Corey Hill work email
- Valid
- Valid
- Valid
- Valid
Corey Hill personal email
Senior Cybersecurity Leader focused on aligning the business, IT, and Security strategies to enable business objectives.
-
Department Leader - Threat Management And ResponseEdward Jones Jun 2024 - PresentSt. Louis, Mo, UsResponsible for the strategic and operational aspects of Threat Response, CTI, Threat Detection, and Threat Emulation functions. -
Sr Technical ArchitectEdward Jones May 2023 - Jun 2024St. Louis, Mo, UsProvide strategic oversight, direction, and planning for the threat monitoring and incident response organization. Coordinate with other architects to improve process, procedure, and technical capability for threat monitoring and response. Operates as an expert in Incident Response with expertise in both the technical and procedural aspects.Serve as escalation point for analyst and response teams in support of security initiatives and investigations. -
Director Security OperationsCloud Software Group (Formerly Citrix) Jul 2022 - Jan 2023Manages teams responsible for Detection Engineering, Threat Intelligence, Threat Monitoring, SOAR Automation, and Incident Response (both CSIRT) services at CitrixManages an organization that is dispersed across 4 countriesCreate, maintain, and improve security incident response process and proceduresBuilt team to address requirements for multiple certifications including FedRamp, IRAP, and SOC2 compliance.Increased efficiency in which security events are ingested and addressed which has doubled the capacity of the SOCMentor direct reports and colleagues on IR processes and forensicsWork with cross functional teams to address security gaps and provide consultation on security initiatives
-
Sr Manager Security OperationsCitrix Oct 2021 - Jul 2022Fort Lauderdale, Fl, UsManages teams responsible for Detection Engineering, Intelligence, Threat Monitoring, Incident Response (both CSIRT and PSIRT) services at CitrixManages an organization that is dispersed across 4 countriesCreate, maintain, and improve security incident response process and proceduresBuilt team to address requirements for multiple certifications including FedRamp, IRAP, and SOC2 compliance.Increased efficiency in which security events are ingested and addressed which has doubled the capacity of the SOCMentor direct reports and colleagues on IR processes and forensicsWork with cross functional teams to address security gaps and provide consultation on security initiatives -
Manager- Security OperationsCitrix Feb 2020 - Oct 2021Fort Lauderdale, Fl, UsManage a geographically diverse team of analysts across 4 countries Create, maintain, and improve security incident response process and procedures Built team to address requirements for multiple certifications including FedRamp, IRAP, and SOC2 compliance. Increased efficiency in which security events are ingested and addressed which has doubled the capacity of the SOC Mentor direct reports and colleagues on IR processes and forensics Work with cross functional teams to address security gaps and provide consultation on security initiatives -
Consultant - Managed DefenseMandiant Oct 2018 - Feb 2020Mountain View, California, Us• Trusted advisor for the customer in all matters concerning service delivery and ongoing projects • Lead client and engagement teams in delivery of our Managed Defense solutions, exchange threat intelligence with clients and internal teams, and briefing existing clients, potential clients, and external groups on security threats and incident response • Lead security incident response and leverage product knowledge to guide customers • Articulate complex information on security threats and incident response to internal and external groups across varied levels of technical understanding • Lead efforts in expanding and improving the development of processes, methodologies, and client communication methods for advanced persistent threat detection, threat intelligence, incident response, and vulnerability analysis • Effectively communicate investigative findings and strategy to client stakeholders, technical staff, executive leadership, and legal counsel. • Responsible for building relationships with internal business units to identify innovative solutions to enhance service delivery. -
Cyber Threat Engineer IiFirst Citizens Bank Jun 2017 - Oct 2018Raleigh, North Carolina, UsAct as Incident Commander for IR Team.Provide Intel support for security operations, vulnerability management and incident response teams.Consult management by producing and assisting with the development of cybersecurity process and procedures including: Playbooks Incident Response Plan Standard Operating Procedures Project and toolset documentationServe as a Tier 3 escalation point to SOC analysts.Collect and analyze data to show operational affectiveness and consult on areas of improvement. -
Cyber Threat Analyst IiiBb&T Oct 2016 - Jun 2017Charlotte, Nc, UsAct as interim SOC Manager in the absence of the managerTriage resumes and conduct interviews for potential anaylst and provide hiring recommendations to upper managementServe as escalation point for tier 1 and 2 Cyber Threat anaylstServe as incident coordinator for medium, high, and critical severity incidentsBuild and conduct trainings for members of the SOCAssist SOC manager in overseeing tactical and operational facets of the SOCInterface with other groups within the company when addressing security concernsDevelop policy and procedure around Incident Response and day to day operations of the SOCDevelop and provide threat metric overviews for managementPerform threat hunt missions -
Cyber Threat Analyst IiBb&T Sep 2015 - Oct 2016Charlotte, Nc, UsAssist in escalated computer security incidents and cyber investigations including computer forensics, network forensics, root cause analysis and malware analysis.Act as coordinator in the event of escalated cyber threats/incidents for Tier 1 analysts.Execute on appropriate mitigation strategies for identified threats.Participate in threat hunting activities to proactively search for threats in the enterprise environment.Participate in the creation and maintenance of use cases for recurring investigation/incident triggers in support of the 24/7 Cyber Threat Operations and Cyber Threat Management program.Participate in the creation and maintenance of playbooks used in response for investigation/incident triggers in support of 24/7 Cyber Threat Operations and Cyber Threat Management program.Interface with other teams in Information Security (e\.g\. network operations, Cyber Threat Operations Center \(CTOC), vulnerability management) along with information and liability risk officers and technology management to help guide cyber security strategy.Adhere to all policies and standards, as well as regulatory requirements regarding reporting and escalations.Work with team members to enhance and enrich security monitoring tools with contextual information.Provide mentoring for junior level analysts.Deliver cyber intelligence services and material to information technology and business leaders.Identify new threat tactics, techniques and procedures used by cyber threat actors.Publish actionable threat intelligence for business and technology management. -
Security AnalystCisco Mar 2014 - Sep 2015San Jose, Ca, UsThe Security Analyst focuses on incident and network analysis. Job responsibilities include detecting, analyzing, and resolving potential security events detected in customer environments. This position will also revolve around providing feedback into the Threat Defense platform and processes in order to increase the detection fidelity and accuracy of the Threat Defense solution; and working with security incident investigators to do deeper analysis of detected events. -
Computer Crimes InternNorth Carolina State Bureau Of Investigation Jun 2011 - Aug 2011Updated computer forensics labTaught about virtual machines and set the computer forensics lab up with themRepaired computer hardwareUsed Encase 6 & 7Learned about undercover softwareIntroduced the Linux based Ubuntu operating system
Corey Hill Skills
Corey Hill Education Details
-
Penn State UniversityInformation Security And Forensics -
Campbell UniversityInformation Technology Securities; Information In Technology Management
Frequently Asked Questions about Corey Hill
What company does Corey Hill work for?
Corey Hill works for Edward Jones
What is Corey Hill's role at the current company?
Corey Hill's current role is Cybersecurity Senior Leader.
What is Corey Hill's email address?
Corey Hill's email address is co****@****rix.com
What schools did Corey Hill attend?
Corey Hill attended Penn State University, Campbell University.
What are some of Corey Hill's interests?
Corey Hill has interest in Science And Technology, Education.
What skills is Corey Hill known for?
Corey Hill has skills like Information Security, Networking, Computer Forensics, Network Security, Leadership, Security, Cybercrime, Analysis, Linux, Research, Public Speaking, Information Security Management.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial