David Hundley

David Hundley Email and Phone Number

Information Security Professional | CISSP | CRISC @ Posh
David Hundley's Location
Las Vegas, Nevada, United States, United States
David Hundley's Contact Details

David Hundley personal email

About David Hundley

* Information security specialist with a focus for aligning security operations, plans, controls, processes, policies and procedures with security standards and operational goals.* Experience in Security Operations, Threat Intelligence, Incident Response and Risk Management.* Extensive experience developing Information Security Management Systems leveraging industry best practices, as well as policies and standards to effect compliance with NIST 800-53, ISO 27001, GDPR, CCPA, PCI-DSS, and New York Department of Financial Services regulations.

David Hundley's Current Company Details
Posh

Posh

View
Information Security Professional | CISSP | CRISC
David Hundley Work Experience Details
  • Posh
    Staff Internal Security Auditor
    Posh Jan 2024 - Present
    Boston, Massachusetts, Us
  • Bonusly
    Information Security Engineer
    Bonusly Oct 2021 - Jan 2024
    Boulder, Colorado, Us
    * Partnering with multiple aspects of the business organization to achieve successful SOC2 Type II attestation.* Establishing multiple programs where none had existed, including Governance and Compliance, Enterprise and Third-Party Risk, Security Operations and Security Engineering. This included creating program charters, writing policy, and working with external auditors and penetration testing firms.* Developing and deploying processes and tooling to facilitate third party risk operations, such as answering inbound questionnaires to accelerate the sales process, and sending outbound questionnaires and performing risk assessments on Bonusly vendors.* Working with Engineering, Sales, Customer Success, and other business teams to build security as a culture into the organization.
  • Open Technology Solutions, Llc
    Information Security Analyst
    Open Technology Solutions, Llc Mar 2021 - Oct 2021
    Englewood, Colorado, Us
    *Designing and deploying tooling for Cyber Fusion Center including Security Operations and Cyber Threat Intelligence*Creating Security Operations processes and documentation*Running and maintaining current Vulnerability Management Program
  • Ibotta, Inc.
    Security Risk Analyst
    Ibotta, Inc. Jan 2020 - Mar 2021
    Denver, Colorado, Us
    * Creating Third Party Risk, Security Awareness and Training, Threat Intelligence, and Security Governance functions within Ibotta.* Writing Information Security Management System (ISMS) for NIST CCF, CCPA, and PCI-DSS (SAQ A) Governance.* Leveraging ISMS Policies to pass AWS PCI assessment.* Creating and maintaining Security Awareness Training program, including annual and new hire training, quarterly phishing tests, and security awareness newsletters aimed at keeping security front of mind for employees.* Conducting threat intelligence research and performing Security Operations Center Analyst tasks from a variety of security domains to provide both tactical and strategic insight to technical teams within the organization.
  • Oppenheimerfunds
    Cybersecurity Engineer
    Oppenheimerfunds Jun 2015 - Jan 2020
    Atlanta, Ga, Us
    * Authored an information security management system (ISMS); including policies and standards framework around an adherence to the NIST Cybersecurity Framework, New York Department of Financial Services regulations, and industry best practices.* Investigated security incidents from a variety of domains, such as endpoint malware, external infrastructure attacks, user data exfiltration, and other threats.* Co-lead the transition between traditional outsourced and structured Security Operations Center (SOC) to automated, orchestrated (SOAR) unstructured SOC.* Designed and developed analyst playbooks for incident investigations and threat remediation. These playbooks are then used to create automations to assist in incident response and data enrichment.* Conducted threat intelligence research and risk assessments on various indications of compromise, based on those assessments, recommended modifications and proactive compensating controls to mitigate enterprise risks.
  • Community Computer Connection
    Compliance Manager
    Community Computer Connection Nov 2012 - Feb 2015
    * Conducted hardware and software repairs/troubleshooting and support on technology, as well as for nonprofit clients, as well as infrastructure assessments for clients.* Authored and deployed an integrated management system (IMS) that met ISO 14001, 9001, OSHAS 18001 and passed Responsible Recycler (R2) 2008 & 2013 certification specifications.* Trained volunteers with little to no technical experience on technology related processes and equipment.* Created documentation for technical repair processes and environmental processes for equipment refurbishment.
  • Darkowl
    Security Consultant
    Darkowl Jan 2011 - Oct 2012
    Denver, Co, Us
    * Conducted Security Assessments and penetration tests for clients ranging from owner/operators to Fortune 500 financial firms and government agencies.* Assisted clients in understanding their existing security frameworks and infrastructures gaps, as well as assisted in developing plans to mitigate risks associated with those gaps.* Specialist in policies, procedures and controls, and governance, risk, and compliance.* Researched and deployed various network, application, physical security, and social engineering attack vectors.* Wrote articles on staying secure in a connected, changing world focused on social engineering and phishing attack vectors for client employees and the general public.* Performed Open Source Intelligence (OSINT) gathering operations and presented reports to executives on their attack surface and reputation.
  • Geek Squad
    Deputy Of Counter Intellegence
    Geek Squad Jan 2007 - Sep 2011
    Us
    * Designed and deployed Agent training regimen, which increased Agent technical acumen and client relations skills, resulting in a top-10 performance ranking in district.* Performed advanced technical tasks such as manual malware removal, hardware repairs, and data backup and recovery.

David Hundley Skills

Carbon Black Mac Os Information Security Windows Server Splunk Security Incident Response Linux Policy Analysis Computer Hardware Security Operations Itil Windows Cybersecurity It Audit Dns Qradar Fireeye Networking Hipaa Troubleshooting Computer Security Threat Intelligence Ips System Administration Strategic Planning Tcp/ip Symantec Endpoint Protection Dlp Vulnerability Management User Behavior Digital Forensics Network Security Social Networking Disaster Recovery Windows 7 Seim Security Audits Technical Support Iso 27001 Ohsas 18001 Management Compliance Pci Project Management Security Incident Investigation Vmware Nist 800 53

David Hundley Education Details

  • Standley Lake
    Standley Lake

Frequently Asked Questions about David Hundley

What company does David Hundley work for?

David Hundley works for Posh

What is David Hundley's role at the current company?

David Hundley's current role is Information Security Professional | CISSP | CRISC.

What is David Hundley's email address?

David Hundley's email address is da****@****ail.com

What schools did David Hundley attend?

David Hundley attended Standley Lake.

What skills is David Hundley known for?

David Hundley has skills like Carbon Black, Mac Os, Information Security, Windows Server, Splunk, Security Incident Response, Linux, Policy Analysis, Computer Hardware, Security Operations, Itil, Windows.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.