Jack Cohen, CISSP

Jack Cohen, CISSP

Salesman

Followers of Jack Cohen, CISSP1000 followers
location of Jack Cohen, CISSPHouston, Texas, Estados Unidos

Connect with Jack Cohen, CISSP to Send Message

Connect

Connect with Jack Cohen, CISSP to Send Message

Connect
  • Timeline

  • About me

    Principal Security Architect

  • Education

    • San Angelo Central High School

      -
      High School
    • University of Houston

      1973 - 1977
      BBA Finance, General
  • Experience

    • Photo Factory

      Jan 1977 - Jan 1978
      Salesman
    • Entre/MultiNet

      Jan 1986 - Jan 1989
      Salesman
    • Coastal Corp.

      Jan 1990 - Jun 2000

      Evaluate new and emerging technology as it applies to Coastal's I.T. Infrastructure, and make recommendations on their general applicability to Coastal. Project lead for Internet/Extranet security architecture and implementations. Coordinate all evaluation projects underway at all locations. Assist the development staff in planning and deploying new or highly complicated technology (such as imaging, Lotus Notes, Microsoft Exchange, etc.). Ongoing architectural responsibility for corporate internet security. As a member of the I.T. SWAT team, assist in the diagnosis and resolution of complex network problems. Approve/disapprove all hardware and software used throughout the corporation. Initial interface for vendors of new products. Show less

      • Staff Systems Specialist - Technology Planning & Design

        Jul 1990 - Jun 2000
      • Technology Planning & Design

        Jan 1990 - Jan 2000
    • Dynegy

      Jan 2000 - Jan 2006
      Technical Engineer

      • Project Manager for Web Access Control Project to Implement The SiteMinder Environment.• Project Manager the IMLogic instant messaging archiving solution, to meet legal and regulatory requirements.• Project Manager/Technical Lead for planning and implementing a Security Data Warehouse to support Network Intelligence log aggregation system for SOX Compliance Monitoring.• Project Manager and Technical Lead for planning and implementing Cisco/AireSpace 802.11 wireless network system.• Co-authored DIRT (Dynegy Incident Response Team) Process and Compliance Monitoring SOX Process Documentation.• Published multiple SOX runbooks for IMLogic Instant Messaging Archiving System, Vulnerability Assessment, IDS, and the SiteMinder SSO environments.• Constructed automated “WAR Dialing” system to support SOX requirement for DID phone line/Modem auditing.• Defined strategic architecture plan, and product/vendor selection for implementation/deployment of secure 802.11 wireless technologies to support core office, remote site, and executive business requirements.• Developed Strategic plan for an LDAP based Meta-Engine for the Enterprise Directory Project.• Secured Dynegy Assets for the Chicago & Vienna office closing.• Participated in Data Center Relocation Project. • Conducted Wireless Security Review for the Mont Belvue Rail Car Project.• Conducted Security Review of PeopleSoft eRecruit/eSettlement/eSupplierConnect application environment.• Consolidated radius support for the IPASS/VPN environment into the SiteMinder Policy Server across two datacenters, with replication and load-balancing.• Co-developed a forensic laboratory to support Legal and HR related investigations. Co-authored policies, procedures, and forms to document the “chain of evidence” in I.T. Legal investigations.• Re-engineered Internet facing PeopleSoft HR applications after conducting an architectural security review to meet legal compliance issues. Show less

    • Vericenter, Inc.

      Jun 2000 - Sept 2000
      Senior Network Architect

      Lead RTC (Research Testing and Certification) Group activities for hosted applications. Serve as a liaison between the Provisioning Group and the DataCenter Design Team for new client engagements. Provide on-call operational support for security infrastructure. Participated in the deployment of Cisco VoIP solutions using Cisco CallManager, Cisco VG200 voice gateways, Cisco 7960 IP phones, and Interactive Intelligence EIC 1.3C.

    • Fiserv Output Solutions

      Jun 2006 - Dec 2007
      Corporate Director of Arch. & Tech.

      Establish technology standards and architectures to support Personix business objectives. Ensure technology solutions are aligned with the requirements and demands of the needs of the business. Review network and information technology infrastructure strategic initiatives, investigating opportunities to improve their effectiveness and efficiency and to ensure consistent and continuous alignment with Fiserv corporate policy.• Lead design reviews of perimeter eCommerce/Internet systems.• Lead the identification and analysis of enterprise business drivers to develop enterprise architecture requirements.• Member of taskforce charged with formulating a new corporate development framework.• Designed corporate wide network segmentation project which included developing architecture for internal and perimeter firewalls, subnetting, network management probes, and intrusion prevention. This project is designed to mitigate corporate SAS70 and PCI control deficiencies. By incorporating a virtual firewall segmentation concept, the project timeline was cut in half, and the budget was reduced by 67%. • Developed integration project for a SIEM (Security Information Event Management) system to mitigate audit/compliance and support deficiencies. Show less

    • Cohen Systems Consulting

      Dec 2007 - now
      Principal Security Architect

      Superior record providing the vision and decisive leadership crucial to establishing enterprise class information security. Successful at building secure, highly available security solutions which safeguard sensitive data, and enhance the user experience.Demonstrated skill with integrating emerging technologies to solve business problems, fully compliant with corporate security requirements. Experienced at making effective decisions under adverse conditions with the foresight to quickly change tactics as necessary to achieve goals to meet aggressive project deliverables. Show less

    • F-1 Consulting Group

      Dec 2007 - May 2010
      Security Architect
    • BG Group, North America

      Dec 2007 - Jul 2010
      Consultant - IT Security Architect

      • Conducted Risk Assessments on network requests, all 3rd party connectivity or firewall rule changes, and new IT projects. • Consulted with various to resolve security architecture issues related to a new global IT outsourcing agreement .• Represented IT Security at bi-weekly change management meetings to ensure compliance with established BG company policy, standards and guidelines. • Conducted special projects and investigations at the request of the Global Director of Information Security and Controls.• Project: Define process, procedures, and technology necessary to remediate NTFS rights and ownership issues with multiple NetApps Filers. This remediation enables the company’s strategic initiative to migrate from NetApps NAS Filers to EMC SAN Technology.• Project: Conduct vulnerability assessment on multiple remote power facilities for NERC compliance. The office automation networks, scada control networks, and perimeter internet points of presence analyzed and an overall risk assessment document prepared. • Project: Engaged to support BG Global Data Ownership Project to establish a data ownership identification process, define roles and responsibilities, define accountability for all assets and that appropriate protection levels are identified, implemented and consistently maintained. Show less

    • MRE Consulting

      May 2010 - Jul 2010
      Security Architect
    • Enterprise Products

      Jul 2011 - Aug 2021
      Lead Security Specialist

      ● Lead project and action plans. ● Design, develop, engineer, and implement solutions that meet security requirements. ● Perform vulnerability/risk analysis of computer systems and applications during all phases of the system development life cycle. ● Analyze general information security issues and provide basic engineering and technical support to resolution. ● Design, develop, engineer, and implement solutions that meet security requirements. ● Analyze and define security requirements for computer systems, which may include workstations, and personal computers. ● Conduct vulnerability assessments of information systems. ● Recommend information assurance/security solutions to support business requirements. ● Perform gap analysis on company security policy, standards, and procedures. Show less

  • Licenses & Certifications

    • CISSP

      ISC2