David Day Email and Phone Number
David Day work email
- Valid
- Valid
- Valid
David Day personal email
- Valid
David Day phone numbers
Certified Information Systems Security Professional (CISSP) expert in the design, implementation and management of network infrastructure and security. Proven record of evaluating system vulnerability and recommending security solutions aligned with business processes and objectives. Adept at critical and strategic thinking, leading to innovative solutions that solve complex problems involving a wide variety of information systems. Self-motivated and disciplined, able to work independently or collaboratively on large-scale projects, while directing multiple programs from concept to implementation. Strong sense of responsibility and accountability with an approachable leadership style that promotes a culture of high-performance and results.
-
Senior Cyber Security ArchitectBen E. Keith Company Dec 2023 - PresentFort Worth, Texas, Us1. Security Architecture Design: Update and design security architecture, including networks, systems, applications, and infrastructure. Ensure that security controls and mechanisms are properly integrated into the overall design. Develop compensating controls for security gaps that cannot support preventive controls.2. Risk Assessment and Mitigation: Identify potential security risks and vulnerabilities in the network and infrastructure. Conduct risk assessments and recommend appropriate security measures and controls to mitigate identified risks.3. Security Framework Development: Define and establish security policies, standards, and procedures based on industry best practices and regulatory requirements ensuring alignment with tbusiness goals and objectives.4. Security Solution Evaluation: Evaluate and recommend security technologies, products, and vendors to meet security requirements. Stay updated with emerging security trends and technologies to identify opportunities for improvement.5. Security Incident Response Planning: Develop incident response plans and procedures. Ensure that security incident response processes are effective and aligned with industry best practices.6. Collaboration and Communication: Work closely with other IT teams, stakeholders, and business units to understand their security needs and requirements. Collaborate with infrastructure architects, application developers, and system administrators to implement security controls and measures.7. Compliance and Regulatory Adherence: Ensure compliance with relevant and applicable security standards, regulations, and industry frameworks such as PCI DSS, ISO 27001, NIST Cybersecurity Framework. Stay updated with changing regulations and update security architectures and processes accordingly.8. Maintain and enhance Security Awareness Training Program.9. Understand technology partner’s features and technology roadmaps to better align on long term objectives and opportunities. -
Cybersecurity Program Manager For Ben E. KeithZyston Llc Jul 2019 - Dec 2023Dallas, Texas, UsDirects, coordinates, plans, and organizes information security activities throughout assigned client. Acts as the focal point for all communications related to information security, both with internal staff and third parties. Works with a wide variety of people from different internal organizational units, bringing them together to manifest controls that reflect workable compromises as well as proactive responses to current and future information security risks.Security: - Chase down details of alerts received from the Zyston SOC: - Validate files / end users - Detailed forensics to answer / remediate SOC alerts - Engineer and maintain Fortinet / Palo Alto / Meraki firewalls - Engineer and maintain Cylance AV - Engineer and maintain Office365 security - Engineer and maintain Azure / AWS security - SIEM engineering and maintenance using Sumo Logic - Identity and Access Management - Workstation and Server patching - Server management (configuring, deploying, event logs, debugging, Group policy, sandboxing) - Vulnerability scans and raw data analytics - Incident Response process - Testing new system configurations and upgrades before production deployment - System and Data backups and policy - Disaster Recovery policy and testing - Interfacing with Helpdesk and other SysAdmins - Change control Governance: - Strengthen overall security posture of clients - PCI compliance assessments and gap analysis - documentation and policy creation - auditingProcess improvement - reduce cycle time - valuations -
Cybersecurity Analyst And It Audit SeniorDoerenmayhew Apr 2014 - Apr 2019As a member of the client service team on multiple engagements, responsible for the planning and execution of vulnerability assessments, social engineering, penetration testing, risk assessments, and IT Audits for a wide variety of clients.Vulnerability assessments:• Created a vulnerability assessment program using Tenable Nessus Pro.• Compiled results into a spreadsheet with detailed results to assist the client’s IT personnel in remediation activities.• Created custom scripts to organize vulnerability data into usable formats.• Created custom charts and graphs used in summary reports to provide client management teams summary information on their vulnerability risk levels.Social engineering:• Created a program to test client security posture using various social engineering techniques.• Performed phishing attacks on clients using custom emails and websites to obtain sensitive data such as usernames, passwords, social security numbers, etc.• Performed vishing attacks pretending to be either a vendor, a member of the client’s IT department, or one of the client’s custom in order to gain sensitive information.• Performed on-site physical security social engineering exercises in an attempt to gain unescorted access to sensitive areas such as network closets or datacenters.Penetration testing:• Created a penetration testing program to validate vulnerabilities and test client IT controls.• Utilized Kali Linux and the software included, such as Metasploit, Armitage, NMAP, etc. to test client network security controls and incident response. IT Audit:• Performed IT security assessments based on one of several cybersecurity frameworks and regulations (FFIEC, ISACA, COBIT, FedRAMP, NIST, CIS Critical Controls, GLBA).• Performed IT Security Risk Assessments.• Participated in the preparation and execution of SOC 1, 2, and 3 Service Organization Control engagements.
-
G-6 Ncoic / Information Systems Chief (Retired, 26 Years)Ohio Army National Gaurd, Joint Force Headquaters Feb 2014 - Oct 2014Responsible for supervision of planning, coordination, employment, operation, management, and unit level maintenance of multi-functional/multi-user information processing systems in mobile and fixed facilities.• Validated the State’s Windows 7 deployment ensuring that all configurations were compliant with all Security Technical Implementation Guides (STIGs).• Created Group Policy Objects to correct all settings to remediate settings that were not within compliance of applicable STIGs.• Configured Microsoft System Center Configuration Manager to ensure systems maintained proper configurations.• Configured Microsoft WSUS servers to ensure patches were properly deployed.• Implemented and configured Microsoft BitLocker.
-
Network / Systems / Information Security EngineerGeneral Dynamics C4 Systems Oct 2005 - Apr 2014Fairfax, Va, UsResponsible for comprehensive system support comprised of installation, operation, management and maintenance of the Joint Network Node shelter and associated transit cases (voice and data), including Battalion Command Post Node (BCPN) data cases:• Primary responsibility is for equipment/system support, with detailed knowledge of system tactical employment and optimization.• Experience with Microsoft Windows Server solutions (DNS, SQL, Active Directory, Group Policy, WSUS, SCCM, etc.)• Provided expertise in deployment, configuration, and maintenance of end point security through various security and vulnerability management tools (Nessus, Retina, McAfee, Symantec, HBSS, ePolicy Orchestrator, BitLocker)• Provided insight and technical expertise in Incident Response, Business Continuity, and Disaster Recovery.• Deployed, configured, and provided expert engineering assistance to military customers on Cisco and Juniper routers, switches, firewalls, and IDS/IPS.• Performed deployment, configuration, and guidance on VMWare, ESXi, and vSphere Client.• Installing and configuring telephony systems (Unified Cisco Call Manager 8.3 servers and REDCOM PBX).• Installing and configuring TACLANE in-line encryption devices.• Primarily working with WAN technologies including satellite communications and line-of-sight radios along with network architecture in a hub-spoke topology. -
Brigade S-6 Ncoic And Information Assuarance Manager37Th Brigade Combat Team, Ohio, Army National Guard Apr 2010 - Feb 2014Responsible for the overall communications strategies and capabilities of the 37th Brigade Combat Team. Supervises all aspects of communications including radio, radio over IP, VoIP, automations, security, etc. • Responsible for the 37th Brigade Combat Team Information Assurance posture for both the garrison automation operations and the tactical wide and local area networks operated by the Brigade for NIPR, SIPR, and CENTRIX operations. • Ensures information systems are scanned and patched in accordance with appropriate Army and DoD regulations using Harris STAT Scanner and Retina.
-
Network Operations Ncoic / Communcications Security CustodianC Co., 37Th Ibct Jun 2007 - Apr 2010• Responsible for assisting the Brigade S-6 with all COMSEC, satellite access, network configurations, information assurance, and all other aspects of the Brigade’s Joint Network Tactical Communications-Spiral. • Assisted the Network Technician in establishing policies and procedures in network device authorization, auditing, and access control, information assurance tracking to include patching systems, IDS operations and antivirus updates. • Assisted with fully implementing all the network monitoring tools to include SNMPc, SolarWinds, SolarWinds Cirrus, and CISCO ACS.• Taught the Network Operations soldiers to setup a Network Monitoring map with alarms based on SNMP Traps received, how to download, baseline, compare, and update network device configurations, and to limit and log access to all network devices. • Instrumental in assisting with the configuration changes for the Joint Network Node mission into Afghanistan within support of the Afghanistan Microwave Network. • Assisted in implanting access control procedures for network devices and monitoring of network traffic.
-
Tactical Automation Network TechnicianHhc, 156Th Signal Battalion Mar 2001 - Jun 2007• Supervised configuration of information processing equipment into required operating configurations. • Compiled production report data and quality control information. Wrote, analyzed, edited, and tested network configurations for the tactical local and wide area networks to include access control lists and device access controls such as RADIUS. • Created a computer lab consisting of 15 workstations, 3 servers, 2 routers and 1 switch in order to train signal soldiers on workstations, servers, network, and information assurance including antivirus implementation, firewall configuration, and security controls. • Served as the Battalion Information Assurance Security Officer ensuring that users were properly trained on access controls, file security, antivirus updating, and backup and recovery plans.• Controlled helpdesk operations for all computer and network devices for Joint Operations to include program troubleshooting, network defense, antivirus operations, and access controls. • Deployed, configured, and monitored HP OpenView, CISCO Works, and What’s Up Gold.
-
Senior Systems Administrator / It SpecialistMichigan Army National Guard Sep 2002 - Oct 2005• Responsible for researching, recommending, and implementation of the Altiris Client Management Suite of products to include the Deployment Server and Helpdesk solutions provided by Altiris ensuring that the Michigan Army National Guard would be able to monitor, inventory, patch, and upgrade all computer systems throughout the State. • Utilized the Altiris Deployment Server and Wise Package Studio to deploy Window XP to all the computers in the Michigan Army National Guard remotely, saving the State rough $5,000,000. • Responsible for running Harris Stat Scanner and Retina to identify vulnerabilities and mitigating risks by pushing patches for software, ensuring antivirus was updated regularly, and developing security baselines and controls. • Assisted with development of State Continuity and Disaster Recovery Plan.
-
Information Technology ManagerRadian, Inc. Jan 2001 - Sep 2002• Established security policies for network access, file security, web operations, and systems availability. • Setup a backup continuity and disaster recovery plan to include tape backups, off-site storage, and recovery testing. • Removed production systems from the development section and implemented a test environment ensuring that development did not interfere with the production environment. • Created an extensive inventory system for tracking hardware and software licensing brining the company into regulatory compliance for proper accountability and licensing of software programs required for day to day operations. • Performed incident response procedures to mitigate damage and cleaned and patched all systems ensuring no damage or loss of data.• Implemented a corporate antivirus solution using Norton Corporate Edition to protect systems from virus outbreaks, after being infected with the zero-day virus NIMDA.
-
Battalion Intelligence Officer And Secruity Manager4Th Corps Material Management Center Jun 1999 - Dec 2000 Performed as Battalion Security Manager dealing with all areas of security to include personnel security, physical security, information security, operation security, communications security, crime prevention, key control, force protection (anti-terrorism) and information systems security. Managed security files for over 300 personnel and over 400 automation systems. Responsible for setup, access control, and monitoring of secure classified briefings. Responsible for performing vulnerability assessments, recommending mitigation techniques, and inspection of completed force protection projects. Ensured that all personnel utilizing automation equipment were properly trained per DoD and Army regulations in the area of information and information system security. Supervised two security personnel, as well as, eight information assurance security officers.
-
Adpe Repair Section Tech Ncoic / Information Management And Information Systems Security Officer4Th Corps Material Management Center Aug 1997 - Jun 1999Network administrator for a Windows NT network with over 400 users. Automated Data Processing Equipment (ADPE) Repair Section Technical NCOIC in charge of 12 personnel responsible for rebuilding, upgrading, troubleshooting, configuring, repairing, and installing desktop PCs, monitors, mini-hubs, laptops, etc. Performed duties as Information Management Officer and Information Systems Security Officer. Requested and administered e-mail accounts, troubleshot LAN problems, researched and recommended automation purchases.
-
Network / Systems Administrator4Th Corps Material Management Center Jun 1996 - Jun 1997Network/Systems administrator for the CTASC-II (HP9000) Unix based system for III Corps and Fort Hood. Performed normal day to day administrator duties such as installs, upgrades, backups, and restores to the system. Added, deleted, and modified user accounts and file permissions. Setup and edited routing tables for incoming and outgoing communications. Corrected errors in the system, monitored traffic, wrote SQL scripts using Informix-SQL, and repaired workstations.Served as the Battalion Information Systems Security Officer ensuring user awareness, system patching, and virus definition updating.
David Day Skills
David Day Education Details
-
University Of Maryland Global CampusComputer Infomation Technology
Frequently Asked Questions about David Day
What company does David Day work for?
David Day works for Ben E. Keith Company
What is David Day's role at the current company?
David Day's current role is Cybersecurity Program Architect for Ben E. Keith.
What is David Day's email address?
David Day's email address is da****@****hoo.com
What is David Day's direct phone number?
David Day's direct phone number is +198988*****
What schools did David Day attend?
David Day attended University Of Maryland Global Campus.
What are some of David Day's interests?
David Day has interest in Hunting, Weightlifting, Sports, Fishing.
What skills is David Day known for?
David Day has skills like Cissp, Security Clearance, Vulnerability Assessment, Firewalls, Disaster Recovery, Dod, Network Security, Servers, Switches, Cisco Technologies, System Administration, Network Administration.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial