John Grim

John Grim Email and Phone Number

Executive Director | Global Cyber Threat Management Center @ Estée Lauder
Pittsburgh, PA, US
John Grim's Location
Pittsburgh, Pennsylvania, United States, United States
John Grim's Contact Details

John Grim personal email

n/a
About John Grim

I have 20+ years of experience in threat intelligence, investigative response, digital forensics, and security assessments. I have built and/or managed cyber threat intelligence, cyber threat hunting, cyber counterintelligence, counterintelligence, and investigative response teams within the military and corporate sectors. In doing so, I have parlayed this knowledge and experience into advising and educating clients, commanders, internal teams, and other audiences on data breach mitigation, detection, and response.Skills / Specialties: ● Cyber Threat Intelligence ● Cyber Threat Modeling ● Intelligence Operations Coordination / Synchronization / Deconfliction ● Data Breach Investigations ● Proactive Cybersecurity Checks ● Digital Forensic Examinations ● Litigation Support Activities ● Incident Response Assessments ● Insider Threat Assessments ● Counterintelligence / Force Protection Support ● Thought Leadership ● Business Development ● Content Development ● Product Marketing ● Sales Enablement ● Pre-Sales ● Consulting ● Data Breach Presentations ● Cyber Threat Briefings ● Cybersecurity Panels ● Executive Breach Simulations ● Technical Table-Top Exercises ● Digital Forensics Training ● Incident Response TrainingGovernance / Standards: ● ISO-EIC 27001 / 27002 ● NIST Cybersecurity Framework ● VERIS Framework | A4 Threat Model ● MITRE ATT&CK Framework ● NIST SP 800-154 (draft) (Threat Modeling) ● NIST SP 800-53 R5 (Security and Privacy) ● CIS Critical Security Controls ● NIST SP 800-61 R2 (Incident Handling) ● NIST SP-800-86 (Digital Forensics) ● NIST SP-800-37 R2 (Risk Management) ● NIST SP 800-181 (NICE Framework) ● EDRM ● FAIR ● CBEST Framework

John Grim's Current Company Details
Estée Lauder

Estée Lauder

View
Executive Director | Global Cyber Threat Management Center
Pittsburgh, PA, US
Employees:
1333
John Grim Work Experience Details
  • Estée Lauder
    Executive Director | Global Cyber Threat Management Center
    Estée Lauder
    Pittsburgh, Pa, Us
  • Estée Lauder
    Executive Director | Global Cyber Threat Management Center
    Estée Lauder Dec 2023 - Present
    New York, New York, Us
    ● Manages a 24x7 Cyber Threat Management Center consisting of cyber threat intelligence, threat-vulnerability management, threat detection analytics, security operations center, cyber threat response, cybersecurity investigations, digital forensics, and electronic discovery● Leverages next-generation monitoring to include tools for supervised and artificial learning, artificial intelligence, user and entity behavior analytics, and visualization technologies across a complex, global environment● Leads and guides full time employees, vendor relationships, security consultants, and matrixed teams to conduct just-in-time threat management in an ever-changing cyber threat landscape ● Interacts with all levels of business leadership to include executive-level communications and interpersonal skills to include briefing C-level leaders, influencing stakeholders across the organization, and engaging information security and industry leaders● Makes critical and timely decisions while solving unique and complex problems. Executes key operational decisions with potentially high impact threat attacks to include, but not limited to, phishing campaigns, malware campaigns, organized criminal operations, and nation-state operations● Maintains full accountability over operating budget, to include hiring, consulting, outsourcing, and service decision-making, as well as assesses growth needs and implements business case changes
  • Experian
    Director | Cyber Threat Assessment Group, Gcfc (Global Cyber Fusion Center)
    Experian Dec 2021 - Jan 2024
    Costa Mesa, Ca, Us
    ● Managed cyber threat intelligence, cyber threat hunting, and cyber threat thought leadership that serves as the focal point and driving force behind cyber fusion and threat-informed defense; was responsible for strategic planning, operational decision-making, daily operations, metrics / key performance indicators, hiring decisions, tool procurement, and vendor relationships● Provided intelligence-driven strategic support to executives for long term, decision-making, operational support to nearer term, functional level activities, and tactical / technical support to front line cyber fusion operations● Provided direct, threat-informed support to threat detection, incident response, digital forensics, insider threat, offensive security, attack surface management, network security, architecture and engineering, mergers & acquisitions, security awareness and training, among other intelligence consumers● Liaised and interacted with functional level leaders and business unit security leaders to determine and review priority intelligence requirements, socialize services and capabilities catalog, and develop and maintain reporting products that meet the needs of these supported entities● Adhered to the fundamentals of intelligence activities to include the cyber threat intelligence cycle in delivering timely, relevant, accurate, and actionable intelligence, as well as stakeholder feedback loops and constant self-assessment aimed at improving collection, analysis, and production● Oversaw cyber threat hunting activities in direct support of reactive and proactive threat detection, incident response, offensive security activities by focusing on threat actor campaigns, TTPs, vulnerabilities / exploits, LOLBINs, and malware● Embraced industry standards to include SIPOC (Source-Input-Process-Output-Consumer), Attack-Defend Vortex (Attacker-Action-Defender-Counteraction), MITRE ATT&CK Framework, CIS Controls, NIST Cyber Security Framework, and SWOT Framework
  • Verizon Business
    Head | Research, Development, Innovation, Vtrac (Verizon Threat Research Advisory Center)
    Verizon Business 2019 - 2021
    Basking Ridge, Nj, Us
    ● Facilitated technical discussions with and advised C-suite clients on data breach prevention / mitigation / detection / response and cyber threat intelligence / threat modeling solutions; leads executive-level data breach simulation / crisis management exercises● Integrated cyber threat intelligence and technical research into cloud, network, virtual, endpoint, detection / response tool solutions to improve cybersecurity postures, incident detection, and investigative response workflows● Synergized with pre-sales, sales enablement, product management, product marketing, external marketing, thought leadership, analyst relations, and corporate communications stakeholders for sales opportunities, marketing campaigns, thought leadership publications, and new product roll-outs● Identified, developed, and implemented processes and frameworks for new product and service growth opportunities across verticals; led research and analysis projects into new, emerging technologies for incident detection, incident response, and forensic investigations● Led research and analysis projects into new, emerging technologies for incident detection, incident response, and forensic investigations● Managed and contributed to new / enhanced service and product offerings from conception through time-lining, research, development, strategy, coordination, to launch● Researched, primary-authored, and produced the 2020 Verizon Cyber-Espionage Report, the 2019 Verizon Insider Threat Report and the 2019 Verizon Incident Preparedness and Response (VIPR) Report; co-authored the 2019 Verizon Payment Security Report
  • Verizon Business
    Senior Manager | Investigative Response, Vtrac
    Verizon Business 2016 - 2019
    Basking Ridge, Nj, Us
    ● Managed, trained, mentored, and evaluated the performance of a highly-skilled, geographically dispersed, remote investigative response team; approved technical findings deliverables / expenditures● Worked closely with pre-sales, product marketing, external marketing, thought leadership, analyst relations, and corporate communications stakeholders● Scoped and managed complex data breach investigations across industries, to include financial, healthcare, manufacturing, retail, and accommodation; coordinated collection and analysis of open source, dark web, cloud, NetFlow, network, endpoint, and malware evidence sources● Provided technical advice and assistance to CIOs / CTOs / CISOs and other executives; conveyed findings and advised internal / external counsel, corporate communications, human resources, service providers, and law enforcement● Synchronized efforts with client cyber threat intelligence, CERT / CSIRT, SOC / SIEM, NOC, cyber risk, cybersecurity, and information technology, to include infrastructure, cloud, network, server, desktop, and application teams; assisted with root cause analysis efforts● Oversaw enterprise threat hunting / digital forensic health check engagements; reviewed and quality checked final management reports, to include findings and recommendations● Oversaw incident response capability / readiness assessments and incident response policy, plan, playbook, process, and procedure development; reviewed and quality checked final management reports and incident response plans / playbooks● Developed and oversaw incident response, digital forensics, cyber threat training to external customers, conference attendees, and team members● Created and conducted executive-level data breach simulation / crisis management exercises; conducted after-action reviews to identify cybersecurity and incident response gaps and gap remediation solutions● Produced / primary-authored the 2018 Data Breach Digest and 2017 Data Breach Digest
  • Verizon Business
    Team Lead | Investigative Response, Vtrac
    Verizon Business 2014 - 2016
    Basking Ridge, Nj, Us
    ● Established new digital forensics / investigative response team; supervised, trained, mentored, and evaluated the performance of a geographically dispersed, remote investigative response team; approved technical findings deliverables / expenditures ● Led complex data breach investigations across industries, to include financial, healthcare, manufacturing, retail, and accommodation; collected and analyzed open source, dark web, cloud, NetFlow, network, endpoint, and malware evidence sources● Provided technical advice and assistance to client CERT / CSIRT, SIEM, SOC, NOC, IT security, infrastructure, cloud, network, server, desktop, and application teams● Synchronized efforts and worked closely with cyber threat intelligence, incident response, cyberdefense, cybersecurity, and cyber risk teams● Conveyed findings and coordinated activities with, internal / external counsel, corporate communications, human resources, service providers, and law enforcement● Performed incident response capability / readiness assessments; developed incident response policies, plans, playbooks, processes, and procedures● Developed and delivered incident response / digital forensics / cyber threat training to external customers, conference attendees, and team members● Created and delivered incident response tabletop exercises for technical and non-technical audiences; conducted after-action reviews to identify cybersecurity and incident response gaps and gap remediation solutions● Produced / primary-authored the 2016 Data Breach Digest
  • Verizon Business
    Senior Security Specialist | Investigative Response, Vtrac
    Verizon Business 2009 - 2014
    Basking Ridge, Nj, Us
    ● Investigated network intrusions, malware outbreaks, cyber-espionage incidents, insider threat activity, and payment card industry breaches● Worked closely with management, technical, non-technical, and external stakeholders to resolve data breaches and other cybersecurity incidents and conduct root cause analysis activities● Advised victim organizations on containment, eradication, and remediation measures; advised on breach prevention and mitigation countermeasures● Collected, preserved, and examined digital evidence, to include volatile data, memdumps, system images, packet captures, and network logs● Conducted cybersecurity assessments; reviewed / created client incident response policies, plans, playbooks, and procedures● Provided cybersecurity and investigative response training and cyber threat briefings; developed and led mock incident tabletop exercises; conducted after-action reviews to identify cybersecurity and incident response gaps and gap remediation solutions
  • Us Army
    Chief (Senior Ci Agent) | Technical Support Element, Usainscom
    Us Army 2005 - 2009
    Arlington, Virginia, Us
    ● Served as Intelligence Officer (GG-13, Operations) and managed a technical team of U.S. Army cyber counterintelligence digital forensics investigators, to include providing direction to and overseeing all phases of the counterintelligence cycle: planning and direction, collection, processing, analysis, dissemination● Responded to and led cyber counterintelligence investigations with national security implications involving computer and network security incidents● Forensically imaged / examined digital media; processed evidence; analyzed network device logs and related evidence● Provided digital forensics and incident response training to counterintelligence agents and CERT personnel● Liaised with intelligence, law enforcement, CERT, NOSC, and security entities; provided technical advice and assistance to commanders● Liaised with military intelligence, law enforcement, CERT, NOSC, legal, and security entities; provided technical advice and assistance to commanders
  • Us Army
    Counterintelligence Coordinating Authority (Senior Ci Agent) | S2X, 3Rd Acr
    Us Army 2007 - 2008
    Arlington, Virginia, Us
    ● Served as Intelligence Officer (GG-13, Operations) and coordinated / deconflicted / synchronized counterintelligence and human intelligence operations, collection, and reporting● Oversaw the phases of the intelligence cycle: planning and direction, collection, processing, analysis, dissemination● Served as CI / HUMINT reports officer; responsible for quality assurance and quality control● Analyzed threat reporting for actionable intelligence; integrated threat intelligence into daily reporting summaries and briefings● Conducted collection management activities; ensured counterintelligence collection efforts aligned with and answered Priority Intelligence Requirements and Specific Information Requirements
  • Us Army
    Assistance Chief (Senior Ci Agent) | Technical Support Element, Usainscom
    Us Army 2001 - 2005
    Arlington, Virginia, Us
    ● Served as Intelligence Officer (GG-13, Operations) and stood up cyber counterintelligence / counterespionage capability for the U.S. Army Pacific; identified essential technical training and operational resource requirements; established policies and procedures for evidence collection, examination, and analysis● Conducted all phases of the counterintelligence cycle: planning and direction, collection, processing, analysis, dissemination● Responded to cybersecurity incidents and conducted digital forensic investigations involving computer systems and network environments to determine root cause, assess damage, and advised on containment and remediation measures ● Forensically imaged and examined digital media; processed evidence; analyzed network logs and related evidence● Provided incident response, evidence collection, and digital forensics training to counterintelligence agents and CERT personnel● Ensured cyber counterintelligence collection efforts aligned with and answered Priority Intelligence Requirements and Specific Information Requirements● Liaised with military intelligence, law enforcement, CERT, NOSC, legal, and security entities; provided technical advice and assistance to commanders● Applied the fundamentals of military and civil laws, regulations, and policies; maintained accountability of assigned intelligence property
  • Us Army
    Ncoic (Senior Ci Agent) | Zama Field Office, Usainscom
    Us Army 1999 - 2001
    Arlington, Virginia, Us
    ● Served as field office NCOIC and managed two teams of U.S. Army counterintelligence agents conducting counterintelligence, counterespionage, counterterrorism, and personnel security (background) investigations, as well as providing counterintelligence / force protection support to U.S. Army installations, joint military exercises, and special events● Led or oversaw national security related preliminary inquiries and full scope investigations; oversaw or performed subject / source / witness interviews; oversaw or conducted records checks activities; responsible for counterespionage case control● Oversaw counterintelligence route reconnaissance surveys, site surveys, and facility physical security assessments in support to force protection operations● Reviewed and quality-checked reports of investigation, threat assessments, intelligence summaries, counterintelligence estimates, intelligence information reports, and counterintelligence / force protection reports● Ensured counterintelligence collection efforts aligned with and answered Priority Intelligence Requirements and Specific Information Requirements● Oversaw or presented counterintelligence, threat landscape, and security awareness, and force protection briefings and training sessions to military and civilian audiences● Liaised with intelligence, law enforcement, and security organizations● Applied the fundamentals of military and civil laws, regulations, and policies; maintained accountability of assigned intelligence property
  • Us Army
    Counterintelligence Agent | Zama Field Office, Usainscom
    Us Army 1997 - 1999
    Arlington, Virginia, Us
  • Us Army
    Japanese Linguist
    Us Army 1993 - 1997
    Arlington, Virginia, Us
  • United States Marine Corps
    Field Wireman (Reserves)
    United States Marine Corps 1991 - 1993
    Washington, Dc, Us

John Grim Skills

Leadership Investigations Network Forensics Product Marketing Ftk Computer Forensics Information Security Ids Cissp Litigation Support First Responder Training Intrusion Detection Cybersecurity Incident Response Private Investigations Networking Technical Leadership Small Business It Solutions Penetration Testing Computer Security Communication Product Road Mapping Digital Forensics Training Course Development Strategy Vulnerability Management Digital Forensics U.s. Department Of Defense Risk Assessment Network Security Risk Management Product Strategy Forensic Analysis Security Awareness Product Management Information Security Management Security Audits Payment Card Industry Data Security Standard Management Vulnerability Assessment Product Launch Security Pci Dss Dod Investigation Presentations Analysis Strategic Vision Encase Governance And Compliance

John Grim Education Details

  • Kent State University
    Kent State University
    History
  • Defense Language Institute Foreign Language Center
    Defense Language Institute Foreign Language Center
    Japanese Language
  • Kent State University
    Kent State University
    Political Science
  • U.S. Army
    U.S. Army
    Counterintelligence Special Agent
  • U.S. Army
    U.S. Army
    Interrogator
  • U.S. Marine Corps
    U.S. Marine Corps
    Field Wireman

Frequently Asked Questions about John Grim

What company does John Grim work for?

John Grim works for Estée Lauder

What is John Grim's role at the current company?

John Grim's current role is Executive Director | Global Cyber Threat Management Center.

What is John Grim's email address?

John Grim's email address is jo****@****zon.com

What schools did John Grim attend?

John Grim attended Kent State University, Defense Language Institute Foreign Language Center, Kent State University, U.s. Army, U.s. Army, U.s. Marine Corps.

What skills is John Grim known for?

John Grim has skills like Leadership, Investigations, Network Forensics, Product Marketing, Ftk, Computer Forensics, Information Security, Ids, Cissp, Litigation Support, First Responder Training, Intrusion Detection.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.