Don Mcbride work email
- Valid
- Valid
- Valid
Don Mcbride personal email
- Valid
Don Mcbride phone numbers
Senior systems engineer and architect seeks leadership role in software and hardware development of large scale systems. Experience driving technical innovation, automation, efficiency, and customer needs to a product or service, lab, or field configuration. Prefer to work in the Western US, willing to relocate anywhere there is a good opportunity, willing to travel. Flexible, quick learner, self starter. Results oriented, attention to detail within time constraints. Fills a role when needed. Likes variety. Exceptional interpersonal skills coupled with good team building and organizational skills. Analytical: able to assemble and organize large amounts of data conveying big picture and trends. Experience guiding local or remote development teams from feature inception to deployment. Previous roles include feature development lead, system engineer, architect, tester, analyst, review leader producing results including feasibility studies, feature specifications and high-level designs, call flows, data flows, test plans, test results with trace-ability, architecture review reports, assessment & audit reports, threat and risk analysis,spe SOC-2 security controls, RFP/I responses , and performance and capacity predictions delivered to customers, executives, management, customer teams, development teams. Expertise in security, communications protocols, system and network architecture, call processing, system integrity, performance, hardening, reliability, and system management functionality. Selected for customer facing low-level technical support of marketing as well as lead engineer of complex and troubled development projects where technical and personal skills were needed to move the project forward to deliver expectations on time.SIP,WNG
-
Senior Security ResearchNokia Bell LabsNaperville, Il, Us -
Senior Security ResearchNokia Bell Labs Jun 2022 - PresentMurray Hill, Nj, UsResearch weaknesses in 4G, 5G security. Provide solutions that enable customers to operate networks at a level of security they can tolerate. Look at 6G and propose secure solutions to operate in next generation networks. Specialties Product Development, Control Protocols, Vulnerability Management, Product Security Assessments -
Product Security ManagerNokia Jan 2017 - Jun 2022Espoo, Southern Finland, FiAddressing product security proactively. Governance. Responsible for IP and Optical Network business division’s product compliance to Nokia product lifecycle development security design criteria: Threat Anal, Architecture, Requirements, Privacy, Coding, Hardening, Testing. Tracking to Nokia remediation metrics associated with vulnerability management. 3rd party and Nokia code. Generate monthly reports for division’s 88 products. Manage product security lead’s compliance assessment and remediation progress. Approve compliance for lifecycle gates, or veto. Support duties include ensuring development and leads are properly qualified and trained, clarifying ambiguous criteria and requirements aligned with quality and standards, tools support, provide comprehensive view of product security posture. -
Senior Security EngineerNokia Sep 2010 - Jan 2017Espoo, Southern Finland, FiProduct (virtualized and dedicated) Security Analysis: • Vulnerability and Penetration Test and Analysis• Software Development Environment Audit• Vulnerability Assessment Tools • 3rd Party Software Vulnerability Analysis.Create viable AICPA SOC2 security controls for ALU product security implementation and 3rd party assessment. Conduct independent security audit of ALU products to fulfill customer contractual obligations per solution release.- vulnerability and penetration product audit: discovery(nmap, Senmap, Sparta), vulnerability scanning(Nessus, Nexpose, SAINT), configuration benchmarking (CIS tool, Nessus), DoS (Custom & Defensics), fuzzing (Defensics, Protos), web application (Appscan, Burp), penetration (Metasploit), analysis and reporting- Product testing incl. application, platform middle-ware, Cloud (OpenStack, VMWare, CloudBand), Base HW.- Software development environment security audit, aka trusted software delivery, free of malicious code, Incl. assembing/presenting internal evidence related to the physical, OS, and software construction and delivery environment to contracted oversight.- security issue tracking, incl. remediation planningAuthor internal security standards and best practices for SDLC compliance (threat analysis, security capabilities analysis, vulnerability and penetration testing, 3rd party software analysis, remediation planning)Develop Security Analytics Tools: Analytics Dashboard of security assessment data (Splunk).NSA/CFIUS product assessments, security SMELab network configuration:network and host configuration incl.dedicated and virtual Kali Linux and MS Windows platforms, vlans, router config, host configExpedited Security Incident Response. -
Architectural Review Leader, Software Arch. Review BoardNokia Aug 2008 - Sep 2010Espoo, Southern Finland, FiLead and organize panel of relevant subject matter experts in 3 day lock-in review of internal project (product, solution, or service). Process determines project strengths and major obstacles to set project on path for success. Responsible for preparing project team for review, obtaining subject matter experts, setting review agenda, setting success criteria by which to assess project. Review meeting includes coordinating logistics, maintaining task direction, balancing and summarizing discussions, assuring all strengths and issues are recorded, determining when additional management intervention is needed, assessing schedule and adapting agenda, leading review team caucus and management readout at conclusion of review. After, author project’s “Review Report”, board presentation, and issue follow-up if necessary. -
Wimax Security Systems EngineerNokia Apr 2007 - Aug 2008Espoo, Southern Finland, FiAuthor of “Specification for EAP Authentication Methods” including EAP-TLS, EAP-TTLS, EAP-SIM, EAP-AKA, as well as authentication using CHAP and MS-CHAPv2. Specification includes re-authentication, error handling, impacts of new versions and software upgrades. Includes specifying requirements of key derivation and management, X.509 certificate-based authentication, PKI, DHCP security, Mobile IP, AAA, and mobility impacts - compliant with WiMAX standards and relevant RFCs. Also provided requirements for IPSec, SSH, and SNMP. -
Wireless Security Systems EngineerAlcatel-Lucent Feb 2005 - Apr 2007Author Lucent Common Security Requirements applicable to all products. 375 detailed requirements applicable to all Lucent Wireless network elements. Conforms to IETF and ITU-T X.805 Security Architecture, 8 dimensions in management plane/infrastructure layer. Aligned with Cingular, Verizon, Sprint/Nextel, O2 requirements along with security ITU, ANSI, Telcordia standards, as well as security test input and field feedback. Achieve acceptance by representatives of all Lucent 2G and 3G wirelesss technologies and platforms {EVDO, CDMA, UMTS, and IMS}. Lead author for product realization specification Systems Requirements for 9900 Wireless Network Guardian (Wireless Access IPS), an expedited project. Lead author CDMA Threat Analysis, assessment of security protection and vulnerabilities of CDMA product portfolio. Author systems and architecture feature specification for CDMA security features including IPSec, Session Timeout, SSH and Centralized Security Management.
-
Systems ArchitectLucent Technologies Bell Labs Jun 1998 - Feb 2005VoIP Architect. Evolution of wireline product line from switched voice channel to voice over IP technology. Monolithic large scale switching systems (4ESS/5ESS) evolving to distributed IP trunking using media gateways with media controllers and Application Servers for advanced features. Presentations and in-depth technical discussions with customers, incl. Verizon, Sprint, AT&T, and Vodafone. Feature functionality and system capacity analysis regarding signaling and trunking evolution. Lead systems engineer and author of requirements for SIP Feature Specification for 5ESS ® Switching System and IMS BGCF, an expedited project. Reliability, Security, Overload Control, Performance and Capacity SME of Signaling, SigTran and SG applications. 3rd Party Signaling Gateway Evaluation (Intel, Artesyn, Adax, Ulticom), and lead for in-house development.
-
Performance AnalystLucent Technologies Oct 1996 - May 1998Test and analyze complete wireless network solutions with emphasis on bottleneck areas, packet switched network used for signaling. Designed customer load generator's on top of ATM injector. -
Systems EngineerAt&T Bell Laboratories Jun 1990 - Oct 1996Holmdel, New Jersey, UsDefine Next Network Switch for AT&T, successor to 4ESS(r). Translate ambitious reliability, capacity, and functional needs into detailed implementation specifications that are feasible, traceable, testable, and provide backbone network services for AT&T for the following 20 years. Includes prior work in both Naperville and Holmel, NJ on both 4ESS(r) and 5ESS(tm) Systems Engineering specifying new features for backbone domestic and international networks with specialty in signaling protocols and Software Defined Networks (SDN).
Don Mcbride Skills
Don Mcbride Education Details
-
Columbia UniversityElectrical Engineering -
University Of Wisconsin-MadisonElectrical And Computer Engineering
Frequently Asked Questions about Don Mcbride
What company does Don Mcbride work for?
Don Mcbride works for Nokia Bell Labs
What is Don Mcbride's role at the current company?
Don Mcbride's current role is Senior Security Research.
What is Don Mcbride's email address?
Don Mcbride's email address is do****@****hoo.com
What is Don Mcbride's direct phone number?
Don Mcbride's direct phone number is (908)-582*****
What schools did Don Mcbride attend?
Don Mcbride attended Columbia University, University Of Wisconsin-Madison.
What are some of Don Mcbride's interests?
Don Mcbride has interest in Social Services, Children, Politics, Education, Environment, Poverty Alleviation, Science And Technology, Human Rights, Animal Welfare.
What skills is Don Mcbride known for?
Don Mcbride has skills like Network Security, Snmp, Linux, Testing, Physical Security, Unix Security, Reliability, Performance Analysis, Call Processing, Signalling, Oam, Management.
Who are Don Mcbride's colleagues?
Don Mcbride's colleagues are Kevin White, Cfa, Mba, Zoran Latinović, Rodolfo Feick, Jakub Sapis, Nicolas Le Sauze, Jun Li, Lieven Trappeniers.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial