Christopher McLelland
Details
Computers
University of Maryland Global Campus
1995 : 1998
2004 : Present
Pragmatic Consulting Inc. (Self-employed)
Sr. Information Security Manager / Engineer
Thorough understanding of security best business practices as outlined in ISO 17799 and various federal regulations outlined in GLB, HIPAA, Sarbanes-Oxly and DOD 5200.28 - Lead the design, development, and implementation of security controls for B2B Marketplaces, Exchanges and various other types of B2B environments - Work with architecture and implementation teams in support of security initiatives and conduct planning meetings with technical teams and external consultants to determine project and system security requirements - Conduct Risk and Vulnerability Assessments (Attack & Penetration) of all types of environments - Lead the evaluation of new security hardware and software technologies and lead pilot implementation projects - Develop detailed technical recommendations to solve security issues - Management of security consultants assigned to assist with the deployment of security solutions
2004 : 2006
Pragmatic Consulting Inc.
Sr. Information Security Manager / Engineer
Designed and developed the Information Security Framework - Defined corporate security policies and procedures - Defined and implemented a risk assessment program that defined, identified and classified critical information assets, assess threats and vulnerabilities regarding those assets and implement safeguard recommendations - Established and monitored formal certification programs regarding enterprise security standards relating to the planned acquisition and/or procurement of new applications or technologies - Assisted in the review of applications and/or technology environments during the development or acquisitions process to assure compliance with corporate security policies and strategy - Oversaw the development and implementation of a corporate security awareness-training program - Managed security functions related to corporate information systems and data centers including contract personnel
2001 : 2004
Threat & Risk Assessment Practice Leader
Cap Gemini Ernst & Young
Performed security analyses for classified and unclassified DoD networks throughout the United States and Europe, including Public Key Infrastructure (PKI), Defense Messaging System (DMS), High Performance Computing (HPC), Secret Internet Protocol Router network (SIPRnet), and Non-classified Internet Protocol Router network (NIPRnet) - Designed and executed network and physical security assessments against major corporations including Fortune 500, Fortune 100 and Fortune 50 companies - Technical consultant for an extremely high profile DoD forensics and intrusion analysis efforts - Developed, instructed and proctored courses targeted towards special agents within the Army (Military Intelligence), FBI, CIA, NSA and the DoD - Courses include Network Attack and Penetration, Computer Forensics, System Logfile Analysis, Sniffers, Online Evidence Preparation, Cyber Mapping, and Hacker Culture.
1997 : 2000
Computer Sciences Corporation
Senior Information Security Engineer
About
Christopher McLelland is an Information Security and Data Forensic Professional with over 15 years experience. Christopher began his professional career in the United States Air Force as a Signals Intelligence Analyst. Shortly after, he joined Computer Sciences Corporation (CSC) where he led studies in the reverse engineering of security products for the National Security Agency and penetration testing for various military and DOD installations around the world. While still at CSC he instructed special agents within the Army, Air Force, NSA and the Secret Service in computer forensics investigation techniques. Christopher then joined Cap Gemini Ernst & Young (CGE&Y) where he built and lead the North American Threat & Risk Assessment Practice. Christopher is currently managing the e-Discovery Practice of The LDM Group LLC where he provides litigation support by forensically collecting electronic data intended to be used in the court of law.
Specialties: Computer crime investigations, Litigation support, e-Discovery, Network security posture reviews; Network penetration studies; e-Business planning and pre-implementation risk assessments; Secure network architecture and design; Enterprise security risk management and intrusion detection; Remote access and authentication services