Kevin Ivy, Cissp, Cism

Kevin Ivy, Cissp, Cism Email and Phone Number

Director of Security Services @ TraceSecurity | CISSP, CISM, CRISC @ TraceSecurity
Kevin Ivy, Cissp, Cism's Location
Baton Rouge Metropolitan Area, United States, United States
Kevin Ivy, Cissp, Cism's Contact Details

Kevin Ivy, Cissp, Cism work email

Kevin Ivy, Cissp, Cism personal email

Kevin Ivy, Cissp, Cism phone numbers

About Kevin Ivy, Cissp, Cism

As the Director of Security Services at TraceSecurity, I lead a team of Information Security Analysts who provide high-quality and comprehensive security testing and audit services to clients across various industries. I have over six years of experience in this role, and I hold certifications in CISSP, CISM, and CRISC.My core competencies include penetration testing, social engineering, IT auditing, risk assessment, and vulnerability analysis. I also train and mentor my staff, monitor the threat landscape, report on department status, and collaborate with cross-functional teams. My mission is to deliver the most valuable and accurate security services and help clients meet their regulatory and business requirements. I am passionate about cybersecurity and constantly seek to learn new skills and stay updated on the latest trends and best practices.

Kevin Ivy, Cissp, Cism's Current Company Details
TraceSecurity

Tracesecurity

View
Director of Security Services @ TraceSecurity | CISSP, CISM, CRISC
Kevin Ivy, Cissp, Cism Work Experience Details
  • Tracesecurity
    Director Of Security Services
    Tracesecurity Dec 2019 - Present
    Baton Rouge, La, Us
    • Oversee security services: Manage the security services, including IT audits, vulnerability assessments, social engineering, and penetration testing, to deliver the most valuable and accurate services.• Train and mentor staff: Provide guidance and training for Information Security Analysts, fostering a culture of continuous learning and professional development.• Monitor threat landscape: Stay informed about emerging threats and trends in cybersecurity and adjust security strategies and services accordingly.• Report on department status: Communicate performance metrics and updates to executive leadership.• Collaborate with cross-functional teams: Work closely with IT, development, business development, and other departments to deliver the company's goals.• Continuously improve security posture: Work closely with other department heads to review and update security practices, incorporating lessons learned from incidents and new developments in the cybersecurity field.• Produce educational content: Conduct webinars and write white papers in collaboration with the marketing team, sharing industry insights and promoting TraceSecurity's expertise in information security to engage clients, prospects, and the wider community.• Hands-on service execution: Actively participate in and perform critical security services such as IT audits, penetration testing, social engineering, risk assessments, and other related services, ensuring high-quality delivery and maintaining a deep understanding of current security practices and challenges.
  • Tracesecurity
    Information Security Analyst
    Tracesecurity Sep 2017 - Dec 2019
    Baton Rouge, La, Us
    • Subject matter expertise: Serve as a knowledge expert and contribute to the strategic direction of the company's product and service lines.• Client-focused security testing: Perform various information security testing services to identify threats and help clients meet regulatory requirements such as SOX, GLBA, FFIEC, FDIC, NCUA, and HIPAA.• Core services: Execute vulnerability assessments, physical security inspections, IT security audits, HIPAA audits, HITRUST assessments, risk assessments, social engineering, penetration tests, network/system configuration reviews, wireless assessments, and more.• Comprehensive reporting: Compile and deliver written reports tailored to clients' specific risks and business plans, providing clear remediation suggestions and guidance.• Project management: Maintain detailed documentation throughout the engagement lifecycle and provide team/project support as needed.• Security awareness training: Develop and conduct company-wide training workshops and webinars to promote a strong security culture.• Penetration Testing: Performed red and purple team engagements for small and large institutions. • Public speaking: Represent TraceSecurity at industry conferences and events, sharing expertise and insights in information security.• Client communication: Engage in oral and written discussions with clients to provide post-evaluation reports and guidance on remediation strategies.
  • Tigerbytes It Solutions
    It Consultant
    Tigerbytes It Solutions Jun 2015 - Sep 2017
    Baton Rouge, Louisiana, Us
    • Analyze client's IT infrastructure: Assess existing hardware, software, and network systems to identify areas for improvement or potential issues.• Develop IT strategies: Create comprehensive plans to optimize and align clients' IT resources with their business objectives.• Implement technology solutions: Install, configure, and integrate new hardware, software, and network components to enhance clients' IT systems.• Troubleshoot and resolve issues: Diagnose and fix technical problems, liaising with vendors and third-party service providers when necessary.• Monitor and maintain systems: Regularly check clients' IT systems for optimal performance and security, applying updates and patches as needed.• Provide user support and training: Assist end-users with technical issues and train them in using new software, hardware, and other IT tools.• Document processes and procedures: Create and maintain clear, concise documentation of IT systems, configurations, and operational procedures.• Manage projects: Oversee IT projects from inception to completion, ensuring timely and cost-effective delivery while maintaining high-quality standards.• Maintain client relationships: Communicate effectively with clients to understand their needs, provide regular updates, and ensure service satisfaction.• Stay current with industry trends: Continuously learn about new technologies, tools, and best practices to provide cutting-edge solutions and advice to clients.• Collaborate with team members: Work closely with colleagues to share knowledge, coordinate efforts, and deliver seamless service to clients.
  • Detel
    It Production Manager
    Detel Dec 2010 - Jun 2015
    Baton Rouge, La, Us
    • Oversee production process: Manage the entire IT production process, from planning and scheduling to execution and quality control.• Develop production plans: Create and maintain production schedules to ensure timely delivery of products and services while optimizing resource utilization.• Manage IT resources: Allocate and manage hardware, software, and human resources to meet production targets and maintain operational efficiency.• Monitor and control production costs: Track production expenditures, identify areas for cost reduction, and implement strategies to optimize profitability.• Coordinate with other departments: Collaborate with sales, procurement, and logistics teams to align production activities with customer demands and business objectives.• Maintain quality standards: Implement and enforce quality control measures to ensure products and services meet the highest industry standards.• Troubleshoot production issues: Identify and resolve technical problems that may impact the production process, working closely with the IT team and other stakeholders.• Continuous improvement: Analyze production processes and identify opportunities for improvement to increase efficiency, reduce waste, and enhance product quality.• Supervise production team: Recruit, train, and manage production staff, fostering a positive work environment that encourages collaboration and high performance.• Inventory management: Monitor inventory levels of hardware, software, and other IT components, ensuring timely replenishment to avoid production delays.• Compliance and safety: Ensure production activities adhere to relevant industry regulations, legal requirements, and safety standards.• Report on production performance: Provide regular updates to senior management on production progress, challenges, and achievements, making data-driven recommendations for improvements.
  • Bits Technical Corporation
    It Manager/Technical Sales
    Bits Technical Corporation Jan 2008 - Dec 2010
  • Latech Security + Surveillance
    It Director
    Latech Security + Surveillance Jan 2006 - Jan 2008
    Baton Rouge, Louisiana, Us
    • Develop and implement IT policies: Establish IT policies and procedures to support the organization's objectives and ensure efficient use of resources.• Manage IT infrastructure: Oversee the design, implementation, and maintenance of the company's hardware, software, and network systems.• Coordinate IT projects: Oversee IT projects from initiation to completion, ensuring that they are delivered on time, within scope, and on budget.• Vendor management: Build and maintain relationships with hardware and software vendors.• User support and training: Ensure that end-users receive timely and effective assistance with technical issues and are trained in using IT tools and systems.• Monitor and maintain systems: Regularly review IT systems for optimal performance, security, and compliance, applying updates and patches as needed.• Collaborate with other departments: Work closely with other department heads to align IT efforts with company-wide objectives and support their technology needs.• Stay current with industry trends: Continuously research and evaluate new technologies and best practices to maintain a competitive edge and improve the organization's IT capabilities.
  • Bits Technical Corporation
    It Technician
    Bits Technical Corporation Apr 2004 - Jan 2006
    • Assemble custom-built computers: Follow client specifications to build and configure custom desktops and laptops, ensuring optimal performance and compatibility.• Diagnose and repair computer issues: Identify and troubleshoot hardware, software, and network-related problems on various computer systems, resolving issues efficiently.• Install custom images: Create, configure, and deploy customized operating system images on client computers, incorporating specific software and settings as required.• Perform hardware upgrades: Evaluate existing computer components, recommend and install upgrades to improve system performance and extend device life.• Configure and test systems: Set up new computer systems, ensuring correct configuration of hardware, software, and network settings for optimal performance and user experience.• Maintain inventory of components: Manage stock levels of computer parts and peripherals, reordering as necessary to ensure a consistent supply for computer builds and repairs.• Provide user support and training: Assist end-users with technical issues, and educate them on the proper use and maintenance of their computer systems.• Coordinate with vendors: Establish and maintain relationships with hardware and software suppliers, negotiating prices and managing warranty claims.• Document processes and procedures: Record detailed notes on computer builds, repairs, and custom image installations to maintain accurate records and ensure consistency in service delivery.• Maintain a clean and organized workspace: Ensure that the work area is kept tidy and well-organized, adhering to safety standards and fostering efficiency.• Stay current with industry trends: Continuously learn about new hardware, software, and best practices to provide cutting-edge solutions and up-to-date knowledge to clients.• Collaborate with team members: Work closely with colleagues to share knowledge, coordinate efforts, and deliver seamless service to clients.

