Resume as a Security Consultant


Commercial software design and development. Problem solver. Hard core technical knowledge with direct expertise in its application to business. Over 20 years of professional experience. Proven team management skills. Security consultant with peer acknowledged expertise as a leader in cyber security, secure coding, computer network attack (CNA), computer network defense (CND), and cyber warfare. Specialties: cyber security, start-ups, software design / architecture, software development, grid computing, high performance computing clusters, big data, project management, investor relations, document systems and content management. My designs focus on total system integration, high volume transactions, asynchronous processing / parallel processing, and robust / resilient systems. My track record of successful system development, long term system life spans, and wealth generation speaks for itself. Very few match my performance.


Relevant Experience

January 2012 to present

The Arizona Cyber Warfare Range

All manner of cyber security and operations. Design and development of a secure network to enable and controll a network full of deliberate and known vulnerabilities at all skill level. Containing users to their exclusive environment ensuring no breaches accross defined boundaries. Cyber security leadership advocacy, education, training, execution.

The AZCWR is the designated (US Department of Homeland Security) as the lead cyber security program in the United States and the very first (by executive order) Information Sharing and Anaysis Organization (ISAO).

  • Secure coding
  • Security Assessments
  • Penetration testing
  • Malware Analysis
  • Secure system design and development consulting (simulators, UAVs, missiles, space communications, eCommerce, corporate web applications and expert systemsetc)


August 2003 to May 2016

A Healthcare 2.0 / eCommerce company

  • Required HIPAA compliance
  • Required PCI compliance
  • Hybrid cloud computing environment
  • Responsible for the development of secure coding practices
  • Review of all source code, server instances for adherence to secure coding standards
  • Performed security assessments, penetration testing, security audits
  • Secure software development
  • Code escrow compliance for domain registrar
  • System / code fault tolerance


February 2003 to August 2003

A Large Bank

  • Business continuity process development and implementation
  • Secure software development
  • Lending compliance / regulation audit automation
  • Stateful system / code fault tolerance


July 2002 to January 2003

A Stored Value Credit Card Company

  • Business continuity
  • System / code fault tolerance
  • Required PCI compliance
  • Developed anomaly detection and alerting systems


November 1999 to July 2002

A Six Sigma Consulting Firm

  • Development of secure software systems protecting high level corporate intellectual property
  • Developed off-line data dcollection and secure transfer systems for offline / in-class instructor evaluations
  • Developed secure edi data transfer systems


August 1998 to October 1998

Federal Prison Software Systems for three countries

  • Designed / Authored the core security / access control system
  • Authored the random drug testing system – certified as a truly random system by New Zealand and Australia
  • Authored the victim notification system
  • Performed security audits
  • Trained the development team on security best practices for software development