🎶Jose Rodriguez, CISSP, CCSP, CSIE
Details
Cyber Security & Information Assurance
Western Governors University
2018 : 2023
Institute of Information Technology
Sr. Cybersecurity Instructor
• Developed and delivered effective oral technical presentations tailored to multiple audiences from executive business leaders and IT engineers.
• Produced and assigned Analytic & SQL privileges to users according to SAP best practices to improve the security posture of the operating environment.
• Performed advanced information acquisition techniques using SQL script, spatial data processing, and text analytics to transform big data into meaningful material for decision-makers.
• Gained a comprehensive understanding of advanced modeling techniques in conjunction with the Data Integration Architecture powered by SAP HANA to create flexible analytical models based on real-time data originating from diverse business applications.
• Displayed detailed knowledge in implementing real-time and scheduled data replication using the latest Operational Data Provisioning (ODP) framework to increase the data acquisition speed by up to 60%.
2017 : 2017
NS2 Serves
SAP Applications Associate
• Selected to oversee the efficiency of over 1,200 VMware Virtual Microsoft Windows 2000 – 2012 servers in a highly demanding 24/7, 365-day work environment winning rave review.
• Resolves Windows Server production incidents nationally that host critical medical applications internally and via conference calls.
• Monitors the production environment using CA Spectrum, Tivoli TADDM, VMware vSphere 5.5 and McAfee ePolicyOrchestrator ensuring all projects are completed on time and under budget.
• “Takes over” on complex and sophisticated assignments from IT staff when necessary; trains new hires and cross-trains existing staff on product knowledge and product technique – known as “fun to work with!”
• Remediates over 1,000 server security vulnerabilities via IBM BigFix (IEM) weekly & gained practical knowledge of MDM systems (AirWatch & Meraki) SIEM (McAfee ESM) and Network Security tools (Nessus, Nmap, Nexpose, Metasploit, Burp Suite, TCPdump, Wireshark etc..)
• Gained a reputation as a “…no-nonsense, get-it-done-now and get-it-done-right professional.”
2015 : 2016
EmblemHealth
Senior Systems Administrator
• Led a team of information system specialists responsible for supporting an infrastructure of over 20,000 service members from more than 40 nations.
• Supported the administration of over 100 racked Microsoft Windows servers including Remote Access Services, SQL, Active Directory and Group Policy, Exchange 2003 – 10, SharePoint 07-10, McAfee ePolicy Orchestrator and Windows Deployment Services ensuring the accurate completion of critical mission communication assets throughout the enterprise.
• Commended by the Commander of US Forces Afghanistan and recognized with “The Joint Service Commendation Award” for meritorious service during critical emergency situations.
• Designed “best practice” policies for work competencies and grievance procedures keeping subordinates motivated, engaged and focused.
• Managed and trained personnel on cryptographic key handling policies & inspects restricted area security access logs.
2010 : 2014
NATO Communications and Information Agency (NCI Agency)
Information Systems Manager
• Managed the Information Assurance Program compliance of a Windows Server 2008 environment (30+ rack-mounted servers and 3-set ESX host virtual infrastructure configuration).
• Enforced security guidelines reporting company security posture for over 1,500 information systems within three network classifications, reporting findings and solutions to senior management.
• Exceeded the standard for systems support remedy and remediation of Information Assurance Vulnerability Assessments and Bulletins, reducing incidents by 98%.
• Trained and mentored six Information Management Officers on best security practices, operations and procedures using the Retina Network Security Scanner vulnerability assessment software.
• Counseled soldiers at difficult career crossroads empowering them to take control and thrive under demanding conditions.
• Selected to design and manage the Active Directory (OU, Users, Groups & Computers) and SharePoint (Permissions, Editing, Web Page Creation) environment for a 4,000 man organization.
2007 : 2010
US Army
Information Assurance Officer
Skills
Access Control, Active Directory, Application Security, Behavioral Analytics, Cloud Applications, Cloud Computing, Cloud Security, Computer Hardware Troubleshooting, Computer Security, Cryptography, Customer Service, Data Security, Disaster Recovery, Dispute Resolution, Governance, Risk Management, and Compliance (GRC), Incident Response, Information Assurance, Information Security, Information Security Management, Information Technology, IT Risk Management, Leadership, Microsoft Exchange, Microsoft Technologies, Military, Military Experience, Mobile Security, Network Administration, Networking, Network Security, Network Troubleshooting, Penetration Testing, Preventive Maintenance, Project Management, Reconnaissance, Risk Management, Security, Security Awareness, Security Controls, Servers, Software Installation, SQL, System Administration, Troubleshooting, Virtualization, VMware, Vulnerability, Vulnerability Assessment, Vulnerability Management, Windows Server
About
As a Sr. Cybersecurity Instructor at the Institute of Information Technology, I leverage my 14+ years of experience and success in cybersecurity, IT infrastructure, and troubleshooting to teach and mentor aspiring cyber professionals. I hold multiple certifications, including Security +CE, CASP+, and Certified Information System Security Professional, and I have been awarded several medals for my service and performance throughout my career.
I specialize in securing public cloud environments, implementing security architecture, networking, and managing IT infrastructure. I have a proven track record of implementing innovative security solutions, driving strategic objectives, and protecting critical assets in various industries. I am passionate about sharing my knowledge and expertise with the next generation of cyber talent, and I am committed to excellence, integrity, work ethic, and resourcefulness.