StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

A Position to Plan, Design, Develop, Implement, and Evaluate the Security of Corporations - Resume/CV Example

Cite this document
Summary
The author has traveled extensively while on assignments. He has been able to blend his military experiences with entrepreneurship activities, which places him at an upper level of experience as a Risk Management Consultant and as a Security Specialist…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.4% of users find it useful
A Position to Plan, Design, Develop, Implement, and Evaluate the Security of Corporations
Read Text Preview

Extract of sample "A Position to Plan, Design, Develop, Implement, and Evaluate the Security of Corporations"

CAREER HISTORY: 2008 Conducted training for an Executive Protection Team in China. Conducted Due Diligence and In Country Assessment for a multi-national Oil and Gas Company. Enhanced the security program in China, in various areas: Threat Assessment; Security Management Plan; Emergency Evaluation Plan; Operating Procedures; Kidnap and Ransom Plan, and Close Protection Team Training. 2007 Compiled Regional, Country, and site Crisis Management Plans and the Evaluation Plan for Thailand and Singapore.

Advised to create and implement a security program for an oil exploration project in Africa. Conducted TRVA and associated surveys for oil exploration operations in Africa. Advised on Risk Management in Indonesia. Conducted a Security Survey for an educational institute in Japan. 2006 Conducted a Security Survey for a microprocessor plant in the Philippines. Enhanced security in three Petrochemical Industrial Cities in Qatar. Conducted a TRVA and Security Concept of Operations for an Integrated Resort in Singapore.

2005-2004 Conducted a TRVA on industrial facilities in three cities in Qatar. Advised and ensured the safety of media teams whilst reporting in Iraq. Managed the security for a joint Australian/Philippines company based in the Philippines and was responsible for the safety of 800 employees and the property on site (an island that has insurgency problems). Developed security plans, threat assessment, risk analysis, and contingency, and crisis management plans during the construction and leading into the operating phase of mining precious metals.

Established a close liaison with law enforcing agencies, local government officials, and local communities. 2004.2003 Advised on the security for the American Broadcasting Corporation in Iraq. Advised, implemented risk control measure, and ensured the safety of media teams deployed in hostile areas. 2003.2002 Specialized in evacuation plans, security plans, travel security, individual security, and security audits for oil industry companies in the Middle East. Became a member of the Close Protection Team that was responsible for the safety of US Steel expatriate employees in Serbia. 2002.1980 Became part of the UK SPECIAL FORCES (22 SPECIAL AIR SERVICE REGIMENT).

Deployed on operations, training, and advisory assignments in the Middle East and Far Eastern regions. Held senior management posts in operations, training and development, logistics, policy, and doctrinal departments.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(A Position to Plan, Design, Develop, Implement, and Evaluate the Resume/CV - 4, n.d.)
A Position to Plan, Design, Develop, Implement, and Evaluate the Resume/CV - 4. Retrieved from https://studentshare.org/management/1551899-resume
(A Position to Plan, Design, Develop, Implement, and Evaluate the Resume/CV - 4)
A Position to Plan, Design, Develop, Implement, and Evaluate the Resume/CV - 4. https://studentshare.org/management/1551899-resume.
“A Position to Plan, Design, Develop, Implement, and Evaluate the Resume/CV - 4”, n.d. https://studentshare.org/management/1551899-resume.
  • Cited: 0 times

CHECK THESE SAMPLES OF A Position to Plan, Design, Develop, Implement, and Evaluate the Security of Corporations

Risk Management: Failures and Defects in Constructions

The design decisions and quality control procedures must be approved and conformed to.... The main objective of this research “Risk Management: Failures and Defects in Constructions” is to come up with accurate information that will help in constructing a sensible framework that will help in risk evaluation in the setting up of a mobile concrete construction project....
31 Pages (7750 words) Research Paper

Research of management systems

Even when corporations terminate or cut down development or growth programs, it is for a larger good.... The ISO 9000:2000 is used as the basis for drafting other standards; unfortunately there is a tendency among novice administrators to use a standard to design management systems.... It should be stressed here that these standards define elements to be included in the design of a system of management in order for it to be compatible with an assessment operation....
15 Pages (3750 words) Essay

The Business Analysis of an IS Implementation into Mathews Corporation

In this report I will present case study analysis of the Mathew's Corporation regarding the business analysis of an IS implementation.... I will talk about the implementation of an ERP Information System and then its impacts (both positive and negative) on the overall Mathew Corporation's business. ...
19 Pages (4750 words) Case Study

Emergency Preparation and Response in the World of Corporate Security

the security focus is to determine the appropriate actions to be taken during normal activities and steps to take in the event of unusual circumstances.... n order to gain an insight on the security issues and problems faced by corporate America, I have gone through websites of companies with security programs in effect.... The role of corporate security for emergency preparedness and management of… sk situations is determined through a study of existing norms, corporate security providing companies, security departments within companies, threat and risk assessment....
15 Pages (3750 words) Essay

Business Analysis of an IS Implementation Case Study: Mathews Corporation

I will talk about the implementation of an ERP Information System and then its impacts (both positive and negative) on the overall Mathew… First of all I will discuss the Matthews Inc.... Systems and business, basically Mathew Corporation was founded in 1923 and is a leader in high-performance labels, signs, and related industrial safety products. ...
12 Pages (3000 words) Essay

Cyber Security Industry

he startup business would analyze the potential clients system, test it for vulnerabilities of a hacker, and provide solutions to resolving those vulnerabilities, and improving the overall security of the information.... Cyber security industry is one of the emerging and evolving industries in the twenty first century as the business community and governmental agencies are commonly practicing the widespread usage of the internet.... y looking at the market trends of the growing businesses, it has come to notice that cyber security industry is one of the sectors that are growing at an unprecedented rate due to the technological advancement (Gallaher, Link & Rowe, pp....
14 Pages (3500 words) Research Paper

Business and IT Alignment

Also examined will be the specific IT needs that all corporations must implement to be effective, those needs being accessibility and risk management.... This paper “Business and IT Alignment” will begin with an analysis as to why business leaders are reluctant to implement the newest technology....
8 Pages (2000 words) Research Paper

Designing a Secure Network Infrastructure for E-Commerce

the security system does not only protect the company's data from reaching unwanted people/personnel, but it also prevents the data from being destroyed by un-trusted programs and viruses.... For this reason, it is important for a company to develop an information security system.... PrefaceOne of the aims and benefits of a masters program in information security management is the focal point on technology and issues of implementation that are related to information security....
28 Pages (7000 words) Thesis
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us