Jeff Youmans

Jeff Youmans Email and Phone Number

Director of Cyber Security @ Stanley Black & Decker, Inc.
Gainesville, FL, US
Jeff Youmans's Location
Gainesville Metropolitan Area, United States, United States
About Jeff Youmans

Strategic IT Security Leader | Infrastructure Architecture | Cybersecurity Innovation | Risk Mitigation | Compliance Management | Incident Response Authority

Jeff Youmans's Current Company Details
Stanley Black & Decker, Inc.

Stanley Black & Decker, Inc.

View
Director of Cyber Security
Gainesville, FL, US
Jeff Youmans Work Experience Details
  • Stanley Black & Decker, Inc.
    Director Of Cyber Security
    Stanley Black & Decker, Inc.
    Gainesville, Fl, Us
  • Holiday Inn Club Vacations
    Director & Head Of Cyber Security
    Holiday Inn Club Vacations Jun 2021 - Present
    Orlando, Florida, Us
    In my role as Director and Head of Cybersecurity is to be a transformational leader. I built and now supervised comprehensive cybersecurity strategies including cyber engineering, intake and assurance, and identity governance. My leadership encompasses integrating new cyber technologies, leadership for skilled security teams, strategic budget allocation, and continuous improvement of the brand's security posture. I implemented a metrics program with Key Performance and Key Risk Indicators to monitor both baseline security requirements and program health. I provide technical direction for enterprise network systems, crafting execution plans, and designing information security architectures to fortify data security. Furthermore, I lead comprehensive evaluations of security services, including security assessments, thorough scrutiny of security events, policy reviews, lifecycle management of hardware and software, and the refinement of cybersecurity methodologies.★ I oversee firewalls, security information and event management, web application firewalls, cloud environments, virtual environments, Windows and Linux/Unix servers, and EDR and vulnerability management tools while creating CI/CD pipeline security processes and conducting incident response efforts.★ I monitored customer trends, assessed business risks, and addressed security needs by comprehending business practices and strategic objectives.★ I crafted information security architectures, evaluating existing security capabilities and identifying gaps while formulating future roadmaps aligned with IT and corporate strategies★ I overseeing the cyber budget, managed vendors and negotiations, optimized and organized resource allocation, while implementing cost-effective training initiatives; instituted robust corporate-wide training to elevate cybersecurity awareness across organization and minimize cyber risks.
  • St. Petersburg College
    Professor
    St. Petersburg College Aug 2008 - Present
    Pinellas County, Florida, Us
    In my capacity as Adjunct Professor, I delivered captivating course content and provided timely, constructive feedback on assignments and assessments, thereby aiding in the continuous improvement of my students' cybersecurity skills. Additionally, I championed and supported my students in various cybersecurity-related competitions and projects, encouraging them to apply knowledge in practical, real-world scenarios. Furthermore, I immersed myself in the latest developments, including emerging threats, cutting-edge technologies, and industry best practices.Key achievements and contributions during this tenure include:★ I administered comprehensive assessments and examinations to accurately gauge student progress, leveraging a deep subject matter expertise. Provided valuable mentorship in cybersecurity careers, offering guidance in career.★ I facilitated specialized cybersecurity workshops for professionals, enhancing the institution's outreach; designed practical assignments and field experiences, seamlessly integrating course materials for effective upskilling.★ I developed lectures, aligned with course objectives, and fostered student engagement through dynamic classroom discussions; collaborated with faculty to enhance course materials and ensure alignment with learning objectives.★ I evaluated student performance through assignments, quizzes, exams, and projects; provided timely, constructive feedback to enhance skills, fostered inclusivity, and enriched educational quality via collaborative efforts, optimizing learning outcomes.
  • Xtraordinary Joy
    Board Member
    Xtraordinary Joy Nov 2017 - Present
    Volunteer Executive Board Member
  • Murphy Usa
    Deputy Chief Information Security Officer
    Murphy Usa Jan 2020 - Apr 2021
    El Dorado, Arkansas, Us
    Orchestrated a cross-functional team to develop and execute a comprehensive cybersecurity strategy. Oversaw the successful deployment of a robust Identity and Access Management (IAM) system to significantly reduce the associated risk of unauthorized access. Implemented a proactive risk management framework that identified/mitigated potential security compliance risks, and decreased security incidents, and financial losses. Gathered and analyzed business requirements to devise and deliver technical solutions. Devised and implemented new systems and assessment frameworks for local entities/vendors by collaborating with external consultants and risk management teams. Oversaw organization-wide execution of IT risk strategies with changes as per environmental practices, standards, and regulations for highly complex portfolio IT systems and core infrastructure. Ensured compliance with accepted Data Security Standards.  Coordinated local IT infrastructure and team to lead multiple security technologies in monitoring and fixing IT security incidents, thoroughly evaluating security risks and recommending cost-effective preventative measures in collaboration with potential clients. Accomplished on-site security assessments in multiple office locations as part of a comprehensive project to ensure optimal preparedness for cyber-attacks. Delivered remote troubleshooting as necessary during suspected cyber-attacks or vulnerabilities.  Championed security compliance activities by leveraging NIST CSF and control requirements. Led swift incident response efforts to mitigate potential security breaches and minimize downtime during critical incidents or attacks to ensure operational continuity. Designed and executed a resilient cybersecurity architecture that reduced vulnerabilities and protected sensitive information/data from cyber threats, deploying cutting-edge security technologies, cutting-edge industry practices, and cybersecurity strategies.
  • Citi
    Vp, Regional Information Security Manager
    Citi Dec 2017 - Jan 2020
    New York, New York, Us
    Directed a team of cybersecurity experts to proactively counter an exceptionally sophisticated cyber-attack. Fostered collaboration with regulatory authorities to drive compliance with industry-specific cybersecurity regulations. Optimized the company's cybersecurity posture by introducing incident response frameworks. Pioneered a platform for sharing critical threat intelligence that enabled early threat detection and prevention. Served as a driving force for the successful security implementation of large projects, delivered analytical recommendations, and leveraged emerging technologies and virtualization platform solutions for different clients across several industries. Played an active role as mentor, trainer, and leader for a team of competent engineers to carry out deployment of numerous Windows server platforms, Cisco firewalls, and different VMware solutions, ensuring coordination with industry vendors.  Instituted and influenced new security programs, introduced disaster site recovery strategies and compliance programs, and led the systematic implementation of security controls, such as APIs, web application firewalls, and prevention systems. Accomplished installation of access management systems, such as two-factor (RSA) authentication, single-sign-on, and radius. Assured the consistent implementation of security protocols on all server systems by applying a virtual infrastructure. Collected queries regarding enterprise information security design modifications, network appliances, operating systems, databases, and applications to formulate internal policies and procedures based on insights for robust information security.\ Uncovered, categorized, and communicated security risks with the senior management team to encourage balanced decisions based on associated risk factors. Developed ASP risk profile for service providers with detailed security compliance concerns.
  • Children'S Miracle Network Hospitals
    Volunteer / Ambassador Family
    Children'S Miracle Network Hospitals Sep 2016 - Jan 2020
    Salt Lake City, Ut, Us
    As an Ambassador Family for the Children’s Miracle Network, my family and I support University of Florida Health System through appearances and speaking engagements. We have had the pleasure, on numerous occasions to speak with large corporate entities and large groups of high school and college aged volunteers. The objective of these speaking engagement is to provide motivation, direction and purpose.
  • Humana Inc.
    Information Security Technical Architect
    Humana Inc. Apr 2015 - Dec 2017
    Crafted and executed an adaptable and resilient cloud-based security architecture for a substantial reduction of security vulnerabilities. Led the seamless integration of zero-trust security principles into the organizational infrastructure. Oversaw the successful implementation of advanced security automation solutions to streamline manual security tasks and determine/address security flaws or vulnerabilities. Directed a pivotal role in strengthening data security through the execution of advanced encryption protocols and multi-factor authentication systems. Ensured stringent compliance with industry regulations of incident response plans that bolstered resilience. Conducted exhaustive risk assessments to determine vulnerabilities and eradicate the risk of data breaches as per defined policy statements. Prepared and managed security documentation consisting of security policies, systems, and procedures for clients and teams. Architected and installed VoIP phone systems, deployed Cisco’s latest technologies, such as routers, firewalls, and switches, and led comprehensive IT-related functions/operations, as well as performed systems setups and configuration for achieving KPIs.  Devised large-scale solutions for service providers, managed service providers, and enterprise customers, and led solution architects in compliance with current policies and industry regulations. Drove the execution of industry standards controls via tech solutions.  Designed and implemented process improvements to perform security risk assessments and directed partner development resources through the design and delivery phases while providing technical design leadership based on best practices and design patterns. Carried out prompt analysis of different malicious and standard alerts received through consistent evaluation. Developed technical designs as per best practices and industry standards and managed systems operations in collaboration with cross-functional teams.
  • Merlin International
    Us Department Of Veteran Affairs - Grc Project Manager
    Merlin International Sep 2010 - Apr 2015
    Tysons, Va, Us
    In my tenure at Merlin International I held two separate roles, both of which were in direct support to the US Government. In my first role I performed and lead IT security oversight and assessment in support of US Special Operations Command (USSOCOM) WAN optimization efforts. In the second role I was the program manager contracted to the US Department of Veterans Affairs (VA) tasked with planning, designing and oversight of the new and global Governance, Risk and Compliance (GRC) application. I implemented the overall project (agile) lifecycle planning including supervision of application installation and configuration teams.
  • Ctc
    Security Architect
    Ctc Jun 2007 - Sep 2010
    In this role I lead and performed advanced research and development of web services, protocols and technologies under direct funding from the congressional budget. I was also a technology ambassador through numerous public speaking engagements. I collaborated with several government agencies (DIA, NRO, DoE, ONI) on the use of web service for various implementations including cross-domain support. The objective in this role was to provide the various government leaders the ability to ask the right questions, evaluate new web-based technologies and contract applicable services.
  • Defense Intelligence Agency / Saic
    Designated Accrediting Authority Representative
    Defense Intelligence Agency / Saic Jul 1997 - Jun 2007
    Reston, Va, Us
    In my first role outside of military service I performed in three separate positions over ten years. The first role was as the Information System Security Manager (ISSM) for a large, secure government facility. I hired and supervised a small staff of professionals who assisted in the team’s technical responsibilities. These responsibilities included the design and implementation of a training and awareness program, access controls program, asset / configuration management, Communication Security (COMSEC) maintenance and an annual facility certification program. My second role at SAIC provided me the opportunity to be the chief security engineer for a large Office of Secretary of Defense (OSD) advanced research project. My role was to assist in the design and security of an Access Control, JSR-168 compliant Web portal. This was the predecessor to today’s ‘As A Service’ environments. My final role with SAIC assigned me as a designated accreditation Authority Rep for the Defense Intelligence Agency (DIA). In this position I was assigned assurance and oversight responsibilities for emerging web based technologies.
  • Us Army; 7Th Special Forces Group
    Sergeant; Intelligence Collection Manager
    Us Army; 7Th Special Forces Group Feb 1991 - Apr 1997
    Arlington, Virginia, Us
    As a US Army Special Forces Intelligence professional I deployed with small teams in support of counter narcotic and counter insurgency missions. My role was to collect, analyze, answer and report on the 7th Special Forces Group Commander’s priority information requirements. To do this I used various tactical and national intelligence avenues including imagery, signal and human sources. Additional duties assigned include buffing the floors.

Jeff Youmans Skills

Information Security Security Cissp Information Assurance Network Security Information Security Management Computer Security Information Technology Program Management Vulnerability Assessment Integration Vulnerability Management Risk Assessment Security Management Leadership Penetration Testing Enterprise Architecture Risk Management Security Clearance System Administration Disaster Recovery Computer Forensics Governance Pci Dss Firewalls Nist Incident Response Security Audits Security Policy Business Continuity Application Security Security Architecture Design Intrusion Detection Ids Identity Management Malware Analysis Security+ Sdlc Cism It Audit Ceh Cisa Network Architecture Cobit Payment Card Industry Data Security Standard Iso 27001 Ips Fisma Itil

Jeff Youmans Education Details

  • Norwich University
    Norwich University
    Information Assurance
  • Strayer University-Maryland
    Strayer University-Maryland
    Computer Networking
  • Oregon State University
    Oregon State University
    Computer Forensics

Frequently Asked Questions about Jeff Youmans

What company does Jeff Youmans work for?

Jeff Youmans works for Stanley Black & Decker, Inc.

What is Jeff Youmans's role at the current company?

Jeff Youmans's current role is Director of Cyber Security.

What is Jeff Youmans's email address?

Jeff Youmans's email address is je****@****usa.com

What is Jeff Youmans's direct phone number?

Jeff Youmans's direct phone number is +181242*****

What schools did Jeff Youmans attend?

Jeff Youmans attended Norwich University, Strayer University-Maryland, Oregon State University.

What skills is Jeff Youmans known for?

Jeff Youmans has skills like Information Security, Security, Cissp, Information Assurance, Network Security, Information Security Management, Computer Security, Information Technology, Program Management, Vulnerability Assessment, Integration, Vulnerability Management.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.