Craig Rodenberg Email and Phone Number
Craig Rodenberg work email
- Valid
- Valid
- Valid
Craig Rodenberg personal email
- Valid
• Passionate, pragmatic and highly technical Cyber-Security Leader.• Leader of diverse, geographically dispersed Cyber-Security operations for over 15 years.• Inclusive organization builder and a catalyst for technical innovation.• Deep experience in Penetration Testing and Cyber-Incident Response.
-
Director, Cybersecurity Operations And EngineeringCopeland Jan 2024 - PresentSt. Louis, Missouri, UsAssist in building Copeland’s Cybersecurity organization, hiring necessary talent, and developing and managing relevant processes and services.Create and oversee the implementation of cybersecurity strategies, long-range plans, processes, and technologies.Understand the organization’s security posture and proactively develop strategies to collaboratively address weaknesses and gaps.Partner with relevant teams to develop and monitor critical metrics and KPIs, provide regular updates to IT and Cybersecurity leadership.Build and lead the security architecture and engineering functions, including creating and implementing security designs, documenting security architectures, developing secure configuration requirements, and integrating security controls and tools.Manage day-to-day operations while ensuring strategic objectives are met.Partner with relevant peers and service providers to ensure expectations and SLAs are met. -
Sr. Information Security ArchitectEnergizer Holdings Oct 2021 - Jan 2024St Louis, Missouri, Us• Develop, recommend and execute the Information Security strategy and technical compliance efforts.• Manage the Enterprise Cyber-Security team.• Perform as a highly-technical “hands on” Information Security Architect, making routine technical contributions and directing Cyber-Security and Compliance efforts.• Maintain the IT Security posture necessary to result in zero reportable breaches of Industrial Control Systems or GDPR protected data.• Collaboratively work to evaluate Business and technology initiatives and processes to identify and mitigate potential information security risks.• Conduct and coordinate information security risk assessments and audits, based on information security policies, standards, guidelines, and compliance criteria.• Execute information security practices, procedures and controls as necessary to result in compliance with regulatory criteria and maintenance of zero reportable breaches of Industrial Control Systems or GDPR protected data.• Take charge of, manage the response to and successfully resolve all Cyber Security incidents.• Develop, implement, manage and operate Information Security practices including but not limited to Server and application hardening, Firewall and VPN management, Network intrusion prevention, Server intrusion prevention, Network and server file integrity, Virus and malware protection, DDoS mitigation, Vulnerability assessment and remediation, Penetration testing, Advanced data encryption, Data forensic recovery, Counter-Forensic data destruction, Security log management and SIEM Event correlation.• Create a culture of continuous IT Security improvement. -
Information Security ArchitectEnergizer Holdings Feb 2018 - Oct 2021St Louis, Missouri, Us• Develop, recommend and execute the Information Security strategy and technical compliance efforts.• Manage the Enterprise Cyber-Security team.• Perform as a highly-technical “hands on” Information Security Architect, making routine technical contributions and directing Cyber-Security and Compliance efforts.• Maintain the IT Security posture necessary to result in zero reportable breaches of Industrial Control Systems or GDPR protected data.• Collaboratively work to evaluate Business and technology initiatives and processes to identify and mitigate potential information security risks.• Conduct and coordinate information security risk assessments and audits, based on information security policies, standards, guidelines, and compliance criteria.• Execute information security practices, procedures and controls as necessary to result in compliance with regulatory criteria and maintenance of zero reportable breaches of Industrial Control Systems or GDPR protected data.• Take charge of, manage the response to and successfully resolve all Cyber Security incidents.• Develop, implement, manage and operate Information Security practices including but not limited to Server and application hardening, Firewall and VPN management, Network intrusion prevention, Server intrusion prevention, Network and server file integrity, Virus and malware protection, DDoS mitigation, Vulnerability assessment and remediation, Penetration testing, Advanced data encryption, Data forensic recovery, Counter-Forensic data destruction, Security log management and SIEM Event correlation.• Create a culture of continuous IT Security improvement. -
Technical Director Of Information SecurityAdvanced Icu Care Jul 2013 - Feb 2018St. Louis, Missouri, Us• Create and execute the Information Security strategy and technical compliance efforts.• Lead the technical compliance efforts for SOC2, HIPAA, HITECH and HITRUST criteria.• Perform as a highly-technical “hands on” Information Security and Compliance architect, making routine technical contributions and directing IT Security and Compliance efforts.• Maintain the IT Security and Compliance posture necessary to result in zero reportable breaches of Protected Healthcare Information (PHI).• Collaboratively work to evaluate Business and technology initiatives and processes to identify and mitigate potential information security risks.• Conduct and coordinate information security risk assessments and audits, based on information security policies, standards, guidelines, and compliance criteria.• Execute information security practices, procedures and controls as necessary to result in compliance with regulatory criteria and maintenance of zero reportable breaches of protected healthcare information (PHI).• Take charge of, manage the response to and successfully resolve all Cyber Security incidents.• Develop, implement, manage and operate Information Security practices including but not limited to Server and application hardening, Firewall and VPN management, Network intrusion prevention, Server intrusion prevention, Network and server file integrity, Virus and malware protection, DDoS mitigation, Vulnerability assessment and remediation, Penetration testing, Advanced data encryption, Data forensic recovery, Counter-Forensic data destruction, Security log management and SIEM Event correlation.• Create a culture of continuous IT Security improvement.• Manage IT Security staff to include hiring, evaluation of staff and development of training plans. -
Security Operations ManagerSavvis, Inc. Jan 2011 - Jul 2013Monroe, La, Us• Designed, Deployed, and managed the following Managed Security Services: Server and application hardening, Firewall and VPN management, Network intrusion prevention, Server intrusion prevention, Network and server file integrity, Virus and malware protection, DDoS mitigation, Vulnerability assessment and remediation, Penetration testing, Advanced data encryption, Data forensic recovery, Counter-Forensic data destruction, Security log management and SIEM Event correlation services. • Maintained SAS-70 type 2, SOC2 and VISA PCI certifications. • Designed and deployed IPSEC, SSL, PPTP and L2TP VPNs.• Deployed and maintained Centralized network and host anti-virus solutions.• Deployed and managed multi-factor authentication solutions for multiple customers.• Designed, deployed and managed custom cryptographic protection for data while in-use and in-storage. -
Director, Information SecurityRedplaid Managed Hosting Jun 2005 - May 2010• Created the Information Security Department and developed Managed SecurityServices. • Designed, Deployed, and managed the following Managed Security Services: Server and application hardening, Firewall and VPN management, Network intrusion prevention, Server intrusion prevention, Network and server file integrity, Virus and malware protection, DDoS mitigation, Vulnerability assessment and remediation, Penetration testing, Advanced data encryption, Data forensic recovery, Counter-Forensic data destruction, Security log management and SIEM Event correlation services. • Developed the Information Security department from a cost-center to profitability within 15 months.• Achieved and maintained GLB, SAS-70 type 2 and VISA PCI certifications. • Engineered custom Cisco ASA, Juniper Net Screen and Sonic Wall solutions.• Designed custom TLS and VPS over MPLS solutions for privatized circuits.• Deployed and maintained Centralized network and host anti-virus solutions.• Deployed and managed multi-factor authentication solutions for multiple customers.• Designed, deployed and managed custom cryptographic protection for data while in-use and in-storage.
-
Vp, Information SecurityThe Planet Managed Hosting Oct 2003 - Jun 2005• Created the Information Security Department and developed Managed Security Services. • Developed standard Information Security practices into seventeen distinct Managed Security Services.• Responsible for the vision, direction and daily operations of web-hosting Managed Security Services. Managed a Director, 6 Sr. Security Engineers and 19 Jr. Security Engineers.• Designed, Deployed, and managed the following Managed Security Services: Server and application hardening, Firewall and VPN management, Network intrusion prevention, Server intrusion prevention, Network and server file integrity, Virus and malware protection, DDoS mitigation, Vulnerability assessment and remediation, Penetration testing, Advanced data encryption, Data forensic recovery, Counter-Forensic data destruction, Security log management and SIEM Event correlation services.• Integrated DLP with Intrusion Prevention so that compliance could be monitored in real-time by the monitoring team as they watched for intrusions.• Resolved numerous business risks such as DDoS attacks, IRC bot-nets, Abuse complaints, Spam, DMCA copyright infringements and terrorist Internet activity.
-
Information Security ManagerData Return Sep 2000 - Oct 2003Basking Ridge, Nj, Us• Created, implemented and managed the Information Security department.• Achieved consistent and measurable results implementing and managing network and host-based IDS against aggressive deadlines. • Re-defined the objectives and procedures for configuration and management of network DMZ's and virus scanning gateways.• Designed, Deployed, and managed the following Managed Security Services: Server and application hardening, Firewall and VPN management, Network intrusion prevention, Server intrusion prevention, Network and server file integrity, Virus and malware protection, DDoS mitigation, Vulnerability assessment and remediation, Penetration testing, Advanced data encryption, Data forensic recovery, Counter-Forensic data destruction, Security log management and SIEM Event correlation services.• Established and directed multi-department teams to provide security for Cisco routers and switches including VIPs and subnets. • Managed multiple projects to provide secure access portals (SSH, SSL, VPN, Secure Remote and IPsec). • Established a profitable data Forensics security practice. -
Sr. Information Security EngineerPerot Systems Aug 1997 - Sep 2000Plano, Texas, UsAdminister key security systems including Intrusion Prevention, Web and Data security, E-mail security and encryption, Server and Endpoint Security and Vulnerability Scanning.Take ownership of and accountability for the daily operation and engineering of Energizers Endpoint Security Systems.Take ownership of and accountability for the daily operation and engineering of Energizers Vulnerability Management Program.Take ownership of and accountability for the daily operation and engineering of Energizers Server Intrusion Prevention Systems.Take ownership of and accountability for the daily operation and engineering of Energizers Hardening Program for Servers, Applications and Endpoints.Respond to Cyber-Security Incidents and Events to eliminate active threats to Energizers Infrastructure, Applications and Operations.Enforce security operations processes, procedures, and standards.Implement new security technologies - define requirements, research technology solutions, participate in RFPs.Identify security surveillance gaps, assist in developing strategic roadmaps for improvement of security posture.Provide technical security consulting to internal colleagues and cyber-security assistance to IT support staff.Investigate escalated security related incidents as needed.Communicates security strategy and direction to leadership.Perform other duties as assigned. -
Information Security EngineerPerot Systems Jan 1995 - Sep 1997Plano, Texas, UsAdminister key security systems including Intrusion Prevention, Web and Data security, E-mail security and encryption, Server and Endpoint Security and Vulnerability Scanning.Take ownership of and accountability for the daily operation and engineering of Energizers Endpoint Security Systems.Take ownership of and accountability for the daily operation and engineering of Energizers Vulnerability Management Program.Take ownership of and accountability for the daily operation and engineering of Energizers Server Intrusion Prevention Systems.Take ownership of and accountability for the daily operation and engineering of Energizers Hardening Program for Servers, Applications and Endpoints.Respond to Cyber-Security Incidents and Events to eliminate active threats to Energizers Infrastructure, Applications and Operations.Enforce security operations processes, procedures, and standards.Implement new security technologies - define requirements, research technology solutions, participate in RFPs.Identify security surveillance gaps, assist in developing strategic roadmaps for improvement of security posture.Provide technical security consulting to internal colleagues and cyber-security assistance to IT support staff.Investigate escalated security related incidents as needed.Communicates security strategy and direction to leadership.Perform other duties as assigned. -
Torpedoman'S Mate, Uss Henry M Jackson (Ssbn-730)(Gold)Us Navy Jan 1990 - Jan 1994Washington, Dc, UsTorpedomans' Mate, First Class TM1 (SS)Operate and maintain Torpedo launching/firing systems, and weapons stowage facilities associated with underwater ordnance. Operate and maintain hydraulic systems, air systems, and seawater systems.Perform maintenance on underwater ordnance, small arms, and ammunition, and underwater ordnance.Conduct pre-launch, launch and post-launch routines for underwater ordinance.Served as crew of Ohio class nuclear submarine.Completed U.S. Navy College-at-Sea Program.Demonstrated effective teamwork and frequently worked under minimal supervision. -
Torpedoman'S Mate, Uss Philadelphia (Ssn-690)Us Navy Jan 1984 - Jan 1990Washington, Dc, UsTorpedomans' Mate, Second Class TM2 (SS)Operate and maintain Torpedo launching/firing systems, and weapons stowage facilities associated with underwater ordnance. Operate and maintain hydraulic systems, air systems, and seawater systems.Perform maintenance on underwater ordnance, small arms, and ammunition, and underwater ordnance.Conduct pre-launch, launch and post-launch routines for underwater ordinance.Served as crew of Los Angeles class nuclear submarine.Demonstrated effective teamwork and frequently worked under minimal supervision.
Craig Rodenberg Skills
Craig Rodenberg Education Details
-
Sans Technology InstituteComputer And Information Systems Security/Information Assurance -
Saint Martin'S UniversityComputer Science
Frequently Asked Questions about Craig Rodenberg
What company does Craig Rodenberg work for?
Craig Rodenberg works for Copeland
What is Craig Rodenberg's role at the current company?
Craig Rodenberg's current role is Information Security Leader / Architect / Ethical Hacker.
What is Craig Rodenberg's email address?
Craig Rodenberg's email address is cr****@****zer.com
What schools did Craig Rodenberg attend?
Craig Rodenberg attended Sans Technology Institute, Saint Martin's University.
What skills is Craig Rodenberg known for?
Craig Rodenberg has skills like Firewalls, Security, Vulnerability Assessment, Information Security, Network Security, Penetration Testing, Vpn, Disaster Recovery, Encryption, Cisco Technologies, Data Security, Linux.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial