Donnie Reznek
Education:
AAS
Information Systems Security/Cyber Security Digital Forensics
Central Piedmont Community College
2009 : 2011
AAS
Information Systems /Network Administration
Central Piedmont Community College
1998 : 2000
Experience:
Information Security Analyst
Manage, and resolve security incidents using Archer; monitor events/tasks using ArcSight. Monitor security measures and ensure security controls are in place to safeguard digital files and vital electronic infrastructure.
• Analyze and document information to identify malicious network, system or internet activity and to determine sophistication, priority, and threat level. Communicate with management, Line of Business partners and Information Security Teams on escalation and post incident reviews.
• Recommend IS security changes, new tools and process to management. Enhance existing incident response methods, tools and processes to reduce risk.
• Info Security tools : Threat Reporter, Threat Response, RSA SA, RSA Incident Management, Archer eGRC, RSA SecurID, ArcSight ESM, ArcSight Logger, AVG, Tanium, Bluecoat Proxy, ZDMDC, Firewalls, Virus Mitigation, Malware, IDS/IPS Analysis, Environment Management, Disaster Recovery, Application Asset Management, Vendor Management, PAC2000, BMC BPPM & Remedy, VMware, Virtual PC, Wireshark, Nmap, Nessus, Cisco Prime, Fire Eyes, Threat Connect, Air Deference Service Platform.
2014 : Present
Wells Fargo
Information Security Analyst
Selected to conducted investigations for Internal Audit, (ABA) Advanced Behavioral Analysis, and Corporate Security pertaining to fraud, bribery, data exfiltration.
Experience with Forensic tools such as FTK, EnCase, Spectorsoft monitoring software, Vontu, and RSA Archer eGRC, as well as, many in house applications such as Band Analysis and Reporting Tool, INSider Threat Information Correlation Tool, Desktop Compliance Reporting System, Endpoint global release and deployment operations and other networking tools.
Working knowledge of many bank related departmental procedures including Mortgage, Technology, Fraud, Onboarding and Outsourcing.
Produced instructional and core team documentation establishing procedures and standards
Provide training and mentorship to new team members
Correlation of data for statistical department analysis of case flow and investigation assignments
2011 : 2013
Bank of America
Cyber Forensics / Cyber Surveillance
Rehired after finishing degree in 2001 to provide Tier 2 technical support of hardware, system and application software and networking to end users across multiple internal and external organizations. Managed 30-45 callers daily, with an understanding of the idiosyncrasies of each unique customer environment.
Daily functions included : Physical site planning, installation planning, post job completion reviews and customer technical requirements analysis. Tracked projects and ensured service level agreements /contracts were met.
• Selected by management to train 67 agents onsite for three weeks at a new data center in Indiana and 25 associates in India via Netmeeting. Curriculum included technical training as well as guidelines for handling IBM accounts.
• Known as Subject Matter Expert / Go to Person by senior management, with extensive Project Management experience. Skilled in planning, scheduling, prioritizing and coordinating activities within the department and working with IBM Project Office, Service Delivery Managers, Customer Vendor Management, Data Centers and third party vendors.
SPECIAL RECOGNITION :
The only EUS employee out of 175, to be given top performance rating for five consecutive years, 2004-2008
Selected to attend EUS Women in Technology 2006 Hall of Fame Conference from over 600 woman employees.
2001 : 2009
IBM Global Business Services
Administrative Analyst
• Accepted the Trade Re-adjustment Act (TRA) program to attended college full time, 1998-2000.
1992 : 1998
IBM
Test Technician - Electronic Card Assemble & Test
Company: Wells Fargo
Years of Experience: 25
Information Systems Analyst with 7+ years experience managing stressful and critical security situations involving data/identity theft, data/privacy protection and security/liability issues. A skilled investigator with keen eye for cyber security trends, recognized for quickly resolving complex cases.