Information security is an evolving battleground with critical flaws being found every day; your company’s approach to security should continuously evolve too. I can help you implement continuous security monitoring solutions that can be centrally managed by as few remote personnel as possible.
As an independent contractor, I am not obligated to oversell you the most expensive solutions. I can provide higher-quality, personally tailored security consulting, compliance auditing & remediation and general IT engineering for a fraction of what local firms charge by designing solutions customized to your specific needs using the same open-source technologies the big-name products leverage.
Whether you want to know if you are really PCI compliant or what your compliance requirements are, or if you need outside auditing of corporate security policies, I can provide in-depth and cost-effective services, even if you know nothing about IT and have little to no IT staff.
IT Growth Planning
Has your small business’ IT needs grown beyond your capabilities? I can provide assessments and design and recommend cost-effective upgrade plans and personally implement or oversee their implementation. I can help translate what you need and why and how it will save you money.
Systems & Network Engineering
Does your organization already have a complex IT operation? I can work with a variety of deployed systems, including Linux and Microsoft solutions for web, email, unified communications, virtualization, and security and monitoring solutions.
I can write scripts to automate many manual processes, including custom middleware to enable automation between disparate systems. My solutions include centralized and remote management and monitoring, allowing a minimal staff to managing a large, complex production IT system.
I retained Dan to architect and implement PGP key usage for secure signing and data encryption. Dan goes the extra mile for his customers and made sure I was in a position to independently manage the environment once he was done. His deep knowledge of encryption and implementation patterns was invaluable in setting up and managing a secure PGP key regime.
Two decades of front-line IT Experience
My wide range of IT experience over the last two decades and my on-going efforts to stay current in an ever-changing technology and information security world can be put to work for you to lower your IT risk and create secure, manageable solutions at the lowest costs.