Jeff Youmans Email and Phone Number
Jeff Youmans work email
- Valid
- Valid
- Valid
- Valid
- Valid
Jeff Youmans personal email
- Valid
Jeff Youmans phone numbers
Strategic IT Security Leader | Infrastructure Architecture | Cybersecurity Innovation | Risk Mitigation | Compliance Management | Incident Response Authority
-
Director Of Cyber SecurityStanley Black & Decker, Inc.Gainesville, Fl, Us -
Director & Head Of Cyber SecurityHoliday Inn Club Vacations Jun 2021 - PresentOrlando, Florida, UsIn my role as Director and Head of Cybersecurity is to be a transformational leader. I built and now supervised comprehensive cybersecurity strategies including cyber engineering, intake and assurance, and identity governance. My leadership encompasses integrating new cyber technologies, leadership for skilled security teams, strategic budget allocation, and continuous improvement of the brand's security posture. I implemented a metrics program with Key Performance and Key Risk Indicators to monitor both baseline security requirements and program health. I provide technical direction for enterprise network systems, crafting execution plans, and designing information security architectures to fortify data security. Furthermore, I lead comprehensive evaluations of security services, including security assessments, thorough scrutiny of security events, policy reviews, lifecycle management of hardware and software, and the refinement of cybersecurity methodologies.★ I oversee firewalls, security information and event management, web application firewalls, cloud environments, virtual environments, Windows and Linux/Unix servers, and EDR and vulnerability management tools while creating CI/CD pipeline security processes and conducting incident response efforts.★ I monitored customer trends, assessed business risks, and addressed security needs by comprehending business practices and strategic objectives.★ I crafted information security architectures, evaluating existing security capabilities and identifying gaps while formulating future roadmaps aligned with IT and corporate strategies★ I overseeing the cyber budget, managed vendors and negotiations, optimized and organized resource allocation, while implementing cost-effective training initiatives; instituted robust corporate-wide training to elevate cybersecurity awareness across organization and minimize cyber risks. -
ProfessorSt. Petersburg College Aug 2008 - PresentPinellas County, Florida, UsIn my capacity as Adjunct Professor, I delivered captivating course content and provided timely, constructive feedback on assignments and assessments, thereby aiding in the continuous improvement of my students' cybersecurity skills. Additionally, I championed and supported my students in various cybersecurity-related competitions and projects, encouraging them to apply knowledge in practical, real-world scenarios. Furthermore, I immersed myself in the latest developments, including emerging threats, cutting-edge technologies, and industry best practices.Key achievements and contributions during this tenure include:★ I administered comprehensive assessments and examinations to accurately gauge student progress, leveraging a deep subject matter expertise. Provided valuable mentorship in cybersecurity careers, offering guidance in career.★ I facilitated specialized cybersecurity workshops for professionals, enhancing the institution's outreach; designed practical assignments and field experiences, seamlessly integrating course materials for effective upskilling.★ I developed lectures, aligned with course objectives, and fostered student engagement through dynamic classroom discussions; collaborated with faculty to enhance course materials and ensure alignment with learning objectives.★ I evaluated student performance through assignments, quizzes, exams, and projects; provided timely, constructive feedback to enhance skills, fostered inclusivity, and enriched educational quality via collaborative efforts, optimizing learning outcomes. -
Board MemberXtraordinary Joy Nov 2017 - PresentVolunteer Executive Board Member
-
Deputy Chief Information Security OfficerMurphy Usa Jan 2020 - Apr 2021El Dorado, Arkansas, UsOrchestrated a cross-functional team to develop and execute a comprehensive cybersecurity strategy. Oversaw the successful deployment of a robust Identity and Access Management (IAM) system to significantly reduce the associated risk of unauthorized access. Implemented a proactive risk management framework that identified/mitigated potential security compliance risks, and decreased security incidents, and financial losses. Gathered and analyzed business requirements to devise and deliver technical solutions. Devised and implemented new systems and assessment frameworks for local entities/vendors by collaborating with external consultants and risk management teams. Oversaw organization-wide execution of IT risk strategies with changes as per environmental practices, standards, and regulations for highly complex portfolio IT systems and core infrastructure. Ensured compliance with accepted Data Security Standards. Coordinated local IT infrastructure and team to lead multiple security technologies in monitoring and fixing IT security incidents, thoroughly evaluating security risks and recommending cost-effective preventative measures in collaboration with potential clients. Accomplished on-site security assessments in multiple office locations as part of a comprehensive project to ensure optimal preparedness for cyber-attacks. Delivered remote troubleshooting as necessary during suspected cyber-attacks or vulnerabilities. Championed security compliance activities by leveraging NIST CSF and control requirements. Led swift incident response efforts to mitigate potential security breaches and minimize downtime during critical incidents or attacks to ensure operational continuity. Designed and executed a resilient cybersecurity architecture that reduced vulnerabilities and protected sensitive information/data from cyber threats, deploying cutting-edge security technologies, cutting-edge industry practices, and cybersecurity strategies. -
Vp, Regional Information Security ManagerCiti Dec 2017 - Jan 2020New York, New York, UsDirected a team of cybersecurity experts to proactively counter an exceptionally sophisticated cyber-attack. Fostered collaboration with regulatory authorities to drive compliance with industry-specific cybersecurity regulations. Optimized the company's cybersecurity posture by introducing incident response frameworks. Pioneered a platform for sharing critical threat intelligence that enabled early threat detection and prevention. Served as a driving force for the successful security implementation of large projects, delivered analytical recommendations, and leveraged emerging technologies and virtualization platform solutions for different clients across several industries. Played an active role as mentor, trainer, and leader for a team of competent engineers to carry out deployment of numerous Windows server platforms, Cisco firewalls, and different VMware solutions, ensuring coordination with industry vendors. Instituted and influenced new security programs, introduced disaster site recovery strategies and compliance programs, and led the systematic implementation of security controls, such as APIs, web application firewalls, and prevention systems. Accomplished installation of access management systems, such as two-factor (RSA) authentication, single-sign-on, and radius. Assured the consistent implementation of security protocols on all server systems by applying a virtual infrastructure. Collected queries regarding enterprise information security design modifications, network appliances, operating systems, databases, and applications to formulate internal policies and procedures based on insights for robust information security.\ Uncovered, categorized, and communicated security risks with the senior management team to encourage balanced decisions based on associated risk factors. Developed ASP risk profile for service providers with detailed security compliance concerns. -
Volunteer / Ambassador FamilyChildren'S Miracle Network Hospitals Sep 2016 - Jan 2020Salt Lake City, Ut, UsAs an Ambassador Family for the Children’s Miracle Network, my family and I support University of Florida Health System through appearances and speaking engagements. We have had the pleasure, on numerous occasions to speak with large corporate entities and large groups of high school and college aged volunteers. The objective of these speaking engagement is to provide motivation, direction and purpose. -
Information Security Technical ArchitectHumana Inc. Apr 2015 - Dec 2017Crafted and executed an adaptable and resilient cloud-based security architecture for a substantial reduction of security vulnerabilities. Led the seamless integration of zero-trust security principles into the organizational infrastructure. Oversaw the successful implementation of advanced security automation solutions to streamline manual security tasks and determine/address security flaws or vulnerabilities. Directed a pivotal role in strengthening data security through the execution of advanced encryption protocols and multi-factor authentication systems. Ensured stringent compliance with industry regulations of incident response plans that bolstered resilience. Conducted exhaustive risk assessments to determine vulnerabilities and eradicate the risk of data breaches as per defined policy statements. Prepared and managed security documentation consisting of security policies, systems, and procedures for clients and teams. Architected and installed VoIP phone systems, deployed Cisco’s latest technologies, such as routers, firewalls, and switches, and led comprehensive IT-related functions/operations, as well as performed systems setups and configuration for achieving KPIs. Devised large-scale solutions for service providers, managed service providers, and enterprise customers, and led solution architects in compliance with current policies and industry regulations. Drove the execution of industry standards controls via tech solutions. Designed and implemented process improvements to perform security risk assessments and directed partner development resources through the design and delivery phases while providing technical design leadership based on best practices and design patterns. Carried out prompt analysis of different malicious and standard alerts received through consistent evaluation. Developed technical designs as per best practices and industry standards and managed systems operations in collaboration with cross-functional teams.
-
Us Department Of Veteran Affairs - Grc Project ManagerMerlin International Sep 2010 - Apr 2015Tysons, Va, UsIn my tenure at Merlin International I held two separate roles, both of which were in direct support to the US Government. In my first role I performed and lead IT security oversight and assessment in support of US Special Operations Command (USSOCOM) WAN optimization efforts. In the second role I was the program manager contracted to the US Department of Veterans Affairs (VA) tasked with planning, designing and oversight of the new and global Governance, Risk and Compliance (GRC) application. I implemented the overall project (agile) lifecycle planning including supervision of application installation and configuration teams. -
Security ArchitectCtc Jun 2007 - Sep 2010In this role I lead and performed advanced research and development of web services, protocols and technologies under direct funding from the congressional budget. I was also a technology ambassador through numerous public speaking engagements. I collaborated with several government agencies (DIA, NRO, DoE, ONI) on the use of web service for various implementations including cross-domain support. The objective in this role was to provide the various government leaders the ability to ask the right questions, evaluate new web-based technologies and contract applicable services.
-
Designated Accrediting Authority RepresentativeDefense Intelligence Agency / Saic Jul 1997 - Jun 2007Reston, Va, UsIn my first role outside of military service I performed in three separate positions over ten years. The first role was as the Information System Security Manager (ISSM) for a large, secure government facility. I hired and supervised a small staff of professionals who assisted in the team’s technical responsibilities. These responsibilities included the design and implementation of a training and awareness program, access controls program, asset / configuration management, Communication Security (COMSEC) maintenance and an annual facility certification program. My second role at SAIC provided me the opportunity to be the chief security engineer for a large Office of Secretary of Defense (OSD) advanced research project. My role was to assist in the design and security of an Access Control, JSR-168 compliant Web portal. This was the predecessor to today’s ‘As A Service’ environments. My final role with SAIC assigned me as a designated accreditation Authority Rep for the Defense Intelligence Agency (DIA). In this position I was assigned assurance and oversight responsibilities for emerging web based technologies. -
Sergeant; Intelligence Collection ManagerUs Army; 7Th Special Forces Group Feb 1991 - Apr 1997Arlington, Virginia, UsAs a US Army Special Forces Intelligence professional I deployed with small teams in support of counter narcotic and counter insurgency missions. My role was to collect, analyze, answer and report on the 7th Special Forces Group Commander’s priority information requirements. To do this I used various tactical and national intelligence avenues including imagery, signal and human sources. Additional duties assigned include buffing the floors.
Jeff Youmans Skills
Jeff Youmans Education Details
-
Norwich UniversityInformation Assurance -
Strayer University-MarylandComputer Networking -
Oregon State UniversityComputer Forensics
Frequently Asked Questions about Jeff Youmans
What company does Jeff Youmans work for?
Jeff Youmans works for Stanley Black & Decker, Inc.
What is Jeff Youmans's role at the current company?
Jeff Youmans's current role is Director of Cyber Security.
What is Jeff Youmans's email address?
Jeff Youmans's email address is je****@****usa.com
What is Jeff Youmans's direct phone number?
Jeff Youmans's direct phone number is +181242*****
What schools did Jeff Youmans attend?
Jeff Youmans attended Norwich University, Strayer University-Maryland, Oregon State University.
What skills is Jeff Youmans known for?
Jeff Youmans has skills like Information Security, Security, Cissp, Information Assurance, Network Security, Information Security Management, Computer Security, Information Technology, Program Management, Vulnerability Assessment, Integration, Vulnerability Management.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial