Dr. Christopher L. Email and Phone Number
Dr. Christopher L. work email
- Valid
- Valid
- Valid
Dr. Christopher L. personal email
Dr. Christopher L. phone numbers
I provide strategic vision, leadership, and oversight for all aspects of the company's operations. I drive growth, set goals, and ensure alignment with our mission of delivering innovative and effective cybersecurity solutions to our clients. I have over 6 years of experience in the technology industry, leading and directing major training projects involving cutting-edge technologies, multiple teams, and budgets exceeding $2 million.I was also a content creator and instructor at INE, where I share my industry expertise in cyber defense and threat hunting with career-focused cybersecurity professionals. I create relevant and engaging courses, evaluate the market demand for training, and participate in community content endeavors. I have a passion for learning and teaching, and I hold two doctoral degrees in cybersecurity and information assurance, and dark web and digital forensics, as well as multiple certifications from across the industry. I am a confident and collaborative leader, a creative and results-driven trainer, and a lifelong learner and educator.
Quardian Cyber
View- Website:
- QuardianCyber.com
- Employees:
- 1
-
Chief Information Security OfficerQuardian CyberCoos Bay, Or, Us -
OwnerQuardian Cyber Jun 2018 - PresentAs CEO, I provide strategic vision, leadership, and oversee all aspects of the company's operations. I drive growth, set goals, and ensure alignment with our mission. Building strong relationships with stakeholders and fostering a collaborative work culture are key priorities. I make critical decisions, allocate resources, and manage risks. I work closely with the executive team, inspire our employees, and drive execution of our business plans. Representing our brand, I engage with the industry, drive thought leadership, and deliver value to clients. My focus is on driving success, fostering innovation, and positioning our company as a leader in the industry. -
Cyber Defense And Threat Hunting Instructor - Part TimeIne Jan 2021 - Dec 2021Cary, North Carolina, UsAs a content creator for INE's cybersecurity courses, evaluate the current market appetite for training, adapt rapidly to create relevant content, and participate in community content endeavors to ensure maximum visibility.Through industry expertise in cyber defensive capabilities such as incident response, threat hunting, threat intelligence, and security engineering concepts to be able to identify key concepts that need to be taught to career-focused cybersecurity professionals and created a roadmap for how to achieve those goals.Participate in relevant industry-wide activities such as conferences, workshops, user groups, and other networking events to ensure consistent knowledge with cybersecurity trendsPartner with peer organizations such as sales, marketing, client success, and other teams to contribute to the success of the organization's ability to gain market share in cybersecurity verticalsWork closely with full-time INE content team members to incorporate courses into the INE platform -
Cloud/Network Security Engineer & Information Security EngineerCvs Health Aug 2020 - Jan 2021Woonsocket, Ri, UsMaintain and improve upon, as necessary, the existing Threat and Vulnerability Management for Multi-Cloud in AWS/Azure/GCP, including maintenance of systems and licensing, procedures, reporting, and client communications.• Server, Networking, and Security Administration: Proficient in setting up, troubleshooting, and managing policies for servers, networking, and security in both on-premises and cloud environments.• Public Cloud Expertise: Certified and experienced in utilizing multiple public cloud platforms, including GPC, Azure, and AWS.• Engineering Documentation: Skilled in creating engineering level diagrams, instructions, and guides to document system configurations and processes.• Enterprise Environment Experience: Worked in a large, complex enterprise environment, gaining valuable experience and understanding of the unique challenges and dynamics of such organizations.• ServiceNow Utilization: Experienced in using ServiceNow for documentation and ticket management.• Effective Prioritization and Multi-tasking: Demonstrated ability to handle and prioritize multiple requests concurrently, ensuring timely and efficient completion.• Technical Writing Proficiency: Capable of producing well-written technical documents, with an understanding of effective communication and documentation practices.• Familiarity with Emerging Technologies: Acquainted with emerging technologies such as IoT, Blockchain, AI, and mobile development, demonstrating a curiosity for staying updated with industry advancements. -
Cyber Security Instructor - Part TimeNexgent May 2020 - Nov 2020Phoenix, Arizona, UsLive instruction on CompTIA Security+, Cyber Rage SkillsPerform all instructional duties to facilitate student learning in assigned classes.Provide a syllabus to students, and follow syllabi content and requirements.Use classroom technology (PowerPoint) as appropriate.Submit requested information within established timelines.Consult with students and address their concerns.Meet all scheduled classes of contracted courses.Conduct all work activities with an appreciation and respect for diversity of population, views, and learning styles. -
Sr. Vulnerability Management And Aws EngineerGilead Sciences Jun 2019 - Aug 2020Foster City, Ca, Us•Recommend AWS technology for the POC projects•Develop a prototype, explain the pros/cons of using different technologies•Take lead in selecting and deploying AWS tools to bring business value•Architect the technology landscape for at least 3 years vision•Audits current AWS implementation and suggest ways to improve control, automation and security for the landscape•Support system managers analyzing software patches sent by IT Security•As needed, work with system managers to create a workable plan to implement software patches in a particular sequence•Work as a liaison with IT Security and IT Infrastructure Services Teams to file exception, perform scanning of systems and deploy patches•Prepare ad-hoc reports to support system managers and Laboratory Technology Operations Management to provide visibility•Keep the patch management visibility dashboard updated•Research about software patches and occasionally work with system vendors to see the feasibility of installing a software patch -
Threat Vulnerability And Patch EngineerGilead Sciences Sep 2018 - Jun 2019Foster City, Ca, Us• Maintain and improve upon, as necessary, the existing Threat and Vulnerability Management program, including maintenance of systems and licensing, procedures, reporting, and client communications.• Provide guidance to clients and system managers in support of Threat and Vulnerability Management services, which includes, but not limited to, establishing goals of vulnerability management and road maps to achieve those goals.• Conduct scheduled and ad-hoc vulnerability scans for clients and the GMP protect environments for FDA and TGA regulations.• Analysis and validation of scan results communicated to clients through reporting and results-review meetings. Responsible for researching and analyzing vulnerabilities, identifying relevant threats, corrective action recommendations, summarizing and reporting results.• Provided clients with remediation recommendations and guidance, up to and including remediation tracking and reporting. Including working directly with IT resources responsible for remediation on behalf of client Security teams and System Managers.• Coordinate with clients in defining reports that provide the most value based on security maturity and established Threat and Vulnerability Management goals. This required the ability to be adaptive in report parameters and formats depending on client needs and target audience.• Manage the Nexpose scan process for a subset of clients with our 3rd party scan provider. Work with the professional services and technical teams to ensure the on-schedule turn-up of the customized Threat and Vulnerability Management program for new clients.• Produce metrics and reporting on the state of system security, threat, vulnerability and patch management. Develop approaches for addressing vulnerabilities include system patching, deployment of specialized controls, code or infrastructure changes, and changes in development processes. -
It Manager : Network, Systems, SecurityKern Medical Aug 2016 - Mar 2018Bakersfield, Ca, UsAn experienced IT Manager who maintained and expanded multiple computer networks. Able to manage WAN, LAN, SAN and VDI computer platforms while looking for ways to grow a network with cost-effectiveness to meet future needs. Responsible for developing network & system maintenance and growth plans, creating annual and project budgets, managing the IT staff.Detailed in keeping executive teams and project stakeholders up to date on the latest networking & system technologies that could help the company to succeed.• Develop innovative network and system troubleshooting methods that reduce downtime and lower repair costs.• Work closely with departmental managers to determine the maintenance and growth needs of the healthcare systems. • Monitor changing network and system technology and deliver a technology update to the executive team each quarter. • Responsible for creating and administering disaster plans that will keep the company functional in the event of a crisis• Determine the rationale and methods for upgrading the business network and system hardware and software programs each time an update is released.Full migration from legacy systems to an all-new Network Operation Center, with rip and replace of the following:• Dell R710 PowerEdge Systems with Cisco UCS 5108 Blade system• Migration from local hard drive storage to full Flash array via Nimble solutions• Rip and replace legacy network equipment for complete Cisco unified communication systems• Migration of Full email on-premise solution to Office 365 for HealthcareBuild process for full HIPAA and PCI DSS compliance methods, to address new regulations. Adhere to best practices for infrastructure hardening, safety, and E-PHI compliance -
Senior Information Technology AdministratorH5 Mar 2016 - Jul 2017San Francisco, Ca, UsResponsible for performing Network, Storage and Server administration tasks, and assisting the IT team with issues related to data privacy and data security. As a member of the IT team, I have learned of state of the art technologies, and worked with a wide range of technologies. As such, I am a very well rounded IT professional, who is a self-starter; detail oriented; and highly motivated to excel in a fast paced environment- Configure and administer firewalls, routers, strong ACL’s, VLan’s, domains.- Configure and administer storage for H5 projects and engagements on H5’s enterprise (EMC) storage.- Configure and administer servers, including virtual servers.- Assist with desktop and application support- Assist with data security and data privacy administration.- Manage vendors and assets (including hardware and software assets)- Assist in the development and automation H5’s private cloud using SC Orchestrator, SCVMM, PowerShell and MS Hyper-V. -
Network AdministratorDiamond Student Information System Dec 2013 - Dec 2015•Established compatibility with third party software products by developing program for modification and integration.•Developed and implemented complex Internet and Intranet applications on multiple platforms.•Coordinated with systems partners to finalize designs and confirm requirements.•Provided continued maintenance and development of bug fixes and patch sets for existing web applications.•Ensured network, system and data availability and integrity through preventative maintenance and upgrades.•Provided documentation on start-up, shut down and first level troubleshooting of processes to help desk staff.•Designed and implemented new server standards for core business services.•Utilized a pipe and filter model to find bottlenecks and enable measurement of system resource usage and process behavior at boundary limits of all operations.•Developed data architecture design to enable analysts to perform targeted customer analysis.•Recommended architectural improvements, design solutions and integration solutions.•Provided methodologies for object-oriented software development and efficient database design.•Proposed technical feasibility solutions for new functional designs and suggested options for performance improvement of technical objects.•Managed firewall, network monitoring and server monitoring both on- and off-site.•Independently designed and executed company catalog for infrastructure support and development.•Developed work-flow charts and diagrams to ensure production team compliance with client deadlines.•MS Servers (2003, 2008, 2012) •Virtualization (VMware) •Storage (SAN: NetApp, HP) •Cisco UCS System •HP ProLiant Servers/Blades •Active Directory (2008 and above) •Exchange (2010 and Office 365) •Backup Technologies (Symantec,)
-
It Systems Administrator IPinnacle Technology Solutions Apr 2010 - Dec 2013Fort Wayne, In, Us•Established compatibility with third party software products by developing program for modification and integration.•Developed and implemented complex Internet and Intranet applications on multiple platforms.•Coordinated with systems partners to finalize designs and confirm requirements.•Provided continued maintenance and development of bug fixes and patch sets for existing web applications.•Ensured network, system and data availability and integrity through preventative maintenance and upgrades.•Provided documentation on start-up, shut down and first level troubleshooting of processes to help desk staff.•Designed and implemented new server standards for core business services.•Utilized a pipe and filter model to find bottlenecks and enable measurement of system resource usage and process behavior at boundary limits of all operations.•Developed data architecture design to enable analysts to perform targeted customer analysis.•Recommended architectural improvements, design solutions and integration solutions.•Provided methodologies for object-oriented software development and efficient database design.•Proposed technical feasibility solutions for new functional designs and suggested options for performance improvement of technical objects.•Managed firewall, network monitoring and server monitoring both on- and off-site.•MS Servers (2003, 2008, 2012) •Virtualization (VMware) •Storage (SAN: NetApp, HP) • Cisco UCS System •HP ProLiant Servers/Blades •Active Directory (2008 and above) •Exchange (2010 and Office 365) •Backup Technologies (Symantec, NetApp) -
Network SupportHanford Tech Com Apr 2007 - Apr 2010•Install new hardware or software systems or components, ensuring integration with existing network systems.•Train users in procedures related to network applications software or related systems.•Configure and define parameters for installation or testing of local area network (LAN), wide area network (WAN), hubs, routers, switches, controllers, multiplexers, or related networking equipment.•Maintain and administer computer networks and related computing environments including computer hardware, systems software, applications software, and all configurations.•Analyze and report computer network security breaches or attempted breaches.•Configure security settings or access permissions for groups or individuals.•Configure wide area network (WAN) or local area network (LAN) routers or related equipment.•Evaluate local area network (LAN) or wide area network (WAN) performance data to ensure sufficient availability or speed, to identify network problems, or for disaster recovery purposes.
-
Network SupportPaden Enterprise Apr 2000 - Apr 2007•Install new hardware or software systems or components, ensuring integration with existing network systems.•Train users in procedures related to network applications software or related systems.•Configure and define parameters for installation or testing of local area network (LAN), wide area network (WAN), hubs, routers, switches, controllers, multiplexers, or related networking equipment.•Maintain and administer computer networks and related computing environments including computer hardware, systems software, applications software, and all configurations.•Analyze and report computer network security breaches or attempted breaches.•Configure security settings or access permissions for groups or individuals.
Dr. Christopher L. Skills
Dr. Christopher L. Education Details
-
Colorado Technical UniversityDarkweb And Digital Forensics -
Capella UniversityCybersecurity And Information Assurance -
Western Governors UniversityCyber/Computer Forensics And Counter Terrorism -
Western Governors UniversityInformation Technology - Security Emphasis -
West Hills College LemooreComputer/Information Technology Administration And Management
Frequently Asked Questions about Dr. Christopher L.
What company does Dr. Christopher L. work for?
Dr. Christopher L. works for Quardian Cyber
What is Dr. Christopher L.'s role at the current company?
Dr. Christopher L.'s current role is Chief Information Security Officer.
What is Dr. Christopher L.'s email address?
Dr. Christopher L.'s email address is ch****@****sis.com
What is Dr. Christopher L.'s direct phone number?
Dr. Christopher L.'s direct phone number is +166132*****
What schools did Dr. Christopher L. attend?
Dr. Christopher L. attended Colorado Technical University, Capella University, Western Governors University, Western Governors University, West Hills College Lemoore.
What skills is Dr. Christopher L. known for?
Dr. Christopher L. has skills like Leadership, Firewalls, Information Technology, Information Security, Windows Server, Help Desk Support, Cisco Technologies, Active Directory, Computer Hardware, Infrastructure, Windows, Software Installation.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial