Please post your requirement

We recommend that you provide us with as much information as possible to ensure that the listing will attract a suitable candidate.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
partnership migrants icon

Thank you for showing an interest in our Job Seeker client.

Please give us some details about the role you want to fill and let us know why you think our client might be the perfect candidate for you.

What happens next?

Our Job Search Specialist Mark Beltran will facilitate the next steps:

Mark will let our client know that you have shown an interest in their professional skills.

You will receive a full job application from our client and might want to offer them a formal job interview if you see the right potential in this candidate.

If you decide that you would like to offer the role to our client, we will help to make the next steps as smooth as possible.

You will be supported by our Licensed Immigration Advisers, who will take care of all visa related aspects of the process of offering our client a job.

Offering a job to our client will be straight forward.

Candidate Details

Name :

Jeffrey Flournoy
Qualification :
IT Security Engineer
Industry :
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
New Zealand Immigration Concepts Logo
Candidate ID:
JF222
This candidate has been hired.

IT Security Engineer

About our Client

As a Certified Cybersecurity Professional with expertise in cloud security, threat intelligence, incident response, penetration testing, and vulnerability assessment, I excel in developing and implementing effective cybersecurity strategies that align with business objectives and compliance requirements. My hands-on experience in conducting thorough penetration testing, vulnerability assessments, forensic investigations, log analysis, and providing technical consulting support ensures that appropriate compliance is in place. With a constant state of vigilance and readiness, I am always prepared to respond to threats and breaches and leverage my extensive experience in proactive measures to secure systems and data in cloud environments. With a passion for staying up-to-date on emerging trends and technologies in cloud security and cybersecurity, I am always seeking opportunities to enhance my skills and knowledge, making me a valuable asset to any organisation seeking a strong cybersecurity leader.

Achievements

  • Azure cloud services (Gov/Commercial)
  • Public Key Infrastructure (PKI) and Certificate
  • Authority
  • Cryptography
  • Azure Modern Authentication
  • Routing and Switching
  • Threat detection and response (e.g., CrowdStrikeNextGen AV)
  • Active Directory & Azure Active Directory
  • PowerShell automation
  • Vulnerability assessment
  • Proficient in Python
  • Vulnerability Assessment (e.g., Nessus or OpenVAS)
  • Conversational Spanish
  • Desktop and endpoint management (JamF,MacAfee, Desktop Central)
  • Virtualisation (e.g., VMware ESXi, Hyper-V)
  • Identity and Access Management (PingID,Duo)
  • Data Loss Prevention (McAfee, Microsoft)
  • Regulatory compliance (e.g., PCI-DSS, CJIS)
  • Disaster recovery planning and execution
  • Cloud security best practices
  • Incident response and management
  • Server architecture and administration
  • Network and web application penetration testing (e.g., Burp Suite, Metasploit, Nmap)
  • Security awareness (e.g., Proofpoint)

Professional Experience

IT Security Engineer

  • Successfully integrated Microsoft Modern Authentication solutions within the organisation, including Multifactor Authentication (MFA), conditional access for Azure AD, and Single Sign-on, significantly enhancing the organisation's security posture.
  • Conducted regular vulnerability assessments and penetration tests to proactively identify and address security issues before they could be exploited by attackers.
  • Deployed and secured cloud applications hosted as SAAS and federated on-premises, reducing security vulnerabilities and improving system reliability.
  • Conducted thorough vulnerability assessments and security reviews for applications and identities, identifying and mitigating risks before they could be exploited by malicious actors.
  • Collaborated with neighbouring departments like HR and Legal to compile the organisation's official security review procedures for 3rd party vendors, ensuring all vendors meet the organisation's strict security requirements.
  • Conducted regular security awareness training for internal users, reducing the likelihood of security breaches due to human error.
  • Configured Microsoft DLP for Microsoft 365 services, such as Exchange Online and SharePoint Online, to accurately identify and classify sensitive data, including personally identifiable information (PII), financial data, and intellectual property, preventing unauthorised access and data leakage.
  • Conducted reviews of the organisation's log sources within the SolarWinds environment.

System Security Engineer

  • Led the development and implementation of secure information systems for storing government data, including system, network, database, and security technologies.
  • Championed the successful deployment of Microsoft Modern Authentication across the entire state of Colorado, enhancing security measures and streamlining access management processes.
  • Reviewed and fine-tuned parsing rules specific to the organisation's environment and log sources, ensuring accurate and efficient parsing of log data.
  • Chosen to participate in the Change Advisory Board, contributing to discussions on technical changes, policies, and security that affect the overall network and system enclaved.
  • Configured and optimised McAfee DLP policies and rules to align with the organisation's data security requirements, minimising false positives and ensuring accurate detection and prevention of data breaches.
  • Developed and implemented an email security policy, including SPF and DKIM validation, to prevent phishing attacks and ensure secure email communications.
  • Assisted in the decommissioning process of outdated or redundant Splunk instances.
  • Created and updated technical documentation relating to system changes and configurations, ensuring accurate and up-to-date information for future reference.
  • Developed and executed patch management processes to ensure all systems were up-to-date and protected from potential exploits.
  • Configured LogRhythm within the organisation's infrastructure to centralise and analyse security logs from various sources.
  • Collaborated with the development team to design and implement an application security pipeline using Kubernetes and AKS, which resulted in a streamlined and automated process for identifying and addressing security issues.

Identity and Access Management Analyst

  • Successfully resolved numerous issues related to access management and provisioning workflows, ensuring seamless operations for the client.
  • Conducted comprehensive Identity and Access Management (IAM) activities, including user provisioning, access review, and role-based access control, to enhance security and improve efficiency.
  • Managed operations within the IAM environment at the client, including proactive application patching and upgrades, thorough certificate management, and diligent monitoring of access logs to mitigate risks.
  • Efficiently executed various security-related activities, including User ID management, significantly enhancing the overall security posture of the organisation.
  • Utilised advanced Access Management tools such as Privilege Access Management (PAM), Active Directory, and other related solutions to effectively manage access to client systems.

Education

  • Master of Science in Cybersecurity and Information Assurance
  • Bachelor of Science in Information Technology and Cybersecurity
  • Associate of Arts

Certifications

Apple Certified Associate

CompTIA Network+ Certified Professional

CompTIA Security+ Certified Professional

EC-Council Certified Ethical Hacker

EC-Council Certified Network Defense Architect

EC-Council Certified Secure Computer User

Microsoft 365 Certified Security Admin Associate

Interests

Skills

Technical Skills

ARE YOU INTERESTED IN THIS 
CANDIDATE?
Thank you for showing an interest in this candidate.

One of our Job Search Specialists will contact you to have a chat about the next steps of connecting you with our client.

go back to browse more Candidates
Oops! Something went wrong while submitting the form.

Are you a New Zealand employer?

All our clients are fully committed to working in New Zealand!
List Your Job