Kristine Gadberry work email
- Valid
- Valid
Kristine Gadberry personal email
- Valid
Kristine Gadberry phone numbers
Security Professional, Mother, & Entrepreneur.My expertise lies in Cyber and Information Security, with over 15 yrs of organizational experience. A dynamic and resourceful Info Sec professional, I am recognized for continued dedication and ability to achieve positive results. I am a transformational leader with excellent communication and interpersonal skills, able to collaborate effectively with coworkers and management, with a versatile skillset applicable to a wide range of industries. I am a quick learner and excellent mentor who inspires others to do their best.✧ Technical expertise in encryption, multi-factor authentication, data loss prevention, and Cloud security. ✧ Astute analytical and problem solving skills that result in practical, effective, long-term solutions.✧ Excels at collaboration with internal teams, management, coworkers, and customers. ✧ Skilled at documentation and research, with focused abilities to detect and remedy incidents. ✧ Strong work ethic based on honesty, integrity, flexibility, resiliency, and adaptability.✧ Broad range of knowledge, skills and abilities transferable to multiple industries and fields.SPECIALTIES:Information Security; Cyber Security; Training & Mentoring; Problem Solving; Interpersonal Communication; Negotiation; Project Management; Task Delegation; Personnel Management; Documentation; Security Troubleshooting; Customer Service; Team Motivation; Cloud Security; Anti-Virus Protection; Vulnerability Management; Data Loss/Leak Prevention; Data Encryption; Multi-factor Authentication; Risk ManagementTECHNOLOGY SKILLS:Antivirus: Symantec Endpoint Protection, Data Center Security (Server AV); Vulnerability Management Scans: Qualys; Vulnerability Management Tracking: Qualys, Service Now; Data Loss/Leak Prevention: Symantec, Palo Alto Networks Aperture, BetterCloud; Encryption: Vormetric; Multi Factor Authentication: Duo; Cloud Access Security Broker: Symantec CloudSOC; Security information and Event Management: LogRhythm; Risk Management: RSA Archer
Little Fox Design, Llc
-
OwnerLittle Fox Design, LlcRound Rock, Tx, Us
-
Sr. Information Security EngineerFirst American Docutech May 2021 - PresentUnited States
-
OwnerLittle Fox Design, Llc Jan 2020 - PresentUnited StatesDBA: The Foxes Den, thefoxesden.comDefine Business Strategy. Identify priorities based on business risk, controls, and frameworks. Building a CRM (Customer Relational Database), Online Website design and troubleshooting, Business Continuity planning, Finance infrastructure, and methods of operation. Marketing strategy development and implementation of social media strategies across multiple platforms. Partnering with multiple distributors and managing all inventory. Created policies and processes for the shop.
-
Contract ConsultantGreenfield Partners Inc. Feb 2021 - May 2021Irvine, California, United States -
Security Remediation EngineerDocutech Feb 2021 - May 2021Idaho Falls, Idaho, United States -
Cyber Security Engineer - Data Protection And MitigationAaa Northern California, Nevada & Utah Aug 2013 - Dec 2019San Francisco Bay AreaDefine Data Protection Strategy. Identify priorities based on a risk and cyber based models, controls and frameworks. Identify, Protect, sensitive, confidential, and restricted information, then block the unauthorized exfiltration of that data. Establish data security protection standards and ensure monitoring and enforcement. Conduct tests of systems to evaluate compliance with specifications and requirements (e.g. PCI-DSS). With adjacent teams take necessary measures to on data inventory, access control, logging, and alerting. Employ a defense-in-depth approach to data protection. Lead data loss mitigation efforts. Evaluate the adequacy and operating effectiveness of efforts to protect data stored with third parties (e.g. critical vendors, SaaS tools, approved data transfers). Employ risk-based approaches to monitoring personnel access and physical access to data, including cultural reminders of employee obligations to protect sensitivedata. -
Risk And Compliance - Security Analyst ~ Gap, Inc.Advantis Global Services Feb 2013 - Jun 2013San Francisco/Pleasanton⁃ Develop vulnerability management methods - including; working with systems administrators and application owners to get processes in place that are sustainable and will produce results, metrics and score-carding.- Establish relationships with support, infrastructure, and application teams across the enterprise to create processes for patch and configuration management. - Performing duties as a compliance and risk expert, perform audit activities and proactively engaging partners and business users. - Acting Custodian of Security Asset Hardening Process- PCI Audit Activities (Coordination, interviews, external pen testing activities)- Vendor management- Backup team members and assist with PII project assessments- Assisting security operations with management of security tools and hardware. - Work with engineers to implement new processes and conduct remediations. - Perform Risk and Compliance assessments for the company's security environment- Work with engineers to implement new processes and conduct remediations. - As the engineering team builds any necessary tools, the functioning role is to assess and analyze best use practices from the risk/compliance perspective. - Work with engineers, operations and various business utilizing communication / soft skills.
-
Information Security Engineer 3 (Ise) – Technical LeadWells Fargo Mar 2010 - Jan 2013San Francisco Bay Area⁃ Participates in the research, analysis, design, testing and implementation of medium to complex computer network security/protection technologies for company information and network systems/applications. ⁃ Assists customers in identifying security solutions for the company's networks and virtual private networks, application systems, key public infrastructures, authentication and directory services to ensure the security of the network and confidential data. ⁃ Assists with periodic vulnerability scans of firmware/hardware to identify security vulnerabilities and conducts security risk assessments to ensure compliance with corporate security policies and adherence to best practices. ⁃ Performs lead and support roles in computer security incident response activities and the technical investigations of security related incidents ⁃ Vendor Management responsibilities including; Surveying software and hardware solutions, product and price configuration, retail solutions, technical functionality and support, and ongoing encryption solution support. ⁃ Performing infrastructure design, analysis, hardware implementation, maintenance and end support for Development (DEV), (QA), (UAT), and Production (PROD) environments. Including enterprise BCP exercises. ⁃ Worked with enterprise support teams to enhancements documentation in regards to file and hardware server build best practices, implementation and maintenance procedures. ⁃ Oversaw the script development and testing to support software migrations. ⁃ Created and maintained presentation materials, such as process flow diagrams and Power Point presentations, for customers and support teams to leverage, providing a better understanding of various server encryption implementation processes. ⁃ Exercising Leadership skills in providing guidance on day to day and week to week work assignments for 12+ contractors. ⁃ Oversaw all training for engineering contractors and project managers -
Information Security Analyst 3 (Isa)Wells Fargo Sep 2006 - Feb 2010Greater Minneapolis-St. Paul AreaVormetric CoreGuard – Subject Matter Expert File Encryption• Certify software for various Operating Systems, multiple Wells Fargo Applications, as well as 3rd party software builds and platforms.• Establish first phase of communication with Lines of Business that are looking for Encryption solutions.• Assist internal Lines Of Business (LOB) with implementation and project plans • Keep in constant communication with the vendor on current issues and enhancement requests (this involves the following vendor teams: Sales, Support, and Development/Engineering)Decru (FC-Series, E-Series, S-Series/OKLM/LKM– SME / Backup to Primary • Install and configure Decru Appliance and Lifetime Key Management systems.• Assist in testing of upgrades and use cases and documenting procedures.SafeNet – Database Encryption - support role• Train Enterprise Access Management ID administration and created process and best practice documentation.• Assist Primary SME on implementation projects as required.Key Manager• Act in dual custody, with other key managers, to access secure rooms and safe’s that hold physical keys, data, and hardware.• Train key holders proper standards/methods of physical security.• Assist Enterprise Key management with quarterly audits.• Work with datacenter security teams to ensure proper methods and security measures are being met. -
Information Security Analyst 2 (Isa)Wells Fargo Dec 2004 - Sep 2006Greater Minneapolis-St. Paul AreaUNIX Administration, Active Directory Administration, & Mainframe Administration• Creating and troubleshooting Users access to over 500 Servers• Maintenance and certification updates to Users and servers• Creation of Users, computers, and Objects• Maintaining all objects over multiple domain controllers• Working closely with users to ensure completion and satisfaction • Troubleshooting and correspondence with other administrators within the Bank • Creation and maintenance of Mainframe IDs for Wells Fargo Employees• Troubleshooting access issues with users, Database Administrators, Mainframe Technical Group, as well as various other administrative groups within the bank• Writing technical documentation to keep up with new rules and standards of security -
Data Storage TechnicianAxiom Integration Mar 2003 - Dec 2004Greater Omaha Area• Utilized knowledge of all Windows platforms for installation and troubleshooting of software with over 100 small to medium-sized companies throughout the United States• Worked within a UNIX-backbone network, including Sun Microsystems• Administered Veritas Netbackup• Installed Cisco VPN client platforms 3.6.4, 3.6.5, and 4.0• Participated in brainstorming sessions as part of the product development team• Phone-based sales to companies who called requestinginformation on the product
-
Technology Helpdesk AnalystIbm - American Express Mar 2004 - Nov 2004Primary responsibilities included:Technical Troubleshooting with Financial Advisors all over thecountry over the phonePassword Resets using Novell Netware Administrator and UserAdmin for NTWeb based software application troubleshootingCisco VPN and 831 Router configuration and troubleshooting(Intranet connections)Creation of Tickets to document steps in troubleshooting andtransfers to other Technology teamsInstallations troubleshooting of 3rd party software such asNTI Backup, SQL Server anywhere, PCAnywhere, AdobePrinter and hardware troubleshootingMainframe applications for financial accounts andPassword/accessNovell Netware Administrator and NT Domain Administration.
Kristine Gadberry Skills
Frequently Asked Questions about Kristine Gadberry
What company does Kristine Gadberry work for?
Kristine Gadberry works for Little Fox Design, Llc
What is Kristine Gadberry's role at the current company?
Kristine Gadberry's current role is Owner.
What is Kristine Gadberry's email address?
Kristine Gadberry's email address is kr****@****rgo.com
What is Kristine Gadberry's direct phone number?
Kristine Gadberry's direct phone number is +170138*****
What skills is Kristine Gadberry known for?
Kristine Gadberry has skills like Security, Computer Security, Active Directory, Troubleshooting, Vendor Management, Encryption, Vmware, Visio, Training, Project Management, Windows Server, Business Continuity Planning.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial