, Inc. Herndon, VA 12/2000-5/1/2002 Global Integrity Information Security Director, National & International practice, Incident Response & Digital Forensi cs * Organized and led large multidisciplinary investigative teams on internal and external national and international General and High Tech crimes. * Created corporate security policies for large multinational financial institut ions. * Provided incident response services including network intrusions, computer for ensics, and recovery operations to large commercial clients throughout the Unite d States and Europe. * Conducted international large-scale security breach and fraud investigations f or Stock Brokerage Institutions. * Developed internal incident response programs for large commercial and governm ent organizations. * Developed and managed Anti-Terrorist programs for Executive Management, as wel l as General Employees for global clients. * Created an emergency response team to ensure the availability of appropriate p ersonnel in providing support to clients at a moments notice, upon the discovery

of a security breach or an investigative need. * Created a dedicated forensics lab facility for use for providing Incident Resp onse and Digital Forensics services. The guidelines implemented for the lab, eq uipment and personnel, follow the same strict guidelines implemented by DOJ (Dep artment of Justice) as well as the DODS (Department of Defense), when analyzing, recovering, storing and safeguarding evidence & sensitive information. * Purchased the appropriate equipment for utilization of Digital Forensics inves tigations, in the event of an incident response request. The equipment is used t o preserve evidence, create and retain duplicate copies of evidence, and to secu rely transport evidence while maintaining the evidence integrity and proper chai n of custody. * Conducted training of senior management in security procedures, guidelines, an d security awareness. * Selected to conduct digital forensics investigation training for Japans Federa l Law Enforcements agency. Directed and coordinated Incident Response actions and plans. JANUS ASSOCIATES, Inc. Stamford, CT 1999-12/2000 Director, Computer Forensics Division & Business Development (Office in Tracy, C alifornia) * Designed, developed and implemented the infrastructure for rapid deployment of consultants, investigators and technical forensics experts * Planned, developed and implemented the infrastructure to simultaneously suppor t large scale projects. * Conducted complete security audits and risk assessment for a states Lottery Sy stem * Developed the strategic business plan, budget and productized services to enha nce JANUS corporate capabilities offerings. * Created nationally recognized educational awareness presentations in the areas of computer forensics investigations, as well as in the areas of Internet, Intr anet and Extranet security and fraud awareness. * Negotiated multiple industry solutions and generated sales revenues in the mul tiple of millions of dollars. * Created a layering approach in the preparation, documentation and presentation of project sizing and project pricing. * Planned and implemented marketing strategies on best practices approach. COHESIVE TECHNOLOGY SOLUTIONS Moraga, California 1998 Vice President, Security Solutions Practice * Recruited to create, implement, and oversee a National Security Practice divis ion linking Cohesives 18 nationwide offices. * Developed Cohesives strategic business plan, budget, and productized services to launch the new security division nationwide. * Integral member of executive team for the security solutions best practices. * Advised, counseled, and assisted in the security practice market research and analysis to identify available target markets and competitive analysis. * Designed and developed plans relating to status and tasks, difficulties and ri sks, product improvement, and new product and cost evaluation. * Managed the security pyramid structure and created, developed, and implemented policies, standards, guidelines, and procedures. MCI TELECOMMUNICATIONS San Francisco, California 1995-1997 Senior Staff Specialist and Senior Investigator * Implemented the Enterprise Security Task Force (ESTF), a rapid deployment proc ess to mitigate any external or internal attacks, as well as conduct digital for ensics investigations for MCI related incident and MCIs clients related incident s. * Conducted major internal as well as external investigations. Some of the inve stigations dealt with industrial espionage, bomb threats, violence in the workpl ace, fraud and theft. * Created and implemented an executive protection program, for traveling executi

ve management. * Created and implemented and audited physical security standards and policies f or major MCI facilities. * Assess threats, risks and vulnerabilities related to MCI operations, and creat e, implement and participate in the appropriate proactive and reactive operation s. * Delivered security training presentations to executives in several Fortune 50, 100 & 500 companies. * Implemented telecom fraud awareness and Internet security educational awarenes s program. * Instituted training programs for bomb threat response awareness and violence i n the workplace presentations. * Responsible for $122 million in revenue in 1997. * Created a project management style emphasizing customer support and interactio n while reestablishing and strengthening customer relationships and improving cu stomer service. * Trained prospective sales staff in techniques of sales that led to increased s ales and customer retention. * Developed and implemented a new advertising campaign with a $2 million budget. NETWORK INVESTIGATORS, INC. San Francisco, CA 1995 Vice President, Field Operations * Conducted Criminal and Civil investigations including but not limited to surve illance, fraud, statement taking, locating people and assets, background searche s, database searches and subpoena service. * As a certified expert in drugs and narcotics use, I participated in the creati on of policies supporting a drug free working environment. * Conducted as well as Assisted with drugs and narcotics investigations. * Conducted investigations on fraudulent Health Audits. * Developed, implemented and trained investigators on AOE/COE report formats and methodology * Developed, implemented and trained investigators on how to conduct general, wi tness and suspect interviews. * Created and implemented client security programs dealing with safety and healt h environment, access controls, and guard operations. * Prepared detailed reports, and processed cases for insurance companies. * Trained, supervised and managed eight investigators * FREMONT POLICE DEPARTMENT Fremont, California 1985-1995 Investigator * Fraud, computer fraud investigations, and forensics crime scene investigations . * Specialized in the following areas: * hostage negotiations, * explosive ordnance investigations, * counter terrorism, * academy instructor. ALAMEDA COUNTY SHERIFFS OFFICE Oakland, California 1974-1985 Investigator * Detective, Fraud and Bunco Investigations. * Specialized in the following areas: * forensics crime scene investigations, * Field Training Officer, * Participation in high risk transportation details * Warrants and Extraditions Detail, * Unit Supervisor, * Intelligence Officer.

PROFESSIONAL TRAINING CERTIFICATES Department Of Justice Diplomas: Basic, Intermediate & Advanced P.O.S.T. Police Officers Standards of Training Basic Hostage Negotiations San Jose State University Advanced Hostage Negotiations Chapman College Sexual Assault Investigations San Jose State University Robbery, Burglary & Fraud Investigations San Jose State University Officer Safety and Field Tactics California Specialized Training Institute Clandestine Laboratory Investigations Dept. Of Justice Training Center Hazardous Materials Investigations California Specialized Training Institute Narcotics Enforcement Investigations Evergreen Valley College Juvenile Law Enforcement Investigations Department of Youth Authority Officers Involved Shooting Investigations Dept. Of Justice Training Center, Sa cramento Executive Protection Dept. Of Justice Training Center, Sacramento Field Training Officer San Jose City College Crime Scene Investigations California State University, Long Beach Advanced Crime Scene Investigations California State University, Long Beach Investigative and Crime Scene Videotaping Garrett Video Productions Bloodstain Pattern Analysis Los Rios Community College Digital Forensics, Internet & Network Investigations SEARCH Group, DoJ Center, Sacramento Sudden Infant Death Investigations Contra Costa Criminal Justice Center Homicide/Death Investigations California State University, Long Beach FBI & U.S. Secret Service Certifications: Surveillance Techniques Gavilan College Advanced Latent Fingerprinting Techniques College of the Redwoods Fingerprint Retrieval and Classifications College of the Redwoods Explosives & Bombing Investigations College of the Redwoods Counter-Terrorism California Specialized Training Institute SPEAKING ENGAGEMENTS * IIA (Institute of Internal Auditors) Annual Conference, Myrtle Beach, SC 2007 * ISACA International Information Security Conference, Adelaide, Australia 2006 * North America Information Security Conference, Orlando 2006 * Bucharest, Romania Annual Security Conference 2005 * CACS International Conference, Las Vegas, Nevada 2005 * CACS International Conference, Seoul, S. Korea * Keynote Speaker & Presenter, Shirahama Computer Security Symposium, Osaka, Jap an * ISACA International Asian Conference, Tokyo, Japan * Keynote Speaker, ISACA International European Conference, Budapest, Hungary * ISACA (Information Systems Audit and Control Association), National Conference * Computer Security Institute (CSI) * NASA: Moffett-Field, California, Ames Flight Training Center (Huntsville, Alab ama) and Lewis Research Center (Cleveland, Ohio) * Air Force (El Segundo, CA & Wright Patterson AFB, Dayton, OH) * American Correctional Association * CFCA (Computer Fraud Crime Association) * NAAG (National Attorney Generals Association) * Certified Fraud Examiners Association * California Fraud Investigators Association * Telecommunications Association * National Institute Of Justice/High Tech Conference * International Octel Users Group * ICCA (Independent Consultant Computing Association) * ISSA (Information Security Systems Association)

* AFCOM National Conference

You might also like