James Potter work email
- Valid
James Potter personal email
- Valid
Seasoned leader with over twenty years of experience in the field of Active Directory security. I have had the privilege of serving as a trusted consultant for major companies throughout my career, assisting them in enhancing their security posture and safeguarding their critical systems.During my consulting years, I successfully collaborated with diverse teams, identifying vulnerabilities, implementing robust security measures, and designing comprehensive strategies to mitigate risks associated with Active Directory environments. My expertise lies in understanding the intricacies of Active Directory architecture, access controls, privilege management, authentication protocols, and group policy management. More important than any of that though is striking the balance between cost/usability and security. Each client has different needs here and that is where I come into play, making sure we have the not just the best solution but the right solution.In addition to my consultancy work, I am proud to be the CEO and Founder at DSE. In this role, I lead a talented team of professionals which provide cutting-edge security solutions to some of the world’s largest companies. Our mission is to empower businesses with the knowledge, tools, and support necessary to protect their invaluable digital assets.As an industry thought leader, I actively engage in the security community by speaking at conferences, sharing my insights through publications, and participating in collaborative forums. I strongly believe in fostering a culture of continuous learning and innovation, staying abreast of the latest developments in the security world and developing security solutions to counter nation state threat actors.I am passionate about helping organizations navigate the ever-evolving threat landscape, enabling them to build resilient security frameworks and achieve their business objectives securely and efficiently. Whether it's architecting secure Active Directory environments, conducting comprehensive security assessments, or providing tailored training programs, I am dedicated to delivering exceptional results that surpass client expectations.If you are seeking a seasoned security firm with extensive experience in Active Directory security and a track record of success, I would be thrilled to connect with you. Let's explore how my expertise and my company's services can contribute to your organization's security journey.
-
FounderDse Dec 2019 - PresentSeattle, Washington, UsDSE was founded with one simple guiding principle. Do better. Do better by our clients, do better by ourselves and do better than our competitors in every way possible. -
ConsultantPwc Feb 2018 - Sep 2022Gb• Red Forest (ESAE) architecture project with lab and production implementations.• HGS (Host Guardian Service) deployment in a dedicated forest to secure Hyper-V cluster VM’s in both production environments and the Red Forest.• Dynamic local group membership management implemented through a combination of built-in group policy preferences and PowerShell automation which allows for granular temporal server access utilizing shadow principals. -
ConsultantLarge International Communications Provider Jan 2017 - Feb 2018• High security ESAE/Red Forest architecture projects for government clients and other high-profile customers.• Local admin permission creep was becoming an issue and needed to be addressed. Through wildcard group policy preferences and PowerShell temporal admin membership, management of local admins through domain security groups was implemented.• Long term health and performance trending was needed for domain controllers in multiple domains. Using a backend of SQL with PowerShell doing the heavy lifting we were able to identify trending patterns on a web front end as well as receiving performance alerts.
-
ConsultantEy Nov 2016 - Dec 2016London, Gb• PowerShell automation project for Active Directory object provisioning in a large healthcare environment. The automation was the first stage in a high security migration project involving an acquisition that was AWS based. Scripts performed error checking as well as verbose logging and SMTP alerts. All credentials obscured and encrypted. -
ConsultantPwc Jan 2016 - May 2016Gb• Red Forest analysis and design project. Investigated current state then implemented design and deployment documentation detailing the requirements for the install process.• As a prerequisite for the Red Forest implementation a full role-based access control model was implemented for multiple security tiers. IAM controls were hooked in to prevent access loopholes and elevation through provisioning solutions.• AD security risk analysis with a focus around solutions using current application space in order to reduce app sprawl. With many SAAS and partial IAAS implementations needing to be roped in during the process. -
ConsultantEy Dec 2015 - Feb 2016London, Gb• Domain Admin reduction security initiative for human and non-human accounts, architecting role based solutions to remove the need for these domain admins.• Analysis and design recommendation for a Red Forest implementation to help mitigate pass the hash vulnerabilities. -
ConsultantBecu Sep 2015 - Jan 2016Tukwila, Wa, Us• Brought in to establish a working IDM system where only a piecemeal solution existed.• Working closely with HR and data source owners to setup workflows in the RSA IAM suite to automate user/service account/group provisioning and de-provisoining.• Active Directory security audit revealed an active need for privileged account isolation, Red Forest was proposed and a pilot implemented for stakeholder review.• Security delegation to remove the need for wide spread domain admin usage in active directory. Role based model implemented for different usage tiers allowing the removal of the domain admins.• OU and GPO consolidation project to ease maintenance and troubleshooting. -
ConsultantKpmg May 2015 - Aug 2015Toronto, On, Ca• Project goal was to identify all non-human accounts in the AD structure and correlate them with owners with as little staff interaction as possible. Remaining time was spent performing a security audit with an emphasis on Red Forest implementation benefits.• This was accomplished by gathering data using PowerShell and storing it in SQL then performing table references to determine owner(s) and details.• Data was gathered from audit logs to show login source/destination, DNS for short name of server, inventory for server owners, a ticketing system for account owners and active directory. When parsed and arranged in a final table multiple owners were identified for 75% of the service accounts with a methodology that kicked off new data daily. -
Active Directory ArchitectMicrosoft Sep 2012 - Feb 2015Redmond, Washington, Us• Brought in to develop an independent secure forest for the Windows phone project.• All aspects of data gathering design and implementation in addition to deployment for a new forest for the Windows phone development group that enables all the functionality that currently exists in the present environment.• Dynamically updated geographical site map with logical site link data implemented to display replication routes.• PowerShell updated pivot table with detailed site/subnet information for IP planning and networking monitoring in relation to geographical location.• Created a project plan for the new forest infrastructure with supporting features and performed a quantitative cost analysis of the migration vs. current cost. -
Senior ConsultantProsource Solutions Llc Sep 2011 - Sep 2012Richfield, Ohio, Us• At the client I work closely with the AD engineering team to help improve their operational efficiency and security through Group Policy Preferences• Specifically we are implementing a deeper OU hierarchy to replace the relatively flat structure that currently exists. This will allow a tiered out RBAC setup utilizing a least privileged model. • In addition I analyzed current startup/logon VB scripts with the goal of improving login time and presenting a more standardized model. The end results are improved startup time and logins for desktops as well as being more efficient to maintain then legacy scripts.• Some of my other work at SunTrust included advanced PowerShell scripting to enable single/bulk AD item restores through the use of the AD Recycle Bin. These scripts enable the client to quickly and recursively restore entire OU structures to a single user based on the time it was deleted and the name of the object.
James Potter Skills
James Potter Education Details
-
N.I.T.Network Engineering -
A+ -
Ccna -
Cissp -
Itil V2 -
Mcitp: Server Administrator -
Mcp -
Ocsa
Frequently Asked Questions about James Potter
What company does James Potter work for?
James Potter works for Dse
What is James Potter's role at the current company?
James Potter's current role is Founder at DSE.
What is James Potter's email address?
James Potter's email address is ja****@****ail.com
What schools did James Potter attend?
James Potter attended N.i.t., A+, Ccna, Cissp, Itil V2, Mcitp: Server Administrator, Mcp, Ocsa.
What skills is James Potter known for?
James Potter has skills like Active Directory, Powershell, Windows Server, Dns, Security, Iis, Cisco Technologies, Microsoft Sql Server, Switches, Group Policy, Windows, Servers.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial