James Edmiston

James Edmiston Email and Phone Number

Senior Security Analyst at Intuit @ Intuit
mountain view, california, united states
James Edmiston's Location
San Diego, California, United States, United States
James Edmiston's Contact Details

James Edmiston work email

James Edmiston personal email

About James Edmiston

Information Security professional, passionate about learning and continuing to grow in order to ensure the protection of company proprietary information while still enabling business and providing value.

James Edmiston's Current Company Details
Intuit

Intuit

View
Senior Security Analyst at Intuit
mountain view, california, united states
Website:
intuit.com
Employees:
12187
James Edmiston Work Experience Details
  • Intuit
    Senior Security Analyst
    Intuit Jun 2018 - Present
    San Diego, California
    Incident Response/Blue Team | Intuit Information Security • Perform analysis of web traffic: prevent, detect, and protect against threats using packet captures, flow and log analysis. • Conduct research on open source information and other sources to identify potential web attacks and threats impacting our web applications. • Research, recommend, and implement new security solutions, products and controls. • Monitor and maintain web filtering. • Apply strategic and… Show more Incident Response/Blue Team | Intuit Information Security • Perform analysis of web traffic: prevent, detect, and protect against threats using packet captures, flow and log analysis. • Conduct research on open source information and other sources to identify potential web attacks and threats impacting our web applications. • Research, recommend, and implement new security solutions, products and controls. • Monitor and maintain web filtering. • Apply strategic and tactical responses in real-time in a high stress and changing environment. • Provide mentoring to staff as a means to develop job satisfaction and coordinates cross training opportunities with other technical support groups. • Strong understanding of incident response processes, cyber threats, vulnerabilities and network exploits. • Perform analysis of various system logs (e.g., Windows System, Application, Event logs, Linux, Email, Web server, DNS, DHCP, VPN, Proxy, IDS). • Perform ad-hoc vulnerability assessment scanning. • Analyze malware of email and web-based threats. • Analyze vulnerabilities, determine impact, write alerts and advisories and implement remediation. • Centrally monitor critical systems and respond to security events according to procedure. • Collaborate with neighboring security teams and compliance functions to implement consistent security safeguards and controls for the company. Show less
  • San Diego County Credit Union
    It Security Analyst
    San Diego County Credit Union Jan 2018 - Jun 2018
    Greater San Diego Area
    • First point of contact for Service Desk and Business Units for security related issues.• Perform problem resolution of escalated IT Security issues for all departments and branch offices.• Directly responsible for managing enterprise email management service in a DLP role.• Review messages for malicious activity and sensitive information.• Review and document incoming alerts from security services for malicious activity.• Primary point of contact between SDCCU and security… Show more • First point of contact for Service Desk and Business Units for security related issues.• Perform problem resolution of escalated IT Security issues for all departments and branch offices.• Directly responsible for managing enterprise email management service in a DLP role.• Review messages for malicious activity and sensitive information.• Review and document incoming alerts from security services for malicious activity.• Primary point of contact between SDCCU and security related vendor applications.• Monitor security applications to ensure that appropriate versions are installed; perform upgrades as needed.• Perform and review vulnerability scans using Tenable; work with teams to perform remediation as needed.• Review Checkpoint firewalls for network activity.• Review all firewall change requests for risk and provide approvals and/or recommendations for improvements.• Perform administration of endpoint security technologies.• Perform maintenance of end user and vendor VPN profiles and certificates in Checkpoint.• Perform weekly controls testing on end users computers to ensure compliance with enterprise Information Security Program.• Research malware attacks throughout the industry to better learn and understand how to implement protections against them.• Perform reviews of server certificates, including renewals or reissues.• Assist in technical IT Security related projects as directed by management.• Provide escalated support for afterhours security issues.• Provide tier 3 technical IT Security support to all departments and branch offices.• Assist in vendor selection and software/equipment purchasing.• Maintain and administer software licensing of IT Security applications. Show less
  • Qualcomm
    It Security Engineer
    Qualcomm Jan 2017 - Dec 2017
    Greater San Diego Area
    Global Cyber and Incident Response Team• Member of the Cyber Security Incident Response team• Perform security event monitoring and response for a global enterprise of over 30,000 employees• Utilized Phantom Orchestration Engine to analyze security events related to phishing, sinkhole, Palo Alto firewalls, SCEP, and Bit9/Carbon Black• Utilize Splunk to look for and take appropriate action on discovered Indicators of Compromise, perform log analysis, and communicate potential… Show more Global Cyber and Incident Response Team• Member of the Cyber Security Incident Response team• Perform security event monitoring and response for a global enterprise of over 30,000 employees• Utilized Phantom Orchestration Engine to analyze security events related to phishing, sinkhole, Palo Alto firewalls, SCEP, and Bit9/Carbon Black• Utilize Splunk to look for and take appropriate action on discovered Indicators of Compromise, perform log analysis, and communicate potential threats to management• Receive requests for adjustment of local Windows Firewall policy, analyze risk, and implement approved changes via Powershell• Utilized JIRA to manage and track User Acceptance Testing of development activities• Familiar with Splunk, Powershell, Bit9/Carbon Black• Some basic familiarity with AWS: Setting up instances, configuring security groups, assigning storage, assigning and configuring Identity roles Show less
  • Qualcomm
    It Security Engineer
    Qualcomm Apr 2013 - Jan 2017
    Greater San Diego Area
    Security Architecture Team: Perform risk assessments of network and border access controls. Perform consultation on the redesign of interconnected business systems and services to minimize exposure footprint and reduce network communications risk. Ensure resulting configurations are compliant with company policies. Analyze host intrusion prevention services to reduce attack surface minimizing risk and controlling access to sensitive applications on local… Show more Security Architecture Team: Perform risk assessments of network and border access controls. Perform consultation on the redesign of interconnected business systems and services to minimize exposure footprint and reduce network communications risk. Ensure resulting configurations are compliant with company policies. Analyze host intrusion prevention services to reduce attack surface minimizing risk and controlling access to sensitive applications on local machines. Provide general consultations to customers on questions regarding compliance with security policies, security architecture, risk management and access controls. First point of contact in triaging emergency requests for security control configuration changes. Analyze communication security status for electronic messaging services, ensuring compliance with company policies regarding cryptographic transmissions of sensitive data over public networks. Review vulnerability assessment data related to exposed services on Internet facing systems. Work with Qualcomm business owners to ensure appropriate security posture, including hardened configurations and software patching, thereby reducing risk and ensuring compliance with company policies. Review requests for all externally facing websites to ensure appropriate security and risk management review as well as compliance with Qualcomm policy prior to production launch. Conduct interviews with external vendor staff to assess vendor security posture and maturity of security processes. Build reports analyzing vendor security posture to assist Qualcomm in selecting the most qualified company to perform services with minimal risk. Show less
  • Qualcomm
    It Support Analyst
    Qualcomm Jun 2009 - Apr 2013
    Greater San Diego Area
    IT Support Analyst: Assisted Qualcomm employees with management of passwords for Windows, UNIX, DMZ, and RSA SecureID Tokens. Utilized Active Directory to manage security groups and organizational units. Manage and troubleshoot access to company wireless access points. Manage and troubleshoot endpoint security encryption on local systems. Manage and troubleshoot McAfee Host Intrusion Prevention software configurations on local systems. Manage Lockbox… Show more IT Support Analyst: Assisted Qualcomm employees with management of passwords for Windows, UNIX, DMZ, and RSA SecureID Tokens. Utilized Active Directory to manage security groups and organizational units. Manage and troubleshoot access to company wireless access points. Manage and troubleshoot endpoint security encryption on local systems. Manage and troubleshoot McAfee Host Intrusion Prevention software configurations on local systems. Manage Lockbox technologies to store and protect local host and host intrusion prevention passwords. Troubleshoot and resolve networking issues for local hosts and servers. Troubleshoot and resolve local host and server backup operations. Educate Qualcomm employees on good physical security practices. Educate Qualcomm employees on current social engineering tactics. Educate Qualcomm employees on corporate policies and IT best practices. Show less
  • Eds
    Software Distribution (Novadigm)
    Eds Sep 2003 - Oct 2008
    Perform remote installations of software applications in support of the Navy and Marine Corps computer networks. Utilize Radia via Novadigm for installation, removal, maintenance, and troubleshooting of software applications. Also responsible for the creation and maintenance of application groups in an Active Directory environment. Currently service over 300,000 machines and 500,000 users.Security Clearance: Top Secret (SSBI)
  • The Sutherland Group
    Help Desk Technician (Gateway)
    The Sutherland Group Feb 2003 - Sep 2003
    Performed duties as a computer technician over the phone, servicing Gateway customers in areas of hardware troubleshooting, removal, replacement, and installation. Other areas of assistance include: Microsoft application assistance, Operating systems configuration and installation, and multiple software installations/removals/configurations.
  • Us Army
    Instructor
    Us Army Dec 1999 - Feb 2003
    Performed duties as an instructor to Basic Training, ROTC Cadets, and Permanent Party soldiers in areas such as First Aid, Leadership Duties, Basic Rifle Marksmanship, etc located at Fort Knox, Kentucky.Security Clearance: Secret
  • Us Army
    Infantryman
    Us Army Jun 1995 - Dec 1999
    Performed duties as an Heavy Weapons Specialist/Infantryman with a line company at Fort Drum, New York, 10th Mountain Division, XVIII Airborn Corps.Security Clearance: Secret

James Edmiston Skills

Troubleshooting Active Directory Security Operating Systems Windows 7 Computer Hardware Network Security Networking Hardware Unix Help Desk Support Vmware Servers System Administration Windows Software Installation Information Technology Windows Server Information Security Itil Tcp/ip Linux System Deployment Technical Support It Operations Software Documentation It Management Switches Bmc Remedy Windows Xp It Service Management Virtualization Incident Management Routers Storage Microsoft Exchange Visio Vpn Vmware Esx Citrix

James Edmiston Education Details

Frequently Asked Questions about James Edmiston

What company does James Edmiston work for?

James Edmiston works for Intuit

What is James Edmiston's role at the current company?

James Edmiston's current role is Senior Security Analyst at Intuit.

What is James Edmiston's email address?

James Edmiston's email address is ed****@****ail.com

What is James Edmiston's direct phone number?

James Edmiston's direct phone number is +185865*****

What schools did James Edmiston attend?

James Edmiston attended Coleman College, Remington College, Morse High School.

What are some of James Edmiston's interests?

James Edmiston has interest in Programming, Technology, Network Security, Computer Networks, Palo Alto Firewalls, Sans, Perl.

What skills is James Edmiston known for?

James Edmiston has skills like Troubleshooting, Active Directory, Security, Operating Systems, Windows 7, Computer Hardware, Network Security, Networking, Hardware, Unix, Help Desk Support, Vmware.

Who are James Edmiston's colleagues?

James Edmiston's colleagues are Judy Tharpe, John Acpd, Marius Costache, Aoife Dill, Mackenzie Taylor, Samantha Valenzuela, Juan Luis Aguilar-Galindo Jiménez.

Not the James Edmiston you were looking for?

  • James Edmiston

    Principal Founding Partner At St. George Resource Partners, Llc
    Houston, Tx
    3
    harvestnr.com, harvestnr.com, fuqua.duke.edu

    2 +128189XXXXX

  • James Edmiston

    After Sales Engineer
    Sanford, Fl
  • James Edmiston

    Business Data Analyst At Liberty University
    Evington, Va
    5
    questinfosys.com, dell.com, questis.com, liberty.edu, tidewatersewvac.com

    6 +170386XXXXX

  • James Edmiston

    Engineering Technician / Quality Assurance Inspector Navfac
    United States

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.