SlideShare une entreprise Scribd logo
1  sur  2
Linda Lopez
22311 David, Taylor, MI 48180
Phone: 734.686.7263 Email: lylopezez@gmail.com
Linda Lopez 734.686.7263 Page 1 of 2
PROFESSONAL PROFILE
*Software Engineer (Security) *Sr. IT SecurityConsultant *Information SecurityArchitect *IT Compliance Consultant
Highlymotivated, award-winning ITachiever with20+ years experience inITsecurityand application engineering through
support. Enjoythe dynamic IT environment andlearningnew threats and relatedtechnologies. Disciplines include automotive
material requirements processingand shippingincludingEDI transactions, workorder processing and billing systems,
timekeeping andlearningmanagement systems. Proven success in several seamless application launches, securitycontrols
management for 100+ applications, identification andmanagement of over 100+ IT securitygaps, securitygapremediation
management, establishing policies andprocedures, standardizingprocesses, improving performance, capitalizingon lessons
learnedandbuildinglasting relationships with all levels of management. EarnedBBA inCIS, MCP, MCSE, Passed CISA.
CORE COMPETENCIES
-Application, Infrastructure andData IT SecurityCompliance, -SOXCompliance and Testing, -Oracle-based Application
Engineering, -SDLC/SDM, -ISO/IEC27001 ISP, -Business Process Reengineering, -VPNs, -Firewalls, -Change Control, -Separation
of Duties, -EncryptionTechniques, -Records Management, -Disaster Recovery, -Audit Support, -Data Classification includingPII,
-RiskAssessments, -ApplicationDecommissions, -IT Supplier Audits, -Infrastructure Architecture, –RemediationPlanning
MAJOR CAREER ACCOMPLISHMENTS
 Generatedover $3Min revenue/cost savings over course of career
 2011 ExemplaryTeamwork Award
 2004 Outstanding LeadershipAward
PROFESSIONAL EXPERIENCE
Epitec Inc., Southfield, MI 06/2011 to 03/2014
While engaged at FordIT Security & Controls Groupas a Security Controls Consultant:
 IncreasedIT asset securityby64% for two portfolios byauthoringandpublishingIT securitycontrolsfor over 70
applications andinfrastructures byrequireddeadlines.
 DecreasedIT risk by91% for two portfolios byauthoring over 100 (non-compliant)comments and closing gaps.
 Improvedbusiness documentationprocesses by32% as a result of counseling businesson acceptable evidence
documentationandevidence storage locations to meet audit requirements.
 ReducedDepartment costs by$90K annuallybymanaging an additionalportfoliowhen one employee was
eliminated.
 Introduceda new extranet definition that ledto one newglossaryentryin the ITPolicyManual.
 Removed12 obsolete applications that ledto a $12Kcost reduction in IT support costs.
 Successfullyadded 15 newapplications and/or infrastructures byauthoringand publishingthe requiredsecurity
documentationprior to launch dates.
 Achieved businesscustomer approval onSOXtesting results bytestingand documenting 3rd partyIT Vendor controls’
test results for a high-risk financial application meeting SOX testing compliance byyear end.
Advantage Technical Resourcing, Southfield, MI 07/2010 to 01/2011
While engaged at FordIT Security& Controls Groupas a Security Controls Consultant:
 Increased IT asset securityby10% for four portfolios byauthoring andpublishing IT securitycontrols for over 20
applications byrequired deadlines.
 Decreasedriskby18% for four portfolios byauthoring over 40 (non-compliant) comments andclosing gaps.
 Improvedcontrols documentationby25% byconstructingapplication network diagrams usingVisio2003.
 Classified data with SME (subject matter expert) groups determining the asset’s level of data sensitivityinterms of
data CIA (confidentiality, integrityandavailability) rating.
 Successfully updated 200 applications with risk assessment data by conducting meetings with SMEs.
 Assigned to eliminate an oldcomment byrequired deadline that ledto three less security loopholes in a JV (joint
venture) partner’s access to applications onNorthAmerican data center servers. Successfullyresolved by deadline.
Linda Lopez 734.686.7263 Page 2 of 2
LSSM, Detroit, MI 11/2006 to 12/2008
Assistant Network Administrator
 UtilizedActive Directoryin W2K3 to manage network of 400 users andassociatedlogonscripts, computers, groups,
and grouppolicy, private andsharedfolders andpermissions.
 Successfullyadded one new DomainController server byinstallingandconfiguringW2K3 to bring remote site onto
companyWAN (wide area network).
 Added three new standard computer imagesusing Acronis and NortonGhost resultinginenhancedOS anddisaster
recoveryconsistencyandsupport productivity.
 Manageddisaster recoveryfor allapplications anddata, backups andrestores.
CIBER, Inc.,Greenwood Village, CO 01/1998 to 04/2005
While engaged at Ford, ADS as a Project Manager from 01/05 to 04/05:
 Constructed project planfor the CVA (cost variance analysis) project. Managed the CVA project byconductingstatus
meetings to monitor task status and byprovidingleadershipto four Business Analysts clearing roadblocks.
 Developedand achieved approval on the requiredsecuritydocumentation for the CVA project.
 Achieved approval on the CVA analysisphase deliverables fromPMO (project management office).
While engaged at Ford, ADS as a Business Analyst from 08/04 to 12/04:
 Developed, documentedandachieved business customer approval onthe functional decompositionfor the EHPAS
(enterprise host protectionauditing system)system.
 Facilitated the EHPASsystem logicaldata design.
 Developedand documenteddata flow diagrams for the EHPAS system.
While engaged at FordLandas a Systems Analyst / Project Leader from 01/98 to 08/04:
 Successfullyadded a new Oracle-based maintenance management system MAXIMO, serving500 employees.
 Increased revenue by$1Mbyimplementing an inter-companybilling systeminterface to MAXIMO.
 Introduceda new SDMthat ledto four years of comment-free IT audits.
 Successfullyadded three newSOXprocessesbyauthoringandimplementing password checkout, separation of
duties, andchange control processes.
 DecreasedIT Site Administrationcosts by50% bydistributing anautomated installation package for MAXIMO.
 Achieved removalof WINNT server byupgrading to WIN2Kserver includingupgrading andmigrating applications.
Douglas & Lomason Co., Farmington Hills, MI 05/1986 to 05/1997
Systems Analyst
 DecreasedIT costs by$100Kannuallyandincreasedinternal performance ratings by80% as a result of launching a
new, Oracle-basedCDM(customer demandmanagement) system.
 Achieved Tier One status with Ford byvoluntarilyleadinganemployee involvement groupto improve data accuracy.
 Recovered over $1Min excess transportationcharges fromFordbyinterpreting EDI shipping schedulesand providing
evidence that D&L shippedaccordingto customer’s releasedrequirements.
TECHNICAL SKILLS
Platforms: MS Windows 2003 Server, MS Windows 2000 Server and Professional, MS Windows Vista, MS Windows XP
Professional, MS Windows 7, MS Windows NT 4.0 Server, Unix, VAX/VMS, DOS, IBMMainframe.
Technologies: Acronis, Active Directory, BusinessObjects, Visual C++, CGI, Citrix Metaframe, Crystal Reports, EDI, Ghost, HTML,
IIS, JCL, MS Access, Office, Project, Oracle Application Server, Oracle Developer, Oracle RDBMS, Perl, PL/SQL, Pro*COBOL, Shell
scripting, SSL, SQL*Loader, SQL*Net, SQL*Plus, SQR4 Workbench, Tivoli, Veritas, Visio, VisualBasic, WebIntelligence.
CERTIFICATIONS
CertifiedInformationSystems Auditor (CISA) Expected3/2017
Microsoft CertifiedSystems Engineer (MCSE), 2005
Microsoft Certified Professional(MCP), 2003
EDUCATION
Davenport University,Dearborn, MI 6/2004
Bachelor of BusinessAdministration / CIS, MCSE 3.8 GPA Dean’s List

Contenu connexe

Tendances

Integrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementIntegrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementPriyanka Aash
 
Bayo Omisore, IT Auditor-Compliance Analyst
Bayo Omisore, IT Auditor-Compliance AnalystBayo Omisore, IT Auditor-Compliance Analyst
Bayo Omisore, IT Auditor-Compliance AnalystBayo Omisore.
 
Organizational Resilience Management - an Integrated GRC Approach
Organizational Resilience Management - an Integrated GRC ApproachOrganizational Resilience Management - an Integrated GRC Approach
Organizational Resilience Management - an Integrated GRC ApproachPECB
 
A New Frontier in Securing Sensitive Information – Taneja Group, April 2007
A New Frontier in Securing Sensitive Information – Taneja Group, April 2007A New Frontier in Securing Sensitive Information – Taneja Group, April 2007
A New Frontier in Securing Sensitive Information – Taneja Group, April 2007LindaWatson19
 
BMC Discovery IDC Research Study 470 ROI in 5 Years
BMC Discovery IDC Research Study 470 ROI in 5 YearsBMC Discovery IDC Research Study 470 ROI in 5 Years
BMC Discovery IDC Research Study 470 ROI in 5 YearsChris Farwell
 
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...IJNSA Journal
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)PECB
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guideAdilsonSuende
 
The Business Case for Data Security
The Business Case for Data SecurityThe Business Case for Data Security
The Business Case for Data SecurityImperva
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementDMIMarketing
 
Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...
 Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape... Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...
Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...NetCom Learning
 
International Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian SummaryInternational Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian SummaryCompTIA
 
Audit Sample Report
Audit Sample ReportAudit Sample Report
Audit Sample ReportRandy James
 
Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-IT Strategy Group
 
Auditing SOX ITGC Compliance
Auditing SOX ITGC ComplianceAuditing SOX ITGC Compliance
Auditing SOX ITGC Complianceseanpizzy
 
Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Full Cybersecurity Regulations Overview for DoD Prime and SubcontractorsFull Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Full Cybersecurity Regulations Overview for DoD Prime and SubcontractorsIgnyte Assurance Platform
 

Tendances (20)

Integrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementIntegrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk Management
 
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  YrsFinto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
 
Bayo Omisore, IT Auditor-Compliance Analyst
Bayo Omisore, IT Auditor-Compliance AnalystBayo Omisore, IT Auditor-Compliance Analyst
Bayo Omisore, IT Auditor-Compliance Analyst
 
Organizational Resilience Management - an Integrated GRC Approach
Organizational Resilience Management - an Integrated GRC ApproachOrganizational Resilience Management - an Integrated GRC Approach
Organizational Resilience Management - an Integrated GRC Approach
 
A New Frontier in Securing Sensitive Information – Taneja Group, April 2007
A New Frontier in Securing Sensitive Information – Taneja Group, April 2007A New Frontier in Securing Sensitive Information – Taneja Group, April 2007
A New Frontier in Securing Sensitive Information – Taneja Group, April 2007
 
BMC Discovery IDC Research Study 470 ROI in 5 Years
BMC Discovery IDC Research Study 470 ROI in 5 YearsBMC Discovery IDC Research Study 470 ROI in 5 Years
BMC Discovery IDC Research Study 470 ROI in 5 Years
 
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
Og Disparate It Mgmt Tool Impact Report
Og Disparate It Mgmt Tool Impact ReportOg Disparate It Mgmt Tool Impact Report
Og Disparate It Mgmt Tool Impact Report
 
】=
】=】=
】=
 
The Business Case for Data Security
The Business Case for Data SecurityThe Business Case for Data Security
The Business Case for Data Security
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...
 Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape... Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...
Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...
 
IT Position of Trust Designation
IT Position of Trust DesignationIT Position of Trust Designation
IT Position of Trust Designation
 
International Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian SummaryInternational Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian Summary
 
Audit Sample Report
Audit Sample ReportAudit Sample Report
Audit Sample Report
 
Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-
 
Auditing SOX ITGC Compliance
Auditing SOX ITGC ComplianceAuditing SOX ITGC Compliance
Auditing SOX ITGC Compliance
 
Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Full Cybersecurity Regulations Overview for DoD Prime and SubcontractorsFull Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
 

En vedette

En vedette (14)

Linda Resume First Edit 2817
Linda Resume First Edit 2817Linda Resume First Edit 2817
Linda Resume First Edit 2817
 
Resume - Linda Nguyen 2016 OK (1)
Resume - Linda Nguyen 2016 OK (1)Resume - Linda Nguyen 2016 OK (1)
Resume - Linda Nguyen 2016 OK (1)
 
Linda resume
Linda resumeLinda resume
Linda resume
 
Rasheed David Calhoun R 2017
Rasheed David Calhoun R 2017Rasheed David Calhoun R 2017
Rasheed David Calhoun R 2017
 
Linda Gibson Resume
Linda Gibson ResumeLinda Gibson Resume
Linda Gibson Resume
 
linda-resume
linda-resumelinda-resume
linda-resume
 
Linda Goff resume
Linda Goff resumeLinda Goff resume
Linda Goff resume
 
Randy ChristoffersonMussack
Randy ChristoffersonMussackRandy ChristoffersonMussack
Randy ChristoffersonMussack
 
Linda's resume 2011
Linda's resume 2011Linda's resume 2011
Linda's resume 2011
 
Resume Linda Finkelstein
Resume Linda FinkelsteinResume Linda Finkelstein
Resume Linda Finkelstein
 
De Hoyos, Ryan Resume 1
De Hoyos, Ryan Resume 1De Hoyos, Ryan Resume 1
De Hoyos, Ryan Resume 1
 
LAURA LINDA CERVERA RESUME V9
LAURA LINDA CERVERA RESUME V9LAURA LINDA CERVERA RESUME V9
LAURA LINDA CERVERA RESUME V9
 
Linda Resume 083015
Linda Resume 083015Linda Resume 083015
Linda Resume 083015
 
2017 Resume Linda Odell Cowles
2017 Resume Linda Odell Cowles2017 Resume Linda Odell Cowles
2017 Resume Linda Odell Cowles
 

Similaire à Linda Lopez Resume 20170130 IT Security

Resume - James Simmons
Resume  - James SimmonsResume  - James Simmons
Resume - James Simmonssimmoja3
 
CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan MMohan M
 
Ecom Nets Technologies
Ecom Nets TechnologiesEcom Nets Technologies
Ecom Nets Technologiesnveeravalli
 
Proteus OCM Company Profile
Proteus OCM Company ProfileProteus OCM Company Profile
Proteus OCM Company ProfileKGanzy
 
Ryan Phillip Chan Resume - 10212016
Ryan Phillip  Chan Resume - 10212016Ryan Phillip  Chan Resume - 10212016
Ryan Phillip Chan Resume - 10212016Phillip Ryan- Chan
 
Raed_CV_Resume_2015
Raed_CV_Resume_2015Raed_CV_Resume_2015
Raed_CV_Resume_2015Raed Khalil
 
VetsAmerica Vets GWAC Team Capabilities
VetsAmerica Vets GWAC Team CapabilitiesVetsAmerica Vets GWAC Team Capabilities
VetsAmerica Vets GWAC Team CapabilitiesVetsAmerica
 
IBM Governance, Risk and Compliance for Data Movement and Exchange
IBM Governance, Risk and Compliance for Data Movement and ExchangeIBM Governance, Risk and Compliance for Data Movement and Exchange
IBM Governance, Risk and Compliance for Data Movement and ExchangeLightwell
 
ExecResume-Joe-Moore - Director
ExecResume-Joe-Moore - Director ExecResume-Joe-Moore - Director
ExecResume-Joe-Moore - Director Joe Moore, MSE
 
Richard_Minor_Business_Analyst_Resume_09052015
Richard_Minor_Business_Analyst_Resume_09052015Richard_Minor_Business_Analyst_Resume_09052015
Richard_Minor_Business_Analyst_Resume_09052015Richard Minor
 
Paul L Gue Resume
Paul L Gue ResumePaul L Gue Resume
Paul L Gue ResumePaul Gue
 
Meeting your Compliance objectives with ease and without incurring a high cost
 Meeting your Compliance objectives with ease and without incurring a high cost  Meeting your Compliance objectives with ease and without incurring a high cost
Meeting your Compliance objectives with ease and without incurring a high cost Mithi Software Technologies Pvt Ltd
 
Josephdixonresumev1
Josephdixonresumev1Josephdixonresumev1
Josephdixonresumev1Joseph Dixon
 
Troux Presentation Austin Texas
Troux Presentation Austin TexasTroux Presentation Austin Texas
Troux Presentation Austin TexasJoeFaghani
 
Robert_Hiser Resume 4-1-16
Robert_Hiser Resume 4-1-16Robert_Hiser Resume 4-1-16
Robert_Hiser Resume 4-1-16Bob Hiser
 

Similaire à Linda Lopez Resume 20170130 IT Security (20)

Resume - James Simmons
Resume  - James SimmonsResume  - James Simmons
Resume - James Simmons
 
Peter J. Simpson Resume
Peter J. Simpson ResumePeter J. Simpson Resume
Peter J. Simpson Resume
 
S Rod Simpson Resume
S Rod Simpson ResumeS Rod Simpson Resume
S Rod Simpson Resume
 
CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan M
 
Ecom Nets Technologies
Ecom Nets TechnologiesEcom Nets Technologies
Ecom Nets Technologies
 
Proteus OCM Company Profile
Proteus OCM Company ProfileProteus OCM Company Profile
Proteus OCM Company Profile
 
Ryan Phillip Chan Resume - 10212016
Ryan Phillip  Chan Resume - 10212016Ryan Phillip  Chan Resume - 10212016
Ryan Phillip Chan Resume - 10212016
 
Resume A
Resume AResume A
Resume A
 
Raed_CV_Resume_2015
Raed_CV_Resume_2015Raed_CV_Resume_2015
Raed_CV_Resume_2015
 
VetsAmerica Vets GWAC Team Capabilities
VetsAmerica Vets GWAC Team CapabilitiesVetsAmerica Vets GWAC Team Capabilities
VetsAmerica Vets GWAC Team Capabilities
 
Robin Williams Resume'
Robin Williams Resume'Robin Williams Resume'
Robin Williams Resume'
 
IBM Governance, Risk and Compliance for Data Movement and Exchange
IBM Governance, Risk and Compliance for Data Movement and ExchangeIBM Governance, Risk and Compliance for Data Movement and Exchange
IBM Governance, Risk and Compliance for Data Movement and Exchange
 
ExecResume-Joe-Moore - Director
ExecResume-Joe-Moore - Director ExecResume-Joe-Moore - Director
ExecResume-Joe-Moore - Director
 
Richard_Minor_Business_Analyst_Resume_09052015
Richard_Minor_Business_Analyst_Resume_09052015Richard_Minor_Business_Analyst_Resume_09052015
Richard_Minor_Business_Analyst_Resume_09052015
 
Paul L Gue Resume
Paul L Gue ResumePaul L Gue Resume
Paul L Gue Resume
 
Meeting your Compliance objectives with ease and without incurring a high cost
 Meeting your Compliance objectives with ease and without incurring a high cost  Meeting your Compliance objectives with ease and without incurring a high cost
Meeting your Compliance objectives with ease and without incurring a high cost
 
Josephdixonresumev1
Josephdixonresumev1Josephdixonresumev1
Josephdixonresumev1
 
JAMiller_Pro
JAMiller_ProJAMiller_Pro
JAMiller_Pro
 
Troux Presentation Austin Texas
Troux Presentation Austin TexasTroux Presentation Austin Texas
Troux Presentation Austin Texas
 
Robert_Hiser Resume 4-1-16
Robert_Hiser Resume 4-1-16Robert_Hiser Resume 4-1-16
Robert_Hiser Resume 4-1-16
 

Linda Lopez Resume 20170130 IT Security

  • 1. Linda Lopez 22311 David, Taylor, MI 48180 Phone: 734.686.7263 Email: lylopezez@gmail.com Linda Lopez 734.686.7263 Page 1 of 2 PROFESSONAL PROFILE *Software Engineer (Security) *Sr. IT SecurityConsultant *Information SecurityArchitect *IT Compliance Consultant Highlymotivated, award-winning ITachiever with20+ years experience inITsecurityand application engineering through support. Enjoythe dynamic IT environment andlearningnew threats and relatedtechnologies. Disciplines include automotive material requirements processingand shippingincludingEDI transactions, workorder processing and billing systems, timekeeping andlearningmanagement systems. Proven success in several seamless application launches, securitycontrols management for 100+ applications, identification andmanagement of over 100+ IT securitygaps, securitygapremediation management, establishing policies andprocedures, standardizingprocesses, improving performance, capitalizingon lessons learnedandbuildinglasting relationships with all levels of management. EarnedBBA inCIS, MCP, MCSE, Passed CISA. CORE COMPETENCIES -Application, Infrastructure andData IT SecurityCompliance, -SOXCompliance and Testing, -Oracle-based Application Engineering, -SDLC/SDM, -ISO/IEC27001 ISP, -Business Process Reengineering, -VPNs, -Firewalls, -Change Control, -Separation of Duties, -EncryptionTechniques, -Records Management, -Disaster Recovery, -Audit Support, -Data Classification includingPII, -RiskAssessments, -ApplicationDecommissions, -IT Supplier Audits, -Infrastructure Architecture, –RemediationPlanning MAJOR CAREER ACCOMPLISHMENTS  Generatedover $3Min revenue/cost savings over course of career  2011 ExemplaryTeamwork Award  2004 Outstanding LeadershipAward PROFESSIONAL EXPERIENCE Epitec Inc., Southfield, MI 06/2011 to 03/2014 While engaged at FordIT Security & Controls Groupas a Security Controls Consultant:  IncreasedIT asset securityby64% for two portfolios byauthoringandpublishingIT securitycontrolsfor over 70 applications andinfrastructures byrequireddeadlines.  DecreasedIT risk by91% for two portfolios byauthoring over 100 (non-compliant)comments and closing gaps.  Improvedbusiness documentationprocesses by32% as a result of counseling businesson acceptable evidence documentationandevidence storage locations to meet audit requirements.  ReducedDepartment costs by$90K annuallybymanaging an additionalportfoliowhen one employee was eliminated.  Introduceda new extranet definition that ledto one newglossaryentryin the ITPolicyManual.  Removed12 obsolete applications that ledto a $12Kcost reduction in IT support costs.  Successfullyadded 15 newapplications and/or infrastructures byauthoringand publishingthe requiredsecurity documentationprior to launch dates.  Achieved businesscustomer approval onSOXtesting results bytestingand documenting 3rd partyIT Vendor controls’ test results for a high-risk financial application meeting SOX testing compliance byyear end. Advantage Technical Resourcing, Southfield, MI 07/2010 to 01/2011 While engaged at FordIT Security& Controls Groupas a Security Controls Consultant:  Increased IT asset securityby10% for four portfolios byauthoring andpublishing IT securitycontrols for over 20 applications byrequired deadlines.  Decreasedriskby18% for four portfolios byauthoring over 40 (non-compliant) comments andclosing gaps.  Improvedcontrols documentationby25% byconstructingapplication network diagrams usingVisio2003.  Classified data with SME (subject matter expert) groups determining the asset’s level of data sensitivityinterms of data CIA (confidentiality, integrityandavailability) rating.  Successfully updated 200 applications with risk assessment data by conducting meetings with SMEs.  Assigned to eliminate an oldcomment byrequired deadline that ledto three less security loopholes in a JV (joint venture) partner’s access to applications onNorthAmerican data center servers. Successfullyresolved by deadline.
  • 2. Linda Lopez 734.686.7263 Page 2 of 2 LSSM, Detroit, MI 11/2006 to 12/2008 Assistant Network Administrator  UtilizedActive Directoryin W2K3 to manage network of 400 users andassociatedlogonscripts, computers, groups, and grouppolicy, private andsharedfolders andpermissions.  Successfullyadded one new DomainController server byinstallingandconfiguringW2K3 to bring remote site onto companyWAN (wide area network).  Added three new standard computer imagesusing Acronis and NortonGhost resultinginenhancedOS anddisaster recoveryconsistencyandsupport productivity.  Manageddisaster recoveryfor allapplications anddata, backups andrestores. CIBER, Inc.,Greenwood Village, CO 01/1998 to 04/2005 While engaged at Ford, ADS as a Project Manager from 01/05 to 04/05:  Constructed project planfor the CVA (cost variance analysis) project. Managed the CVA project byconductingstatus meetings to monitor task status and byprovidingleadershipto four Business Analysts clearing roadblocks.  Developedand achieved approval on the requiredsecuritydocumentation for the CVA project.  Achieved approval on the CVA analysisphase deliverables fromPMO (project management office). While engaged at Ford, ADS as a Business Analyst from 08/04 to 12/04:  Developed, documentedandachieved business customer approval onthe functional decompositionfor the EHPAS (enterprise host protectionauditing system)system.  Facilitated the EHPASsystem logicaldata design.  Developedand documenteddata flow diagrams for the EHPAS system. While engaged at FordLandas a Systems Analyst / Project Leader from 01/98 to 08/04:  Successfullyadded a new Oracle-based maintenance management system MAXIMO, serving500 employees.  Increased revenue by$1Mbyimplementing an inter-companybilling systeminterface to MAXIMO.  Introduceda new SDMthat ledto four years of comment-free IT audits.  Successfullyadded three newSOXprocessesbyauthoringandimplementing password checkout, separation of duties, andchange control processes.  DecreasedIT Site Administrationcosts by50% bydistributing anautomated installation package for MAXIMO.  Achieved removalof WINNT server byupgrading to WIN2Kserver includingupgrading andmigrating applications. Douglas & Lomason Co., Farmington Hills, MI 05/1986 to 05/1997 Systems Analyst  DecreasedIT costs by$100Kannuallyandincreasedinternal performance ratings by80% as a result of launching a new, Oracle-basedCDM(customer demandmanagement) system.  Achieved Tier One status with Ford byvoluntarilyleadinganemployee involvement groupto improve data accuracy.  Recovered over $1Min excess transportationcharges fromFordbyinterpreting EDI shipping schedulesand providing evidence that D&L shippedaccordingto customer’s releasedrequirements. TECHNICAL SKILLS Platforms: MS Windows 2003 Server, MS Windows 2000 Server and Professional, MS Windows Vista, MS Windows XP Professional, MS Windows 7, MS Windows NT 4.0 Server, Unix, VAX/VMS, DOS, IBMMainframe. Technologies: Acronis, Active Directory, BusinessObjects, Visual C++, CGI, Citrix Metaframe, Crystal Reports, EDI, Ghost, HTML, IIS, JCL, MS Access, Office, Project, Oracle Application Server, Oracle Developer, Oracle RDBMS, Perl, PL/SQL, Pro*COBOL, Shell scripting, SSL, SQL*Loader, SQL*Net, SQL*Plus, SQR4 Workbench, Tivoli, Veritas, Visio, VisualBasic, WebIntelligence. CERTIFICATIONS CertifiedInformationSystems Auditor (CISA) Expected3/2017 Microsoft CertifiedSystems Engineer (MCSE), 2005 Microsoft Certified Professional(MCP), 2003 EDUCATION Davenport University,Dearborn, MI 6/2004 Bachelor of BusinessAdministration / CIS, MCSE 3.8 GPA Dean’s List