I have a long history with assisting the government and large global organizations with IT data centers, networking, systems , cyber security, security programs and compliance solutions.
I have extensive management skills, technical skills in security, or all areas of IT/IS with proven knowledge leadership they need for integrating solutions to manage, build, and grow successfully.
I have worked in higher levels of management and in the trenches with about everything anyone can think of or not think of. All domains of security, compliance, telecommunications, hardware systems, operating system, application’s, programming, networking and continue to do so, I love it! I’m happy with my success.
Experience includes success with creation of several security programs, build out of small to global (ANSI/TIA) tier 4 enterprise data centers, world wide networks, development and implement policy, best practice.
I’m older now and when I really think about it. What really make me happy and I’m most proud of is my kids and those I have taught and mentored with process/technology or life in general and see the success they have brought forth in their lives. I continue to learn and mentor and will continue for a long time.
The real security professional will evaluate risk and help find the proper controls to solve a problem.
Controls do not always mean technical. The processes, awareness and policy are a key factor to help with controls.
I’m a strong believer in Security first and compliance will work.
It’s really all about the business and listening to the needs of business, risk analysis and helping them with secure solutions to protect sensitive information.
Reporting to CIO, Cyber-Security -"undisclosed" @ All things Security, Networks, Systems, Compliance. From November 2014 to Present (1 year 2 months) Orange County, California AreaCEO/IT ( CISO ,Enterprise IT Security Manager of operations and Security Architecture) @ I have not included information for the organization I have worked for. This is for the protection of my clients, Non-disclosure agreements and Security classification requirements. From 2008 to November 2014 (6 years) Information Security Manager, Security Architecture and compliance. @ I have not included information for the organization I have worked for. This is for the protection of my clients, Non-disclosure agreements and Security classification requirements. From 1980 to 2008 (28 years) SR. Security Engineer, Security Architecture design and Compliance . @ I have not included information for the organization I have worked for. This is for the protection of my clients, Non-disclosure agreements and Security classification requirements. From 1980 to 2008 (28 years) Security Engineer,Principal Management - Security Architecture and Compliance @ I have not included information for the organization I have worked for. This is for the protection of my clients, Non-disclosure agreements and Security classification requirements. From 1980 to 2008 (28 years) Orange County, California AreaSecurity Sales Engineer, Security Architecture and Compliance @ I have not included information for the organization I have worked for. This is for the protection of my clients, Non-disclosure agreements and Security classification requirements. From 1980 to 2008 (28 years) TRW/experian included management, systems, networks, security integration, audit, compliance @ My years at TRW and Experian included technical/management positions in several areas for Main frames systems, Networks, Midframes systems management, security. This included ground up building global Tier 4 data centers and DR, NOC, SOC design/implementation and support. My experience includes all versions of IBM OS, Solaris, DEC, MS, Tandem Non-stop systems, all modes of Local and wide area networking, Internal, extranet, Internet. Security design, implementation and support for multiple security products, Security audit,compliance,policy and procedures. From 1974 to 2001 (27 years) experience: @ My experience includes advisory to executive management and board committees on Cyber Security Compliance, networking and system matters.
I have service delivery experience , design, implementation and operation experience for building strategic company direction, negotiates client and vendor contract terms, IS best practices , IS policies, standards and guidelines, IS team building and management, IS program development, operational procedures and metrics, risk assessment, IT technology trends and developments, data, networking, business systems, applications, infrastructure, asset management compliance, audit compliance management.
Hands on experiance with SOX, JSOX, PCI DSS, GRC, HIPAA/PHI, DoD,DoJ,DARPA, CJIS, NERC,CIP, WECC, NEI 04-04, NEI 08-09, CFR 73.54, Nuclear Cyber Security, SAS-70, NIST, various worldwide personal information protection regulatory and data protection requirements, Industrial security, DCS, SCADA, and other Industrial Control Systems (ICS), CIRT team management, project management, cyber security assessments, risk & remediation strategies, intrusion detection/prevention, remote access, e-discovery, trial forensics investigations, corporate security initiatives.
Security and Control Frameworks (ISO 2700.xx, CobIT, COSO, CMM, ITIL) , threat and vulnerability management, anomalous events and remedial actions, technical and non-technical stakeholder communications, C-Level Relationships Collaboration, Customer Collaboration-Service delivery level build out.
(1)Clients – DoD,DoJ,Federal,State,Local government, all levels of law enforcement, extensive organizational contracts throughout North America.
Short list- all branches of military,AT&T, SAIC, Verizon, Qualcomm, Broadcomm, Titan, CSC, M/S, google, yahoo, Intuit, Kaiser, WellPoint, State California, Hawaii, Utah, University systems, Beckman, Boeing, Experian, Allergan, PACSUN, CKE, extensive contract engagements with financial and gaming. From January 1975 to January 1975 (1 month) Management, Leader, Architect , Integrator , Mentor , Serivce Delivery @ I could add a full list of what solutions I have been certified on or have hands-on experience, but I'm not a beliver of just certifications. I will take dedicated motivated hands-on experienced individual who is not afraid to get dirty and thinks outside of the box any day. A lot of very talented individuals has what it takes and never are givin the chance or cannot afford to get certified or in companies that do not help pay. CERTS are expensive and not always easy to keep up. Traditional skills-infested job descriptions and traditional behavioral interviewing prevent companies from seeing or hiring the best people. Those that I have taken the chance on that may appear to have less education have never let me down. I cannot say the same about some that have all the educations and certs. My hands-on skills - If it is out there I have probably had my hands on it. If not with my experiance I figure it out quickly.
This includes designing/Architect, implementations, Networks, Systems, Firewall, Wireless, PKI , secure email. Identity management/SSO, Network/Host based IDS/IPS, web, LAN/WAN intranet, extranets, vulnerability management systems, patch management, risk management, change management, data centers, SOC’s. Encryption all levels, secure remote access, VPN’s, security assessment test tools, compliance tools, Routers, switches, end point solutions, mobility security management, cloud security, ediscovery/forensics investigations to include working with courts.
I have engineering/compliance sales experience with McAfee and Nokia and managed an extensive customer base, providing excellent customer service to clients in the follow up of the sale. Developed and delivered informative sales presentations, proof of concept, RFP/RFI to potential and existing clients From February 1974 to February 1974 (1 month)
ORANGE COUNTY LEADERSHIP ACADEMY @ Chapman University From 2014 to 2014 California State University-FullertonCerritos CollegeUniversity of California, Irvine Gary Mills is skilled in: Network Security, ITIL, Data Center, Disaster Recovery, Encryption, Telecommunications, Privacy, HIPAA, Operating Systems, Security, Computer Security, Firewalls, PKI, Penetration Testing, Identity Management