Leigh A Ronczka

Leigh A Ronczka Email and Phone Number

ISO 27001 and Privacy Technical Lead @ Pivot Point Security
Voorhees Township, NJ, US
Leigh A Ronczka's Location
Voorhees, New Jersey, United States, United States
Leigh A Ronczka's Contact Details
About Leigh A Ronczka

Manager at CBIZ/Pivot Point Security | Driving Excellence in ISO 27001, ISO 27701, and ISO 42001 Implementations & AuditsAs a Manager at CBIZ/Pivot Point Security, I specialize in strengthening clients' information security and privacy frameworks through expert implementation and auditing of ISO 27001, ISO 27701, and ISO 42001 standards. With extensive hands-on experience, I bring a comprehensive understanding of security, compliance, and best practices.Our team's dedication to excellence ensures the delivery of tailored solutions that not only meet but exceed industry benchmarks, empowering organizations to achieve their security and compliance goals.

Leigh A Ronczka's Current Company Details
Pivot Point Security

Pivot Point Security

View
ISO 27001 and Privacy Technical Lead
Voorhees Township, NJ, US
Leigh A Ronczka Work Experience Details
  • Pivot Point Security
    Iso 27001 And Privacy Technical Lead
    Pivot Point Security
    Voorhees Township, Nj, Us
  • Cbiz/Pivot Point Security
    Manager
    Cbiz/Pivot Point Security Jun 2023 - Present
  • Pivot Point Security
    Iso 27001 / Privacy Technical Lead
    Pivot Point Security May 2020 - Jun 2023
    Hamilton Township, New Jersey, Us
  • Pivot Point Security
    Information Technology Auditor
    Pivot Point Security Jun 2017 - Feb 2022
    Hamilton Township, New Jersey, Us
  • Pjm Interconnection
    Sr Its Security And Compliance Analyst
    Pjm Interconnection Jan 2012 - May 2017
    Audubon, Pa, Us
    Senior Compliance Analyst• CyberArk Password Vault Project (2014-2017) - Vault Administration (Setup, configuration, implementation, management tasks)Process documentation and Technical Support• Responsible for the continued development/enhancement and assurance of ITS Controls for ITS owned CIP requirements, requirement parts under CIP-005, CIP-007 and CIP-010 (version 5)o NERC Version 5 transition – (2015,2016)♣ GAP analysis V3 to v5 CIP Requirements♣ Security and Compliance Lead for multiple ITS Division owned requirements♣ Lead compliance oversight, development and documentation relating to the implementation of Tripwire Enterprise for CIP-010o Lead (Compliance Analyst) on audit support gathering, assessment, and organization approach for 2013,2016 CIP Audit o 2012- Lead CIP Compliance Auditor for internal self-certification for PJMo 2014, 2015 – Lead Security and Compliance Analyst for CIP self-certification and audit readiness reviewso Annual Password Change Project – Lead (2012,2013,2014, 2015,2016,2017)♣ Develop project schedule, identify technical subject matter experts of privileged accounts in scope of NERC CIP ♣ Coordinate, obtain, review, validate system support for approximately 20,000 accounts.♣ Maintain overall project and status reporting to management♣ Reduced execution time from 12 months to 5 months with the implementation of Enterprise Password Vault♣ Quality review of compliance of new assets on-boarding to the scope of NERC CIP.• Assurance all PJM cyber security and NERC CIP regulatory requirements were operational and effective prior to an asset being declared “CIP”• Documentation of exceptions were documented in accordance with PJM policy, and NERC CIP requirements ♣ Internal Investigations, , Self-Report Documentation, and Mitigation Plan development, Remediation follow-upo Continued Department Process enhancements (2013,2014,2015,2016)o Liaison to Internal Audit – various Audits (2012,2013,2014, 2015)
  • Phh Corporation
    Sr It Auditor
    Phh Corporation Apr 2009 - Nov 2011
    Mount Laurel, Nj, Us
    PHH Corporation - Senior IT Auditor - Dates Employed Apr 2009 – Nov 2011 Employment Duration2 yrs. 8 mos.All Areas of IT Audit Process (Audit Planning, Scope development, Control Identification and assessment, documentation of issues, draft reports, remediation validation) Leveraged CobiT/ITGC to develop and document IT Audit Plans as approved by the board.(examples not limited to Patch Management, Access Management, Database access monitoring, Application development – new code deployment, SDLC, Data Backup, Disaster Recovery, BCP)Peer Work paper review.Training of junior auditors, mentorship, support. Liaison to external auditors for SAS70/SSAE16 for interviews and document review.Led internal IT audit aspect of control verification, policy/process review and artifacts of compliance with controls for external auditor review for SAS70/SSAE16Liaison to internal SOX auditors and assisted internal testing of identified controls. Liaison to legal and external auditor for GLBA auditIT liaison to legal auditor for HIPPA compliance validation of work performed.IT Audit liaison to external vendor for PCI assessment.CoBIT, SOX, SAS 70/SSAE 16; GLBA, HIPAA, Limited PCI.
  • Njm Insurance Group
    Sr It Auditor
    Njm Insurance Group Aug 2006 - Feb 2009
    West Trenton, Nj, Us
    All Areas of IT Audit Process. Audit Planning, Scope development, Control Identification and assessment.Audit Execution, Documentation, Draft Reports, RemediationPeer Work paper review.CoBIT, SOX, MAR, ITGC, ITIL, COSOIn addition to Disaster Recovery and BCP exercises.Lead on Policy Holder Special Dividend Annual Procject
  • Gr Consutling
    It Auditor
    Gr Consutling Nov 2004 - Aug 2006
    IT Audit Process. Control Identification and assessment.Audit Execution, Documentation, Remediation Testing. Internal, External Auditing, CoBIT, SOX, SAS-70.
  • Peco Energy
    Information Technology
    Peco Energy Apr 1995 - Nov 2004
    Philadelphia, Pa
    Exelon/PECO – Information Technology Dates of Employed April 1995 – Nov 2004 Duration 9 yrs. 8 mos.OS, Novell, Windows AdministrationSharePoint AdministrationLotus Notes Administration IT Business AnalystChange ControlProblem Management
  • Peco
    It
    Peco 1995 - 2004

Leigh A Ronczka Skills

Security Business Process Improvement Business Analysis It Audit Disaster Recovery Sdlc Process Improvement Information Security Sarbanes Oxley Act Information Security Management Information Technology Cisa Software Development Life Cycle Nerc Enterprise Password Vault Cybeark It Compliance Microsoft Office Microsoft Excel Password Management Jira Confluence Kanban Scrum Mentoring Viso Team Leadership Nerc Cip Cobit Itgc Sox Ssae 16 Auditing Internal Audit External Audit Regulatory Compliance Cyberark Enterprise Password Vault Microsoft Word Microsoft Powerpoint Ssaae 16

Leigh A Ronczka Education Details

  • University Of Phoenix
    University Of Phoenix
    Technology Management
  • Camden County College
    Camden County College
    Marketing
  • Glassboro State College / Rowan
    Glassboro State College / Rowan
    Management Information Systems
  • Rowan University
    Rowan University
    General

Frequently Asked Questions about Leigh A Ronczka

What company does Leigh A Ronczka work for?

Leigh A Ronczka works for Pivot Point Security

What is Leigh A Ronczka's role at the current company?

Leigh A Ronczka's current role is ISO 27001 and Privacy Technical Lead.

What is Leigh A Ronczka's email address?

Leigh A Ronczka's email address is le****@****zon.net

What schools did Leigh A Ronczka attend?

Leigh A Ronczka attended University Of Phoenix, Camden County College, Glassboro State College / Rowan, Rowan University.

What skills is Leigh A Ronczka known for?

Leigh A Ronczka has skills like Security, Business Process Improvement, Business Analysis, It Audit, Disaster Recovery, Sdlc, Process Improvement, Information Security, Sarbanes Oxley Act, Information Security Management, Information Technology, Cisa.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.