Sophon Orapin Email and Phone Number
Sophon Orapin work email
- Valid
- Valid
- Valid
- Valid
Sophon Orapin personal email
- Valid
- Valid
- Valid
Sophon Orapin phone numbers
“It’s impossible to separate the concept of ‘security transformation’ from the pragmatic day-to-day discipline necessary to achieve it. In order to transform my IT security infrastructure, I must ensure that each security project clearly maps back to the organization’s strategic business objectives. I have to be ruthless when it comes to making tough decisions about the kind of information security investments I am willing to authorize and support. Ensuring that IT security investments support our business strategy is a critical litmus test for my computer professional career. Every discrete security project must align with corporate strategy in order to make the cut. Otherwise, it is not going to drive our business forward.”
Cisc
View- Employees:
- 176
-
CiscMilford Mill, Md, Us -
Senior It Security ConsultantCisc Jan 2015 - PresentUs• Software Engineering Java development, full software development life cycle, and technical documentation. • Protecting information confidentiality is a critical security objective for organizations. Starting with a good understanding of the business, organizations must weave IT security and IT risk management into the executive levels of business planning. IT security objectives must be defined for the organization as a whole and fall within the following categories: integrity, availability, confidentiality, use control and accountability. The objectives provide the criteria used to determine whether the architecture is appropriate for the given task.• Plan, implement and upgrade security measures and access controls• Establish plans and protocols to protect digital files and information systems against unauthorized access, modification and/or destruction• Maintain data and monitor security access• Perform vulnerability testing, risk analyses and security assessments• Conduct internal and external security audits• Anticipate security alerts, incidents and disasters and reduce their likelihood• Manage network, intrusion detection and prevention systems• Analyze security breaches to determine their root cause• Recommend and install appropriate tools and countermeasures• Define, implement and maintain corporate security policies• Train fellow employees in security awareness and procedures• Coordinate security plans with outside vendors• Lead the planning and implementation of project.• Facilitate the definition of project scope, goals and deliverables• Define project tasks and resource requirements• Develop project plans• Manage project budget and effort utilization• Manage project resource allocation• Plan and schedule project timelines• Track project deliverables• Provide direction and support to project team• Present reports defining project progress, problems and solutions• Implement and manage project changes -
Senior Security Software EngineerT-Rex Corporation Jun 2012 - PresentSENIOR SECURITY SOFTWARE ENGINEER at T-REX CORPORATON, 7338 Baltimore Avenue, Suite 209A, College Park, MD 20740: SOFTWARE ENGINEER CONTRACTOR for LOCKHEED MARTIN CORPORATION and IRONDATA for Social Security Administration (SSA), June 2012 – Present.Hardware & Software Environment: IBM Mainframes/IBM AS400/Thunderhead NOW/MS Sharepoint/MS Office 2010 & Communication /MKS/IBM RAD/HP ALM/TOAD/Thunderhead 5.1.5.29.xx,/ Others. •Provides high level expertise in developing complex software applications involving new Disability Claims Processing Systems(DCPS) for Social Security Administration (SSA) technologies, methods, concepts, or approaches •Based on functional and conceptual design specifications, develops diagrammatic plans and design logic required to implement computer programs, IT systems and procedures •Verifies accuracy and validity of programs by preparing sample test data and test plans; corrects program errors by revising by testing and validation the templates which are integrated with Thunderhead Software (COTS) instructions; modifies programs when required by changes in procedures and reports desired •Demonstrate ability, experience and performance in understanding creating and assigning group and user rights security levels requirements based on client needs •Facilitate and manage schedules through product delivery by using Thunderhead NOW/HP ALM/IBM RAD/IBM Websphere/MKS/HP ALM/TOADS/SharePoint/Microsoft 365/Microsoft Live Meetings/Others.
-
It Security ConsultantNitirathaphum Law& It Consulting Office May 2009 - PresentHardware & Software Environment: IBM z/OS V1R9.0 UNIX/MVS/AS400/CICS; SDK for z/OS, Java 2Planning, designing, and leading enterprise security applications with the J2EE Platform, Java servlets, Java Server Pages, and Enterprise JavaBeans component models, as well as the JDBC API, Java Message Service API, and J2EE Connector Architecture. Responsible for security, deployment, transaction management, internationalization, and other important issues for today's applications and CICS Transaction Server for z/OS Version 3 provides an efficient and effective environment for applications that are written in COBOL, PL/I, C, C++, and Java.; Proactively protect the integrity, confidentiality and availability of information by ensuring appropriate security controls are in existence and enforced. Assist in formalizing security policies and resource classification schemes; maintain and publish all information security standards, procedures, and guidelines, including monitoring and reviewing compliance procedures.Coordinates with IT team members, vendors, contractors and consultants to build and sustain a coordinated, meaningful security program in compliance to industries security standards.Conduct investigations and remediation of suspected information security incidents.Promote information security awareness programs, and recommending tools and improvement essential to IT security.
-
Icam Senior Software DeveloperDsfederal Incorporation Mar 2014 - Dec 2014• Responsible for Java-based identity and access management suites, including products from IBM Tivoli, Oracle, and Forge Rock. Augment and tailor the identity and access solutions using commercial, open source, and custom-developed software, as required.• 7 years combined JavaScript framework experience using BackboneJS and JSF• Conduct services and product design, implementation, and integration.• Applying Restful Services, SOAP, and Message Driven Beans• Engineer components; allocate requirements to product or service components.• Engineer internal and external interfaces.• Develop and/or provide technical input for build directives.• Develop and verify product and services components.• Analyze proposed changes to engineering products and services.• Add appropriate work products to the technical data package.• Support internal testing activities and correct software discrepancies, as identified.• Support external testing activities and correct software discrepancies, as identified.• Solid understanding of Java, JavaScript programming languages.• Solid understanding and practical experience of software development lifecycle/Agile.• Strong analytical, problem solving and debugging skills.• Deploy and maintain all other software, hosting, data, and configuration elements of the ICAM environment.• Early and continual user involvement.• Frequent releases of end-to-end capabilities no less than quarterly.• Multiple, rapidly executed iterations that produce functionality to users for feedback no later than every four weeks.• Early, successive delivery of functional product, or prototyping where functional product cannot be delivered, to support an evolutionary acquisition.• Automated implementation of build, deploy, test and release process (AKA: Deployment Pipeline).• Modular, open systems approach (MOSA).• Organization of requirements into user stories that are Independent, Negotiable, Valuable, Estimable, Small and Testabl
-
Senior Security AdministratorOpen Technology Group, Inc Jan 2009 - May 2009DMA Environment: Sun Fire 880; Sun Ultra Sparc T5240; Sun Ray; IBM AIX, AS/400,Websphere; Windows XP Professional; UNIX C; 27 servers; CA eTrust Access Control; ePC; Tripwire; Unix and Windows Image Servers; Kodak, Fujitsu or equivalent USB2 Scanners; Windows Fax Servers; Backup Server /Robotic Tape Backup Units; Cache-DASD Arrays with SAN and/or SCSI interfaces to multiple servers; Patch Panels and cables; Switches; Routers; Ethernet backbones; Accelerated Video Cards; Workstations; Content Manager Workflow Management and Imaging Software; Argent monitoring software; Customer standard suites of software development, testing and production operations tools; Veritas Netbackup; Veritas Volume Manager; Control-M Job Scheduling; EMC & Hitachi Mainframe Disk Subsystems; EMC Timefinder; Hitachi Shadowimage; SQL for Sequel Server; VBScript and Windows Management Instrumentation (WMI).; Primary responsible for implementing the security architecture for the Document Management Architecture (DMA) UNIX environment.Advising on security related issues.Responding within established timeliness to all Division of Telecommunication and Security Standards (DTSS) inquiries and reports.Maintaining all security related applications (i.e. eTrust, ePC, tripwire, etc.).Create, administer, and maintain all DMA user accounts in accordance with DMA and DTSS guidelines.Ensure that the DMA servers are in compliance with all DTSS regulations when feasible.Ensure frequent and open communication with the DMA system administrators so that both parties are up to date on the security of the DMA servers.Attend regularly scheduled DTSS and Solaris group meetings as well as audits and reviews.Prepare any necessary documents required/requested by DTSS.
-
Senior It Enterprise Architect/ConsultantComputer Information Systems Consultants (Cisc) Aug 2006 - Dec 2008Environment: IBM OS/390; Windows XP Professional; C++; EJB, J2EE; Oracle, JDBC with IBM Ethernet, 510 servers: IBM Client, Windows, Unix, Linux, and Solaris servers; Citrix Meta Frame Presentation Server, eTrust.Extensive project experience in Government, Financial Institutions, Retail, Manufacturing, Insurance, Commodity Trading and Consumer finance.Provided solution with J2EE using advanced features of Java including EJB, Java Beans, Java Server Pages (JSP), Servlets, Struts, JSP Tag Library (JSTL), JSF, and JDBC.; Oversee a network of security directors and vendors who safeguard the organization's assets, intellectual property and computer systems, as well as the physical safety of the organization.Install, implement, configure, and monitor all servers with daily activity report and computer incident report.Identify protection goals, objectives and metrics consistent with organization strategic plan. Manage the development and implementation of global security policy, standards, guidelines and procedures to ensure ongoing maintenance of security. Physical protection responsibilities will include asset protection, workplace violence prevention, access control systems, video surveillance, and more. Information protection responsibilities will include network security architecture, network access and monitoring policies, employee education and awarenessMaintain relationships with local, state and federal law enforcement and other related government agencies. Oversee incident response planning as well as the investigation of security breaches, and assist with disciplinary and legal matters associated with such breaches as necessary. Work with outside consultants as appropriate for independent security audits. Provide technical expertise in the use of database technology. Accountable for the overall performance of the enterprise's database environment: Microsoft Access, Oracle Database, and IBM DB2.
-
Senior It AuditorFederal Housing Finance Board Feb 2005 - Jun 2006UsEnvironment: Sun Solaris; Microsoft XP Professional; Microsoft IIS; Active X; Citrix Meta Frame Presentation Server; eTrust; Digital Defense.; Perform information systems audit work throughout the organization including security audits of complex computer applications, network, and the Federal Housing Finance Board. Possess a working knowledge of the Organization: its business processes; policies and procedures; governance practices; and regulatory obligations as it relates to information systems. Demonstrate proficiency in applying information systems audit principles, skills and techniques in reviewing, penetration testing, and testing computer applications and information systems technology of varying complexity utilized by the independent IT auditor team from Brown & Company CPAs PLLC. Assess internal & external controls, and execute the audit process on a wide variety of computing environments and computer applications and accurately interpret results against defined criteria and do so such that the work is competently and efficiently performed in accordance with Federal Information Security Management Act (FISMA), Federal Information Processing Standards (FIPS), Office of Management and Budget (OMB), Government Accountability Office (GAO), and Federal Identity Credentialing Committee (FICC) and the National Institute of Standard and Technology (NIST) professional and departmental standards at the Federal Housing Finance Board (FHFB) for Fiscal Year 2005 and 2006. -
Director Of Information TechnologySeg, Inc May 2003 - Feb 2005Environment; IBM AS/400; RPG/400;JAVA, J2EE, JAVA API, JSP, EJB, EIS, JDBC; Visual Basic.NET; SQL Server; Oracle; Microsoft IIS, Active X, Windows Server 2003; eTrust, IBM Content Management; AdPro, Axis Video.
-
Senior Programmer Analyst/Software DeveloperHome Sale Inc Mar 2000 - May 2003Environment: IBM AS/400; RPGIII, RPGILE, RPG/400; IBM Content Management; Crystal Reports; Borland Delphi 5.0; IBM DB2, J2EE, JavaScript; Microsoft Access; Visual Basic/RPG; IBM JAVA/RPG400.; Managed the Information Systems Department for Home Sale, Inc., a property management corporation controlling extensive commercial and residential properties in the Northeast U.S. Supervised a team of 5 developers tasked to design, develop, and support custom property and financial management systems for the corporation. Served as the lead application developer for database-driven business systems. Utilized a variety of code development, web, and database modeling tools to design, review, code, and test applications. Identified data resource requirements and designed database access and security standards, backup procedures, and performance metrics. Led design reviews and developed technical design, code, training, and user documentation for software products. Provided system and database administration for central financial and property management systems. Managed all change control and reporting functions. Performed code support and maintenance for database throughout the corporation. Analyzed key data integration issues, tracked and resolved data issues, and provided direct user support to every level of personnel.
-
Financial Systems Analyst/Programmer AnalystSpectera, Inc Jul 1997 - Mar 2000Environment; IBM AS/400; RPGIII, RPGILE, IBM DB2, Microsoft Access; GUI; EJB, JDBC, Java; XML.; Managed the Management Information Systems (MIS) department for Spectera, a healthcare provider with 550 employees nationwide. Developed and implemented corporate IT strategic plans including enterprise architecture design and security management policies. Served as the software development project manager and lead developer for design, implement, and support of healthcare provider and financial management applications. Managed the full software development life cycle (SDLC) process from initial concept through definition, design, development, test/bug, and production phases. Led cross-functional teams throughout entire project cycle, facilitating communications with marketing, accounting, finance, product management, production, and development groups. Served as the lead developer for a variety of computing platforms, including IBM AS/400, Compaq, HP, and Windows NT. Developed and tested codes using RPGIII, RPGIV, RPGILE, and RPG/400 and integrated with Microsoft Access and IBM DB2/UDB databases. Developed procedures to ensure IT system reliability and accessibility and to prevent and defend against unauthorized access to systems, networks, and data. Conducted risk and vulnerability assessments of planned and installed IT systems to identify vulnerabilities, risks, and protection requirements. Diagnosed and resolved security problems and sent security alerts to involved personnel. Collaborated with sales, marketing, and other business managers to design database, web, and data management strategies to further business growth.
-
Financial Systems Applications ConsultantAssociated Staffing At Westport, Llc Jun 1996 - Jul 1997Environment: IBM AS/400; RPGIII, RPGILE; IBM DB2; Microsoft Windows 98. Served on an applications development team producing financial management, inventory control, warehouse, and bar-coding applications in an IBM AS/400 RPG development environment. Consulted with the Great Brand of Europe, Inc., an importer of fine bottled water, yogurt, for France, to convert their inventory management system from European to U.S. bar-coding standards. Met with the customer to determine and document requirements, and participated in the full design, review, implementation, test, and acceptance phased of the project. Designed the Point of Sale (POS) scanner for this application.
-
Supervisor Computer Operations & ProgrammerFirst National Bank Mar 1990 - Jun 1996Raleigh , North Carolina, UsEnvironment: IBM AS/400; RPG II/III; IBM DB2; Procom Plus; Diebold.; Supervised computer operations and software development for a regional banking institution. Led the development efforts for new software releases. Wrote program specifications for systems modifications and data conversion programs from IBM/38: RPGII to IBM AS/400: RPGIII, RPGILE, RPGIV, RPG/400 mainframe; Unix C; Diebold; IBM Ethernets; Token Ring; Router and Switch; and software environment. Ensured that applications met all federal banking regulations.Developed system and user documentation for new code releases and presented formal user training classes. Completed the design and implementation of applications, which provided EDI, NYSE, and other wire transmission functions for the bank. This provided customer payroll receipts, electronic payments, and other electronic transfers between the MIS department and the Federal Reserve Bank of New York. Provide technical expertise in the use of database technology. Accountable for the overall performance of the enterprise's database environment. Work closely with clients, business analysts, systems programmers, and application developers to define and resolve information flow and content issues---helping to transform business requirements into environment specific databases. Monitor and analyze performance metrics and allocate database resources to achieve optimum database performance. Perform additional job duties as required.Solid knowledge of database administration, database monitoring and tuning, logical data modeling, and physical database development. -
Data Processing Supervisor And Unix C Programmer AnalystMaxon Company Jul 1986 - Mar 1990Environment: Targon UNIX C and peripheralsResponsibility for the daily operation and supervised 6 technical staff, computer operator, 12 data entry operators, and 2 clerks including administered, operated computer hardware and peripherals, UNIX client servers, and backed up. EARLIER
-
Executive Management TraineeThe Bangkok Bank Limited, Headquarters In Bangkok, Thailand Jul 1975 - Mar 1990I readily accepted projects with increased responsibilities for the 12th largest financial service institution in Asia with 15,000 employees worldwide. Relocated to the US and was recruited; and in the mean time at The Dharmniti Law Office as
-
Personal Computer Repair And Memory ManagementDutchess Community College Jan 1988 - Jan 1990Poughkeepsie, Ny, UsPersonal Computer Repairing and Memory Management for the personal computer OS. -
Computer Programming CertificationCity Of University Jan 1984 - Jan 1986COBOL, CICS/JCL/VSAM/VTAM/OS390/, BASIC. FORTRAN. C/C++ programming
-
Began My CareerThe Bangkok Bank Ltd., Headquarters Jan 1975 - Jan 1986COBOL: CICS, MVS/VMS/JCL/VTAM/VSAM/TSO: on IBM/370:390
Sophon Orapin Skills
Sophon Orapin Education Details
-
University Of Maryland Global CampusInformation Technology Management And Computer Security -
University Of Maryland University College, CollegeInformation Technology Management -
Kasetsart UniversityAgricultural Economics; Finance; Business Administration
Frequently Asked Questions about Sophon Orapin
What company does Sophon Orapin work for?
Sophon Orapin works for Cisc
What is Sophon Orapin's role at the current company?
Sophon Orapin's current role is ICAM Senior Software Developer at DSFederal Incorporation.
What is Sophon Orapin's email address?
Sophon Orapin's email address is so****@****zon.net
What is Sophon Orapin's direct phone number?
Sophon Orapin's direct phone number is +141027*****
What schools did Sophon Orapin attend?
Sophon Orapin attended University Of Maryland Global Campus, University Of Maryland University College, College, Kasetsart University.
What are some of Sophon Orapin's interests?
Sophon Orapin has interest in Exercise, Sweepstakes, Nascar, Home Improvement, Reading, Gourmet Cooking, Sports, Photograph, Cooking, Electronics.
What skills is Sophon Orapin known for?
Sophon Orapin has skills like Security, Unix, Information Technology, Servers, Solaris, Computer Security, Oracle, Microsoft Sql Server, Hardware, Information Security, Windows, Disaster Recovery.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial