Harry Hoffman

Harry Hoffman Email and Phone Number

AVP and CTSO - Chief Technology and Security Officer @ Northeastern University
Cambridge, MA, US
Harry Hoffman's Location
Cambridge, Massachusetts, United States, United States
About Harry Hoffman

As an information technology executive, I help develop and implement world-class information technology and security programs, services, and solutions at the world's most prestigious educational institutions. My focus is to ensure technology is not just a tool but is used as a transformational factor to deliver on the promise of preparing our lifelong learners to make a direct impact upon the world.I am a capable leader, mentor, and project manager skilled at strategic planning and my area of expertise is focused on infrastructure and resilience, information security, risk management and mitigation, and regulatory compliance.Currently, I am the Associate Vice President of IT and Chief Technology and Security Officer (CTO/CISO) at Northeastern University. As the CTO I am responsible for Northeastern's vast network infrastructure, cloud and on-premise computing environments, and business continuity and disaster recovery programs. As the university CISO I have oversight of our global campus information security, identity, and privacy programs. Previously, I managed a wide range of technical security operations and infrastructure to provide cutting-edge security at Harvard University, M.I.T., University of Pennsylvania, Drexel University, and the University of Auckland. Additionally, I worked to build employee awareness and education programs regarding cybersecurity awareness. Beyond educational institutions, I helped develop PayQuik, Inc., a startup company that created technology software eventually acquired by Citi Group. I served as Vice Chair on the Board of Directors for the Research and Education Networks Information Sharing and Analysis Center (REN-ISAC) and started The Center for Cybersecurity Operations in Research and Education, Inc. (CCORE).

Harry Hoffman's Current Company Details
Northeastern University

Northeastern University

View
AVP and CTSO - Chief Technology and Security Officer
Cambridge, MA, US
Website:
northeastern.edu
Employees:
5
Harry Hoffman Work Experience Details
  • Northeastern University
    Avp And Ctso - Chief Technology And Security Officer
    Northeastern University
    Cambridge, Ma, Us
  • Northeastern University
    Avp/Ctso - Chief Technology And Security Officer
    Northeastern University Jan 2021 - Present
    Boston, Ma, Us
    In my role as the Associate Vice President and Chief Technology and Security Officer, I have taken on leadership responsibilities that encompass a broad spectrum of crucial areas. A significant part of my role involves formulating and executing a forward-looking IT strategy designed to bolster the growth of our global campus. This strategy is especially focused on facilitating mergers, acquisitions, and the establishment of new campuses. Concurrently, I am at the forefront of an IT modernization initiative that places a premium on automation, multi-cloud environments, containerization, and seamless API integrations, ensuring that our technology infrastructure remains at the cutting edge of innovation.One of my standout strengths lies in crisis management, where I have adeptly guided our organization's response to various incidents. My approach is anchored in minimizing operational disruptions and enhancing our overall preparedness and resilience. This includes overseeing business continuity and disaster recovery efforts, ensuring that our operations remain robust and resilient even in challenging circumstances.Furthermore, I continue to chart the course for our multi-year IT vision and roadmaps, with a strong emphasis on business enablement via IT transformation. This strategy also involves the integration of Agile principles to propel our product and service offerings to new heights across the university. My purview extends to overseeing IT operations, with a particular focus on refining processes to support the university's growth, both domestically and on a global scale. My steadfast commitment to delivering innovative security programs remains unwavering, all with the goal of providing our user community with a seamless and secure experience.
  • Harvard University
    Director, Information Security Architecture And Engineering
    Harvard University Jan 2016 - Jan 2021
    Cambridge, Massachusetts, Us
    Responsible for enterprise-wide information security architecture and engineering program protecting Harvard’s intellectual property, data, applications, and systems. Lead Architecture and Engineering teams focused on cloud adoption, identity and access management, and capital projects.I successfully implemented a cloud-first security strategy that cut costs significantly with the shutdown of ineffectual campus data centers. I led several long-term projects that eliminated legacy systems, along with substantial technical debt. I secured alignment, support, and funding from school CIOs in highly distributed IT environments to centralize an IAM Active Directory project around single identity and shared service. Since 2016, I worked tirelessly to modernize Harvard’s information technology services. I introduced agile processes that increased work output. I created advancement and professional development opportunities and career resources for Harvard staff, which increased staff retention. • Create and maintain governance to ensure alignment between enterprise technology architecture, technology products and standards in support of evolving business and technical strategies and objectives.• Define security architecture and strategy focused on NIST CSF, CIS Top 20, and TOGAF.• Develop strategies to enable cloud adoption of AWS, Azure, and GCP.• Mature SDLC processes incorporating automation via Jenkins, Travis CI, etc. integrating application security testing (SAST) with web application penetration testing (DAST).• Architect and build solution to classify, identify, and remediate over-sharing of sensitive data using Cisco CloudLock, o365 DLP with automated alerting and remediation.• Adapt information risk management practices into organization-wide adoption of Agile.• Create Security “MVP” that standardized protections across all IT assets.
  • Massachusetts Institute Of Technology (Mit)
    Director, Security And Resilience
    Massachusetts Institute Of Technology (Mit) Mar 2014 - Jan 2016
    Cambridge, Ma, Us
    At M.I.T. I was fortunate enough to serve as security and resilience director, providing oversight for complex IT projects ranging from risk management, mitigation, response, and availability. My primary objective in overseeing the wide range of technical security operations was to reduce IT risk and enable disaster recovery in the IT environment. I’m proud of the mentorship program I created to allow for leadership opportunities and job shadowing. I fostered and encouraged a “culture of security” on campus and disseminated cybersecurity information and awareness materials across campus. Also, while there, the adoption of security services rose by 45% and resulted in the creation of an IT service portfolio for IT providers and their consumers. • Oversee security operations (SOC), IT audit, business continuity, and disaster recovery for the overall IT environment.• Create information security risk management program based upon NIST 800-171.• Advise Senior Staff and Directors quarterly on information security program health and current threat landscape.• Create portfolio of services and consulting to better serve the community by clearly identifying consumable services, consulting services, and metrics for individual groups to identify security priorities.• Devise data security classification including; aligning data sensitivity with security controls around human research studies (IRB), HIPAA, PCI, PII, and internal classifications.• Develop data analytics platform (Splunk) creating dashboards and risk profiles to evaluate enterprise risk exposure.• Establish application security practice, incorporating threat modeling and secure coding best practices into enterprise SDLC and project management lifecycles• Launch cross-functional Security Champions community, creating career paths in security for technologists, and coordinating activities across IT operations, architecture, engineering, and development;
  • University Of Pennsylvania
    Sr. Information Security Analyst
    University Of Pennsylvania Sep 2012 - Feb 2014
    Philadelphia, Pa, Us
    As the senior architect, my responsibilities at UPenn involved managing system security measures and the overall IT infrastructure to identify and eliminate potential security threats. I implemented vulnerability and threat assessment architecture. I was accountable for custom rule creation and Sourcefire IDS infrastructure. Also, I implemented an automated system that enable customization and developed a code to shuttle and transform data, which enabled integration. Here I furthered my leadership ability when I was charged to lead the team at UPenn responsible for the architecture and design of SIEM (Splunk) and vulnerability management platforms. • Responsible for designing and building Penn’s security instrumentation network to detect and eliminate risks through vulnerability management and threat assessment. • Design and build network observability using Cisco Sourcefire IDS infrastructure and custom-rule creation. • Implement automated system enabling customization of vendor-supplied rules-specific environment. • Write applications and code enabling integrations with 3rd party products.
  • Drexel University
    Director Of Information Security
    Drexel University Sep 2009 - Sep 2012
    Philadelphia, Pennsylvania, Us
    I held multiple technical positions at Drexel University between 2001 and 2012. I began in 2001 as a senior network security analyst and authored custom NAC solutions written in PERL code for processing vulnerability scan results and event alerts. Promoted in 2003 to senior security analyst, I protected and secured the university’s digital assets and enabled business continuity.In 2009, I was offered a position as the information security director. My responsibilities included designing and implementing all information security and identity management programs and related activities. Not only did I coordinate risk assessments, but I also developed incident response policies and procedures and ensured compliance.
  • Payquik, Inc., A Subsidiary Of Citi, N.A.
    Information Security Manager
    Payquik, Inc., A Subsidiary Of Citi, N.A. 2007 - 2008
    I started at PayQuik to help build and secure their money transfer software. Generally speaking, I managed key servers and created Linux operating system hardening and minimization procedural guidelines. I’m pleased to say, CitiGroup acquired the end product and with that I moved on to return to Drexel in 2009.
  • Drexel University
    Senior Network Security Analyst
    Drexel University 2003 - 2007
    Philadelphia, Pennsylvania, Us
    Ensure adherence to security policies from all departments and colleges.Write custom PERL code for processing vulnerability scan results and alerting on events.Deploy centralized firewall for windows clients (ZoneAlarm)Manage Snort/Bro IDS systems, Argus and Cisco NetFlow to report on anomalous traffic.Hardened Solaris installations using customized JASS security scripts.Hardened AIX, IRIX, Linux, and Windows NT/2000 servers by writing customized shell, Perl, and batch scripts.Transformed homegrown processes/toolsets of log aggregation into a cohesive, standardized set of solutions that elevated efficiency and accuracy university-wide.Deployed proxy servers for student dorms to ensure compliance with the University Network Security Policies.Setup Darknets to monitor scans against our University netblocks using Argus and flow-tools. Created Jumpstart/Kickstart servers for unattended OS installs to confirm with hardening/minimization guides.
  • The University Of Auckland
    Systems Team Leader
    The University Of Auckland Apr 2002 - Jun 2003
    Auckland, Nz
    Developed operating system hardening/minimization guidelines for Windows, Solaris, Linux, and BSD based operating systems.Created installation server to automated operating system installation that conformed with hardening/minimization guidelines. Provided central log aggregation for log analysis, reporting, and alerting in real-time of critical system and application messages.Setup LDAP to consolidate authentication of all Unix based systems as well as web applications.Manage SAN zoning and deployment on IBM “Shark” and “Fast-T” storage arraysPerform systems administration of Solaris, AIX, Free/Open BSD, Linux, IRIX, and Windows operating systems.Utilize configuration management system (cfengine) to centrally manage all key servers.
  • Drexel University
    Senior Network Security Analyst
    Drexel University Jul 2001 - Jan 2002
    Philadelphia, Pennsylvania, Us
    Performed penetration testing/analysis of servers, routers, and switches to ensure network and server security.Provided reports detailing security risks, potential loss and mitigation factors.Hardened AIX, IRIX, Linux, and Windows NT/2000 servers by writing customized shell, Perl, and batch scripts.Secured and administered Solaris systems (Enterprise and Sunfire) using modified JASS architecture.Created documentation of securing both hosts and networks within a university setting.
  • Restaurants Unlimited
    Manager Of Information Technology
    Restaurants Unlimited Jun 1997 - Mar 2001
    Seattle, Wa, Us
    Managed IS team including system/network administrators and helpdesk staff.Responsible for creating job descriptions, salary justification, and all aspects of the hiring process.Proficient in resolution of staff concerns.Created professional development goals for staff.Charged with annual performance evaluations.Provided hands-on training for all staff members. Worked with various telecom vendors for provisioning of T1 lines.Held responsibility for firewalls, routers, and Layer II/III switches.Diagnosed all network issues by means of Open Source tools spanning all OSI Layers. Implemented Linux as file and backup server for Windows and Macintosh clients.Setup and maintained Windows NT 4.0 domain/standalone servers.Migrated mail system from Lotus Notes to Microsoft Exchange.Administered MS SQL server 7.0.Designed Network/System monitoring system with Red Hat Linux.Created Web based e-mail system using Linux and PHP.Performed system administration of several operating systems including: Sun, Linux, BSD, Windows NT/9x, and Macintosh. Designed and implemented security procedures and guidelines for Internet connectivity and satellite offices.Built servers with custom-made Linux distribution focused on disk performance and memory management.
  • Comcast
    Security Analyst
    Comcast 2001 - 2001
    Philadelphia, Pa, Us
    Deploy and maintain company firewalls running Checkpoint Firewall-1 on Nokia IP 330s (IPSO)Write ACLs for Extreme and Cisco switches/routers providing access to all regional data centers and NOC.Manage VPN tunnels to regional data centers with Nokia CC 250 VPNsExecuted penetration testing of firewalls, VPNs, routers, switches, and servers.Performed security auditing using Nessus, SAINT, Retina, dsniff, and ngrep.Secured Oracle database servers running on Sun Solaris systems.Migrated existing data center to new hosting facilitySetup Inktomi Traffic servers as proxy/caching servers at regional data centers throughout the East Coast.Assisted in the architecture of a secure nationwide network.Created technical documentation templates for the setup of a ISP.

Harry Hoffman Skills

Network Security Security Information Security Strategic Planning Leadership Enterprise Architecture Penetration Testing Vulnerability Assessment Information Security Management Information Security Architecture Cloud Security Pci Dss Project Management Computer Forensics Data Privacy Information Assurance Incident Response It Risk Management Cybersecurity Risk Management Cloud Computing Software Engineering Regulatory Compliance Business Continuity Planning It Governance U.s. Federal Information Security Management Act Organizational Governance Linux Computer Security Solaris Firewalls Apache Network Administration Linux System Administration System Administration Red Hat Linux Perl Networking Mysql Snort Ldap Administration Jumpstart Cisco Routers Asterisk Cfengine Cobbler Network Engineering Netflow Programming Disaster Recovery Puppet Configuration Management Tcp/ip Unix Osf/1 Aix Administration Postgresql Ldap Vpn Cisco Technologies Servers Postfix Cisco Systems Products

Harry Hoffman Education Details

  • Temple University
    Temple University
    Computer Science

Frequently Asked Questions about Harry Hoffman

What company does Harry Hoffman work for?

Harry Hoffman works for Northeastern University

What is Harry Hoffman's role at the current company?

Harry Hoffman's current role is AVP and CTSO - Chief Technology and Security Officer.

What is Harry Hoffman's email address?

Harry Hoffman's email address is hh****@****mit.edu

What is Harry Hoffman's direct phone number?

Harry Hoffman's direct phone number is +141068*****

What schools did Harry Hoffman attend?

Harry Hoffman attended Temple University.

What are some of Harry Hoffman's interests?

Harry Hoffman has interest in Collecting Antiques, Exercise, Sweepstakes, Home Improvement, Reading, Sports, The Arts, Home Decoration, Health, Children.

What skills is Harry Hoffman known for?

Harry Hoffman has skills like Network Security, Security, Information Security, Strategic Planning, Leadership, Enterprise Architecture, Penetration Testing, Vulnerability Assessment, Information Security Management, Information Security Architecture, Cloud Security, Pci Dss.

Who are Harry Hoffman's colleagues?

Harry Hoffman's colleagues are Yan Zhou, Todd Larson, Jing Chen, Yang Lee, Amanda Glime, Gavin Flood, Petson Baiju.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.