Kevin Ivy, Cissp, Cism Skills

Troubleshooting Customer Service Microsoft Office Servers Active Directory Program Management Business Analysis Technical Support Windows 7 System Administration Tcp/ip Computer Hardware Software Documentation Windows Server Account Management Computer Repair Hardware Networking Printers Project Management Windows Xp Penetration Testing Internal Audit Network Security Security Information Security Risk Management Risk Assessment Social Engineering Report Writing Management Software Installation Windows Security Audits Security Testing Security Awareness It Management Ffiec Iso Standards Cybersecurity Network Administration Physical Security

Kevin Ivy, Cissp, Cism Education Details

  • Iti Technical College
    Iti Technical College
    Information Technology

Frequently Asked Questions about Kevin Ivy, Cissp, Cism

What company does Kevin Ivy, Cissp, Cism work for?

Kevin Ivy, Cissp, Cism works for Tracesecurity

What is Kevin Ivy, Cissp, Cism's role at the current company?

Kevin Ivy, Cissp, Cism's current role is Director of Security Services @ TraceSecurity | CISSP, CISM, CRISC.

What is Kevin Ivy, Cissp, Cism's email address?

Kevin Ivy, Cissp, Cism's email address is ke****@****ail.com

What is Kevin Ivy, Cissp, Cism's direct phone number?

Kevin Ivy, Cissp, Cism's direct phone number is +122557*****

What schools did Kevin Ivy, Cissp, Cism attend?

Kevin Ivy, Cissp, Cism attended Iti Technical College.

What skills is Kevin Ivy, Cissp, Cism known for?

Kevin Ivy, Cissp, Cism has skills like Troubleshooting, Customer Service, Microsoft Office, Servers, Active Directory, Program Management, Business Analysis, Technical Support, Windows 7, System Administration, Tcp/ip, Computer Hardware.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.