Ken Muir work email
- Valid
Ken Muir personal email
Since 1993, has built his career from the proverbial “mailroom” up through the ranks to the present day. Chronology of Experience:1993 – Computing. - Studied computing Engineering Principles. - First Introduction to Viruses, causes and remediation. - Studied Virus writers and their motivations and coding - First time realizing and growing an interest in Information Security (now Cyber)1995 - Novell networking engineering certification (7 Exams)1996 - Admin for networking engineering and cybersecurity1997 - Developed skills in computer manipulation tactics1999 to Present - Working exclusively in cybersecurity.2019 - Developed enthusiasm for crypto and blockchain2019 - Became CISO of LCMKen Muir is a highly accomplished cybersecurity professional with a career spanning back to 1993. He began with a strong foundation in computing engineering principles and an early immersion in the world of viruses, understanding their origins and the motivations of their creators. In 1995, he achieved his Novell networking engineering certifications, later assuming roles as an administrator for networking engineering and cybersecurity. By 1997, he had honed skills in computer manipulation tactics, enhancing his understanding of the attacker's mindset.In addition, his technical proficiency encompasses troubleshooting, threat hunting, advanced support, and the management of complex security design projects, including the construction and reconstruction of security operation centers.Ken's career cover a wealth of roles and industry certifications, including CISO, vCISO, CSC, CISA, CRISC, and others. This diverse background gives him the ability to plan and execute secure network architecture. His experience extends to executive and board-level instruction, governance risk and compliance consultation, research contributions, and risk management consulting. His broad experience across various sectors, such as aerospace, energy, major retail, governments, and educational institutions, provides unique insights into the cybersecurity challenges faced in different environments.Ken is not only an accomplished professional but also a published author and keynote presenter with appearances on prominent platforms such as Voice of America and the Global Counter-Terrorism Council. His global recognition is evident through his inclusion in the Top 100 Global Thought Leaders and Who's Who in Cybersecurity. He serves on a global advisory board, advises the Centre for Internet Security, and actively mentors others in the field.
-
University LecturerUniversity Of WaterlooToronto, On, Ca -
Ciso/Csc/Cisa/Crisc/Global Advisory Board/Business TransformationLcm Security Inc. Jan 2019 - PresentOakville, Ontario, Ca -
Chief Information Security OfficerLcm Security Inc. Jan 2019 - Jan 2019Oakville, Ontario, CaLCM Security has been a managed security and professional services provider since 2001. LCM (Life Cycle Management) enables organizations from many verticals to reduce risk and achieve Compliance with our highly experienced consultants and technology integrators. LCM's service delivery model is designed to help organizations reduce risk and increase awareness of their environments. This allows more rapid response to minimize exposure to ever-evolving threats. In addition, LCM has partnered with industry-leading technology vendors to build a portfolio to help organizations consolidate capabilities, and reduce management overhead, thereby reducing the cost of ownership while still maintaining adequate controls. -
Senior Risk Management Consultant/VcisoUzado Inc. Dec 2016 - Dec 2018Richmond Hill, Ontario, CaUzado is an industry-leading SAAS security provider with a strong focus on information security management. The Uzado Platform is designed to help organizations manage areas of incidents, vulnerability, Compliance, a repository of files that are visible to the rest of the organization, sharing or sending confidential files securely and visualizing an organization's posture in the form of KPIs and Metrics when referring to incidents, vulnerabilities and Compliance. There are also a pre-defined incident, vulnerability and Compliance reports based on an organization's results, displayed in the form of KPIs and metrics and some trending information. -
Director, Cyber Security Consulting | Public And Health Care SectorsCgi Sep 2015 - Nov 2016Montreal, Quebec, CaFounded in 1976, CGI is a global I.T. and business process services provider delivering high-quality business consulting, systems integration and managed services. With 68,000 professionals in 40 countries, CGI has an industry-leading track record of delivering 95% of projects on time and within budget, aligning our teams with clients' business strategies to achieve top-to-bottom line results. Duties: Providing thought Leadership as a security lead in cyber security consulting, delivering assessments, projects and solutions for Public Sector clients across Ontario. Provide client-facing technical guidance in support of strategic goals•. Identify and manage multi-disciplinary teams as required for proposal development and delivery.Thought Leadership in all areas of information securityFifteen years of directly related cyber security experience that includes developing and implementing security solutions and managed security services.Strong business acumen and experience shaping win themes and costing models. Strong knowledge of a variety of network and security technologies such as SOC Services (SIEM), Log Monitoring, Intrusion Prevention/Detection, File Integrity Monitoring, Firewall, VPN, Vulnerability Management, Patch Management, End Point Security, Strong Authentication, IDP, Web Filtering,Database Activity Monitoring, Anti-Virus, Anti-Malware, Anomaly Detection andPrevention, WIPS, Bridging, Noting, Routing; inc. dynamic (RIP, OSPF andBGP), Switching, Deep packet analysis, Endpoint Protection, Firewall, VPN, DLP, SUMO, Splunk, Single-Sign-On, PKI, WAF, VA Scanning and Analysis, Report Writing and analysis. -
Senior Security DirectorThe Herjavec Group Oct 2014 - Aug 2015Kansas City, Mo, UsRoles and responsibilities remained the same as with Sentry Metrics.News of Acquisition: http://www.newswire.ca/news-releases/the-herjavec-group-announces-majoracquisition-as-part-of-250-million-expansion-515512411.html -
Senior Security DirectorSentry Metrics May 2014 - Oct 2014Toronto, CaAs Senior Security Director, duties included overseeing and coordinating service delivery efforts for the SOC and aided business development. Key Responsibilities:Reported directly to the CEO and Executive Team for planning and information updates concerning strategic alignment.Deployed business efficiencies through technology and new processes to ensure Compliance with company policies and standards.Serve as liaison to Business and Sales for continuous alignment with company strategy.I redesigned the entire SOC structure for improved efficiencies to provide a significantly increased customer experience.Work with the Team Leads to develop information technology systems and processes to enable departments and employees to accomplish the security goals set by the business.Met regularly with Department Heads to ensure accountability regarding all office and department initiatives and projects.Served as an internal information security consultant to the organization. Initiated, facilitated, and promoted activities to create information security awareness throughout the organization.Responsibility to serve in an advisory capacity to assist the Management Team in understanding the direction of the Security Services.Ensure that all project plans for existing clients are on target.Develop Security threat and attack countermeasures.Ability to conduct in-depth forensic analytical studies and investigations.Have excellent communication skills.Client-facing communication - promptly report issues to the customer, demonstrate overall business expertise and develop presentations to highlight results and solutions.Exceptional Time Management skills.Exceptional Customer Service skills.A positive and constructive-minded team player. Strong troubleshooting, reasoning and problem-solving skills.Team player with the ability to work autonomously. -
Security Management ConsultantQualys Jun 2012 - Apr 2014Foster City, Ca, UsQualys, Inc. is the pioneer and leading provider of information security and compliance cloud solutions with 5,500+ customers in 85 countries, including 51 of the Forbes Global 100. As a Technical Account Manager (TAM), I was responsible for actively driving and managing the post-sales process with direct and channel customers. Able to articulate the company's evolving suite of technology products while positioning to both business and technical users. Able to identify all technical and business issues of assigned accounts to ensure complete customer satisfaction. Capable of establishing and maintaining strong relationships throughout the sales/technical cycle.Key Responsibilities:•Identify and develop potential new business opportunities•Convey customer requirements to Product Management, Marketing and Engineering teams•Respond to customer questions on technical and business-related issues•Deliver high-level and detailed sales and technical presentations•Responsible for attending conferences and seminars.•Reporting through Company's CRM•Provide product and technical support for assigned accounts•Provide functional and technical support to customersQualifications: Self-motivated with strong knowledge in cybersecurity: Vulnerability Management, Policy Compliance, Intrusion Detection Systems IDS, Intrusion Prevention Systems IPS, Network Scanners, PCI, Policy Compliance and Audit Tools and other enterprise security solutions. Knowledge of various Federal Regulatory Compliance frameworks: HIPAA, GLBA, Sarbanes Oxley SOX, etc.Possesses strong presentation skills and can communicate professionallyOrganized and analytical, able to eliminate sales obstacles through creative and adaptive approachesPosses Industry-specific qualificationsExcellent written and oral communication skills -
Director - Security Consulting ServicesLcmsecurity Oct 2001 - May 2012Oakville, Ontario, CaSecurity and I.T. since 1993, with origins in technical and sales. Exclusively committed to information security and networking disciplines. Project lead on large-scale and complex security design projects. Solutions have included technical implementations and training (ISO & PCI) audits and vulnerability assessments, security and network design, as well as process development. Designed and built a security operation centre, delivering managed security services for private and public companies.Using previously acquired business skills in the auto industry placed me in a pivotal position to help turn LCM into a multi-million-dollar business in both Canada and the U.S. An ability to provide sales direction as part of the technical sale to customers has brought both success and satisfaction to LCM's Customer base.Have deployed over 300 projects through to completion. -
Director Of It/Information Security Consulting ServicesUnilynx Business Systems Sep 1999 - Oct 2001Kirstenhof, Cape Town, Western Cape, Za -
It Systems/Security AdminSony Of Canada Ltd. 1996 - 1999Network and Security Analyst - Business Consultant
-
Fleet Sales And Finance ManagerAuto Industry Jan 1985 - Dec 1990Previous to I.T.Working in the Auto-Industry providing company (including high performance) and commercial vehicles for six years, I was able to provide a very high-level, customer-driven approach to small, medium and enterprise-sized businesses. This, in turn, allowed me to build an extensive customer base. Since switching to I.T. and cybersecurity, I have successfully translated this approach throughout my career.
Ken Muir Skills
Ken Muir Education Details
-
Havering Technical CollegeElectrical And Electronics Engineering
Frequently Asked Questions about Ken Muir
What company does Ken Muir work for?
Ken Muir works for University Of Waterloo
What is Ken Muir's role at the current company?
Ken Muir's current role is University Lecturer.
What is Ken Muir's email address?
Ken Muir's email address is km****@****ity.com
What schools did Ken Muir attend?
Ken Muir attended Havering Technical College.
What skills is Ken Muir known for?
Ken Muir has skills like Information Security, Security, Vulnerability Assessment, Network Security, Computer Security, Vulnerability Management, Information Security Management, Pci Dss, Firewalls, Cloud Computing, Managed Security Services, Penetration Testing.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial