Kristine Gadberry

Kristine Gadberry Email and Phone Number

Owner @ Round Rock, TX, US
Round Rock, TX, US
Kristine Gadberry's Location
Albuquerque, New Mexico, United States, United States
Kristine Gadberry's Contact Details

Kristine Gadberry work email

Kristine Gadberry personal email

Kristine Gadberry phone numbers

About Kristine Gadberry

Security Professional, Mother, & Entrepreneur.My expertise lies in Cyber and Information Security, with over 15 yrs of organizational experience. A dynamic and resourceful Info Sec professional, I am recognized for continued dedication and ability to achieve positive results. I am a transformational leader with excellent communication and interpersonal skills, able to collaborate effectively with coworkers and management, with a versatile skillset applicable to a wide range of industries. I am a quick learner and excellent mentor who inspires others to do their best.✧ Technical expertise in encryption, multi-factor authentication, data loss prevention, and Cloud security. ✧ Astute analytical and problem solving skills that result in practical, effective, long-term solutions.✧ Excels at collaboration with internal teams, management, coworkers, and customers. ✧ Skilled at documentation and research, with focused abilities to detect and remedy incidents. ✧ Strong work ethic based on honesty, integrity, flexibility, resiliency, and adaptability.✧ Broad range of knowledge, skills and abilities transferable to multiple industries and fields.SPECIALTIES:Information Security; Cyber Security; Training & Mentoring; Problem Solving; Interpersonal Communication; Negotiation; Project Management; Task Delegation; Personnel Management; Documentation; Security Troubleshooting; Customer Service; Team Motivation; Cloud Security; Anti-Virus Protection; Vulnerability Management; Data Loss/Leak Prevention; Data Encryption; Multi-factor Authentication; Risk ManagementTECHNOLOGY SKILLS:Antivirus: Symantec Endpoint Protection, Data Center Security (Server AV); Vulnerability Management Scans: Qualys; Vulnerability Management Tracking: Qualys, Service Now; Data Loss/Leak Prevention: Symantec, Palo Alto Networks Aperture, BetterCloud; Encryption: Vormetric; Multi Factor Authentication: Duo; Cloud Access Security Broker: Symantec CloudSOC; Security information and Event Management: LogRhythm; Risk Management: RSA Archer

Kristine Gadberry's Current Company Details
Little Fox Design, LLC

Little Fox Design, Llc

Owner
Round Rock, TX, US
Kristine Gadberry Work Experience Details
  • Little Fox Design, Llc
    Owner
    Little Fox Design, Llc
    Round Rock, Tx, Us
  • First American Docutech
    Sr. Information Security Engineer
    First American Docutech May 2021 - Present
    United States
  • Little Fox Design, Llc
    Owner
    Little Fox Design, Llc Jan 2020 - Present
    United States
    DBA: The Foxes Den, thefoxesden.comDefine Business Strategy. Identify priorities based on business risk, controls, and frameworks. Building a CRM (Customer Relational Database), Online Website design and troubleshooting, Business Continuity planning, Finance infrastructure, and methods of operation. Marketing strategy development and implementation of social media strategies across multiple platforms. Partnering with multiple distributors and managing all inventory. Created policies and processes for the shop.
  • Greenfield Partners Inc.
    Contract Consultant
    Greenfield Partners Inc. Feb 2021 - May 2021
    Irvine, California, United States
  • Docutech
    Security Remediation Engineer
    Docutech Feb 2021 - May 2021
    Idaho Falls, Idaho, United States
  • Aaa Northern California, Nevada & Utah
    Cyber Security Engineer - Data Protection And Mitigation
    Aaa Northern California, Nevada & Utah Aug 2013 - Dec 2019
    San Francisco Bay Area
    Define Data Protection Strategy. Identify priorities based on a risk and cyber based models, controls and frameworks. Identify, Protect, sensitive, confidential, and restricted information, then block the unauthorized exfiltration of that data. Establish data security protection standards and ensure monitoring and enforcement. Conduct tests of systems to evaluate compliance with specifications and requirements (e.g. PCI-DSS). With adjacent teams take necessary measures to on data inventory, access control, logging, and alerting. Employ a defense-in-depth approach to data protection. Lead data loss mitigation efforts. Evaluate the adequacy and operating effectiveness of efforts to protect data stored with third parties (e.g. critical vendors, SaaS tools, approved data transfers). Employ risk-based approaches to monitoring personnel access and physical access to data, including cultural reminders of employee obligations to protect sensitivedata.
  • Advantis Global Services
    Risk And Compliance - Security Analyst ~ Gap, Inc.
    Advantis Global Services Feb 2013 - Jun 2013
    San Francisco/Pleasanton
    ⁃ Develop vulnerability management methods - including; working with systems administrators and application owners to get processes in place that are sustainable and will produce results, metrics and score-carding.- Establish relationships with support, infrastructure, and application teams across the enterprise to create processes for patch and configuration management. - Performing duties as a compliance and risk expert, perform audit activities and proactively engaging partners and business users. - Acting Custodian of Security Asset Hardening Process- PCI Audit Activities (Coordination, interviews, external pen testing activities)- Vendor management- Backup team members and assist with PII project assessments- Assisting security operations with management of security tools and hardware. - Work with engineers to implement new processes and conduct remediations. - Perform Risk and Compliance assessments for the company's security environment- Work with engineers to implement new processes and conduct remediations. - As the engineering team builds any necessary tools, the functioning role is to assess and analyze best use practices from the risk/compliance perspective. - Work with engineers, operations and various business utilizing communication / soft skills.
  • Wells Fargo
    Information Security Engineer 3 (Ise) – Technical Lead
    Wells Fargo Mar 2010 - Jan 2013
    San Francisco Bay Area
    ⁃ Participates in the research, analysis, design, testing and implementation of medium to complex computer network security/protection technologies for company information and network systems/applications. ⁃ Assists customers in identifying security solutions for the company's networks and virtual private networks, application systems, key public infrastructures, authentication and directory services to ensure the security of the network and confidential data. ⁃ Assists with periodic vulnerability scans of firmware/hardware to identify security vulnerabilities and conducts security risk assessments to ensure compliance with corporate security policies and adherence to best practices. ⁃ Performs lead and support roles in computer security incident response activities and the technical investigations of security related incidents ⁃ Vendor Management responsibilities including; Surveying software and hardware solutions, product and price configuration, retail solutions, technical functionality and support, and ongoing encryption solution support. ⁃ Performing infrastructure design, analysis, hardware implementation, maintenance and end support for Development (DEV), (QA), (UAT), and Production (PROD) environments. Including enterprise BCP exercises. ⁃ Worked with enterprise support teams to enhancements documentation in regards to file and hardware server build best practices, implementation and maintenance procedures. ⁃ Oversaw the script development and testing to support software migrations. ⁃ Created and maintained presentation materials, such as process flow diagrams and Power Point presentations, for customers and support teams to leverage, providing a better understanding of various server encryption implementation processes. ⁃ Exercising Leadership skills in providing guidance on day to day and week to week work assignments for 12+ contractors. ⁃ Oversaw all training for engineering contractors and project managers
  • Wells Fargo
    Information Security Analyst 3 (Isa)
    Wells Fargo Sep 2006 - Feb 2010
    Greater Minneapolis-St. Paul Area
    Vormetric CoreGuard – Subject Matter Expert File Encryption• Certify software for various Operating Systems, multiple Wells Fargo Applications, as well as 3rd party software builds and platforms.• Establish first phase of communication with Lines of Business that are looking for Encryption solutions.• Assist internal Lines Of Business (LOB) with implementation and project plans • Keep in constant communication with the vendor on current issues and enhancement requests (this involves the following vendor teams: Sales, Support, and Development/Engineering)Decru (FC-Series, E-Series, S-Series/OKLM/LKM– SME / Backup to Primary • Install and configure Decru Appliance and Lifetime Key Management systems.• Assist in testing of upgrades and use cases and documenting procedures.SafeNet – Database Encryption - support role• Train Enterprise Access Management ID administration and created process and best practice documentation.• Assist Primary SME on implementation projects as required.Key Manager• Act in dual custody, with other key managers, to access secure rooms and safe’s that hold physical keys, data, and hardware.• Train key holders proper standards/methods of physical security.• Assist Enterprise Key management with quarterly audits.• Work with datacenter security teams to ensure proper methods and security measures are being met.
  • Wells Fargo
    Information Security Analyst 2 (Isa)
    Wells Fargo Dec 2004 - Sep 2006
    Greater Minneapolis-St. Paul Area
    UNIX Administration, Active Directory Administration, & Mainframe Administration• Creating and troubleshooting Users access to over 500 Servers• Maintenance and certification updates to Users and servers• Creation of Users, computers, and Objects• Maintaining all objects over multiple domain controllers• Working closely with users to ensure completion and satisfaction • Troubleshooting and correspondence with other administrators within the Bank • Creation and maintenance of Mainframe IDs for Wells Fargo Employees• Troubleshooting access issues with users, Database Administrators, Mainframe Technical Group, as well as various other administrative groups within the bank• Writing technical documentation to keep up with new rules and standards of security
  • Axiom Integration
    Data Storage Technician
    Axiom Integration Mar 2003 - Dec 2004
    Greater Omaha Area
    • Utilized knowledge of all Windows platforms for installation
and troubleshooting of software with over 100 small to medium-sized companies throughout the United States• Worked within a UNIX-backbone network, including Sun
Microsystems• Administered Veritas Netbackup• Installed Cisco VPN client platforms 3.6.4, 3.6.5, and 4.0• Participated in brainstorming sessions as part of the product
development team• Phone-based sales to companies who called requestinginformation on the product
  • Ibm - American Express
    Technology Helpdesk Analyst
    Ibm - American Express Mar 2004 - Nov 2004
    Primary responsibilities included:Technical Troubleshooting with Financial Advisors all over thecountry over the phonePassword Resets using Novell Netware Administrator and UserAdmin for NTWeb based software application troubleshootingCisco VPN and 831 Router configuration and troubleshooting(Intranet connections)Creation of Tickets to document steps in troubleshooting andtransfers to other Technology teamsInstallations troubleshooting of 3rd party software such asNTI Backup, SQL Server anywhere, PCAnywhere, AdobePrinter and hardware troubleshootingMainframe applications for financial accounts andPassword/accessNovell Netware Administrator and NT Domain Administration.

Kristine Gadberry Skills

Security Computer Security Active Directory Troubleshooting Vendor Management Encryption Vmware Visio Training Project Management Windows Server Business Continuity Planning Computer Hardware Security Policy Service Delivery Technical Documentation System Testing Change Management Compliance Problem Management Document Management Operational Risk Project Engineering Software Customer Support Creative Solutions Encryption Software Server Architecture Key Management Syslog Threat And Vulnerability Management Organization Applications Positive Team Player Fast Learner Loyal Friendly Personality Respect Information Security Management Microsoft Office Outlook Test Lab Management Bmc Remedy Telephone Interviewing Product Support Hardware Support Password Management Artistic Abilities Mechanical Aptitude People Oriented Tape Backup Cybersecurity Nist Symantec Security Dlp Security Compliance Privacy Compliance Cloud Security Google Cloud Platform Enterprise Risk Management Rsa Archer Internet Security

Frequently Asked Questions about Kristine Gadberry

What company does Kristine Gadberry work for?

Kristine Gadberry works for Little Fox Design, Llc

What is Kristine Gadberry's role at the current company?

Kristine Gadberry's current role is Owner.

What is Kristine Gadberry's email address?

Kristine Gadberry's email address is kr****@****rgo.com

What is Kristine Gadberry's direct phone number?

Kristine Gadberry's direct phone number is +170138*****

What skills is Kristine Gadberry known for?

Kristine Gadberry has skills like Security, Computer Security, Active Directory, Troubleshooting, Vendor Management, Encryption, Vmware, Visio, Training, Project Management, Windows Server, Business Continuity Planning.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.