Jutt Laing

Jutt Laing Email and Phone Number

Associate Director @ KPMG US | Digital Security Group, Enterprise Security Services @ KPMG US
Jutt Laing's Location
Gilbertsville, Pennsylvania, United States, United States
About Jutt Laing

As an IT and Cybersecurity leader, my mission is to secure and protect enterprise IT applications, infrastructure, and assets.With 3 plus decades of technical and management experience across all IT domains my SME areas include:Ethical Hacking & Purple TeamingSAST, DAST, & SCA DevSecOps SDLCIdentity and Access Managementfederated identity management & SSOAutomation, IAC, and pipelinesArchitecture and engineeringCentralized loggingInformation Security & Physical SecuritySoftware Development

Jutt Laing's Current Company Details
KPMG US

Kpmg Us

View
Associate Director @ KPMG US | Digital Security Group, Enterprise Security Services
Jutt Laing Work Experience Details
  • Kpmg Us
    Associate Director, Digital Security Group
    Kpmg Us Feb 2015 - Present
    New York, Ny, Us
    PML of the KPMG US Software Security Team, leading a global team of Cybersecurity professionals. Perform OSS SCA, SAST, & DAST security scanning & assessment via GHE/ADO secure ci/cd pipelines for all US firm developed applications. Decrease overall IT attack surfaces through vulnerability assessment and remediation. Set firm security review process & secure coding guidelines. Implement SHIFT LEFT toolsets for DevSecOps. Secret scanning & remediation. Purple team offense/defense. AI security (libs/models/code). Identity and Access Management architect/engineer leading federated identity management, IAM, and single sign-on solutions for the firms global IAM infrastructure.Technical lead of Cyber Operations performing vulnerability assessments & security remediation of firm assets as an ethical hacker, including Red/Blue teaming and incident response. Associate Director on Architect & Engineering Team that automated Infrastructure As Code (IAC) build of a plethora of technologies including server OS VM/hardware build (win/rhel), network automation, and applications utilizing Terraform IAC, Bigfix, Python, and Saltstack. Jack of all trades 100% technical hands on leader I take dreams to fruition from requirements thru the entire SDLC and IT Operations.
  • Interlan Corporation
    Consultant / President
    Interlan Corporation Jan 1996 - Present
    Gilbertsville, Us
    President of S-Corporation performing consulting services for large, medium, and small firms.Primary focus on Information Security, Red/Blue Team ethical hacking, & Identity & Access mangement projects for Fortune 500 companies that have included Government Agencies, Education, Banking & Finance, Insurance, Health-Care, Real-Estate industries.
  • Ibm
    Information Security Consultant
    Ibm Nov 2011 - Feb 2015
    Armonk, New York, Ny, Us
    Architect and hands-on technical support of multiple enterprise level clients including KPMG and Avis Budget with a focus on the IBM security stack (FIM - ISAM Federation Manager formerly TFIM, TAM/ISAM WEBSEAL formerly TAM, ISIM - IBM Security Identity Manager formerly ITIM, TDI - Tivoli Directory Integrator, USDS - IBM Security Directory Server formerly TDS). SME in Federated Identity Management using FIM to implement SAML, WS-FED, & Oauth federations for sso between companies. Lead federation Architect/engineer for IBM client KPMG US. Implemented thousands of web apps with ISAM. InfoSec SME for team, analyzing SAST/DAST scans and remediating vulnerabilities in WAF, Web Servers (IIS, Websphere, Apache/Tomcat), and applications.
  • Ascendant Technology
    Information Security Consultant
    Ascendant Technology Oct 2011 - Apr 2013
    Phoenix, Az, Us
    Architecting, designing, and implementing Tivoli Federated Identity Management SSO solutions utilizing Tivoli Federated Identity Manager (TFIM) in combination with Tivoli Access Manager (TAM). Replace TAM MAS (e-community sso) with TFIM using SAML to perform internal cross domain single sign-on.
  • Nypd
    Information Security Consultant
    Nypd Oct 2010 - Oct 2011
    New York, Ny, Us
    Lead the Identity and Access Management project (through Keane and NetworkingPS) for their client the NYPD - which is the largest law enforcement agency in the world. As a consultant I was Lead Architect and Developer on my team of 4 people (3 developers and 1 project manager). Being team lead and sole architect I designed the solution, performed all technical and requirements interfacing with client, and installed / configured / and developed highly customized I&AM solutions. To meet auditing, reporting, and centralized logging requirements I also implemented an Enterprise Splunk solution.Worked on multiple Information Security projects as InfoSec, IAM, and Ethical Hacker SME.
  • Carefirst Bluecross Blueshield
    Information Security Architect & Engineer
    Carefirst Bluecross Blueshield Oct 2007 - Oct 2010
    Baltimore, Md, Us
    Design and architect Enterprise Identity & Access Management solutions utilizing IBM Tivoli suite (ITIM / TAMeb / TFIM / ITDI / ITDS) in conjunction with WAS Portal to integrate enterprise applications using RBAC standards. Large focus on securing solutions at all layers. Produced design artifacts via waterfall SDLC based on CMMI level 3 framework. Hands-on technical support of ENTIRE ENVIRONMENT including Identity Management, Federated Identity management (SAML, Kerberos), and Access Management to all enterprise applications. Designed and built middleware layer using JMS to update Identity Management systems automatically from Systems of Record (Databases of many types). Secured DMZ and internal infrastructure at all layers. Implemented centralized Log management and reporting/alerting apps via Splunk.
  • Iron Mountain
    Security Architect
    Iron Mountain 2006 - 2007
    Implement Enterprise Identity & Access management solution utilizing IBM Tivoli suite (ITIM / TAMeb / ITDI / SunOne LDAP) with corporate WAS Portal to integrate customer based eWeb / online applications. Part of Information Security team providing implementation, support, design, and day to day support.
  • Colliers International
    Consultant - Security Architect
    Colliers International Nov 2002 - Apr 2003
    Toronto, Ontario, Ca
    Short-termed contract position to rollout DirXML / Nsure / Identity Manager, Edirectory, & LDAP to provide centralized email address book lookups for 40+ Exchange, Notes, & Outlook email systems. DirXML / Nsure /Identity Manager drivers were installed on all International servers. Each server’s data fields were then pumped through the public Internet via SSL to Microsoft servers running Novell Edirectory. Placement, creation, logic, & data manipulation were performed using XSLT style sheets. The data was then placed into Edirectory. Email clients could then do centralized LDAP lookups for employees & provided a centralized Authentication Directory Service.
  • Jpmorganchase
    Consultant - Global Security Architect (Edirectory/Nds Ldap & Intel)
    Jpmorganchase Jan 1997 - Nov 2002
    New York, Ny, Us
    Architect, design, & support global Edirectory LDAP architecture containing 1.8 million objects on multiple platforms in 68+ cities & 25 counties worldwide.Supported merger of JPMorgan & Chase implementing Identity Management using DirXML/NSure/Identity Manager supporting 1600+ Edirectory servers & 3 LDAPs connected to a workforce tree for automated provisioning from PeopleSoft. All Microsoft servers were managed via Edirectory. Certified & rolled out Single Sign-On capability globally so one login accesses all systems.Global Admins reported to our team to obtain standards, policies, Intel server builds, & engineering certifications. Installed large server clusters using Fiber Channel Storage Area Networks on EMC.Enforced firm’s security policies using DSExpert, planned router IP/IPX ports, & installed global SNMP monitoring using ManageWise.On 9/11/2001, my contingency implementation provided LDAP availability for the Americas for over 60 lost servers in NYC.
  • Pierce Leahy
    Sr. Network Engineer
    Pierce Leahy Jan 1995 - Jan 1997
    This company became Iron Mountain. Network Engineer purchasing, implementing, and supporting all servers, Operating Systems, switches, routers, Directory Servers (eDirectory/NDS/AD/LDAP), and Network Applications.Managed PC Technical Team responsible for all PCs.

Jutt Laing Skills

Soa Oracle Identity Management Iam Saml Ldap Tivoli Access Manager Federation Security Splunk Integration Tivoli Identity Manager Unix Sdlc Sso Solution Architecture Websphere Application Server Enterprise Software Siteminder Information Security Disaster Recovery Tivoli Directory Server Security Architecture Design Active Directory Operating Systems Ibm Tivoli Identity Federation Websphere Infrastructure Cissp Virtualization Linux Ssl Information Security Management It Management Rbac Directory Services Firewalls Isam Middleware Architectures Vmware Network Security It Strategy Encryption Cloud Computing Edirectory Application Security Novell

Jutt Laing Education Details

  • Clc
    Clc
    Networking

Frequently Asked Questions about Jutt Laing

What company does Jutt Laing work for?

Jutt Laing works for Kpmg Us

What is Jutt Laing's role at the current company?

Jutt Laing's current role is Associate Director @ KPMG US | Digital Security Group, Enterprise Security Services.

What is Jutt Laing's email address?

Jutt Laing's email address is jl****@****pmg.com

What is Jutt Laing's direct phone number?

Jutt Laing's direct phone number is +140856*****

What schools did Jutt Laing attend?

Jutt Laing attended Clc.

What are some of Jutt Laing's interests?

Jutt Laing has interest in Science And Physics, Information Security, Skydiving, Vocals, Piano/keyboard, Music, White Hat Hacking, Drums, Astronomy, Identity And Access Management.

What skills is Jutt Laing known for?

Jutt Laing has skills like Soa, Oracle, Identity Management, Iam, Saml, Ldap, Tivoli Access Manager, Federation, Security, Splunk, Integration, Tivoli Identity Manager.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.