Jim Kuhns Email and Phone Number
Jim Kuhns personal email
- Valid
Jim Kuhns phone numbers
Over Twenty years of technical experience in management and customer support roles performing requirements analysis and system security design and penetration testing of enterprise-wide and large-scale computer systems for both government and private sector. Demonstrated expertise in network security issues both technical and non-technical. Extensive experience with government security practices such as FISMA, NIST, FIPS, and others. Extensive experience in security tools and technology to include vulnerability assessment tools, firewalls, open source tools and intrusion detection/prevention systems. Extensive experience in implementing, designing and upgrading computer system networks, computer services, firewalls and routers. I have designed and built several university network systems within the Baltimore area and have examined the security designs of numerous federal agency networks both internal and external.
-
Senior Cyber Security EngineerInternal Revenue ServiceCrofton, Md, Us -
PresidentEagle Eye Cyber Solutions, Llc Feb 2015 - PresentCrofton, MarylandEagle Eye Cyber Solutions, LLC, is a privately held services upstart company with a focus on the design, implementation, and support of information technology solutions for Federal, State, and commercial clients. We provide trusted cyber security solutions through innovative research, development, consulting, and training for the Private, Federal, Financial, Healthcare, and International customer.• Perform onsite and remote security consulting. • Perform ethical cracks… Show more Eagle Eye Cyber Solutions, LLC, is a privately held services upstart company with a focus on the design, implementation, and support of information technology solutions for Federal, State, and commercial clients. We provide trusted cyber security solutions through innovative research, development, consulting, and training for the Private, Federal, Financial, Healthcare, and International customer.• Perform onsite and remote security consulting. • Perform ethical cracks ("hacks") to assess the vulnerabilities. • Provides network security expertise and guidance in support of security assessments for government and commercial clients. Performs network risk assessments, vulnerability assessments, and penetration testing. Advises on security architecture. Evaluates and recommends security technology processes such as network and host based intrusion detection systems (IDS), virus protection capabilities, and virtual private network solutions. • Provides Application Security and Penetration testing support several high profile federal information technology programs.• Develops security report test cases and testing procedures to verify compliance with IRS, DOD, DHS, DCID and NIST system security requirements.• Provides technical engineering and security architecture guidance to federal agency administrators, certifiers, accreditors, and policymakers.• Evaluates a wide variety of tools varying from highly automated to basic command-line utilities for inclusion in the testing suite. Prepares certification test documentation, including detailed analyses of vulnerabilities and risks, conclusions, and recommendations for inclusion in system security plans/authorization agreements. Show less
-
Cyber Security Analyst/OperatorTechguard Security Feb 2007 - Feb 2015Baltimore, Maryland Area• Perform duties as Subject Matter Expert and interactive on-net operator with experience in multiple theaters. Also have experience with small team leadership and collaborating with other teams. Network security expertise and guidance in support of security assessments for government and commercial clients. • Network risk assessments, vulnerability assessments, and penetration testing. Advises on security architecture. Evaluates and recommends security technology such as network and… Show more • Perform duties as Subject Matter Expert and interactive on-net operator with experience in multiple theaters. Also have experience with small team leadership and collaborating with other teams. Network security expertise and guidance in support of security assessments for government and commercial clients. • Network risk assessments, vulnerability assessments, and penetration testing. Advises on security architecture. Evaluates and recommends security technology such as network and host based intrusion detection systems (IDS), virus protection capabilities, and virtual private network solutions. • Provide Application Security and Penetration testing support several high profile federal information technology systems to include Blue/Red Teams. Show less -
Security Consultant (Private Security Consultant)Digital Liberators May 2004 - Feb 2015Washington D.C. Metro Area• Provided network security expertise and guidance in support of security assessments for government and commercial clients. Performed network risk assessments, vulnerability assessments, and penetration testing. Advised on security architecture. Evaluated and made recommendations for security technology such as network and host based intrusion detection systems (IDS), virus protection capabilities, and virtual private network solutions. • Performed Audits DHS, OPM information technology… Show more • Provided network security expertise and guidance in support of security assessments for government and commercial clients. Performed network risk assessments, vulnerability assessments, and penetration testing. Advised on security architecture. Evaluated and made recommendations for security technology such as network and host based intrusion detection systems (IDS), virus protection capabilities, and virtual private network solutions. • Performed Audits DHS, OPM information technology (IT) systems for compliance with DHS and OPM requirements and security certification configuration agreements. • Provided Application Security and Penetration testing support several high profile DHS and OPM information technology systems. • Developed security report test cases and testing procedures to verify compliance with MIOG, DHS, DOJ, DCID and NIST system security requirements. • Provided technical engineering and security architecture guidance to DHS system administrators, certifiers, accreditors, and policymakers. • Evaluated a wide variety of tools varying from highly automated to basic command-line utilities, for inclusion in the testing suite. Prepared certification test documentation, including detailed analyses of vulnerabilities and risks, conclusions and recommendations for inclusion in system security plans/authorization agreements. • Worked with certification officials and accreditation representatives to ensure all requirements were tested and that the significance of residual risks was clearly understood. Show less
-
Senior Systems Security EngineerComputer Sciences Corporation Jul 2003 - Sep 2006Perform security assessments for operations related to national defense and federal information sharing initiatives. Perform security vulnerability assessments on Windows 2000, 2003 domain structures, UNIX, Solaris and Linux operating systems, DNS structures, and firewalls.Audits FBI information technology (IT) systems for compliance with DOJ and FBI requirements and security certification configuration agreements. Provide Application Security testing and guidance to other… Show more Perform security assessments for operations related to national defense and federal information sharing initiatives. Perform security vulnerability assessments on Windows 2000, 2003 domain structures, UNIX, Solaris and Linux operating systems, DNS structures, and firewalls.Audits FBI information technology (IT) systems for compliance with DOJ and FBI requirements and security certification configuration agreements. Provide Application Security testing and guidance to other test team members on several high profile FBI information technology systems. Provides technical engineering and security architecture advice to FBI system administrators, certifiers, accreditors, and policymakers. Works with certification officials and accreditation representatives to ensure all requirements are tested and that the significance of residual risks is clearly understood. managers, IT staff, and execurive management. Show less -
Senior Systems Security EngineerUser Technology Associates, Inc. Jul 2000 - Jul 2003Washington D.C. Metro Area• Provided proactive risk management offerings focused on infrastructure protection, business continuity, information assurance, computer forensics and emergency response capability, system and software IV&V testing and security management. • Provided guidance to define the corporate security policy and perform as the UTA Corporate Information System Security Officer. • Performed security evaluations and penetration testing on high profile, politically sensitive software development… Show more • Provided proactive risk management offerings focused on infrastructure protection, business continuity, information assurance, computer forensics and emergency response capability, system and software IV&V testing and security management. • Provided guidance to define the corporate security policy and perform as the UTA Corporate Information System Security Officer. • Performed security evaluations and penetration testing on high profile, politically sensitive software development environments. Installed firewalls and intrusion detection systems, perform numerous penetration tests, as well as maintained the UTA Computer Security Laboratory at the Stafford, Virginia Facility. • Researched, examined and performed hash analysis and load data on a database for hash comparisons on known cryptographic and other program and operating system files. • Identified, resolved and documented problems to assure successful completion of Software Development Group (SDG) programs. • Provided close support to the SDG components to ensure fully integrated and operational systems. • Provided support for the installation and security design of the Symantec Firewall installations at the Immigration and Naturalization Services (INS) Corbin Production Facility. • Provided UTA lead consulting support to INS under the STARS contract which includes network design, router and firewall configuration. As a result, INS had a more secure process of connectivity with its contractors. Show less
Jim Kuhns Skills
Jim Kuhns Education Details
-
Management Information Systems
Frequently Asked Questions about Jim Kuhns
What company does Jim Kuhns work for?
Jim Kuhns works for Internal Revenue Service
What is Jim Kuhns's role at the current company?
Jim Kuhns's current role is Senior Cyber Security Engineer.
What is Jim Kuhns's email address?
Jim Kuhns's email address is ku****@****ail.com
What is Jim Kuhns's direct phone number?
Jim Kuhns's direct phone number is +141068*****
What schools did Jim Kuhns attend?
Jim Kuhns attended University Of Maryland Global Campus.
What are some of Jim Kuhns's interests?
Jim Kuhns has interest in Science And Technology, Education, Health.
What skills is Jim Kuhns known for?
Jim Kuhns has skills like Vulnerability Assessment, Fisma, Network Security, Penetration Testing, Dod, Security, Computer Security, Information Assurance, Security Clearance, Information Security Management, Information Security, Cissp.
Who are Jim Kuhns's colleagues?
Jim Kuhns's colleagues are Patricia Gilliam, Maria Zangari, Michael Edwards, Aida Ortiz, Jeanine Ryan, Beth Martin, Dr. Donnisha Davis.
Not the Jim Kuhns you were looking for?
-
3mi.rr.com, comcast.net, horstmaninc.com
2 +158675XXXXX
-
1mooremech.net
-
2jfkquarry.ca, alliance-it.com
2 +141071XXXXX
Free Chrome Extension
Find emails, phones & company data instantly
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial