SlideShare ist ein Scribd-Unternehmen logo
1 von 4
LEON BLUM
                                       Hollis New York     lblum1234@gmail.com


                                                       PROFESSIONAL PROFILE
 I bring years of expertise and technical experience in the field of information security and technical support. I am a high energy,
 results oriented professional with a track record of success with various international banking and software Company. I believe I
 could be an asset to your company based in my previous experience and accomplishments.
                                    LinkedIn:http://www.linkedin.com/in/leonblumaa98760



                                                    KEY AREAS OF EXPERTISE
  Operating Systems:Windows 2000, XP, Vista, and Windows 7Server:Windows,2003 and 2008
  Software Application:Lotus Notes-6.5,7.0, Outlook-2003,2007,MS Project,Visio,LAN/VPN,SMS,Connect-Wise,Remedy,
  Citrix,RSA,TSO,VTAM, CICS, ACF2/RACF,ALLTEL,CharlesRivers, PAM, OPICS, Charlotte, Feline Alliance,JP Morgan , SWIFT,E-
  IBS,IBS,Symantec-Endpoint,CISCO-IPS .G100,NOC,GFI,ISA/VPN, Barracuda-Web-Filter,What-Up-Gold, Active Directory-2000,
  2003, (SQL-User Administration-Server 2005)andQuest-Script-Logic applications.
  Printers: HP LaserJet, Epson,&Brother.Personal Computers/Laptops:Dell, HP and Toshiba.Other: Blackberry, IPhone

                                                     ACCOMPLISHMENTS
    Created MonitoringControls Documentation(Information Risk Assessments Matrix)for the network and applications.
    Implemented enterprise Security Monitoring System. The system performed: tracking mechanisms that generated
     alerts and reported on the activities of the networkwhen changes were made.
    Developed and Implemented a Web-BasedSecurity Access Request System for users to request access to the network
     and various applications.Additional features the system provided;Management approval process, Tracking progress of
     requests, Notifying userswhen requests were completed .Provided users: login ID's, passwords and access levels.
    Created Operations Manuals for Security User’s Administration and the Help Desk system.
    Developed and Implementedan Automated Web-Based Help Desk Systemresulting in a more user friendly system for
     users to report problems,check progress and statusof tickets. LinkedIn:https://sites.google.com/site/leonblumsite
    Developed and Implemented aWeb-Based Help Desk and Knowledge Base System that provided step-by-step basic
     general problem resolutions for users by resolving their own issues, as aresult cutting help desk staff time on problems
     resolutionby 39percent.(The system became the benchmark for other help desk units in European, Canadian, and Latin
     Americas banksoperations.)

                                                   PROFESSIONALEXPERIENCE

 BANCO ESTADO DE CHILE, New York, NY                                                                2008 – 2011
 Information SecurityOfficer
 Managed the Logical and Physical Securityin accordance with the established information security program, policies,
 standards and procedures in compliance with internal and external regulations to safeguard the integrity of the information
 assetsof the bank;Additional responsibilitiesincluded managing the Internet Customers’ Users Administration.
          Managedthe LogicalSecurityuser’sadministration for the networkand other proprietary business applications.
          Managed and monitored the (Physical Security):ADT alarm, cards access, video surveillance cameras, vault room,
          phone recording, asset protection and building access control systems.
          Managed the Internet Customers UsersAdministration for accounts and passwords).Resolved connectivity’s issues
          and assisted users with problems concerning logins, passwords and other related support issues.
          Maintained and monitored the confidentiality of the bankby utilizing an automated monitoring system that protects
          the integrity(information assets and systemsinfrastructure) from unauthorized disclosureand unauthorized access from
          external or internal threats.
          Maintained the Information security plan, policies, procedures and risk management planin compliance with
          information security policiestoensure they are kept up to-date to meet Federal and State regulatory requirements.
          Maintained appropriate security measures and mechanisms to guard againstunauthorized access to electronically
          stored and, or transmitted data and reasonably protected against anticipated threats and hazards.
          Interfaced as security liaison to internal, external, Federal Reserve Bank State Banking auditors to insure that the
          Bank is in compliance with State and Federal regulations based on the ISO 17799/ 27001/2002 frameworks.
          Worked with the Compliance Officer in developing an awareness program and an Incident response capability plan.
LEON BLUM (Page-2)


BANCO ESTADO DE CHILE, New York, NY         Cont’d
        Worked with users, technical groups and management in thedevelopment and the implementation of security
        strategies designed to provide a high level of security over data and information systems.
        Worked with all departments’ managers to identify security requirements byusing the business impact analysis.
        Responsible for the information security awareness training to ensure that employees were aware of how to
        help ensure privacy of data and unauthorized modification from internal, external treats.
        Reviewed and interpreted new sources of information security on current and emerging laws, rules,
        guidelines, regulations, and industry best practices relating to Information technology.
        Implemented appropriate levels of monitoring controlsto safeguard sensitive data and validate those controls in place
        were being implemented.
        Implementeda security system that monitors and prevents unauthorized access, modifications and deletions(Quest-
        logical Security) related to information security throughout Bank. The system provides alerts and audit reports when
        changes were made.
        Administered network useraccounts for;groups, folders, files, and access privileges and business applications.
        Assisted in coordinating the contingency test at the disaster recovery site.
        Assisted the incident response team in the investigation of security issues.
        Conducted annual review of the Information security risk assessments program and the security plan with
        thecompliance officer to update the information security policies and associated security procedures.
        Conducted meetings with management to report on incidents that occurred for the (Logical and Physical) Security.
        Served on the security committee board to report on the activities and incidents that occurred eachmonth.
        Served as security representative to designated bank committees in order to provide advice and professional
        consultation on security issues, policies and procurements being considered.
        Performed internal securityrisk assessments audits for the network and business applications.
        Monitored logins and access violations using internet security acceleration system and VPN manager.
        Monitored, analyzed (Cisco Intrusion prevention system) systems logs for events of unauthorized access to detect
        security threats, vulnerability and collaborate with management and systems administrators to resolve issues.
        Monitored and audited the activities of (NetworkActive Directory) using Quest-Script logic
        applicationsfor;accounts, groups, folders, files and network connecteddevices including business applications as well.
        Promoted and distributed applicable information security awareness materials and publications within the bank.
        Assisted IT staff in resolving on-site computer user’sissueswhen short of staff.

BANK HAPOALIM. B.M,New York,NY                                           2001 – 2008               ITOperations Officer
Managed theHelpDeskTechnical Support and theSecurity Users Administration. Additional responsiblyincluded
managing theInternet Customers Technical Support department.
       Managed and performed Users Security Administrationfor the Network, Citrix, and Mainframe, Lotus Notes
       and internet Mail and other proprietary business applications.
       Assisted the Chief Information Security Officer in the day-to-day operations for the security administration
       for groups, folders, files and access privileges for active directory and other applications.
       Reviewed access security systems log reports to check for unauthorized access from the network and business
       applications. Maintained and reviewed system user’s access rights and privilegesfor the network and
       applications.
       Performed level-1 and 2 functionsby providing technical support to users in person, by telephone, tickets or
       email. Used Citrix to remote access user desktop computers in order to resolve log-in network/applications and
       software issues fromusers for the United States, Canada, the Americas and Europe.
       Performed Security Administration and problem resolution relating tointernet access, Lotus Notes, Office-
       2003, 2007, Citrix, LAN,Mainframe, local/network printing issues, recycles VTAM nodes and CICSactivation of
       CISC sessions using RACF/Fidelity application.
       Prepared standard statistical reports (Analyzed and evaluated incident reported and make recommendations
       to reduce the incident rate of problems).Conducted review meeting with department’s managers regarding
       technical issues that impact their departments.
       Managed the Internet Customers Users Administration for accounts and passwords). Resolved connectivity’s issues,
       and assisted users and customers with their problems concerning logins, passwords and other related support issues.
       Assisted technical support groupfor installing personal computers, and peripheral equipment’s when short of staff.
LEON BLUM (Page-3)Cont’d
COMPUTER ASSOCIATES INTERNATIONAL Inc. New York, NY                                  2000 – 2001
Technical Relationship Account Manager
        My responsibilities were to manage the clients’ technical issues in order to insure the maximum value and
        satisfaction from the use of Computer Associates software and services which includedevaluating the impact
        of IT technical issues related to Computer Associates technology.
        Conducted on-site review meetings with clients and team members regarding technical issues.
        Acted as liaison between technical support groups and field services staff.
        Managed and planned escalations for major technical issues which had impacted the clients’ business.
        Maintained regular communication with clients and established relationships with key technical contacts
        within my territory.
        Drafted and coordinated recovery services plans, which included bringing technical resources on site.
        Provided information regarding new software products and upgrades, and scheduled technology day at the
        client site.
        Provided status reports to management regarding activities within my territory.

CHASE BANK.New York, NY                                                                       2000
System Security Administrator(Consultant)
INACOM/VANSTAR. (American Express),New York, NY                                               1998 - 1999
Help-Desk Support Analyst(Consultant)
CITIBANK (Global Network Center), Weehawken, NJ                                               1996 -1998
Help-Desk-Network Analyst(Consultant)


                                   EDUCATION&PROFESSIONAL CREDENTIALS

Wharton School of Business, Philadelphia.PA(Courses in Business Management)
Queens, College Flushing. NY (Management Information Systems).Accredited97 College credits by the(United
Federal Reserve Bank)of New York for my education at Queens College, Wharton School, including Technical Schools,
Professional work experience and serving in the United State Army and the United State Army Reserve.

                                          Queens College, New York, NY
            Microsoft Networking Technologies for Windows 2000 Client and Server Administration.
            Microsoft Active Directory Administration, Technologies, and System Network Architecture.
            Installation and Configurationof computerOperating Systems.
            Fundamental of Data Communications and Local Area Network
            Mainframe:TSO/RACF, CICS, VTAM/SNAand IM, MVS/JCL, ANS/Cobol programming, VM/CMS

                                        Citrix Learning Center, Wall Street, New York
                                 Citrix Meta-Frame for windows, Active Directory Administration.

                                             Foreign Language:French


                                           PROFESSIONAL AFFILIATIONS
    Association Polytechnique, Paris, France Courses, Workshops, and Seminars on topics of computer technology.

                             United State Military Service.Veteran (FrenchInterpreter)
Information Security Officer  Internet Resume Leon Blum   Copy

Weitere ähnliche Inhalte

Was ist angesagt?

Noel_De_Leon_Alvior_CV
Noel_De_Leon_Alvior_CVNoel_De_Leon_Alvior_CV
Noel_De_Leon_Alvior_CVNoel Alvior
 
Lancy-Curriculum Vitae
Lancy-Curriculum VitaeLancy-Curriculum Vitae
Lancy-Curriculum VitaeLancy Menezes
 
Vulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyVulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyNandita Nityanandam
 
Pramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center ManagerPramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center ManagerPramod Yadav
 
Dunkle resume Info tech spec2
Dunkle resume Info tech spec2Dunkle resume Info tech spec2
Dunkle resume Info tech spec2david dunkle
 
Assessing Risk: Developing a Client/Server Security Architecture,
 Assessing Risk: Developing a Client/Server Security Architecture,  Assessing Risk: Developing a Client/Server Security Architecture,
Assessing Risk: Developing a Client/Server Security Architecture, MITDaveMillaar
 
Prakhar Sood-Resume-CV
Prakhar Sood-Resume-CVPrakhar Sood-Resume-CV
Prakhar Sood-Resume-CVPrakhar Sood
 
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. ManufacturingIgnyte Assurance Platform
 
2008: Web Application Security Tutorial
2008: Web Application Security Tutorial2008: Web Application Security Tutorial
2008: Web Application Security TutorialNeil Matatall
 
Isaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industryIsaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industryInfosec
 
Adam R. Moore Security Architect Resume
Adam R. Moore Security Architect ResumeAdam R. Moore Security Architect Resume
Adam R. Moore Security Architect ResumeAdam Moore
 
CompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to knowCompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to knowInfosec
 
Comp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementationComp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementationShivamSharma909
 
Solvit identity is the new perimeter
Solvit   identity is the new perimeterSolvit   identity is the new perimeter
Solvit identity is the new perimeterS.E. CTS CERT-GOV-MD
 
John Michael Rzepkowski Resume Oct2015
John Michael Rzepkowski Resume Oct2015John Michael Rzepkowski Resume Oct2015
John Michael Rzepkowski Resume Oct2015John Rzepkowski
 

Was ist angesagt? (20)

Noel_De_Leon_Alvior_CV
Noel_De_Leon_Alvior_CVNoel_De_Leon_Alvior_CV
Noel_De_Leon_Alvior_CV
 
Lancy-Curriculum Vitae
Lancy-Curriculum VitaeLancy-Curriculum Vitae
Lancy-Curriculum Vitae
 
Resume_STrofimov
Resume_STrofimovResume_STrofimov
Resume_STrofimov
 
Resume
ResumeResume
Resume
 
System of security controls
System of security controlsSystem of security controls
System of security controls
 
Vulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyVulnerability Testing Services Case Study
Vulnerability Testing Services Case Study
 
Pramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center ManagerPramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center Manager
 
Dunkle resume Info tech spec2
Dunkle resume Info tech spec2Dunkle resume Info tech spec2
Dunkle resume Info tech spec2
 
Assessing Risk: Developing a Client/Server Security Architecture,
 Assessing Risk: Developing a Client/Server Security Architecture,  Assessing Risk: Developing a Client/Server Security Architecture,
Assessing Risk: Developing a Client/Server Security Architecture,
 
Prakhar Sood-Resume-CV
Prakhar Sood-Resume-CVPrakhar Sood-Resume-CV
Prakhar Sood-Resume-CV
 
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
 
2008: Web Application Security Tutorial
2008: Web Application Security Tutorial2008: Web Application Security Tutorial
2008: Web Application Security Tutorial
 
Isaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industryIsaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industry
 
Soc
SocSoc
Soc
 
Adam R. Moore Security Architect Resume
Adam R. Moore Security Architect ResumeAdam R. Moore Security Architect Resume
Adam R. Moore Security Architect Resume
 
CompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to knowCompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to know
 
Comp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementationComp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementation
 
Solvit identity is the new perimeter
Solvit   identity is the new perimeterSolvit   identity is the new perimeter
Solvit identity is the new perimeter
 
ConklinResume2
ConklinResume2ConklinResume2
ConklinResume2
 
John Michael Rzepkowski Resume Oct2015
John Michael Rzepkowski Resume Oct2015John Michael Rzepkowski Resume Oct2015
John Michael Rzepkowski Resume Oct2015
 

Ähnlich wie Information Security Officer Internet Resume Leon Blum Copy

Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder
 
mcdonald.thomas.resume11-15
mcdonald.thomas.resume11-15mcdonald.thomas.resume11-15
mcdonald.thomas.resume11-15Thomas McDonald
 
Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin Carrow
 
Albert G Info systems resume
Albert G Info systems resumeAlbert G Info systems resume
Albert G Info systems resumeAlbert Gonzales
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoringTony Kenny
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoringTony Kenny
 
Cyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comCyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comPrescottLunt386
 
Michael Barham Resume 2014 ISA
Michael Barham Resume 2014 ISAMichael Barham Resume 2014 ISA
Michael Barham Resume 2014 ISAMichael Barham
 
Michael L Sawall INFOSEC
Michael L Sawall INFOSECMichael L Sawall INFOSEC
Michael L Sawall INFOSECMike Sawall
 
Dave Ford Resume
Dave Ford ResumeDave Ford Resume
Dave Ford ResumeDave Ford
 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data LeakagePatty Buckley
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedTiffany Graham
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesisidro luna beltran
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Kirti Ahirrao
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxchristiandean12115
 

Ähnlich wie Information Security Officer Internet Resume Leon Blum Copy (20)

Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1
 
Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17
 
mcdonald.thomas.resume11-15
mcdonald.thomas.resume11-15mcdonald.thomas.resume11-15
mcdonald.thomas.resume11-15
 
Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015
 
Albert G Info systems resume
Albert G Info systems resumeAlbert G Info systems resume
Albert G Info systems resume
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoring
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoring
 
Cyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comCyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.com
 
Michael Barham Resume 2014 ISA
Michael Barham Resume 2014 ISAMichael Barham Resume 2014 ISA
Michael Barham Resume 2014 ISA
 
Hayat resume 1
Hayat resume 1Hayat resume 1
Hayat resume 1
 
Michael L Sawall INFOSEC
Michael L Sawall INFOSECMichael L Sawall INFOSEC
Michael L Sawall INFOSEC
 
CCA study group
CCA study groupCCA study group
CCA study group
 
Jason Allred Resume
Jason Allred ResumeJason Allred Resume
Jason Allred Resume
 
Dave Ford Resume
Dave Ford ResumeDave Ford Resume
Dave Ford Resume
 
IT WORK SAMPLES
IT WORK SAMPLESIT WORK SAMPLES
IT WORK SAMPLES
 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data Leakage
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
 

Information Security Officer Internet Resume Leon Blum Copy

  • 1. LEON BLUM Hollis New York lblum1234@gmail.com PROFESSIONAL PROFILE I bring years of expertise and technical experience in the field of information security and technical support. I am a high energy, results oriented professional with a track record of success with various international banking and software Company. I believe I could be an asset to your company based in my previous experience and accomplishments. LinkedIn:http://www.linkedin.com/in/leonblumaa98760 KEY AREAS OF EXPERTISE Operating Systems:Windows 2000, XP, Vista, and Windows 7Server:Windows,2003 and 2008 Software Application:Lotus Notes-6.5,7.0, Outlook-2003,2007,MS Project,Visio,LAN/VPN,SMS,Connect-Wise,Remedy, Citrix,RSA,TSO,VTAM, CICS, ACF2/RACF,ALLTEL,CharlesRivers, PAM, OPICS, Charlotte, Feline Alliance,JP Morgan , SWIFT,E- IBS,IBS,Symantec-Endpoint,CISCO-IPS .G100,NOC,GFI,ISA/VPN, Barracuda-Web-Filter,What-Up-Gold, Active Directory-2000, 2003, (SQL-User Administration-Server 2005)andQuest-Script-Logic applications. Printers: HP LaserJet, Epson,&Brother.Personal Computers/Laptops:Dell, HP and Toshiba.Other: Blackberry, IPhone ACCOMPLISHMENTS  Created MonitoringControls Documentation(Information Risk Assessments Matrix)for the network and applications.  Implemented enterprise Security Monitoring System. The system performed: tracking mechanisms that generated alerts and reported on the activities of the networkwhen changes were made.  Developed and Implemented a Web-BasedSecurity Access Request System for users to request access to the network and various applications.Additional features the system provided;Management approval process, Tracking progress of requests, Notifying userswhen requests were completed .Provided users: login ID's, passwords and access levels.  Created Operations Manuals for Security User’s Administration and the Help Desk system.  Developed and Implementedan Automated Web-Based Help Desk Systemresulting in a more user friendly system for users to report problems,check progress and statusof tickets. LinkedIn:https://sites.google.com/site/leonblumsite  Developed and Implemented aWeb-Based Help Desk and Knowledge Base System that provided step-by-step basic general problem resolutions for users by resolving their own issues, as aresult cutting help desk staff time on problems resolutionby 39percent.(The system became the benchmark for other help desk units in European, Canadian, and Latin Americas banksoperations.) PROFESSIONALEXPERIENCE BANCO ESTADO DE CHILE, New York, NY 2008 – 2011 Information SecurityOfficer Managed the Logical and Physical Securityin accordance with the established information security program, policies, standards and procedures in compliance with internal and external regulations to safeguard the integrity of the information assetsof the bank;Additional responsibilitiesincluded managing the Internet Customers’ Users Administration. Managedthe LogicalSecurityuser’sadministration for the networkand other proprietary business applications. Managed and monitored the (Physical Security):ADT alarm, cards access, video surveillance cameras, vault room, phone recording, asset protection and building access control systems. Managed the Internet Customers UsersAdministration for accounts and passwords).Resolved connectivity’s issues and assisted users with problems concerning logins, passwords and other related support issues. Maintained and monitored the confidentiality of the bankby utilizing an automated monitoring system that protects the integrity(information assets and systemsinfrastructure) from unauthorized disclosureand unauthorized access from external or internal threats. Maintained the Information security plan, policies, procedures and risk management planin compliance with information security policiestoensure they are kept up to-date to meet Federal and State regulatory requirements. Maintained appropriate security measures and mechanisms to guard againstunauthorized access to electronically stored and, or transmitted data and reasonably protected against anticipated threats and hazards. Interfaced as security liaison to internal, external, Federal Reserve Bank State Banking auditors to insure that the Bank is in compliance with State and Federal regulations based on the ISO 17799/ 27001/2002 frameworks. Worked with the Compliance Officer in developing an awareness program and an Incident response capability plan.
  • 2. LEON BLUM (Page-2) BANCO ESTADO DE CHILE, New York, NY Cont’d Worked with users, technical groups and management in thedevelopment and the implementation of security strategies designed to provide a high level of security over data and information systems. Worked with all departments’ managers to identify security requirements byusing the business impact analysis. Responsible for the information security awareness training to ensure that employees were aware of how to help ensure privacy of data and unauthorized modification from internal, external treats. Reviewed and interpreted new sources of information security on current and emerging laws, rules, guidelines, regulations, and industry best practices relating to Information technology. Implemented appropriate levels of monitoring controlsto safeguard sensitive data and validate those controls in place were being implemented. Implementeda security system that monitors and prevents unauthorized access, modifications and deletions(Quest- logical Security) related to information security throughout Bank. The system provides alerts and audit reports when changes were made. Administered network useraccounts for;groups, folders, files, and access privileges and business applications. Assisted in coordinating the contingency test at the disaster recovery site. Assisted the incident response team in the investigation of security issues. Conducted annual review of the Information security risk assessments program and the security plan with thecompliance officer to update the information security policies and associated security procedures. Conducted meetings with management to report on incidents that occurred for the (Logical and Physical) Security. Served on the security committee board to report on the activities and incidents that occurred eachmonth. Served as security representative to designated bank committees in order to provide advice and professional consultation on security issues, policies and procurements being considered. Performed internal securityrisk assessments audits for the network and business applications. Monitored logins and access violations using internet security acceleration system and VPN manager. Monitored, analyzed (Cisco Intrusion prevention system) systems logs for events of unauthorized access to detect security threats, vulnerability and collaborate with management and systems administrators to resolve issues. Monitored and audited the activities of (NetworkActive Directory) using Quest-Script logic applicationsfor;accounts, groups, folders, files and network connecteddevices including business applications as well. Promoted and distributed applicable information security awareness materials and publications within the bank. Assisted IT staff in resolving on-site computer user’sissueswhen short of staff. BANK HAPOALIM. B.M,New York,NY 2001 – 2008 ITOperations Officer Managed theHelpDeskTechnical Support and theSecurity Users Administration. Additional responsiblyincluded managing theInternet Customers Technical Support department. Managed and performed Users Security Administrationfor the Network, Citrix, and Mainframe, Lotus Notes and internet Mail and other proprietary business applications. Assisted the Chief Information Security Officer in the day-to-day operations for the security administration for groups, folders, files and access privileges for active directory and other applications. Reviewed access security systems log reports to check for unauthorized access from the network and business applications. Maintained and reviewed system user’s access rights and privilegesfor the network and applications. Performed level-1 and 2 functionsby providing technical support to users in person, by telephone, tickets or email. Used Citrix to remote access user desktop computers in order to resolve log-in network/applications and software issues fromusers for the United States, Canada, the Americas and Europe. Performed Security Administration and problem resolution relating tointernet access, Lotus Notes, Office- 2003, 2007, Citrix, LAN,Mainframe, local/network printing issues, recycles VTAM nodes and CICSactivation of CISC sessions using RACF/Fidelity application. Prepared standard statistical reports (Analyzed and evaluated incident reported and make recommendations to reduce the incident rate of problems).Conducted review meeting with department’s managers regarding technical issues that impact their departments. Managed the Internet Customers Users Administration for accounts and passwords). Resolved connectivity’s issues, and assisted users and customers with their problems concerning logins, passwords and other related support issues. Assisted technical support groupfor installing personal computers, and peripheral equipment’s when short of staff.
  • 3. LEON BLUM (Page-3)Cont’d COMPUTER ASSOCIATES INTERNATIONAL Inc. New York, NY 2000 – 2001 Technical Relationship Account Manager My responsibilities were to manage the clients’ technical issues in order to insure the maximum value and satisfaction from the use of Computer Associates software and services which includedevaluating the impact of IT technical issues related to Computer Associates technology. Conducted on-site review meetings with clients and team members regarding technical issues. Acted as liaison between technical support groups and field services staff. Managed and planned escalations for major technical issues which had impacted the clients’ business. Maintained regular communication with clients and established relationships with key technical contacts within my territory. Drafted and coordinated recovery services plans, which included bringing technical resources on site. Provided information regarding new software products and upgrades, and scheduled technology day at the client site. Provided status reports to management regarding activities within my territory. CHASE BANK.New York, NY 2000 System Security Administrator(Consultant) INACOM/VANSTAR. (American Express),New York, NY 1998 - 1999 Help-Desk Support Analyst(Consultant) CITIBANK (Global Network Center), Weehawken, NJ 1996 -1998 Help-Desk-Network Analyst(Consultant) EDUCATION&PROFESSIONAL CREDENTIALS Wharton School of Business, Philadelphia.PA(Courses in Business Management) Queens, College Flushing. NY (Management Information Systems).Accredited97 College credits by the(United Federal Reserve Bank)of New York for my education at Queens College, Wharton School, including Technical Schools, Professional work experience and serving in the United State Army and the United State Army Reserve. Queens College, New York, NY Microsoft Networking Technologies for Windows 2000 Client and Server Administration. Microsoft Active Directory Administration, Technologies, and System Network Architecture. Installation and Configurationof computerOperating Systems. Fundamental of Data Communications and Local Area Network Mainframe:TSO/RACF, CICS, VTAM/SNAand IM, MVS/JCL, ANS/Cobol programming, VM/CMS Citrix Learning Center, Wall Street, New York Citrix Meta-Frame for windows, Active Directory Administration. Foreign Language:French PROFESSIONAL AFFILIATIONS Association Polytechnique, Paris, France Courses, Workshops, and Seminars on topics of computer technology. United State Military Service.Veteran (FrenchInterpreter)