Jim French work email
- Valid
Jim French personal email
- Valid
At the forefront of cybersecurity at a major financial institution, my role as Information Security Manager marries deep technical proficiency with strategic risk management. My team and I adeptly navigate complex security landscapes, ensuring robust protection against evolving threats. We have cultivated a culture of continuous improvement, with a strong focus on mentorship and cross-functional collaboration, fostering an environment where knowledge sharing and professional growth are paramount.With a CISSP certification and specialized skills in network security and firewalls, I contribute to safeguarding our organization's assets and reputation. My approach is not just about mitigating risks but also about enabling the business through secure innovation. The trust placed in us by our partners is a testament to our team's ability to balance security imperatives with business objectives, making a significant impact on the organization's resilience and operational excellence.
Major Financial Institution
-
Information Security Manager - Information Security Consultant LeadMajor Financial Institution Jan 2019 - PresentI regularly provide mentoring, training, and expert level consultation for a wide range of business and IT Security issues to 7 direct reports and complex matrixed partners. Providing not only hard guidance in terms of IT Security risk assessment, but also soft guidance in terms of business acumen coaching and conflict resolution.
-
Operational Risk ConsultantMajor Financial Services Firm Apr 2017 - Feb 2018
-
Operational Risk ConsultantExperis Working For Major Financial Institution Jan 2013 - Jul 2013• Assess enterprise risk based on Federal regulation, Financial industry standards, compliance controls and management guidance.• Lead Risk Assessment discovery calls along with leading multiple lines of business, network, firewall, application developers and Information Security Officers through the Wells Fargo risk assessment process.• Risk assessment work is done at a very fast pace, juggling multiple competing priorities, assessments, timing and projects simultaneously, often times fulfilling the role of Relationship Manager, Project Manager and Information Security expert all at once.• Correlate the information gathered through the risk assessment discovery process and write the security plan for a request from the Line of Business. These requests include writing narratives, developing accurate risks and assigning them to the security plan and working with all levels of Team Members to see the process through to completion.
-
Information Technology Security OfficerSalt River Pima-Maricopa Indian Community Jul 2012 - Jan 2013Scottsdale, Arizona, Us• Developed an IT security framework for the Tribal government, integrating the framework into their existing COBIT and SAS controls.• Developed an IT Security Policy framework that provided a complete policy lifecycle deployment environment.• Responsible for conducting IT security reviews. This responsibility included gathering business requirements from stakeholders, identifying risk and making recommendations for approval or denial of the security plan.• Implemented Encase Enterprise for performing computer forensic examinations across Human Resources and technology investigations.• With very little resources, deployed a government wide network vulnerability assessment system using virtual machines and open source software, making it possible to conduct quarterly vulnerability assessments on varying network segments. -
Senior Information Security EngineerChoice Hotels International Apr 2012 - Jul 2012North Bethesda, Maryland, Us• Due to an increase in website traffic, the choice was made to implement F5 web application firewalls. I was the primary individual responsible for implementing the firewalls. • As a part of this effort I managed the project and worked with various groups within Choice Hotels to ensure the firewalls were tested, configured properly and put into production in a timely manner.• There were several areas identified that lacked a proper IT security risk assessment. I led all aspects of those efforts, including identification of personally identifiable information and application roles and responsibilities.• PCI compliance – I had several PCI-DSS sections assigned to me as the primary provider of compliance evidence for our annual audit. I was responsible for the website (internal cryptography usage), network vulnerability assessments, penetration testing and incident response sections. -
Information Security EngineerExperis Working For Major Financial Institution Mar 2011 - Apr 2012Milwaukee, Wi, Us- Short term Sterling Secure Proxy engineers assigned to this project.- Provide logical designs that are based on internet, extranet (leased lines), or VPN connectivity to the internal and external partners. From these designs I write the rules for our Sterling Secure Proxy service and the rules for our firewall engineers to implement.- Lead testing calls along with leading multiple lines of business, network, firewall and Sterling Secure Commerce Connect Direct Secure plus engineers through the process of transitioning to the new connectivity path.- These testing calls can be long and arduous as I am working with differing skill levels from all of the partners represented. I am the subject matter expert on the calls. -
Network Manager-IsoState Of Wa., Dept. Of Ecology Feb 2005 - Jul 2011The Network Manager-ISO is a professional specialist and supervisor of a unit having primary responsibility for the agency’s network services functions. This is a complex, high impact network function that affects the entire agency’s access to data and systems. It requires knowledge of the business of the agency and extensive technical knowledge of project management methodologies, network operating systems, and network architecture. Serves as the highest level authority and agency spokesperson for the agency’s network architecture, network systems and network security projects.
-
Network ManagerState Of Wa., Military Dept.-Emergency Management Division Sep 2001 - Feb 2005Managed a high-availability network with over 150 workstations and over 40 servers, including planning and implementing equipment upgrades, and maintaining network security and disaster recovery equipment and protocols.Member of Washington Computer Incident Response Center (WACIRC) steering committee.
-
Information Systems/Human Resources ManagerResource Systems Jun 2000 - Apr 2001New Concord, Ohio, UsNetwork administrator responsible for all systems integration, administration, and maintenance to include: Windows NT (servers), WIN9X (workstations), WIN 2K Professional, Cisco routers, and necessary network hardware.Responsible for development of corporate training programs to include: supervisory, sexual harassment, computer usage, and disaster preparedness training. Provide human resources management to our company with over 20 employees including hiring, firing, employee counseling, writing job descriptions, and putting together training programs for supervisors and employees. -
Owner/Manager Of Information SystemsTurbotek Internet Solutions/Reachone Internet Jan 1998 - Jun 2000TurboTek Internet Solutions, Inc. was a local Internet service provider. I developed the initial business plan and found an investor to be the majority owner and President. TurboTek was purchased in October 1999 by ReachONE Internet. At that time, my position changed from General Manager / Minority Owner to Manager of Information Systems for ReachONE Internet
Jim French Skills
Jim French Education Details
-
University Of WashingtonInformation Technology -
Jackson CollegeCriminal Justice -
Spring Arbor UniversityBroadcast Communications
Frequently Asked Questions about Jim French
What company does Jim French work for?
Jim French works for Major Financial Institution
What is Jim French's role at the current company?
Jim French's current role is Information Security Manager @ Major Financial institution | CISSP, GCIH, GCFA.
What is Jim French's email address?
Jim French's email address is ji****@****.wa.gov
What schools did Jim French attend?
Jim French attended University Of Washington, Jackson College, Spring Arbor University.
What are some of Jim French's interests?
Jim French has interest in Children, Information Technology, Science And Technology, Human Rights, Organizational Dynamics And Strategy, Martial Arts Instructor.
What skills is Jim French known for?
Jim French has skills like Network Security, Firewalls, Disaster Recovery, Network Architecture, It Management, Data Center, It Operations, Servers, Security, Information Security, Cissp, Integration.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial