Bob D. work email
- Valid
Bob D. personal email
- Valid
Bob D. phone numbers
I am a distinguished senior-level Cybersecurity leader, Chief Information Security Officer (CISO), and AI Engineer with a published background in the intersection of advanced technology, security, and business strategy. My extensive expertise in Information Technology, Web Management, Cybersecurity Engineering, and Strategic IT Management has enabled me to lead secure and efficient business transformations. I specialize in overseeing and implementing cutting-edge cybersecurity frameworks and AI-driven security models that safeguard critical infrastructures.My ability to bridge technology and business objectives has consistently delivered high-value, productive solutions. Over the years, I’ve successfully led and mentored cross-functional cybersecurity teams across global and multi-facility environments, fostering collaboration to maximize security posture and operational productivity. My technical expertise spans Splunk, Phantom, OSINT, Symantec ICA, Symantec DLP, Risk Management, Governance, CyberArk (EPV, AIM, PAM), SQL, Oracle, Agile methodologies, and AI tools, enabling me to drive innovation in secure systems design and implementation.As an FBI Citizen’s Academy Alumni (2007), I’ve gained unparalleled insights into national security operations, intelligence community collaboration, counter-terrorism strategies, and emerging cybersecurity threats. This background reinforces my ability to proactively address evolving threats through both human intelligence and technological interventions, keeping organizations one step ahead.In addition to cybersecurity, I have hands-on experience in AI engineering, leveraging AI and machine learning algorithms to bolster automated threat detection and response, driving efficient and proactive defense mechanisms.I’ve consulted for top-tier organizations such as Tata Consultancy Services, Integrity, Accenture, KPMG, and Robert Half International, lending my cybersecurity expertise to various sectors. My robust communication, networking, and leadership skills further amplify my ability to align technology strategies with business goals.As a shareholder in Huntington National Bank, Apple, Tesla, and Wendy’s, my investments reflect a broad understanding of technology, finance, and consumer industries. Each holding demonstrates my belief in innovation, resilience, and the growth potential in diverse sectors.Let’s connect to explore future collaborations in the dynamic and evolving field of cybersecurity, AI, and IT management.
-
ShareholderNvidiaSalt Lake City, Ut, Us -
Remote - Artificial Intelligence, Cybersecurity, Robotics, & Biotechnology Engineer/Ciso - Ai Developer & Artist - Independent Financial ProfessionalMcdonald'SSalt Lake City Metropolitan Area -
ShareholderNvidia Dec 2024 - PresentSanta Clara, Ca, UsAs a proud shareholder in NVIDIA, I am aligned with a leading force in artificial intelligence, graphics, and high-performance computing. NVIDIA's cutting-edge advancements in AI, gaming, and data center technologies inspire my passion for innovation and the future of tech.With a vested interest in NVIDIA's groundbreaking work, I stay informed on developments in GPU technology, machine learning, and their transformative impact across industries. My involvement underscores my belief in the power of innovation to drive progress and create a more connected, intelligent world. -
ShareholderMcdonald'S Oct 2024 - PresentChicago, Illinois, UsAs a dedicated shareholder of McDonald's, I am passionate about the brand's commitment to quality, innovation, and customer experience. With a keen interest in the fast-food industry, I closely monitor McDonald's strategic initiatives and their impact on market trends. My investment reflects my belief in the company's strong growth potential and its ability to adapt to changing consumer preferences. I actively engage with fellow investors and industry professionals to discuss insights and opportunities within the sector, and I am excited to contribute to the ongoing success of this iconic global brand. -
Remote - Chief Information Security Officer (Ciso)Lycan Cybersecurity Jan 2010 - PresentAs a Chief Information Security Officer (CISO), I lead the development and execution of the organization’s cybersecurity strategy to protect our data and information assets. My role involves identifying security risks, designing mitigation strategies, and ensuring compliance with industry regulations and standards like NIST and ISO 27001. I manage incident response plans to quickly address and resolve cyber threats while fostering a security-conscious culture through training and awareness programs. I oversee the implementation of advanced security technologies, including Splunk, Phantom, Symantec DLP, CyberArk, and firewalls, to safeguard our systems. My key responsibilities include leading cross-functional security teams, communicating cybersecurity risks to the executive team, and aligning security initiatives with the organization's business objectives. I’m skilled in risk management, governance, cloud security, and leveraging AI-driven tools for proactive defense, ensuring that our security posture remains robust in a constantly evolving threat landscape. -
Remote - Lead Cybersecurity EngineerHexaware Technologies Mar 2023 - PresentNavi Mumbai, Maharashtra, InCybersecurity, Automation & AI Engineering - Security Strategy Development: Design, implement, and maintain comprehensive cybersecurity strategies and frameworks to safeguard organizational assets.Risk Management: Conduct risk assessments to identify potential vulnerabilities and develop mitigation strategies.Team Leadership: Lead, mentor, and train a team of cybersecurity professionals, ensuring they stay updated on the latest security trends and technologies.Incident Response: Lead the incident response team in identifying, mitigating, and reporting security breaches or attacks.Security Architecture: Oversee the design and implementation of secure network architectures, including firewalls, intrusion detection systems (IDS), and encryption protocols.Compliance & Auditing: Ensure compliance with security regulations and standards such as ISO 27001, NIST, GDPR, or HIPAA.Collaboration: Work with IT, DevOps, and other teams to embed security into the development lifecycle (DevSecOps).Policy Development: Create and enforce security policies, procedures, and standards across the organization.Security Awareness: Promote cybersecurity awareness and training programs across the organization. -
ShareholderApple Jan 2018 - PresentCupertino, California, UsBeing an Apple shareholder is not just an investment in a company; it's a connection to a global technology phenomenon. As a shareholder, I have a stake in one of the world's most innovative and influential tech giants. Apple's relentless pursuit of excellence in product design, user experience, and ecosystem integration is nothing short of remarkable. It's a source of pride to support a company that has revolutionized industries, from smartphones and tablets to wearables and services. As an Apple shareholder, I'm excited to witness and contribute to the company's ongoing growth and its commitment to pushing the boundaries of what technology can achieve while delivering value to both customers and investors. -
ShareholderTesla Jan 2019 - PresentAustin, Texas, UsBeing a Tesla shareholder is a thrilling journey into the future of transportation and sustainable energy. Tesla has reshaped the automotive industry with its electric vehicles, pushing the boundaries of innovation, and challenging the status quo. As a shareholder, I'm not only invested in a company but also in a mission to accelerate the world's transition to clean energy. Tesla's commitment to environmental sustainability, renewable energy, and cutting-edge technology aligns with my values. It's inspiring to witness the company's continual breakthroughs in electric vehicle technology, solar energy, and energy storage. As a Tesla shareholder, I'm excited to be a part of this revolutionary company, contributing to a more sustainable and electrified future for generations to come. -
ShareholderThe Wendy'S Company Jan 2019 - PresentDublin, Ohio, UsBeing a Wendy's shareholder is an opportunity to be part of an iconic fast-food brand with a rich history and a bright future. Wendy's has carved out its place in the industry through its commitment to quality, freshness, and innovation. As a shareholder, I appreciate the company's dedication to serving fresh, never-frozen beef and a menu that continually evolves to meet changing consumer preferences. Wendy's strong brand presence and strategic initiatives make it an exciting investment choice. Whether it's the introduction of new menu items or the expansion of its global footprint, being a Wendy's shareholder means being connected to a company that values both its customers and its investors. I look forward to witnessing Wendy's growth and continued success in the competitive fast-food industry. -
Remote - Chief Information Officer (Cio) & Chief Information Security Officer (Ciso)Billboardbug 2012 - PresentBillboard Bug - billboardsbug.com - Phone App - Billboard Bug revolutionizes digital advertising with an easy-to-use phone app that simplifies the creation and management of dynamic billboard ads. Powered by cutting-edge AI-assisted augmented reality, our platform allows businesses to seamlessly design, deploy, and optimize digital billboards in real-time, bringing your brand to life in new and exciting ways. Whether you're looking to increase engagement, capture attention, or showcase interactive content, Billboard Bug makes it effortless to turn ordinary billboards into a high-tech marketing tool. Step into the future of advertising with AI-assisted augmented reality and make your message stand out. -
Remote - Lead Cybersecurity EngineerFreddie Mac Mar 2023 - Sep 2024Mclean, Va, UsCybersecurity, Automation and AI Engineering - As a Lead Cybersecurity Engineer, VP specializing in CyberArk Access Governance, my role is centered on safeguarding critical digital assets and ensuring robust access control measures within organizations. I specialize in leveraging the power of CyberArk to establish stringent access policies and monitor privileged accounts effectively. My expertise extends to utilizing heavy SQL coding and advanced queries, as well as harnessing the capabilities of Python and other programming languages to enhance security protocols and automate essential tasks. By combining my technical skills with a deep understanding of access governance principles, I work tirelessly to fortify an organization's defenses against cyber threats, ultimately contributing to its resilience in an increasingly complex digital landscape. -
Remote Cybersecurity Engineer - Data Protection - Internal Threat - CybersecurityHuntington National Bank Oct 2019 - Mar 2023Columbus, Ohio, UsSpecializing in Data Protection within the realm of Cybersecurity, I bring a unique blend of technical expertise and analytical acumen to our organization's security efforts. My role revolves around developing and implementing data protection solutions that bolster our cybersecurity posture. Whether it's creating intricate encryption algorithms, fortifying access controls, or conducting in-depth data analysis, I am dedicated to ensuring the safety and integrity of our digital assets. In this dynamic field where the threat landscape is ever-evolving, I stay vigilant, identifying vulnerabilities and devising proactive strategies to defend against cyberattacks. My work is a critical component of our organization's commitment to data security and cyber resilience. -
Business Systems Analyst, Sr. - Iam - Cyber SecurityHuntington National Bank Apr 2019 - Oct 2019Columbus, Ohio, UsAs a Senior Business Systems Analyst specializing in Identity and Access Management (IAM) within the realm of Cyber Security, I play a pivotal role in fortifying our organization's digital defenses. My responsibilities encompass a multifaceted approach to cybersecurity, where I meticulously analyze and optimize our IAM systems. I ensure that only authorized individuals have access to our critical resources, mitigating the risk of unauthorized breaches. My work bridges the gap between business needs and advanced technological solutions, all while adhering to the highest security standards. In this dynamic role, I contribute significantly to our mission of safeguarding sensitive information and maintaining the integrity of our cybersecurity infrastructure, ensuring that our organization operates securely in an increasingly interconnected digital world. -
Sr. Business Systems Analyst, Vp - Iam - Cyber SecurityJpmorgan Chase & Co. Jan 2009 - Apr 2019New York, Ny, UsAs a Senior Business Systems Analyst and Vice President specializing in Identity and Access Management (IAM) within JP Morgan Chase's Cyber Security division, I hold a pivotal role in ensuring the bank's digital assets are secure and accessible only to authorized individuals. My responsibilities encompass crafting and implementing sophisticated IAM strategies, collaborating with cross-functional teams, and driving innovation in cybersecurity solutions. In this dynamic role, I navigate the ever-evolving landscape of cyber threats and regulatory requirements to fortify the bank's defenses and uphold its commitment to safeguarding sensitive information. With a blend of technical expertise, strategic thinking, and leadership, I play a vital part in JP Morgan Chase's mission to provide clients with the highest level of security and trust in the digital age. -
Sr. Business Systems Analyst/Vp - Collections - Risk - Cyber SecurityBb&T Jan 2007 - Jan 2009Charlotte, Nc, UsAs a Senior Business Systems Analyst and Vice President specializing in Collections, Risk, and Cyber Security, I assume a multifaceted role crucial to the success and security of our organization. My responsibilities span across multiple domains, from analyzing and optimizing collections processes to mitigating risks associated with financial operations, and fortifying our cybersecurity measures. This multifunctional perspective enables me to bring a holistic approach to managing challenges and opportunities within our organization. I actively contribute to strategic decision-making, bridging the gap between business needs and technological solutions, while also ensuring that our operations adhere to the highest security standards. In this dynamic role, I'm dedicated to maintaining the integrity of our collections, minimizing risks, and safeguarding our digital assets in an ever-evolving landscape of threats and opportunities. -
Senior Analyst - RiskUtah Government Jan 2004 - Jan 2007
-
Sr. Network Analyst - CcnaCisco Jan 2000 - Jan 2004San Jose, Ca, Us -
Chief Information Security Officer (Ciso)Cyberamerica Corp. Jan 1993 - Jan 2000
-
Actor ModelModels International Jan 1992 - Jan 1995New York, Ny, UsWorking as an Actor and Model for Magazines, Movies, TV Shows, and Commercials. -
Professional ActorLaurel Entertainment Llc Jan 1992 - May 1994Working as an Actor (Extra) in the role of a US Soldier in the post-apocalypse world of the Stephen King Movie Mini-Series “The Stand” that was released in 1994. -
Web DeveloperConfidential Jan 1992 - Jan 1993
Bob D. Skills
Bob D. Education Details
-
University Of PhoenixInformation Technology -
Vipss - Office Of Homeland Security & Justice ProgramsCounter-Terror And Light Search & Rescue. -
Fbi Citizen'S AcademyLaw Enforcement -
Bb&T UniversityFinance & Collections
Frequently Asked Questions about Bob D.
What company does Bob D. work for?
Bob D. works for Nvidia
What is Bob D.'s role at the current company?
Bob D.'s current role is Shareholder.
What is Bob D.'s email address?
Bob D.'s email address is da****@****ail.com
What is Bob D.'s direct phone number?
Bob D.'s direct phone number is +121246*****
What schools did Bob D. attend?
Bob D. attended University Of Phoenix, Vipss - Office Of Homeland Security & Justice Programs, Fbi Citizen's Academy, Bb&t University.
What are some of Bob D.'s interests?
Bob D. has interest in Writing, Vin Diesel Movies, Technology, Reading, History, Education, Environment, Science And Technology, Human Rights, Analytical Thinking.
What skills is Bob D. known for?
Bob D. has skills like Systems Analysis, Rate Negotiation, Travel Management, Sql Server, Powerpoint, Banking, Social Media, Cultural Analysis, Customer Relations, Planning, E Commerce, C.
Who are Bob D.'s colleagues?
Bob D.'s colleagues are Fae Ghodrat, Masaki Iwatani, Sreedhar Chikoti, ✨️anat Rozen, Daniel W., William Wang, Thong Pham.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial