Kevin Johnson, Cism work email
- Valid
- Valid
Kevin Johnson, Cism personal email
Air Force combat veteran, passionate golfer (despite my handicap!), avid fisherman, and people enthusiast. Firmly believe in connecting with others on their terms, tailoring my communication style and interactions to each person, and being genuinely curious about who they are as people. Finding great satisfaction in helping others reach their goals and offering guidance to those in need is fulfilling. Love to learn continuously and share my knowledge with anyone interested. Most of my free time is spent outdoors with my family, enjoying quality time, decompressing, and recharging.In my professional life, I am a meticulously organized, high-energy executive that simply gets things done. Effective communicator, from executive teams and board members making critical business decisions to the analyst tasked with keeping us all safe. Ambassador of an inclusive security culture, providing organizations the tools they need to not only function but thrive in today's complex security environment.With almost 20 years of information security experience, I currently serve as the Chief Information Security Officer (CISO) at The Beckage Firm. I have extensive experience in IT security, including: - Governance- Risk Management- Compliance- Long- and short-term strategic planning- Framework Alignment- Continuous monitoring- Incident response- Vulnerability management- Data Management- Vendor Management- Asset Management- Operations- Auditing- Automation- DevSecOps- Cloud / On-Prem environmentsCertifications Acquired:Certified Information Security Manager (CISM)Comptia Advanced Security Practitioner (CASP)Certified Associate in Project Management (CAPM)Security+
-
FounderVeil GroupAustin, Tx, Us
-
Svp, Cyber Risk | CisoThe Beckage Firm Aug 2022 - PresentBuffalo, New York, UsAs a people-first executive, I spearhead the strategic direction of the firm's Information Technology, including infrastructure, development, and security. Leadership• Business development• Strategy• Budgeting• Operations• Mentorship• Recruitment• Compliance• Audit readiness• Policy creation• TrainingBusiness support • Business development, operations, and continuity• Litigation• Privacy• Legal strategySystem & Security Architecture• Design and implement secure cloud environments for a fully remote workforce.• Assess and implement relevant technology and security tools.• Develop comprehensive security controls that protect Firm and client data.• Implement comprehensive audit processes to address compliance and business objectives.• Design proprietary applications to streamline business processes and collect valuable data that enable data-driven strategies.• Assess and implement emerging technologies to support business functions.Client Support• Advise international organizations and SMBs on advanced IT topics, including emerging technology, AI integration, security architecture, strategy, governance, compliance, incident preparedness, and framework adoption.• Conduct security assessments against NIST and ISO frameworks to identify gaps and create prioritization strategies that meet organizational objectives. • Guide clients through the Incident Response lifecycle, leading ransomware and destructive malware incidents to quickly resume business operations and help determine legal obligations. • Craft policies and plans from the ground up, including Acceptable Use, Access Management, Asset Management, Audit Readiness, Change Management, Cybersecurity, Data Classification and Handling, Data Retention, Disaster Recovery, Incident Response, Risk Management, Vendor Management, and Vulnerability Management.• Perform cryptocurrency tracing, collaborating with federal agencies to combat crypto fraud and theft. -
Director Information SecurityNational Western Life Oct 2021 - Aug 2022Austin, Texas, Us• Managed a security team that covers every facet of cybersecurity, including architecture, engineering, operations, vulnerability management, risk assessments, data security, incident response, continuous monitoring, access controls, and vendor management. • Led enterprise security strategy, governance, compliance, policy, and training in alignment with organizational objectives.• Developed and led a comprehensive data management initiative to inventory enterprise data, determining legal obligations and operational risks.• Effectively communicated at an executive level, clearly and competently providing complex security risks to non-technical leaders. • Collaborated across IT sections and business units to create an encompassing and inclusive security environment across the organization. • Provided expert management, organizational, and interpersonal skills to foster a team environment with all stakeholders, utilizing strengths and improving weaknesses for individual personnel. -
Information Technology Security ManagerInternal Revenue Service Apr 2017 - Oct 2021Washington, District Of Columbia, UsFunctioned as the Information Technology Security Manager and member of the Project Management Office (PMO) for the IRS. Conducted analysis on various vulnerability scans on over 100 servers, tracked vulnerability findings for remediation and false positives, represented the system during FISMA audits and cyber directives, created and managed Plan of Action and Milestones (POAMs), developed and implemented security processes, and updated system security documentation to ensure compliance. Assessed system processes for improvement, coordinated with team members to identify and overcome challenges, and ensured that proper documentation was completed and updated. Implemented measures to manage and track contractor system access, resource use, and roles/responsibilities for the project. -
System Analyst/PmoUs Navy Nov 2014 - Apr 2017Washington, Dc, UsProvided oversight for technical and performance quality assurance, Information Assurance compliance, policy, and contract oversight of the Enterprise Military Housing (eMH) web-based application utilized jointly by all DoD services with more than 400 locations, over 700,000 occupants, and 2 million yearly logins while being supported 24/7.Responsible for the overall system security, compliance, and documentation in correlation with USN, NIST, and DISA publications. Established future hardware and software considerations based on technical security needs and budgetary limitations. Managed the software development life cycle and provided approvals for application releases and updates, maintaining tight deadlines and a stable application. Managed contractor team leads for hosting, information assurance, and database teams consisting of various Information Technology experts, providing guidance and leadership to ensure project milestones remained on track and were met. -
Work Group ManagerUnited States Air Force Jan 2012 - Nov 2014Randolph Afb, Tx, UsManaged and provided non-classified and secret communications support for the organization, involving more than 850 personnel, including senior leadership and personnel with technical and non-technical knowledge while maintaining a positive customer service relationship. Responsible for the installation, maintenance, accountability, and troubleshooting of communication equipment worth over $1.5 million in support of day-to- day operations, special events and emergency situations. Trained and supervised a team of Information Technology Specialists and provided guidance and leadership to make sure operational requirements and needs were met.Set long- and short-term plans and strategies to strengthen information technology programs, including governance, compliance reporting, vulnerability management, asset management, incident response, and user support. -
Security Forces Patrolman / Information Assurance OfficerUnited States Air Force Nov 2008 - Jan 2012Randolph Afb, Tx, UsReceived and maintained a presidential clearance to support presidential security at Andrews AFB.Lead convoy driver of the Provost Marshal’s Office in Afghanistan for law enforcement patrol and provided personal security for senior government officials.Completed an intensive Army Air Assault school to support expeditionary missions.Performed Information Assurance Officer duties; tracked, managed, and corrected discrepancies in accordance with DoD and Air Force regulations and procedures.Provide Administration and management of physical system and data access controls based on the sensitivity of the data processed and the corresponding authorization requirements of individual users.Monitored Intrusion Detection System for high level protection resources worth over $1.3B.Responded to and wrote detailed reports on major traffic accidents, fatalities, domestics, assaults, and other incidents. -
Cnc Systems Operator / Computer TechnicianAggressive Technologies Mar 2006 - Nov 2008Provided hardware and software troubleshooting for drafting / design systems.Maintained network connectivity and ran diagnostics for performance issues.Backed up and maintained vital customer and business information in case of emergency outage / failure.Edited pictures of products to remove lighting defects for upload to the company website.
Kevin Johnson, Cism Skills
Kevin Johnson, Cism Education Details
-
American Military UniversityInformation Technology Project Management
Frequently Asked Questions about Kevin Johnson, Cism
What company does Kevin Johnson, Cism work for?
Kevin Johnson, Cism works for Veil Group
What is Kevin Johnson, Cism's role at the current company?
Kevin Johnson, Cism's current role is Founder.
What is Kevin Johnson, Cism's email address?
Kevin Johnson, Cism's email address is ke****@****irs.gov
What schools did Kevin Johnson, Cism attend?
Kevin Johnson, Cism attended American Military University.
What are some of Kevin Johnson, Cism's interests?
Kevin Johnson, Cism has interest in Information Security, Information Assurance, Information Technology, Customer Service Management.
What skills is Kevin Johnson, Cism known for?
Kevin Johnson, Cism has skills like Microsoft Office, Active Directory, Dod Top Secret Clearance, Veterans, Information Security, Information Assurance, Inventory Management, Software Product Management, Data Management, Vmware Workstation, Vmware Esx, Lotus Forms.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial