Joe Clifton

Joe Clifton Email and Phone Number

Cloud/Cyber/Network Security Engineer with CISSP and Network (Route/switch) expertise /disabled combat veteran @ CISCO SYSTEMS (USA) PTE. LTD
Conroe, TX, US
About Joe Clifton

CLOUD/CYBER SECURITY ENGINEER/ARCHITECT• Experienced IT Professional and U.S. Military veteran with 28+ years IT network infrastructure and IT security design, implementation and project management seeking to support an IT department to surpass business and departmental objectives.• Experienced in various cloud implementations, including public, hybrid, private configurations and SaaS, PaaS and IaaS deployments. Configured and implemented required AWS native security tools across 180+ accounts in several locations/regions globally. Those tools included Config, SecurityHub, GuardDuty, CloudWatch, CloudTrail, AWS WAF, Route53, AWS Firewall, bastion host/jump box, Macie, Inspector, System Manager, Detective, KMS, ECS, EKS, Elastic BeanStalk etc. Deployed and managed CNAPP/CSPM/CWS tools such as Wiz.io, PrismaCloud, Lacework, CloudAware.• Extensive experience with engineering and implementing of core AWS resources I.e., EC/2 (AMI linux, other Linux distributions, Windows Servers, other AMI’s) VPC, S3, Security Groups (SG’s), Network Access Control Lists (NACL’s), RDS (mariaDB, MS-SQL, mySQL), NoSQL (DynamoDB), Lambda, Route53, CloudFront• Strong security applications and equipment experience, including Checkpoint FW-1 and Cisco Firepower, PIX/ASA Firewalls, IDS/IPS systems, SIEM’s (Qradar, RSA enVision, Splunk), logging solutions ie LogLogic & LogRythmn.• Comprehensive security assessment and vulnerability testing skills using Tenable Nessus, Rapid7, Sentinel One, OWASP ZAP, BurpSuite and MetaSploit. Experienced in using various DAST/SAST tools as well as the using the full KALI suite of tools while executing penetration testing and blue teaming.• Vast experience in various distributions of Linux, Unix, Solaris and MacOS and knowledgeable with Windows.• Considerable experience with CIS, NIST 800-series, NIST CSF, Mitre Framework, HIPAA, PCI-DSS, ISO 27001/2 and SOC II standards and other auditing frameworks.• Held Top Secret/Special Background Investigation (TS/SSBI/CNWDI), CJIS clearance, US Secret Service Presidential Protection clearance.My core competencies include advanced security configuration, architecture, and engineering of AWS, and GCP platforms, as well as integrating and managing wiz.io, a Cloud Security Posture Management (CSPM) tool that provides continuous visibility and control over cloud assets and risks. I also perform security assessments and vulnerability testing using various tools and frameworks, such as Tenable Nessus, CIS hardening Benchmarks, Qualys CloudView, CloudAware.

Joe Clifton's Current Company Details
CISCO SYSTEMS (USA) PTE. LTD

Cisco Systems (Usa) Pte. Ltd

View
Cloud/Cyber/Network Security Engineer with CISSP and Network (Route/switch) expertise /disabled combat veteran
Conroe, TX, US
Employees:
25569
Joe Clifton Work Experience Details
  • Cisco Systems (Usa) Pte. Ltd
    Cisco Systems (Usa) Pte. Ltd
    Conroe, Tx, Us
  • Cisco Systems (Usa) Pte. Ltd
    Sr Cloud Security Engineer
    Cisco Systems (Usa) Pte. Ltd Feb 2024 - May 2024
    Creating pipelines to moving critical logging data from six critical sources into Splunk, for better analysis, reporting and correlation or events.AWS CloudTrail, Kuberbnetes, AWS GuardDuty, Config & SecurityHub
  • Conn'S Homeplus
    Sr Cloud/Cyber Security Engineer
    Conn'S Homeplus Dec 2023 - Feb 2024
    The Woodlands, Texas, Us
    • Responsible for security posture of AWS environment using AWS native security tools, such as SecurityHub, Config, CloudWatch, CloudTrail, AWS Firewall, AWS WAF, GuardDuty, VPC NACL’s, EC/2 Security Groups, Detective, Inspector, Trusted Advisor, Audit Manager, etc• Daily monitoring and remediation of XDR/EDR, Cisco Umbrella, solution typically used for investigating of possible breaches. Employ Sentinel One and applied CIS benchmarks as well as Mitre ATT&CK• Supported SOC as 3rd level AWS cloud support. Investigate security incidents and reported vulnerabilities and set remediation guidelines using CVSS scores. Use wireshark to troubleshoot on packet-level issues. Remediate security and network related vulnerabilities and other configuration issues, sometimes using manual remediation and others using Terraform or CloudFormation.• Responsible for entire network environment security posture, ie router, switch, firewall, IDS/IPS configuration, assessment, care, monitoring and management of network security.• Level 3 support of SOC especially for CTI as well as management of the 3rd party MSS.
  • Seminole Hard Rock Support Services (Kforce)
    Cloud Security Engineer
    Seminole Hard Rock Support Services (Kforce) Feb 2023 - Jul 2023
    Seminole Hard Rock Support Services• Preform advanced & level 3 security configuration, architecture, and engineering of Microsoft Azure & O365 cloud environment across multiple subscriptions, projects and hybrid clouds.• Continually create, monitor and manage dashboards, alerts and reports within wiz.io to ensure best of breed security in a hybrid cloud environment.• Integrate wiz.io into Azure and AWS hybrid cloud solution, setup up notification of findings and issues, integrated into ServiceNow for automatic ticketing.• Engineer auto-remediation where applicable, integrate wiz.io into the Ci/CD chain, as well ads developing a DevSecOps model.
  • Cisco
    Cloud Security Engineer
    Cisco Apr 2021 - Aug 2022
    San Jose, Ca, Us
    • Perform advanced security configuration functions across multiple Amazon Web Services (AWS) & GCP accounts for CX/PX Cloud environments. • Create reports using AWS SecurityHub, Config and other cloud native security resources then manually remediate findings.• Create wiz.io & CloudAware reports in AWS and GCP, then auto- and manually remediate findings.• Perform CIS and AWS fundamental audits across multiple AWS accounts then remediate findings.• Work within an Agile environment using Rally and Jira. Lead/Attend Backlog, Sprint Planning and Sprint Retrospective meetings with SCRUM masters.• Configuring security posture for SecurityHub, Config, Macie, S3, Lambda, EC/2, GuardDuty, Inspector, Systems Manager
  • Avaya
    Cyber/Cloud Security Engineer
    Avaya Mar 2019 - Mar 2021
    Morristown, New Jersey, Us
    • Perform pen testing of Avaya Managed Services Platform using Metasploit, OWASP Zed Attack Proxy (ZAP), various Kali tools, Burp Suite and other automated tools• Assist in remediating Application Security for Avaya Managed Services Platform• Vulnerability assessment of AWS and Avaya Managed Services Platform environments• Applied CIS benchmarks to AWS, Ubuntu, and Oracle Linux (OEL) platforms.• Create/Maintain SIEM use cases for Avaya Managed Services Platform.• Assisted in ISO 27001/2 audits, i.e. firewall, router and switch audits, password strength testing with hashcat and John The Ripper• Monitor and use AWs tool such as GuardDuty, Security Hub, Config, Inspector, CloudTrail, CloudWatch, etc.∙. Lead Agile team as well as attend Daily Standup, Backlog refinement, Sprint Planning and Sprint Retrospective meeting with SCRUM masters
  • Avaya
    Cyber Security Engineer
    Avaya Mar 2018 - Mar 2021
    Morristown, New Jersey, Us
    • Perform pen testing of Avaya Managed Services Platform using Metasploit, OWASP Zed Attack Proxy (ZAP), various Kali tools, Burp Suite and other automated tools• Assist in remediating Application Security for Avaya Managed Services Platform• Vulnerability assessment of AWS and Avaya Managed Services Platform environments• Applied CIS benchmarks to AWS, Ubuntu, and Oracle Linux (OEL) platforms.• Create/Maintain SIEM use cases for Avaya Managed Services Platform.• Assisted in ISO 27001/2 audits, i.e. firewall, router and switch audits, password strength testing with hashcat and John The Ripper• Monitor and use AWs tool such as GuardDuty, Security Hub, Config, Inspector, CloudTrail, CloudWatch, etc.
  • Ibm
    It Security Architect (Ttsa)
    Ibm Aug 2016 - Apr 2017
    Armonk, New York, Ny, Us
    Transition and Transform Security Architect (TTSA) Generate appropriate security designs, including, not but not limited to, firewalls, UTM's, NIDS, HIDS, vulnerability management systems, and malware solutions Create documents that show the proper integration of all components of the security solutions, keeping in mind industry and regulatory compliance issues. Create the applicable rack, stack and cabling documents for the implementation of the hardware. Review contracted solution and lead security architecture design discussions with cross tower architects including Network, Transition & Transformation (T&T) Integration architects, Midrange, DataCenter (DC) relocation, Storage, etc. to define and document low level designs that can be implemented by the transition teams.
  • Accenture (Collabera)
    Sr It Security Consultant
    Accenture (Collabera) Oct 2015 - Dec 2015
    Dublin 2, Ie
    Implement and upgrade Cisco ASA and Cisco IPS (AIP-SSM). Configure Cisco ASA VPN’s (both IPSec and SSL) from CLI as well as ASDM. Implement, configure and manage multiple contexts as well as active/standby and active/active failover, along with other management and operational tasks.
  • Royal Bank Of Scotland
    It Security Consultant
    Royal Bank Of Scotland May 2015 - Sep 2015
    Gogarburn, Gb
    Design and implement firewall rules in Check Point R77 & R75 firewalls. Analyze traffic and rule efficiency with SmartLog and SmartTracker. Use MS Excel to analyze rules and traffic to better optimize the ruleset, with respect to complying with the Federal Reserve (the FED) guidelines. Use Skybox to analyze and adjust firewall and network posture.
  • Dell
    Senior It Security Advisor
    Dell May 2014 - Dec 2014
    Round Rock, Texas, Us
    IT Security liaison between Dell and Dell client for migrating all data centers and server resources into the Dell datacenters. Reviewed and approved Tier architecture. Reviewed and approved firewall ruleset prior to migration. Migration included P-P, P-V and greenfield servers. Manage Qualys vulnerabilities scanning and subsequent remediation of all HIGH and MEDIUM of all assets prior migrations. Managed 7 migration “packages” with over 200 assets each on average.
  • Centurylink Technology Solutions
    Senior Security Consultant
    Centurylink Technology Solutions Feb 2013 - Jun 2014
    Monroe, La, Us
    Lead a SSAE16 SOC II Type I assessment focusing on the Security and Confidentiality principles to prepare a media company for their first ever SSAE 16 SOC II audit. Identified security control gaps, proposed improvements to current controls and additional controls to be implemented. Designed high-level remediation plan to prepare them for their audit. Assisted in remediation efforts for SSAE 16 SOC II Type I assessment. Coordinated security efforts in the migration of a large data center into Savvis "cloud". Firewall rule preparation and implementation. Cisco ASA SSLVPN configuration and implementation. Monitor and report on all firewall, IDS/IPS, threat management (Qualys), LogLogic and WAF logs. Manage Alerting and reporting on LogLogic Manage Cisco ASA and Checkpoint FW-1 firewalls
  • Hewlett-Packard
    Senior It Security Engineer
    Hewlett-Packard May 2011 - Jul 2012
    Houston, Texas, Us
    CISSP, SAP SSO SME, Config Mgmt SME, Forensics SMECreated and validated IT Security policies and procedures. Assisted with assessing the feasibility of DLP solutions to use as a HP Company standard. Assisted in the auditing of entire company for PCI compliance as well as other regulatory compliance standards. Assisted with firewall, IPS and IDS configuration standards. Created and validated policies and procedures surrounding forensic investigations and tool procedures including e-discovery. Administered SSO solution for SAP.
  • Cynergistek, Inc.
    Senior Information Security Consultant
    Cynergistek, Inc. May 2010 - Dec 2010
    Austin, Tx, Us
    Responsible for the implementation and integration of security solutions such as Code Green Networks Data Loss Prevention (DLP) solutions, SIEM solutions such as LogLogic and NitroSecurity and privacy breach notification such as FairWarning. Performed e-discovery and forensics investigations. Performed HIPAA/HITECH audits and consulting for insurance and healthcare clients, as well as state privacy breach laws including the FTC's Red Flag Rule. Primarily responsible for integration of new security technologies into existing infrastructure of client companies, ranging in size from SMB to Fortune 500 companies. Used Windows, various flavors of Linux and Mac OS X.
  • Modis
    Information Security Officer, City Of Greenville, Nc
    Modis Sep 2009 - Jun 2010
    Zurich, Zurich, Ch
    Responsible for strategy, design, implementation and day-to-day operations of IT Security. Ensured confidentiality, integrity and security of all corporate information assets and customer data. Maintained HIPAA, PCI AND CJIS compliance. Worked with network systems team to secure Active Directory.. Managed several security infrastructure rollout projects, including upgrading of CheckPoint R65 to R70.20, continuous management and configuration of CheckPoint Firewalls. Managed Checkpoint and Reflex IPS. Used Nessus and eEye Web App scanner for vulnerability assessments. Managed and maintained RSA’s envision (SIEM). Performed security analysis for IDS and Firewalls. Used WebSense on a daily basis to check statuses and add appropriated rules. Used Windows, various flavors of Linux, Unix, Solaris and Mac OS X.
  • Csc - St Johns Hospital
    It Project Manager
    Csc - St Johns Hospital Feb 2009 - May 2009
    Global, Us
    Responsible for vulnerability assessment remediation and tracking. Approved or disapproved security exceptions and tracked them as well. Responsible for Patch Management activities. Evaluated new systems that were put into production for their level of security. Assist with HIPAA assessments. Edit PERL scripts in linux and cygwin for various uses. Managed Pix/ASA firewalls, from design to implementation, day-to-day management, troubleshooting and maintenance of the firewalls.
  • Gmac
    Director, Security Engineering & Architecture
    Gmac Jun 2008 - Dec 2008
    Detroit, Mi, Us
  • Vanguard Car Rental Usa Inc A Division Of Enterprise Rent-A-Car
    Director Information Security
    Vanguard Car Rental Usa Inc A Division Of Enterprise Rent-A-Car Sep 2006 - Jun 2008
    St Louis, Missouri, Us
    Direct report to CIO. Responsible for strategy, design, implementation, and day-to-day operations of IT Security group. Ensured Confidentiality, Integrity, and Security of all corporate information assets and customer data. Implemented and completed a PCI ‘Level 1’ compliance project for an infrastructure of 1,500 locations throughout North America (from HQ to retail locations). Managed several security infrastructure roll-out projects, including ISS IPS (SiteProtector), ADS, and Enterprise scanner, Imperva SecureSphere, and Ingrian, Implement and integrate RSA enVision 4.x and WebSense with DLP. Performed security analysis for IDS and Firewalls. Work in a collaborative fashion with Corporate Risk Management, Internal Audit, and the business unit's leadership. Configuration and analysis of network and host-based Firewall implementation, maintenance and log analysis of all Checkpoint firewalls. Preformed numerous vulnerability and penetration tests against Unix/Linux/Microsoft platforms. Managed, upgraded, and monitored the ISS IDS/IPS SiteProtector console on a daily basis. . Use of Helix3, BackTrack, knoppix Live, Autopsy and strings. Instrumental in the merger/acquisition into Enterprise.
  • Trustwave
    Lead Security Engineer
    Trustwave 2006 - 2007
    Chicago, Illinois, Us
    PCI auditing and consulting for Fortune 100 clients. Strategic design of networks to allow for growth and protection of the client's PCI environment, while allowing conformation to other regulatory statutes and rules. HIPAA, HiTECH, SOX, ISO2700x, Red Flag Rules, etc Perform Gap Analyses, Generation of Policies and Procedures for alignment of PCI DSS standards with interlocking ability for other regulations. Analyzed Firewall, IDS/IPS, Database and application logs and output for PCI compliance. Extensive use of nMap, Nessus, and spike.
  • Hixardt Technologies
    Chief Technology Officer (Cto)
    Hixardt Technologies Jul 2004 - Nov 2005
    Developed a Professional Services division of established Network Integrator and VAR to provide Networking and Security resources for medium to large corporations. Practice areas included penetration testing, internal security assessments, wireless assessments, web application assessments, as well as assess, design, and implement security programs. Installed, configured and maintained Cisco Pix firewall and Checkpoint Firewalls to secure the network. Most common open source and commercial products included Check Point, Cisco, ISS, SPI Dynamic’s WebInspect, Nessus, nMap, Snort, etc. Provided pre-sales support for staff; lab demonstrations, vendor product evaluation, internal and external vulnerability assessments; Intrusion Detection System (IDS) design, implementation and training; security policy review and creation; security issue remediation; project management. Technical PM for complete redesign and implementation of new network and security measures at Tuskegee University. Rolled out campus-wide Cisco wireless network using Nomadix/RADIUS for “internet-café” style access for all students. Implement advanced firewall configurations and troubleshoot connectivity problems in real-time environment to include advanced customer routing networks, Troubleshoot Active Directory implementation. Managed Tuskegee University Campus-wide data center for a full year.
  • Computer Task Group (Ctg)
    Lead, Security Engineer
    Computer Task Group (Ctg) Nov 2003 - Aug 2004
    Amherst, New York, Us
    Primary duties included security vulnerability testing and penetration testing including the use of numerous open source and commercial tools, including nMap, Nessus, WebInspect, PhoneSweeper, ISS Internet Scanner and metasploit. Designed and implemented networking and security solutions. Projects entailed Check Point, Cisco firewalls, routers and switches, ISS products, RSA solutions. Installed, configured and maintained Cisco 501 Pix firewall and Checkpoint Firewall-1/VPN-1 NG to secure the networks of several Fortune 1000 companies. Install and support RSA SecureID rollout. Conducted IT related (Technical Rule) HIPAA audits
  • Office Depot
    Manager, Security Engineer
    Office Depot Nov 2000 - Nov 2003
    Boca Raton, Florida, Us
    Manage personnel and technical aspects of tactical IT security fior Office Depot worldwide. Included designing and implementation the entire suite of ISS products.Monito and react to IDS and IPS alerts. Design and implement incident reposnse plan.
  • 221St Explosive Ordnance Disposal
    Eod Sergeant
    221St Explosive Ordnance Disposal Dec 2002 - Oct 2003
    Served a combat tour in Bosnia as a EOD (Bomb Squad) Sergeant.
  • Seisint, Inc.
    Senior Manager Network Engineering
    Seisint, Inc. Feb 2000 - Nov 2000
    Network Manager for a Cisco network in a campus environment utilizing SONET, ATM, Gig E, and multiple routing and routed protocols. Heavy use of 6509's and 4000 series switches in CatOS and IOS modes. Managed 4 direct reports.
  • Lifesytle Furnishings International (Lfi)
    Director, Network And Security
    Lifesytle Furnishings International (Lfi) Jan 1997 - Feb 2000
    Manager of Network, Security, and EDI. Managed 2 direct reports in the day to day management of a 50000 node network, with over 200 routers and 4000 switches. Managed the security of the entire organizations with Checkpoint firewalls. Employed new technologies such as RadWare and linux based proxy servers, etc.

Joe Clifton Skills

Cissp Information Security Project Management Seim Rsa Envision Network Security Security Firewalls Penetration Testing Management Vulnerability Assessment Vulnerability Management Information Technology Computer Security Security Policy Pci Dss It Management Ids Integration Computer Forensics Checkpoint Information Security Management Cyber Security Troubleshooting Compliance Dlp Linux Security Management Vpn Ccse Hipaa Cisco Ccnp It Governance Unix Tcp/ip Information Security Policy Solaris Sunos Checkpoint Security Websense Iss Network Forensics Cisco Technologies Switches Networking Payment Card Industry Data Security Standard Leadership

Joe Clifton Education Details

  • Devry University
    Devry University
    Routing/Switching And Network & Perimeter Secuirty
  • Keller Graduate School Of Management Of Devry University
    Keller Graduate School Of Management Of Devry University
    Computer Systems Networking And Telecommunications
  • New Horizons
    New Horizons

Frequently Asked Questions about Joe Clifton

What company does Joe Clifton work for?

Joe Clifton works for Cisco Systems (Usa) Pte. Ltd

What is Joe Clifton's role at the current company?

Joe Clifton's current role is Cloud/Cyber/Network Security Engineer with CISSP and Network (Route/switch) expertise /disabled combat veteran.

What is Joe Clifton's email address?

Joe Clifton's email address is jh****@****aol.com

What is Joe Clifton's direct phone number?

Joe Clifton's direct phone number is +151276*****

What schools did Joe Clifton attend?

Joe Clifton attended Devry University, Keller Graduate School Of Management Of Devry University, New Horizons.

What skills is Joe Clifton known for?

Joe Clifton has skills like Cissp, Information Security, Project Management, Seim, Rsa Envision, Network Security, Security, Firewalls, Penetration Testing, Management, Vulnerability Assessment, Vulnerability Management.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.