Don Reed Email and Phone Number
Information Security Professional with more than 30 years of experience in implementing and managing security programs, identifying organizational risk, instituting best practices, achieving security compliance, integrating security practices with business objectives and executive leadership.Information Systems Security Architecture Professional (ISSAP)Certified Information Systems Security Professional (CISSP)Certified Information Security Manager (CISM)GIAC System and Network Auditor (GSNA)Certified Incident Handler (eCIH)Please note: I am NOT open to new opportunities. I am also not accepting new connections unless I already know you personally.
Iron Valley Real Estate Of Lancaster
View- Website:
- ironvalleyrealestateoflancaster.com
- Employees:
- 43
-
Real Estate AgentIron Valley Real Estate Of LancasterLancaster, Pa, Us -
Information Risk OfficerCommonwealth Of Pennsylvania Jan 2022 - PresentStatewide, Pa, Us -
Information Security Architect - Risk ManagementCommonwealth Of Pennsylvania Jul 2019 - Jan 2022Statewide, Pa, UsAssist in developing and maturing Risk Management program; Identify, communicate and monitor information security risks; Specify enterprise-class security systems for all environments; Collaborate with application and infrastructure architects to ensure security concerns are addressed; Align standards, frameworks and security with overall business and technology strategy; Develop solutions that balance business requirements with information risk and cyber security requirements; Identify security design gaps in existing and proposed architectures, and recommend changes or enhancements; Ensure compliance to standards, policies, and procedures; Develop delivery center specific security policies and standards documents; Mentor cyber security and risk management team members. -
Security ArchitectCommonwealth Of Pennsylvania Nov 2017 - Jan 2022Statewide, Pa, UsResponsibilites include: Design/specify enterprise-class security systems for pre-production and production environments; Collaborate with application and infrastructure architects to ensure security concerns are addressed throughout the entire system lifecycle. Align standards, frameworks and security with overall business and technology strategy; Identify and communicate current and emerging security threats; Design security architecture elements to mitigate emerging threats; Develop solutions that balance business requirements with information and cyber security requirements; Identify security design gaps in existing and proposed architectures, and recommend changes or enhancements; Ensure compliance to standards, policies, and procedures; Develop training and awareness programs; Provide guidance and mentoring for security team members. -
Technical Security Program ManagerCommonwealth Of Pennsylvania Mar 2017 - Nov 2017Statewide, Pa, UsTechnical Security Program Manager at Pennsylvania Office of Administration - Infrastructure and Economic Development Delivery Center (PennDOT, DCED and PEMA). Responsible for the coordination and execution of multiple, simultaneous projects associated with the delivery of the Information Security Program. -
Senior It Security AnalystGlatfelter Aug 2015 - Mar 2017Charlotte, North Carolina, Us -
Senior Information Security ArchitectHoly Spirit, A Geisinger Affiliate Jan 2013 - Aug 2015Danville, Pa., UsResponsible for development, delivery and oversight of the organization's information systems security program. Coordinates risk assessments to ensure electronic information are adequately protected. Develops and maintains policies, guidelines and standard operating procedures in accordance of current regulations including HIPAA and PCI, and best practices. -
Senior Network Security EngineerHoly Spirit, A Geisinger Affiliate Jul 2010 - Jan 2013Danville, Pa., UsArchitect and maintain information security technology, policies and procedures necessary to protect patient and company information and the IT infrastructure. Configure and maintain firewalls and other technical security solutons. Mentor and oversee technical resources in the delivery of security administration. -
Question WriterGiac Nov 2014 - Mar 2015Bethesda, Md, UsDevelop exam content for GIAC certification exams including GISF, GCED and GISP -
Network Engineer IvSiemens Healthcare Jun 1996 - Jul 2010Forchheim, DeAccountable for overseeing information security policy development, disaster recovery/business continuity planning, and HIPAA-mandated enterprise risk assessments. Duties include configuring/managing VPN, SSL, TACAS+, RSA Token and other secure access technologies, reviewing security logs and developing security policies and best practices. Additionally, establish project plans and build technical project teams. -
Vp & Chief Technology OfficerConsolidated Marketing And Research Jan 2003 - Dec 2008Focused on guiding business direction by assessing company’s technology needs, providing technology infrastructure oversight, and developing data security policies. Responsible for negotiating SLAs with second-tier Internet/data center providers and hardware/software vendors, and planning initiatives that establish intrusion prevention for Internet, email, and FTP services
-
Network AdminKevric Company 1995 - 1996
-
Sales AssociateSoftware City 1994 - 1995
-
PercussionistUs Air Force Band Mar 1978 - Jan 1982
Don Reed Education Details
-
American Institute For Computer ScienceComputer Science
Frequently Asked Questions about Don Reed
What company does Don Reed work for?
Don Reed works for Iron Valley Real Estate Of Lancaster
What is Don Reed's role at the current company?
Don Reed's current role is Real Estate Agent.
What schools did Don Reed attend?
Don Reed attended American Institute For Computer Science.
Who are Don Reed's colleagues?
Don Reed's colleagues are Tresa Kirk, Christine Hogan, Emily Graham, Joel Hughes, Grant Clark, Fanny C., Kristina Miller.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial