Jeremiah Batac Email and Phone Number
Jeremiah Batac work email
- Valid
- Valid
- Valid
Jeremiah Batac personal email
- Valid
Jeremiah Batac phone numbers
Outcome-Based Enterprise Data Security Expert
#Netsectap - Cybersecurity Training
View- Website:
- netsectap.com
- Employees:
- 3
-
#Netsectap - Cybersecurity TrainingAshburn, Va, Us -
MemberPresales Collective Jan 2017 - PresentChicago, Illinois, UsThe PreSales Collective is a global community of over 20,000 PreSales professionals brought together to help one another grow and learn. We aim to elevate the PreSales profession by setting the standard of excellence, ensuring PreSales is recognized as an essential contributor to organizational growth, and supporting all PreSales professionals who are charting this course. The PSC is designed to empower the PreSales community with the resources, relationships, and opportunities they need to become the best versions of themselves - inside and outside of work -
Senior Sales EngineerForcepoint Mar 2018 - PresentAustin, Tx, Us• Worked directly new and existing customers and prospects to position our network security solutions ex: Forcepoint DLP, Web/ Email Security, CASB, Insider Threat for success and to shape project requirements• Managed complex technical sales process from initial solution discovery through proof-of-concept, solution workshop and proposal development• Skillfully presented technical merits of Forcepoint security offerings, delivery compelling product demos, and expertly handled technical objections• Successfully exhibited resilience and ability to handle stressful situations effectively while managing several tasks• Proactively lead projects and proof-of-concept engagement while keep other projects on track and up to date• Effectively developed empathy and rapport internally with staff, partners and customers• Demonstrated strong work-ethic and committed to quality• Exhibited excellent negotiation and problem-solving skills. Always looking out to help customers and make then successful with their project goals• Effectively demonstrated high level competency working hands-on in Windows and Linux based environments during proof-of-concept engagements; troubleshooting on-site technical issues, using and configuring Forcepoint security solutions to delivery actionable analytic results, and working closely with the client and Forcepoint engineers to resolve and ensure successful proof-of-concept efforts• Brought practical information security experience to bear to the technical sales effort; including effective demonstration of knowledge of Insider Threat, Web Security, Email Security and Data Loss Prevention solutions• Demonstrated advance understanding of enterprise networking, including SaaS and Cloud solutions, such as AWS, Google Cloud Computing and Microsoft Azure• Provided technical support to the sales teams by creating high quality presentations and rapidly responding to requests for information and helping to craft sales strategies -
Senior Security EngineerGuidepoint Security Dec 2015 - Mar 2018Herndon, Va, Us• Trained on the following security technologies but not limited to ForeScout, CounterACT, Palo Alto, Checkpoint, Juniper, CISCO ASA, FirePower, Sourcefire, Snort, Varonis, RSA, NetWitness, RedSeal, CoreImpact, TripWire IP360, RAPID7, NESSUS, VMWARE, VSPHERE, Fortinet, NMAP, FireMon, LogRhythm, Splunk, Skybox, Voltage SecureMail, Altiris, F5, Balabit, QRADAR, CyberArk, RSA, webroot, Qualys, FireEye, IronMail, Tanium, CarbonBlack, • Performed vulnerability assessments and malware research for majority of our clients. Became the subject matter expert when it comes on making the network more secure in all aspects• Technical lead for internal information security programs• Acted as Hybrid sales and technical when speaking to client engagements and providing architecture recommendations• Worked on multiple security devices such as firewalls, IDS/IPS, NAC, DLP, VPN’s, Application Delivery Controllers, Behavioral Analytics, NetForensics, SecureEmail, and MDM• Worked on multiple hybrid operating systems including all of Windows, RHES, CentOS, Ubuntu, Backtrack, KALI• Utilized security technologies to re-architect and to better our clients security posture which includes but not limited to web application firewalls, anti-DDoS, advance anti-malware, network and forensics and visibility solutions like splunk, logrhythm, arcsight• Keeping up with the industry standards including ISO 27000 series, NIST 800-42, PCI-DSS and 800-53 and other industry related security standards• Worked with network forensic and advanced anti-malware technologies including FireEye and RSA SA/NetWitness• Learned, implemented and managed mobile device security (MDM) -
Senior Cybersecurity AdministratorFhlbanks Office Of Finance Feb 2015 - Dec 2015Reston, Va, Us• Implementation, administration and support and monitoring of the preventative and detective IT security controls within the Office of Finance. Current security controls include: o Malware detection/prevention o Network access controls and Virtual private networks o Network Intrusion Detection Systems o Network and application layer firewalls o Mail / Web spam, virus and content filtering o Endpoint Protection o Remote access and two-factor authentication o Privileged Activity Detection• Ensured all security controls are kept up-to-date and are configured for appropriate effectiveness, as mandated by the Information Security Manager• Managed the policies or rulebases of various security controls.• Responding to and resolving alerts/anomalies through monitoring to ensure appropriate behavior.• Assisted with the preparation of the performance metrics through dashboards and automated reports.• Generated and maintained the administrative documentation such as architecture diagrams and admin manuals, (OF conventions, knowledge base and troubleshooting) operational procedures and processes.• Worked directly with external vendors for support and managed services.• Identify, track and remediate vulnerabilities identified within all security tools• Cross train with other team members in order to support their job functions in their absence• Reviewed and evaluated patch reconnaissance performed by the IT Security Analyst. Recommendedsoftware upgrades and performs upgrades in production.• Performed security tasks during BCP exercises and actual disasters• Participated in occasional after hours and weekend maintenance windows for changes to security and network systems. -
Technical Product Marketing ManagerHp May 2014 - Nov 2014Palo Alto, Ca, Us• Strong understanding of HP Enterprise Security, partner, and competing products and services technologies/concepts in a distributed environment.• Excellent verbal and written communications skills.• Strong analytical skills and ability to work both independently and on cross functional teams• Ability to build strong working relationships across all levels of the organization, including remoteareas.• Sales Engineering and/or Marketing experience in the technology industry.• Ability to function well in a fast-paced, dynamic environment with competing priorities.• Develop cross product integration by writing custom code, scripts and other commercially availabletools.• Create and deliver technical webinars and technical presentations to educate the market, internalteam members and sales.• Build a competitive lab to stay up to date on the latest competitive solutions in the market.• Train Product Management, Product Marketing and field on the reality of our solutions compared tocompetition, customer’s operational challenges and overall market fit.• Create a rich profile of customer challenges, pain points, competitive advantages/weaknesses and target partners that add immediate value to HP ESP’s ecosystem.• Assist with alpha customer validation groups, meet-ups, focus groups and activity.• Served as the security solutions authoritative responder and trusted advisor for internal and externalstakeholders.• Applied broad expertise or technical/ industry knowledge in solving problems that are unique andextremely complex given time, budget and resource constraints.• Demonstrated leadership and vision to contribute strategy decisions.• Demonstrated favorable results through leadership and influencing multiple individuals and groups.• Acted as mentor for new hires.• Proactively contributed ideas and vision to Product Managers on how to gain more respect in thenetwork security field• Working on limited supervision and delivered results in timely manner -
Senior Enterprise Security EngineerUspto Mar 2013 - May 2014Alexandria, Virginia, Us• Open and resolve incident/change and service records.• Collaborate and evaluate engineering and integration initiatives and provide technical support to assess security policies, standards and guidelines.• Monitor, evaluate, and maintain systems and procedures to safeguard internal information systems and databases from unauthorized users and to enhance security.• Use HP Open View to manage applications, device availability, network conditions/status, system performance, service/program maintenance, and storage resources.• Create and update documentation and procedures for a variety of duties in both ITIL and ISO formats.• Author reports on threats, vulnerabilities, and security attacks.• Configure routine firewall changes as requested by clients: update object names or IPs, add objects to groups, and revise rules, etc. • Interact with clients to receive requests, request clarifications, triage, troubleshoot and resolve Network Security issues. • Analyze security and firewall logs and investigate all irregularities as needed.• Actively monitor security newsgroups, announcements, mailing lists and report to the Division Chief with recommendations for patching, mitigating or accept risk. • Provide email and phone support for all client related questions on the subjects of network security troubleshooting, architecture, policies and procedures.• Recommend and implement device baseline modifications for tuning of client devices, in order to minimize “noise” to make for more accurate detection and validation of malicious activity. • Validate attacks against client networks and assessing the impact. • When countermeasures are required, responsible for making appropriate recommendations and working with the client and/or Cyber Security team in implementing the recommendation.• Extrapolate traffic patterns observed via data received from firewalls, NIDS and HIDS to mitigate and reduces the number of false positives and negatives. -
Global Technical Project ManagerSymantec Jul 2008 - Mar 2013San Jose, California, Us• Successfully represented Symantec to other stakeholders including vendors, technical support staff and clients.• Acquired strong project management skills and planning experience. Authored global standard operating procedures.• Established good working relationships with all of my accounts and exceeded most of their expectations.• Lead multiple projects at the same time and was able to complete them in a timely manner.• Acted as the primary point of contact of escalations and response even off working hours.• Successfully coordinated resources in a timely manner to get the project going.• Successfully hosted and facilitated conference calls to discuss critical issues and progress update of each project.• Assisted customers in reviewing their current security infrastructure and was able to suggest and implement new better security counter measures.• Provided all involved parties detailed project update and next action required for pending tasks.• Took ownership of all accounts, issues, questions and concerns of all the customers I handled and was able to provided timely resolutions.• Primary monitoring, responding to alerts, system troubleshooting, problem solving/ issue resolution, escalation, service request, operations and proactive maintenance, training, reporting and issue correlation of the following devices (NOKIA IP380, IP350, SGS, CHECKPOINT N65, N70, NGX, JUNIPER/ NETSCREEN 5GT, SSG5, ISG1000, SSG520, CISCO PIX, SYMANTEC MSS V7.0, SNS 7120, 7160, 7161, SNORT, SOURCEFIRE, DRAGON, TIPPINGPOINT).• Supported and monitored clients network security infrastructure, validated attacks, assessed impact and proposed resolutions to solve issues.• Defined, tracked, configuration sets of all managed and/ or monitored security devices and implemented industry best practices with regards to firewall, IDS/IPS, VPN and network configurations.• Performed timely notifications to clients, middle/ senior management electronically and via telephone within SLA. -
Lead Datacenter Operations TechnicianRackspace Hosting Feb 2007 - Jul 2008San Antonio, Texas, Us• Responsible for setting up, configuring, maintaining servers HP (DL385[G2], DL585[G2]) DELL (2650, 2850, 2950), Basic firewalls (CISCO), load balancers (Webmux).• RAID 0, 1 5 configuration, raid array repair and upgrade. CD/ PXE Operating System Installation.• Installing and configuring wide variety of network operating systems including x64 systems (RedHat Linux AS3-4, ES3-4-5, Windows 2000/ 2003 server, FREEBSD, Debian, Slackware.• Responsible for Hardware upgrades for all servers (Proc, RAM, NIC, RAID, HBA’s and server builds)• Performed PC, Printer, Server and Network Troubleshooting. Administration using HP iLO and Dell Open manage, Mega manager and Perc RAID manager for configuring online RAID.• Supported 6,000+ servers onsite on a mixed environment.• Create, Manage and completed complex Data Center projects (server migrations, power distribution, audit).• Responsible for Hardware upgrades for all servers (Proc, RAM, NIC, RAID, HBA’s and server builds)• Vulnerability assessment and penetration testing for corporate networks using tools used by hackers. -
Senior Network Security ProfessorThe Chubbs Institute 2004 - 2006• Operating Systems and Computer/ Server hardware components and Maintenance Back-up Procedures.• Install and configure various Desktop and Server Operating Systems and Applications to keep the OS secured.• Perform computer investigations and familiarized them the applications used by the industry to recover deleted data files, trace e-mails and forensic analysis of download and deleted files.• Small and Large scale network using protocols such as Wireless Networks, TCP/IP, IPX/ SPX, Appletalk, Netbeui. LAN-WAN technologies that exist in the IT Industry. • Attended and Unattended Installation of Windows 2000 Professional and Windows 2000-2003 Servers. Implementing various Microsoft Technologies including DHCP, DNS, Routing, Remote Access, Terminal Services, DNS, Print Management, Certificate Authority configuration, MMC and Disaster Recovery, Group Policies, Organizational Units, Internet Information Server.• Setup, Install and Administration of Microsoft Exchange Server, Configured DNS for e-mail, Setup web-based email (Outlook Web Access, configured public folders and Exchange Key Management service.• Linux server installation, APACHE Web Server configuration, Linux based firewall, User/Group Administration, DNS (Bind), DHCP, Linux Printing, Backup and Disaster Recovery, Kernel Compilation.
Jeremiah Batac Skills
Jeremiah Batac Education Details
-
Strayer UniversityComputer Security And Forensics -
Sti CollegeComputer Science -
The Chubbs InstituteNetwork Security
Frequently Asked Questions about Jeremiah Batac
What company does Jeremiah Batac work for?
Jeremiah Batac works for #netsectap - Cybersecurity Training
What is Jeremiah Batac's role at the current company?
Jeremiah Batac's current role is Principal Solutions Engineer.
What is Jeremiah Batac's email address?
Jeremiah Batac's email address is je****@****hoo.com
What is Jeremiah Batac's direct phone number?
Jeremiah Batac's direct phone number is (877) 889*****
What schools did Jeremiah Batac attend?
Jeremiah Batac attended Strayer University, Sti College, The Chubbs Institute.
What are some of Jeremiah Batac's interests?
Jeremiah Batac has interest in Mma, Arnis, Jiujitsu, Judo, Photography, Muay Thai, Videography.
What skills is Jeremiah Batac known for?
Jeremiah Batac has skills like Network Security, Firewalls, Vmware, Security, Dns, Penetration Testing, Teaching Skills, Troubleshooting, Troubleshooting Hardware, International Project Management, Disaster Recovery, System Administration.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial