Kevin Wilson

Kevin Wilson Email and Phone Number

Senior Product Manager @ Halcyon
Mooresville, NC, US
Kevin Wilson's Location
Mooresville, North Carolina, United States, United States
Kevin Wilson's Contact Details
About Kevin Wilson

Over 15 years of experience in the fields of Intelligence, Cyber Security, Product Management, Risk Mitigation, Incident Response, and Compliance.

Kevin Wilson's Current Company Details
Halcyon

Halcyon

View
Senior Product Manager
Mooresville, NC, US
Kevin Wilson Work Experience Details
  • Halcyon
    Senior Product Manager
    Halcyon
    Mooresville, Nc, Us
  • Abusix, Inc.
    Product
    Abusix, Inc. Feb 2024 - Present
    Boston, Ma, Us
  • Abusix, Inc.
    Ciso
    Abusix, Inc. Feb 2024 - Present
    Boston, Ma, Us
  • Stellar Cyber
    Senior Product Manager
    Stellar Cyber Jun 2022 - Feb 2024
    San Jose, California, Us
  • Cybereason
    Senior Product Manager
    Cybereason Dec 2021 - Jun 2022
    San Diego, California, Us
    • Serve within Platform Product Team.• Developed Product vision for the Multi-Customer Management (MCM) that enables MSSP’s and VLE customers to effectively management large scale environments.• Developed streamlined RBAC and Custom Role models.• Responsible for MSSP and Partner Roadmap to ensure effective delivery of customer needs.• Prioritize Customer RFE’s for Product Roadmap and Development.• Host Partner and Customer strategy round tables to discuss Product future as well as new customer use cases.
  • Area 1 Security
    Senior Product Manager
    Area 1 Security Jun 2020 - Dec 2021
    San Francisco, California, Us
    • Lead all product strategy functions for Cloud Email Security including increasing value received on customer investment.• Develop Go to Market Strategy for all functions of Horizon product.• Manage product lifecycle and development.• Effectively manage backlog of all reported tickets.• Developed industry first Managed Email Security service (PhishGuard).• Triage customer issues relating to product features and functionality.• Define business strategy and use cases to drive product direction.• Author product documentation based on new features and functionality.• Serve as customer CISO advisor.• Author marketing documentation including blogs, webinars, and security reports.• Work with strategic customers to understand new business opportunities to increase product efficacy.
  • Guess?, Inc.
    Global Information Security Officer
    Guess?, Inc. Sep 2019 - May 2020
    Los Angeles, Ca, Us
  • Guess?, Inc.
    Director Of Information Security
    Guess?, Inc. Oct 2016 - May 2020
    Los Angeles, Ca, Us
    • Serve as Chief Information Security Officer.• Lead a Global Information Security Team of Analysts and Engineers. • Created a Global Information Security program. • Operate as a liaison across all global teams for enterprise Information Security. • Work across the enterprise as well as C Levels to ensure compliance is met for PCI, SOX, and GDPR.• Regarded by senior management as the Subject Matter Expert in the realm of Information Security.• Managed a security budget of over $1,000,000. • Drive direction of Information Security for a multi-million dollar Fashion Retailer. • Built foundation to modernize all Guess IT Security infrastructures to protect against new and emerging threats.• Stay abreast of the latest trends and threats in the realm of Information Security.
  • Lowe'S Companies, Inc.
    Lead Information Security Analyst
    Lowe'S Companies, Inc. Aug 2015 - Oct 2016
    Mooresville, Nc, Us
    • Team lead for Lowe’s deployment of the QRadar SIEM platform. • Lead a team of 3 analysts by directing focus areas for research and engineering initiatives to provide greater value add to Lowe’s as a company. • Be an advocate for Information Security Analysts in any and all issues and concerns to discuss with upper level management. • Lead escalation analyst for deep dive threat analysis and threat hunting.• Offer guidance and direction to several multi-disciplined project teams within enterprise security projects. • Sought by senior management for advice and best practices in deployment of various network security tools. • Offer unique “attacker mentality” perspective while evaluating Lowe’s network traffic to find weak points. • Drive direction of SIEM platform for use by SOC, Cyber Threat Intelligence, and Shared Services customers.• Maintain up to date deployment documentation of QRadar appliances within enterprise data centers. • Engage Lowe’s IT teams for knowledge sharing and to drive the importance of Security Log Monitoring.
  • Intel Security
    Product Manager
    Intel Security Aug 2014 - Aug 2015
    San Jose, California, Us
    • Lead Engineering teams of 15+ in Agile strategy to drive deliverables to meet company goals. • Direct workflow strategies of development, marketing, and research teams to help bring a better overall function of our product to the public. • Utilize my experience as a Security Analyst to enhance the functionality of the McAfee Enterprise Security Monitor platform.• Travel to domestic and international client sites to perform security evaluations. • Assess security strategy for customer networking and security teams to best utilize and deploy the McAfee ESM for highest value add. • Host in depth conference calls with current and potential clients to show how value add of deploying McAfee SIEM to their organization.• Interface with client security leads to discuss product vision and enhance usability.• Charged with developing a “Go to Market” strategy for Intel’s investment in the McAfee ESM platform.• Manage budgets for product development and give executive briefings to show cost and value add of investments in new features. • Author legal texts for product use for overseas customers to maintain compliance with international laws and regulations.• Drive product direction in marketplace establishing our place as leader in the Gartner Magic Quadrant for SIEM.
  • First Data Corporation
    Security Engineer
    First Data Corporation Mar 2013 - Aug 2014
    Brookfield, Wisc., Us
    • Responsible for the direction and administration tasks of a team of 4 Network Security Engineers.• As a team lead I am tasked with the professional growth and development of 4 Engineers offering guidance on best practice for Network Intrusion Detection systems as well as business values and corporate financial values.• Managed a budget of $18M for Network Security tools and architecture. • Serve as a Tier 3 analyst to assist and triage network incidents on a global scale. • Utilize and monitor SIEM technologies (ArcSight and Splunk) to assist SOC analysts in day to day operations. • Author of 3 corporate policy documents used globally for administration of IDS/IPS and DDoS mitigation strategy. • Assess company network segments to allow 3rd party vendors and customer’s access. • Design strategy for deployment of IDS/IPS within a complex global network structure. • Deliver monthly metrics to top level management regarding attack threats and mitigation response times.• Interact with Internet Service Providers to establish a networking relationship across the globe to keep informed of emerging cyber security threats. • Troubleshoot and administer over 85 globally deployed NIDS/NIPS sensors.• Review newly released and custom signatures for relevance in our environment.• Collaborate across international teams to ensure optimal network coverage.• Review DDoS standards as it pertains to PCI compliance.• Charged with developing and implementing mitigation plans for DDoS and DoS attacks against our global network.
  • Dollar Bank
    Network Security Engineer
    Dollar Bank Aug 2012 - Mar 2013
    Pittsburgh, Pennsylvania, Us
    • Senior Security Engineer and Lead Analyst for the nation’s largest independent bank. • Looked to as a SME for company’s Security Architecture and Incident Response across a broad corporate and branch environment. • Utilize ArcSight and QRadar SIEM platforms for consistent monitoring of network traffic and security events.• Deliver monthly metrics to Executive management regarding attack threats and mitigation response times.• Conduct Security assessments of 3rd party sites for Data Center, storage, and disaster recovery efforts.• Responsible for the analysis of the network infrastructure to identify potential shortcomings of the current security tools.• Responsible for the training and development of 10 network analysts in practices and theory of Network Security to ultimately create the organizations first 24x7 Security Operations Center. • Mitigate DDoS attacks against our network.• Implement SMTP security measures to monitor and scrub email traffic.• Ensure company’s network security infrastructure adheres to strict PCI-DSS standards.• Interface with vendors to determine latest security architecture giving the organization strongest available security posture.
  • Ntt Data
    Network Security Analyst
    Ntt Data Dec 2011 - Aug 2012
    Tokyo, Jp
    • Directly responsible for the training and operational tasks of a team of 5 Network Security Analysts for a multi-million dollar contract with the Federal Bureau of Investigations. • Lead Security Analyst in CJIS Security Operations Center.• As a team lead I am tasked with the development of employee work schedules, internalaudits, and employee training.• Utilize several network monitoring tools including ArcSight, LogLogic, Bluecoat Reporter, Wireshark, Ironport, and NetQOS to monitor, analyze and trend traffic to our network.• Assess Security of Ingress and Egress points for 3rd party access in to our network from Law Enforcement as well as firearms dealers across the nation. • Charged with the monitoring and correlation of log data to identify and triage Security events within the environment.• Inspect packet data to identify whether a correlated event was a legitimate attack.• Responsible for the analysis and reporting of Network Security violations and unauthorized access to data.• Identify weak points within the environment and suggest mitigation strategy in keeping with the strict standards as mandated by NIST and FISMA government standards.
  • Us Navy
    Ctr2
    Us Navy Jun 2006 - Dec 2011
    Washington, Dc, Us
    • Subject Matter Expert in the fields of Geospatial Metadata Analysis, Threat Intelligence, Digital Network Intelligence, and Risk Management.• Utilize ArcSight SIEM as well as several in house developed Security Monitoring Tools to identify attacks against DoD networks. • Operational Supervisor of a team of 32 multi service intelligence analysts in a 24 x 7 Security and Intelligence Operations Center.• Received the Joint Service Achievement Medal from the National Security Agency for my leadership of a Cyber Intelligence mission during Operation Iraqi Freedom. • Served as Leading Non-Commissioned Officer in charge of a large scale Department of Defense Cyber Security and Intelligence initiative for 3 years. • Focal point for senior management for assistance with technical and training demands.• Responsible for the identification of new training courses for individual career enhancement that are not currently covered by the current training pipelines.• As Department Training Manager, I kept impeccable records and metrics tracking the training progress for over 130 analysts and supervisors.• Research the current training requirements for relevance through interviews with analysts as well as to find which courses may be redundant to career development.• Skilled professional in the identification and exploitation in adversarial communications networks.• Worked with military and DoD customers to identify weak points in existing network and security architecture and provide solutions to triage findings.

Kevin Wilson Skills

Network Security Information Security Security Intrusion Detection Ips Vpn Siem Networking Intelligence Analysis Firewalls Training Dod Troubleshooting Computer Security Dni Report Writing Vulnerability Assessment Analysis Cisco Technologies Navy Information Technology Geospatial Intelligence Program Management Intelligence Management Microsoft Office Leadership Signals Intelligence Ddos Mitigation Ddos Sigint Cisco Asa Disaster Recovery Information Security Management Fusion Analysis Infrastructure Information Assurance Technical Support Customer Service Global Cross Functional Team Leadership Information Security Governance Information Security Engineering Organizational Leadership Project Management Vendor Management Process Improvement Agile Methodologies Security Audits It Security Best Practices Security Architecture Design Information Security Strategy Information Security Leadership Information Security Training Retail

Kevin Wilson Education Details

  • Liberty University
    Liberty University
    Apologetics

Frequently Asked Questions about Kevin Wilson

What company does Kevin Wilson work for?

Kevin Wilson works for Halcyon

What is Kevin Wilson's role at the current company?

Kevin Wilson's current role is Senior Product Manager.

What is Kevin Wilson's email address?

Kevin Wilson's email address is wk****@****son.com

What is Kevin Wilson's direct phone number?

Kevin Wilson's direct phone number is +121351*****

What schools did Kevin Wilson attend?

Kevin Wilson attended Liberty University.

What are some of Kevin Wilson's interests?

Kevin Wilson has interest in Love Talking Security And Strategy, Love Researching New Technology, Huge Sports Fan.

What skills is Kevin Wilson known for?

Kevin Wilson has skills like Network Security, Information Security, Security, Intrusion Detection, Ips, Vpn, Siem, Networking, Intelligence Analysis, Firewalls, Training, Dod.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.