John Word Jr. Email and Phone Number
John Word Jr. work email
- Valid
- Valid
John Word Jr. personal email
- Valid
John Word Jr. phone numbers
Information Security/Cyber Security ProfessionalSpecialties: Analysis, Monitoring, Investigation, Leadership, ManagementSIEM Technology Vulnerability Management, scanning Technology
-
Safenet SecurityWilmington, De, Us -
Cyber Security Cyber Threats ConsultantPennsylvania Higher Education Association Aug 2022 - Present• Advised senior leadership on critical security issues, indicators of compromise, and risk mitigation strategies.• Led cyber threat hunting engagements and managed departmental technologies for all SOC projects.• Architected and implemented the agency's Emerging Threats program in conjunction with vulnerability management initiatives.
-
Merger & Acquisition Cyber Security LeadWsp In The U.S. Aug 2021 - Aug 2022New York, Ny, UsProvide road map for revised cyber security posture to and assimilation of all merger and acquisition clients into the WSP network. Lead Project review and 3rd party risk assessments for all Mergers and Acquisitions through organization. Engineer security solutions such as established Incident response, EDR and NDR. Review Email security status and provide industry standard feedback. Review Pen test results and provide remediation steps for any known vulnerabilities Run vulnerability scans using Nessus for potential Mergers and Acquisition clients. Provided Analysis around core functions of Incident handlers and inspection of potential security breaches and incidents. Build vulnerability and threat reports. Evaluate emerging threats and provide active threat hunting. -
Lead Cyber Security Engineer/ Incident ResponseCity Of Philadelphia Mar 2018 - Aug 2021Philadelphia, Pa, Us• Led project deployment and completion for Incident Response Tools in SOC, including Qradar, Mcafee ePO, Rapid 7 Nexpose, and more.• Supervised a team of SOC incident respondents/administrators, providing analysis on potential security breaches and incidents.• Built vulnerability and threat reports, evaluated emerging threats, and conducted active threat hunting following the cyber kill chain model. -
Cyber Security EngineerThe Judge Group Oct 2017 - Mar 2018Wayne, Pa, UsCyber Security Engineer in the S.O.C -
Sr. Information Security Services EngineerBank Of America Nov 2013 - Aug 2017Charlotte, Nc, Usinformation security engineering -
Information Security Risk ManagementKforce Inc Jul 2013 - Nov 2013Tampa, Fl, Usinformation security risk management -
Information Security EngineerThe Judge Group May 2013 - Aug 2013Wayne, Pa, Usinformation security engineer -
Enterprise Security Risk And Compliance (Esrc)AnalystFirst Data Corporation Feb 2013 - Jul 2013Brookfield, Wisc., UsParticipate in weekly project production meetings for phases or the project reportingReview reports for modification or specifications of phases and project deadlines.Migrate Unix/Linux servers, Remove and replace Policies on Unix\Linux servers Using Quest QAS/VAS and O.A.T tools.Review Users, Application accounts, and file share permissions on All Accounts.Create, Review, and modify change management and controls for server Migration and remediation -
I.T. Risk Management/Security Operations Analyst (Soc)Wawa, Inc. Nov 2011 - Dec 2012Wawa, Pa, UsReview security logs for anomalies, patterns, and variants using ArcSight.Research, review, and report on all potential vulnerabilities to the network.Coordinate reporting to other teams and information gathering of risks.Review Logs files and reports from IPS, IDS, Proxy Servers and MS Servers.Performs initial triage of all security events and in depth analysis of threats to the network as well as proactive security measures.Security vulnerability scanning for web hosts, network devices, and all computer systems.Write, review, edit, documents and procedures on processes. Standard operating procedures (SOP’s) -
Information Security Soc / Data Security AnalystCsc Mar 2011 - Nov 2011Global, UsSecurity operations center analyst security review, alert monitoring, Analysis, Event classification, reporting and device health investigation.Creating, Provisioning, and Modifying end user and system accounts. Providing security around files folders and applications -
Systems Access And Identity Management AdministratorBlackrock Aug 2010 - Mar 2011New York, Ny, UsCreate, modify, and delete end-user and system accounts for applications and operating platformsEnsure proper authorization is received/issued/created for all access changesAdminister security and access across multiple computing platforms. Unix, Linux, Active Directory, Oracle.Troubleshoot access issues including review of current access setups and working with end users, developers, and infrastructure staff to identify and correct issues. -
Helpdesk Technical SupportBarclaycard Mar 2008 - Aug 2010London, GbTechnical support for all lines of business.
John Word Jr. Skills
Frequently Asked Questions about John Word Jr.
What company does John Word Jr. work for?
John Word Jr. works for Safenet Security
What is John Word Jr.'s role at the current company?
John Word Jr.'s current role is Information Security Engineer/ Lead/Manager.
What is John Word Jr.'s email address?
John Word Jr.'s email address is jw****@****ail.com
What is John Word Jr.'s direct phone number?
John Word Jr.'s direct phone number is (866) 382*****
What skills is John Word Jr. known for?
John Word Jr. has skills like Information Security.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial