John D. Email and Phone Number
John D. work email
- Valid
- Valid
- Valid
John D. personal email
I offer 20+ years of increasingly complex and progressive responsibility in Systems Engineering, Administration, and Information Security. I excel at clearly communicating with executives, support teams, auditors, and clients with clear, actionable goals and takeaways. Security incidents are going to happen. Whether large or small, being prepared is key to successfully navigating an event. When things go wrong, people default to their lowest level of functioning, making established procedures and documentation paramount. Practicing responding to events is a practice I regularly lead, and it enables teams to be successful when an unfortunate event inevitably occurs. Information Security is a passion of mine, and it has been for many years. I LOVE helping people become aware of major risks and what they can do about it:* MFA on EVERYTHING* Good password hygiene* Patch your computer* Don't use public shares of data for anything sensitive.It's always great to hear about individuals that change thier habits for the better, both at work and their personal life. With the help of others in the industry (you may be included in this) we have prevented many personal and business security incidents by helping one person at a time. We really do make a difference in this crazy world!Helping people safely use technology in ways that don't "get in the way" is also something I pursue passionately. Security doesn't have to be painful, if it's done right. In an InfoSec role, it's our job to find ways to make security faster, easier, and better. I love it when we can use things like FIDO keys or SSO to make logins easier and faster for our users. It takes effort and intent, but the impact security has can be reduced. It can even help, in many cases.Some of my key career highlights are:● Liaise with the executive board and leadership team and establish enterprise-wide security initiatives, performing risk assessments and providing updates on major security developments.● I perform risk assessments, test data processing systems, and provide documentation on security vulnerabilities and breaches and the extent of the damage caused. I excel at clearly communicating the mitigation steps needed and providing technical and managerial guidance to geographically dispersed support teams. I also excel at constantly and effectively communicating with executives and auditors regarding the status of open items and strive for excellence in this practice.
-
Head Of Information SecurityPackback Aug 2024 - PresentChicago, Illinois, Us -
Information Security OfficerHome Partners Of America Feb 2022 - PresentChicago, Illinois, Us• Regularly performed risk assessments, analyzing the likelihood and potential impact of identified risks and providing business justification for risk reduction. • Analyze and evaluate emerging technologies to identify potential solutions for business needs, Develop implementation plans, and guide multiple teams in their implementation.• Advocate for adopting new technologies by building strong business cases and presentations.• Repeatedly, effectively, and quickly established rapport and communicated with all levels of executives, colleagues, and clients while clearly communicating risks and recommending mitigation steps. -
Product Security LeadSalesforce Dec 2021 - Mar 2022San Francisco, California, Us• Championed the effort to onboard all employees, company assets, and applications following M&A processes, ensuring all internal and customer security requirements were met or exceeded while providing a great experience for employees.• Led a security team responsible for maintaining SOC 2 certification, customer contracts, incident response, risk assessment, and other key functions of the Information Security Process. -
Lead Information Security EngineerNarrative Science Jul 2017 - Dec 2021Chicago, Illinois, UsStrategic Initiatives• Designed and implemented an organization wide information security program that met customer commitments which enabled Narrative Science to pass client security audits as well as obtain a clean SOC 2 report by establishing best practices, governance, and ensuring compliance• Developed the Computer Incident Response Methodology, which lead to increased interdepartmental collaboration, accurate reporting and reduced handle time of incidentsProfessional Experience at Narrative Science• Proven ability to establish effective rapport and communicate with all levels of executives, colleagues and clients• Security Information and Event Management (SIEM), Intrusion Detection(IDS), Data Leakage Prevention (DLP), forensics, sniffers and malware analysis tools.• Security Analysis using AlienVault, BURP, OWASP ZAP, Kali, Lynis, and Amazon Inspector• Implemented a SIEM security system to actively monitor all systems, application logs, and infrastructure devices that could access sensitive information for threats -
Systems AdministratorNarrative Science Jun 2015 - Aug 2017Chicago, Illinois, UsStrategic Initiatives• Designed and implemented an information security program that significantly reduced the effort to complete RFI’s and tracked contract details and commitments• Created a system to efficiently and accurately respond to customer security-related inquiries• Served as the point person in multiple customer engagements covering everything from basic security practices to customer contract negotiation more specific and advanced topicsProfessional Experience at Narrative Science• Design and build enterprise grade infrastructure and application systems• AWS systems including Cloud Formation, EBS, EC2 instances, Route 53, S3, VPC Disaster recovery and Business Continuity• Operating systems: Redhat & CentOS, Debian, and Microsoft Windows• Enterprise wide performance analysis, optimization, and capacity planning• Network infrastructure including TCP/IP, DHCP, DNS, load balancers, firewalls• Monitoring systems, including Nagios, Cloudwatch, Sumologic, and Opsgenie• Server hardware: Dell, SuperMicro• Virtualization technologies: KVM, VMWare/VSphere, Virtualbox -
Senior System EngineerNokia Oct 2013 - Mar 2015Espoo, Southern Finland, FiStrategic Initiatives• Authored project plans to meet compliance requirements, internal policies and standards; represented plans to upper-level management and then with teams implementing them• Implemented a high available Xen cluster with rapid fail-over using a Hitachi storage frame and redundant fiber-optic networks• Was a major contributor on a team that designed and built a new datacenter. I coordinated with business leaders to complete the migration without serious business interruptions• Automated the deployment of virtual machines on remote bare-metal systems. This included bash scripting to automate install tasks, as well as the utilization of Redhat configuration and management capabilitiesProfessional Experience• Provided system/equipment/specialized training and technical guidance• Implemented and maintained virtualization platforms: Xen, RHEV-M, KVM, VMWare and OpenVZ• Participated in the upgrading of operating systems and design of systems enhancements• Participated in staff design reviews ensuring that disciplines meet system requirements• Spec’d and supported hardware: Dell, HP, IBM, SuperMicro, Hitachi, EMC• Conducted various security vulnerability assessments (e.g., Patch Analysis, Port Analysis, Malicious Code Analysis, and CERT Vulnerability Analysis,) and documented the results in Certification Reports -
Senior Systems AdministratorNokia Aug 2012 - Oct 2013Espoo, Southern Finland, FiSummary:• Designed, implemented and supported thousands of servers running Red Hat Linux and Windows.• General system administration tasks including system monitoring, business continuity, software administration, O/S installation and management, virtualization, private and public cloud, highly available and clustered systems and storage area networks.• Expertise in TCP/IP, FTP, SSL, HTTP, load-balancers, firewalls, security compliance and certification, hardware troubleshooting, data-center design & implementation.Responsibilities:• Evaluate new products and technology to see if they meet business needs.• Manage and support large application clusters that utilized Redhat Cluster Suite to provide high availability as well as rapid scalability.• Managed complex storage area networks as well as the highly available, distributed clustered systems.• Provided Tier 3 support and acted as an escalation point for all other support tiers. I managed hardware and OS troubleshooting, performance analysis, as well as application troubleshooting. -
Systems AdministratorNokia Aug 2007 - Aug 2012Espoo, Southern Finland, Fi• Implemented and maintained virtualization platforms: Xen, RHEV-M, KVM, VMWare and OpenVZ• Participated in the upgrading of operating systems and design of systems enhancements• Participated in staff design reviews ensuring that disciplines meet system requirements -
Lead Server EngineerAegon 2004 - 2007The Hague, South Holland, Nl• Provisioned cabinets, network, and power, plus over 100 Redhat, SUSE, AIX, HPUX, and Windows servers• Perform regular upgrades and system maintenance on all servers. -
Lead Network AnalystAegon 2001 - 2004The Hague, South Holland, Nl -
Senier Network AnalystAegon 1999 - 2001The Hague, South Holland, Nl -
Fraud Analyst/Server AdministratorFrontier Communications Sep 1996 - Aug 1999Dallas, Texas, Us
John D. Skills
John D. Education Details
-
Kirkwood Community College -
Kirkwood Community College
Frequently Asked Questions about John D.
What company does John D. work for?
John D. works for Packback
What is John D.'s role at the current company?
John D.'s current role is Head of Information Security @ Packback | Information Security.
What is John D.'s email address?
John D.'s email address is jo****@****lay.com
What schools did John D. attend?
John D. attended Kirkwood Community College, Kirkwood Community College.
What skills is John D. known for?
John D. has skills like High Availability, Vmware, Virtualization, Red Hat Linux, Linux, Storage, Cluster, Operating Systems, Cloud Computing, Active Directory, Redhat, Kvm.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial