Kevin Neely Email and Phone Number
Kevin Neely work email
- Valid
- Valid
- Valid
- Valid
- Valid
- Valid
Kevin Neely personal email
Kevin Neely phone numbers
TL;DR:One part law, one part literature, three parts tinkering with technology. Mix well, serve chilled.Robusto:I'm passionate about building high-performing security cultures that prioritize collaboration, continuous learning, and proactive risk management. Security isn't just about technology; it's about understanding the business risks and translating them into actionable strategies. My twenty-plus years of experience bridge the gap between technical expertise and business acumen, allowing me to deliver impactful security solutions aligned with organizational goals.Throughout my career, I've had the privilege of working with globally recognized companies, supporting business outcomes by delivering Information Security projects, and speaking at numerous conferences on topics such as data security and privacy. As a literature major, a technologist, a lawyer, small startup team member, and leader at a Fortune 1000 company, I understand the value of adaptability, resilience, and collaborative relationships in driving success. My leadership philosophy centers on empowering teams, fostering open dialogue, and driving results-oriented solutions. As a trusted advisor to my peers and a strategic thinker for my staff, experience has taught me the importance of transformation through both action and influence. As I look to the future, my mission remains simple: to elevate the industry's approach to data security and privacy by sharing knowledge, inspiring proactive shifts in how security is perceived and implemented. When not working, you can find me enjoying time with my amazing family or engaging in public speaking on application security and cybercrime topics.
-
Director Of Security OperationsPure Storage Mar 2019 - PresentSanta Clara, Ca, Us*Responsibilties*- Create and oversee a well-defined Security Operations team for a $4B enterprise.- Identify and build security capabilities that can deliver on business and customer requirements.- Direct a team of 3 managers and 15 individual contributors.- Maximize a $7.8M budget in order to deliver on all the requirements of a full SecOps program.- Prepare presentations and deliver Security Operations updates to the Executive Team and Board. *Accomplishments*- No voluntary attrition over the course of 9 \textonehalf{} years.- Coordinated multiple major cybersecurity incidents.- Weaponized OKRs, budgets, and risk assessments to extend the security program and protect the company from liability, growing my team by 300% while other teams remained flat.- With my legal background, I built a strong relationship with the legal team to create a clear reporting structure for SEC filings and incident notification. -
Information Security ManagerPure Storage May 2015 - Mar 2019Santa Clara, Ca, UsOversee and Manage all of corporate security at Pure StorageSet the program security strategy and deployed critical controls to protect the enterprise and support business growth from $200M to $1.6B in revenue and a tripling of employees. Focused on customer concerns regarding security in Pure's services, product development, and handling of data.*Responsibilties*- Instantiate a security program that could support a startup on an IPO trajectory.- Evaluate, acquire, implement, and operationalize foundational security technologies.- Meet customer and industry expectations for an enterprise-level security program. *Accomplishments*- Wrote, obtained approval, and published company-wide policies, along with yearly attestation by employees.- Implemented vulnerability management, EDR, security awareness, incident response, SOAR, and forensics.- Created a light GRC program in order to perform TPRM and meet GDPR compliance.- Deployed innovative approaches to address traditional security controls, making them palatable for an engineering culture. -
MemberInformation Security Leadership Foundation Mar 2019 - PresentSan Francisco, Ca, UsA 501(c)(3) not-for-profit, volunteer organization, the Information Security Leadership Foundation is a community of information security executives focused on practitioner collaboration and the education, mentorship, and development of the next generation of information security leaders. The foundation partners with educational programs to offer grants for students aspiring to be future security leaders. -
Blinky Lights ArchitectAruba Networks Apr 2014 - May 2015San Jose, California, Us* Plan, develop, and deploy an enterprise-wide security awareness program.* Create a forensics and eDiscovery program to support litigation and audit activities.* Define a framework for and make decisions relating to security architecture of IT operations projects.* Create an Incident Management framework and lead response activities. -
MentorAfa Cyberpatriot Sep 2013 - Dec 2014Guide and support my team participating in the CyberPatriot National Youth Cyber Education Program. As a mentor, I played a crucial role in educating students about cybersecurity principles, safe online behaviors, and the technical skills required to defend computer systems and networks against cyber threats. By providing hands-on training, sharing real-world experiences, and fostering problem-solving skills, I aided my students in gaining confidence and expertise in a rapidly evolving digital landscape. In the years I had to do this, I also had to create a lot of training material, such as custom VMs, pre-configured laptops, and training exercises not dissimilar to TryHackMe and HackTheBox in order to prepare the high school students for competition. -
Information Security AnalystJuniper Networks Nov 2008 - Mar 2014Sunnyvale, Ca, UsDeveloped the Incident Response Program and leads the incident response team.Use of threat intelligence collection, research, and sharing to prevent, detect, mitigate, and respond to security incidents.Designed and implemented enterprise edge security infrastructure to enhance corporate security and aid in IR activities.Review, suggest, and negotiate vendor and customer contractual security provisions.Draft requirements, policies, and standards.Worked closely with the legal team on privacy issues and to certify our company for Safe Harbor. -
Attorney - Of CounselKlemow Law Firm May 2007 - Feb 2008Represent clients primarily in bankruptcy, asset protection, and contract litigation in county and circuit courts.Manage own case load.
-
Attorney - ContractHuron Consulting Jul 2006 - Jun 2007Chicago, Il, UsReviewed documents for substantive issues in preparation for discovery. Determine privilege status.Proficient in Case-Data, Ringtail, Amici, and Concordance. -
System ArchitectJuniper Networks Oct 2000 - Jul 2003Sunnyvale, Ca, Us- Architect, implement, and maintain worldwide Active Directory network infrastructure.- Ultimate escalation point for all issues relating to Microsoft products.- Work closely with applications development group to design, scale, and implement new technologies for the corporate enterprise.- Support Solaris and BSD desktop integration with the enterprise network.- Maintain vendor relationships by participating in programs such as the Microsoft JDP, vendor seminars, and sales contacts.
Kevin Neely Skills
Kevin Neely Education Details
-
Case Western Reserve University School Of LawReal Estate -
The University Of Texas At AustinMathematics
Frequently Asked Questions about Kevin Neely
What company does Kevin Neely work for?
Kevin Neely works for Pure Storage
What is Kevin Neely's role at the current company?
Kevin Neely's current role is Director of Security // Speaker // Cyber Enabler.
What is Kevin Neely's email address?
Kevin Neely's email address is ke****@****age.com
What is Kevin Neely's direct phone number?
Kevin Neely's direct phone number is +165029*****
What schools did Kevin Neely attend?
Kevin Neely attended Case Western Reserve University School Of Law, The University Of Texas At Austin.
What are some of Kevin Neely's interests?
Kevin Neely has interest in Education.
What skills is Kevin Neely known for?
Kevin Neely has skills like Security, Information Security, Network Security, Firewalls, Linux, Computer Security, Incident Response, Ids, Penetration Testing, Network Architecture, Servers, Tcp/ip.
Free Chrome Extension
Find emails, phones & company data instantly
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial