Wilson Bautista Jr. Mba, Msism, Cissp, Pmp, Cmmc Lead Cca Email and Phone Number
Wilson Bautista Jr. Mba, Msism, Cissp, Pmp, Cmmc Lead Cca work email
- Valid
- Valid
Wilson Bautista Jr. Mba, Msism, Cissp, Pmp, Cmmc Lead Cca personal email
- Valid
Wilson Bautista Jr. Mba, Msism, Cissp, Pmp, Cmmc Lead Cca phone numbers
• Defense Industrial Base Cybersecurity expert in DFARS , ITAR, CUI, CDI, and other regulatory compliance requirements for federal contractors and their facilities. • Cybersecurity Architect: experienced in planning, developing, and establishing components for IT operations, IT security operations, IT governance, and risk management for organizations. • Multi-disciplined Certified Information Systems Security Professional (CISSP) with experience in IT Project Management (PMP, CSM, CSPO), cyber security ,vulnerability assessments, vulnerability scanning (Qualys, eEye Retina) , risk analysis (CRISC) and IT Governance (CGEIT) in government and corporate environments that improved the security posture of the organizations in the sustainment of the enterprise level data networks and effectively reduced the probability of security incidents.• Certified Project Management Professional with diverse and extensive program/project management experience that provided oversight to the consistent availability of government computer networks. • Certified Scrum Master(CSM) and Certified Scrum Product Owner(CSPO): Established a framework for success in using Agile concepts to increase efficiency and effectiveness for both projects and operations.• Customer Service: Enthusiastic individual who consistently met or exceeded stakeholder expectations through delivering quality products and services. Capable of building and maintaining relationships with customers with diverse needs at all levels . • Oral Communication: Excellent communicator with the ability to translate complex logical concepts into manageable information for briefings to technical and non-technical audiences. An active listener who clarifies information before it is disseminated. Provides clear and concise verbal direction to subordinates through thorough planning and organized execution.
-
Founder, CeoJün Cyber Feb 2019 - PresentSaint Petersburg, Fl, UsProviding leadership to the next level of Managed Services in IT, Cybersecurity, and Business Analytics. -
Executive DirectorCyber Ohana Project Feb 2019 - PresentSaint Petersburg, Florida, UsCyber Ohana Project is a fiscally sponsored project of Social Good Fund, a Florida nonprofit corporation and registered 501(c)(3) organization, Tax ID (EIN) 87-3073621. Cyber Ohana Project, is providing full-service career transition including: technical training, certification, mentorship, career preparation, and placement service. Our Ohana, or community, focuses on like-minded professionals especially those leaving the military and their spouses. -
Podcast HostDev.Sec.Lead Jun 2019 - PresentThis podcast is dedicated to up and coming leaders in the cybersecurity industry. It is meant to help bridge the gap between being a technical leader to a business leader. We will talk about what it takes to be a leader and other issues that impact our industry today.www.devseclead.comOn Stitcher, Spotify, iTunes,and Google. Soon on Alexa, and other popular podcasting mediums.
-
Professional SpeakerThe Bautista Group, Llc Feb 2019 - Sep 2022MISTI and Cyber Risk Alliance- InfoSec World 2019CyberRisk Alliance- Security Analytics and Operations eSummit 2020- Keynote SpeakerCyberRisk Alliance- InfoSec World 2020Texas Information Security Forum 2020Living Security- Breaking Security Awareness 20202020 Federation of Incident Response Team- Cyber Intelligence ConferenceInformation Security Mexico 2020- Keynote SpeakerInformation Security Mexico 2021- Keynote Speaker
-
Freelance WriterMedium Aug 2019 - Apr 2022San Francisco, California, UsI write about my experiences in cybersecurity, mental health, and the military.Follow me on Medium:https://medium.com/@wilson_9048 -
Advisory Board Member- Cybersecurity For Executives ProgramUniversity Of South Florida Muma College Of Business Dec 2019 - Dec 2021Tampa, Fl, UsNo other professional development experience delivers like the USF Cybersecurity for Executives Certificate Program. You’re broken away from the daily routine and immersed in real-life challenges, expert thought leadership, strategy sessions, innovation frameworks, and customer experience cultures.The USF Cybersecurity for Executives Certificate Program is designed to provide a cybersecurity ‘survival guide’ for non-technical senior executives in the private, public and non-profit sectors. Our program prepares you for a cyber attack, arms you with the tools to overcome it, and sets you up with strategies to prevent future attacks. -
Director Of Information Technology And Information Security At I3 MicrosystemsI3 Electronics, Inc Jun 2017 - Sep 2019● Developed the Information Technology and Information Security program for the company from the ground up using NIST 800-171 and ISO 27001 as baseline frameworks● Established IT infrastructure using a combination of on-premise/cloud solutions that emphasized on information security, reduction of administrative overhead, and reduction of costs● Developed multi-year budgets for operations and IT projects to support $100M+ businesses● Provided consultation to senior management cybersecurity requirements and interpretations of federal policy● Provide executive level reporting on IT operations, cyber security, and IT projects● Supervised and implemented NIST 800-53, NIST 800-171, Risk Management Framework compliance for applicable information systems.● M&A: Coordinating and supporting integration planning, tracking and processes for new acquisitions● M&A: Developing and maintaining relationships with potential targets from initial stage to deal closing● Implemented an automated process to manage change management for all security related infrastructure and architecture changes.● Provided security baseline for all operating systems on environment● Established threat intelligence integration with Suricata● Develop, implement, and monitor the organizational mobile device management (MDM) program policies with Microsoft InTune and MDM for Office 365● Lead the implementation and maintain Defense Federal Acquisition Regulation Supplement (DFARS) and International Traffic in Arms Regulations (ITAR) requirements● Provided strategic and tactical planning, development, evaluation, and coordination of the information and technology systems for the organization.● Facilitated communication between staff, management, vendors, and other technology resources within the organization.
-
Book Author- Practical Cyber IntelligencePackt Nov 2017 - Apr 2018Cyber intelligence is the missing link between your cyber defense operation teams, threat intelligence, and IT operations to provide your organization with a full spectrum of defensive capabilities. This book kicks off with the need for cyber intelligence and why it is required in terms of a defensive framework.Moving forward, the book provides a practical explanation of the F3EAD protocol with the help of examples. Furthermore, we learn how to go about threat models and intelligence products/frameworks and apply them to real-life scenarios. By the end of this book, you will be able to boot up an intelligence program in your organization based on the operation and tactical/strategic spheres of Cyber defense intelligence.Find it here: https://amzn.to/2RNfirm
-
Cyber Network Defense Team/ Captain, North Carolina National Guard, Us ArmyNorth Carolina National Guard- J6/G6 Joint Operations Center May 2015 - Feb 2018•Implemented and enforced Cyber Network Defense policies and procedures reflecting applicable laws, policies, procedures, and NIST regulations•Managed the publishing of Cyber Network Defense guidance for the enclave constituency•Provided incident reports, summaries, and other situational awareness information to higher headquarters•Managed incidents (e.g., coordinate documentation, work efforts, resource utilization within the organization) from inception to final remediation and after action reporting.•Managed threat or target analysis of Cyber Network Defense information and production of threat or target information within the network or enclave environment.•Managed the monitoring of external Cyber Network Defense data sources to maintain enclave situational awareness•Interfaced with external organizations (e.g., public affairs, law enforcement, Command or Component Inspector General) to ensure appropriate and accurate dissemination of incident and other Cyber Network Defense information.•Lead risk analysis and management activities (NIST SP 800-37) for the network or enclave environment.Tracked compliance audit findings, incident after-action reports, and recommendations to ensure appropriate mitigation actions are taken.•Maintained knowledge of applicable Cyber Network Defense policies, regulations, and compliance documents specifically related to Cyber Network Defense auditing.•Performed Cyber Network Defense vulnerability and risk assessments within the enclave.•Conducted authorized penetration testing of enclave network assets.•Analyzed site/enclave Cyber Network Defense policies and configurations and evaluate compliance with regulations and enclave directives•Prepared audit reports that identify technical and procedural findings and provide recommended remediation strategies/solutions. -
Global Head Of Vulnerability Management ServicesAbb Inc. Oct 2014 - Jun 2017Zurich, Zh, Ch• Responsible for accounting all activities that support the operating budget.•Owned, delivered, and provided the vision of the global vulnerability management services to support daily operations of 150,000 employees worldwide•Supervised the Threat and Vulnerability portfolio activities for over 11,000 servers across 92 countries•Effectively executed Agile methodologies for projects and operations in order to prioritize tasks in accordance with the needs of the organization•Maintained global compliance with SOX and other relevant audit/compliance requirements through the implementation of policies, standards, process improvements, etc.•Developed progressive training plans for teams in order to improve skill sets and increase capability•Lead the evaluating and ongoing management of vulnerability through people, processes, and tools•Enhanced and integrated security solutions to automate the detection of vulnerabilities, misconfiguration, and threats to provide to the remediation team.•Owned and developed the transformation objectives in respect to Information Security service delivery for the enterprise.•Managed relationships with security, technology and business stakeholders to identify and communicate security risks and mitigation approaches.•Managed and supported the internal, external and cross-functional program resources to complete goals and initiatives.•Developed, maintained, and enforced security hardening standards to meet the current threat landscape•Developed and maintained all technology security configuration baselines for global implementation•Managed, supervised and trained remote teams to ensure that the systems and applications operated within are appropriately configured for security purposes. -
It Operations Officer/ Captain, Usmc-ReserveMarine Forces Reserve-Deployment Processing Center/ Reserve Support Unit East Dec 2013 - May 2015• Supervised IT personnel in the operation and maintenance of over $500,000 business IT assets• Supervised the revision of procedures in the management of SharePoint which improved the business site administration efforts • Coordinated the information management efforts throughout the business• Advised senior management and staff on information technology and information management matters• Coordinated with Marine Corps Enterprise Information Technology Section with management and networking issues affecting unit SharePoint portal• Coordinated with the Marine Corps Installations East on the local area network/wide are network management and networking issues• Lead the development of the public facing website to improve information dissemination to current Marine and personnel preparing for forward deployment to combat zones• Provided and coordinated training to professionally development subordinates to meet and exceed tasks• Provided oral and written presentation for briefings to leadership and technical staff
-
Information Security ConsultantSms Data Products Group, Inc. Oct 2013 - Sep 2014Mclean, Va, Us• Drafted and submitted enterprise level information systems security policy to support network and operating systems information security initiatives• Provided accurate web risk assessments using OWASP-ZAP and W3AF in order to provide detailed written reports to the Headquarters Marine Corps (HQMC) Senior Information Assurance Officer and staff• Provided capability to HQMC Cybersecurity Division and Marine Corps Installations East (MCIEast) cybersecurity by conducting pen tests and exploitation checks with Metasploit on assets within the DMZ and MCIEast public facing web applications • Supervised the mitigation of vulnerability findings and provided technical reports to senior management• Identified weaknesses, vulnerabilities, and provided recommendations on best solution practices, security, and recommended courses of action in the improvement of local security programs and policies• Performed and provided accurate vulnerability assessment using eEye Retina vulnerability scanner data for Headquarters Marine Corps cyber security leadership for tenant commands under Marine Corps Installations East • Researched and analyzed known hacker methodology, system exploits and vulnerabilities to support assessment activities• Performed audits and prepared local commands for the DISA Command Cyber Readiness Inspections (CCRIs) • Performed traditional/physical penetration testing in support of risk assessments and provided results to local commands and executive management• Documented results of security requirements analysis, evaluations, alternatives analyses, risk assessments, and other security-related activities performed in support of the client.• Provided oral and written presentation for briefings to leadership and technical staff• Provided training to government personnel on the Security Technical Implementation Guide (STIG) standards and the STIG Compliance• Drafted STIG Viewer/STIG Compliance Checker presentation for the White Team Methodology Course -
Mid Manager Information Technology Operations, 1St LieutenantUnited States Marine Corps Jan 2010 - Dec 2013Washington, Dc, Us• Supervised Information Security personnel, received incident reports/briefs, identified vulnerabilities, and controlled all software updates affecting the network during a major military exercise supporting over 500 military personnel. • Developed quarterly training plans, policies, and procedures in order to improve the professional development of personnel and account for annual training requirements.• Supervised the coordination, implementation, and operation of transmissions systems and encryption equipment within the network architecture. • Managed real-time enterprise level communications network statuses using Solarwinds and coordinate Approved System Interruptions, Network Change requests, and Operational Directives. • Developed reporting procedures, timelines and official guidance to ensure all subordinate units have met the intent of the Information Technology Operations Officer and Chief Information Technology Officer.•Supervised technical support personnel to maintain the Wide Area Network (WAN)/Local Area Network (LAN) architecture• Managed real-time enterprise level communications network statuses using Solarwinds and coordinate Approved System Interruptions, Network Change requests, and Operational Directives. •Established guidelines and performance expectations for 114 Marines which were clearly communicated through formal employee performance critiques. •Provided advice and counsel to a diverse staff related to work and administrative matters. •Planned and developed long-range objectives and milestones to provide personnel to support the deployed communications architecture. •Identified customer requirements, developed technical approaches, and coordinated project resources related to project costs and schedules.•Managed and maintained over $1.5 million dollars of communications equipment.•Planned and directed the retrograde of over $3.5 million dollars of communication equipment. -
Program Manager1St Marine Corps District Aug 2008 - Jan 2010Washington, Dc, Us• Ensured Musician Enlistment Option Program (MEOP) quality in accordance with approved technical standards for MEOP initial accessions.• Provided technical support through training and assistance at the Recruiting Station and Recruiting Substation level.• Served as the liaison between HQ 1st Marine Corps District (1MCD) and supporting units while coordinating Marine Corps Band support in the 1MCD high schools and Community Relations events.• Provided technical support assistance and support to Public Affairs Officer and Recruiting Advertising Officer.• Processed, tracked and reported all MEOP contracting and shipping results.• Coordinated and attended Marine Corps participation in 1MCD AO music conferences.• Developed and managed annual budget of over $185k -
ManagerUnited States Marine Corps Jan 2001 - May 2008Washington, Dc, Us• Served as unit Information Security Section Coordinator• Served as unit Information Technology Section Coordinator• Provided Tier 1 troubleshooting support of unit Windows workstations• Properly configured and coordinated connection of Windows workstations to enterprise network • Provided mentorship and leadership and managed to accountability and welfare of 40 Marines. • Prepared peers and junior Marines for positions of increased responsibility. • Responsible for in excess of 50 transportation arrangements for unit commitments. • Directed the military training for the unit to include; physical fitness training/testing, professional military education, and unit sustainment training. • Supervised the training of over 140 Marines
Wilson Bautista Jr. Mba, Msism, Cissp, Pmp, Cmmc Lead Cca Skills
Wilson Bautista Jr. Mba, Msism, Cissp, Pmp, Cmmc Lead Cca Education Details
-
University Of South Florida St. PetersburgMaster Of Business Administration - Mba -
Boston UniversityComputer And Information Systems Security -
Villanova UniversityProject Management -
Thomas Edison State UniversityMusic -
Saint Thomas Aquinas High SchoolHigh School/Secondary Diplomas And Certificates
Frequently Asked Questions about Wilson Bautista Jr. Mba, Msism, Cissp, Pmp, Cmmc Lead Cca
What company does Wilson Bautista Jr. Mba, Msism, Cissp, Pmp, Cmmc Lead Cca work for?
Wilson Bautista Jr. Mba, Msism, Cissp, Pmp, Cmmc Lead Cca works for Jün Cyber
What is Wilson Bautista Jr. Mba, Msism, Cissp, Pmp, Cmmc Lead Cca's role at the current company?
Wilson Bautista Jr. Mba, Msism, Cissp, Pmp, Cmmc Lead Cca's current role is CEO of Jun Cyber and Executive Director of Cyber Ohana Project.
What is Wilson Bautista Jr. Mba, Msism, Cissp, Pmp, Cmmc Lead Cca's email address?
Wilson Bautista Jr. Mba, Msism, Cissp, Pmp, Cmmc Lead Cca's email address is re****@****rcn.com
What is Wilson Bautista Jr. Mba, Msism, Cissp, Pmp, Cmmc Lead Cca's direct phone number?
Wilson Bautista Jr. Mba, Msism, Cissp, Pmp, Cmmc Lead Cca's direct phone number is +195426*****
What schools did Wilson Bautista Jr. Mba, Msism, Cissp, Pmp, Cmmc Lead Cca attend?
Wilson Bautista Jr. Mba, Msism, Cissp, Pmp, Cmmc Lead Cca attended University Of South Florida St. Petersburg, Boston University, Villanova University, Thomas Edison State University, Saint Thomas Aquinas High School.
What skills is Wilson Bautista Jr. Mba, Msism, Cissp, Pmp, Cmmc Lead Cca known for?
Wilson Bautista Jr. Mba, Msism, Cissp, Pmp, Cmmc Lead Cca has skills like Leadership, It Strategy, Firewalls, Information Technology, Information Security, Cissp, Cybersecurity, Operational Planning, Operating Systems, Computer Network Operations, Vendor Contracts, Troubleshooting.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial