Lawrence Grim work email
- Valid
- Valid
- Valid
- Valid
Lawrence Grim personal email
- Valid
Lawrence Grim phone numbers
Analytical and accomplished information systems security officer with 25+ years of experience enhancing business operations by implementing IT security solutions. Service business needs and generate improvements through well-developed expertise in evaluating, researching, implementing and testing security systems and programs. Motivational leader with a strong team and end user focus. Communicate effectively to train and coach staff, as well as collaborate with stakeholders and professionals at all levels. Key Competencies• Security and Privacy Requirements• Federal Regulation Compliance• Develop, Implement, Test Security Controls• Contingency Plan/Incident Reports • Risk Analysis/Vulnerability Mitigation• FISMA Assessments• Configuration Management• NIST Risk Management Framework
-
PresidentGrim EnterprisesArnold, Md, Us -
Senior Cyber Risk AdvisorAssyst Mar 2020 - PresentSterling, Va, UsEvaluate, maintain and communicate the risk posture of FISMA systems to executive leadership and make risk-based recommendations to the Authorizing Official. Subject matter expert in all areas of the Risk Management Framework. Support stakeholders in Acceptable Risk Standards requirements. Assist in the implementation and enforcement of risk management procedures. Monitor system security posture and review proposed security and privacy artifacts. Provide guidance to stakeholders on required actions, potential strategies and best practices for closure of identified weaknesses and vulnerabilities. -
PresidentGrim Enterprises Apr 2009 - PresentOne person, service-disabled Veteran-owned business. Handle investigations or analysis of complex tickets received from incident analyst, operator, or engineer. Work with the appropriate technical engineers or outside organizations in order to solve complex incidents and network events. Support the Incident Response Manager when necessary for resolution of incidents or complex events. During security incidents, perform analysis and client communications. Monitor, tune and configure system tools in order to identify anomalies and other incidents not automatically identified. Develop tuning requests for firewalls, IDS and SEM tools. Monitor external threat sources and associate threat information with traffic identified as suspicious. Draft and publish daily incident summary reports for Executive Agency leadership. Use security evaluation tools (Symantec ESM, Nessus, Nmap, CyberCop, and Typhoon) to identify security vulnerabilities in a Commercial enterprise. Middle to advanced level operating system capabilities in SunOS, AIX, RedHat Linux and SuSE. -
Notary PublicState Of Maryland Aug 2012 - PresentA notaries public serve an important role in the prevention of fraud and protection of the parties involved by acting as an official, unbiased witness for certain documents.
-
System Security Officer (Sso)Hhs Technology Group Oct 2019 - Jan 2020Fort Lauderdale, Fl, UsSupporting the Provider Enrollment, Screening & Monitoring (PRESM) Discover Your Provider (DyP) solution for the State of Wyoming. Provides project-wide IT security oversight through the establishment of a comprehensive and sustainable governance, risk management and compliance framework and IT security policies, standards, guidelines and procedures. Ensures IT security/privacy plans and practices are in place to comply with the Health Insurance Portability and Accountability Act’s (HIPAA) security rule and standards, as well as FISMA and FedRAMP regulatory and compliance requirements. Responsible for planning and implementing information security, compliance, and privacy risk management strategies, processes and programs, across the solution. Development and execution of information security risk controls and management strategies. Perform application security assessments as needed. Coordinate external audits and penetration tests and findings remediation. Design, document and implement security controls. Identify strengths, areas of vulnerability, and opportunities to mitigate risks. Manage the development and implementation of sustainable IT security policies, standards, guidelines and procedures. Ensure a high state of readiness for responding to IT security events and events that may compromise the availability, accuracy and reliability of IT systems and data. -
System Security Officer (Sso)Provider Resources, Inc. Nov 2015 - Mar 2019Erie, Pa, UsResponsible for CMS business partner security requirements includes obtaining and maintaining the Authority to Operate (ATO) and participate fully in the Security Assessment and Accreditation process; Determine enterprise information security standards; Provide configuration management (CM) for information system security software, hardware, and firmware; Review, maintain, and ensure all Security Assessments and Authorization (SA&A) documentation to include System Security Plans (SSP); Manage changes to system and access the security impacts of those changes; Prepare and review documentation to include System Security Plans (SSPs), Risk Assessment Reports, Security Assessment and Accreditation packages; Responsible for the day-to day oversight of computing systems ensuring they are operated, maintained, and disposed of in accordance with applicable government guidelines; Provide direct support as a technical representative for ensuring security is integrated throughout the CMS expedited Life Cycle (XLC) and residual risk is acceptable; Provide recommendations concerning safeguarding of information systems and conduct a comprehensive assessment of the management, operations, and technical security controls employed within or inherited by an information system to determine the overall effectiveness of the controls; Provide project documentation to include risk management and system security plan, information assurance assessments on systems development, integration, and operations and maintenance supports in compliance with the customer certification and accreditation process pursuant to security guidelines following government standards and best practices; Recommend courses of action and policies to senior management that allow company to securely meet its organizational goals; Ensure that company automation security programs are implemented through development and promulgation of notices, policies, procedures, training and awareness programs, and customer surveys -
System Security Officer (Decc)General Dynamics Information Technology Apr 2012 - Nov 2015Falls Church, Virginia, UsKey Contributions:• Served as security officer across five FISMA systems which were inspected annually with no security findings in four consecutive years. This was a total of twenty-three separate security assessments.• Eliminated configuration errors by developing scripts and monitored databases containing PHI, PII and other sensitive information. • Boosted employee performance by delivering CISSP training to thirty personnel leading to successful outcomes for three candidates. • Pinpointed potential security weaknesses by conducting comprehensive reviews and recommended improvements to remediate vulnerabilities. Protected organizational information and prevented unauthorized access by researching, developing, implementing, testing, and reviewing information security functions. Developed and maintained documentation for system certification and accreditation in full compliance with government requirements. Communicated with clients for system accreditation, and other IT security issues. Verified compliance with security procedures and standards, identified and documented vulnerabilities, and mitigate risks by making sound recommendations. Understood agency, NIST, OMB and other guidelines. Assisted and supported eight separate engagements with security and privacy controls assessment teams. -
Senior Principal Analyst-Information Security (Gdit) On Cms Decc ProjectGeneral Dynamics Information Technology Sep 2011 - Apr 2012Falls Church, Virginia, UsKey Contributions:• Reduced security risks by performing information and physical security risk assessments, security scans, and penetration test on assets and processes. • Conducted security scans three times a week for over 200 systems to support information assurance and settings for security and privacy controls. • Identified over 100 discrete risks and spearheaded remediation prior to third-party security and privacy controls assessments necessary for Authority to Operate (ATO).Drove security efforts by maintaining existing capabilities, making recommendations, and implementing updated security technologies including firewalls. Encryption, and anti-virus software. Enforced compliance with security policies including administrative, physical and technical safeguard policies. Coordinated incident response and remediation activities. Launched and tracked progress of investigations to ensure optimal and timely resolutions. Provided security tools, policies, and technologies around operating systems, applications systems, code, and data. -
Security Hardware & Software Integration EngineerChickasaw Nations Industries Nov 2010 - Aug 2011Norman, Ok, UsAssessed antivirus, firewall, IDS/IPS, proxy, DHCP, NAT, application and security event logs as well as maintained and provided user support for cyber security tools. Analyzed security products involving research, development, testing, and evaluation. Delivered hands-on support of equipment installation at enterprise network security operation centers at five divisions. Installed and configured deep-packet analysis and threat protection devices at two Federal agencies. -
It Security / Risk Management ArchitectLmi Feb 2009 - Oct 2010Tysons, Va, UsConsulted on information security for DHHS/CMS healthcare integrated general ledger accounting system (HIGLAS) supporting over 45M providers and beneficiaries, and processing over 51M claims daily. Reduced findings from over 150 to less than five in the following year by evaluating and coordinating security posture. Triggered high cost savings by taking preventive measures during software development and deployment to avoid remediation expenses. Sole CMS-designated onsite representative for pre-ATO Security Test and Evaluation (ST&E) audit -
Senior Principal Staff - It SecurityGeneral Dynamics Information Technology Apr 2007 - Feb 2009Falls Church, Virginia, UsHandled investigations or analysis of complex tickets received from the analyst, operator, or engineer. Supported the on-call Incident Response Manager when necessary for resolution of incidents or complex events. Actively monitored, tuned and configured system tools to identify anomalies and other incidents. Generate advanced reports from the reporting console. Develop tuning requests for firewalls, IDS and SEM tools. Monitor external threat sources and associate threat information with traffic identified as suspicious. Draft and publish daily incident summary reports for Executive Agency leadership. Daily Reporting of security vulnerabilities to senior management -
Chief Information Systems Security Officer (Cisso), Board Of ElectionsBithgroup Technologies May 2006 - Apr 2007Baltimore, Md, UsCISSO position for the Maryland State Board of Elections. Successful security environment for the 2006 Maryland Gubernatorial Election Cycle Mitigation responses to Third-party Security Audit of Electronic Voting Systems Responsible for the day-to-day security operations of the election system Develop and update the Election Systems security plan Manage and control changes to the e-Voting system and assess the security impact of those changes -
Senior Data Security SpecialistM&T Bank Oct 2003 - Apr 2006Buffalo, New York, UsInstall and deploy single sign on solution from Computer Associates. Install, configure and maintain UNIX access control software (SymarkPowerBroker/Powerkeeper) Install and system administrator of 32 Solaris 8/9 Enterprise Servers. Use of Solaris DiskSuite and FDR Upstream software for clustered system reliability Distribute and maintain enterprise cryptographic key structure for OpenSSH. Cryptographic custodian for internal/external ATM cryptographic material -
Network Security AnalystAllfirst Bank Apr 2001 - Oct 2003Security compliance reviews of 187 HP/UX, Solaris Sun, IBM AIX, Linux and NCR MP-RAS/Srv4 UNIX servers. Develop, coordinate and publish security policies for UNIX operating systems. Identify security enhancements for distributed server applications. User security evaluation tools: Symantec ESM, Nessus, Nmap, CyberCop, and Typhoon to identify security vulnerabilities in the Bank enterprise Email filtering and release decisions for over 1000 daily messages to ensure compliance with Bank policy -
Network Project Manager - ConsultantSystems Alliance, Inc. Apr 1998 - Apr 2001Hunt Valley, Maryland, UsManaged a Fortune 500 company network of 63 Netware/Windows NT/2000 servers Establishment of UNIX/Windows/Netware WAN-wide time synchronization Wide area network upgrade/installation over FDDI/Frame Relay/ATM WAN links to 23 locations NAT and DHCP centralized management of IP number assignments -
Senior Network Engineer - ConsultantAlpha Engineering Associates Apr 1997 - Apr 1998Annapolis, Md, UsSole Novell consultant support for Maryland State Assessment and Taxation Departments 32 server, statewide network with over 400 users Installation of several small-to-medium size Novell networks to support business ADP needs Deployment of firewall support through Novell BorderManager software and email through Novell Groupwise gateways to FAX and Internet services Troubleshoot and upgrade existing network installations of Netware 2.2./3/1 to InterNetWare 4.11 and work stations using Windows 3.1x, Windows 95 and Windows NT -
Network ConsultantBusiness Network Associates Jun 1995 - Apr 1997Consultant to local County and municipal agencies to support enterprise applications and networking. Troubleshooting and repair of network problems with small-to-medium business installations. Second tier engineering support for Netware issues, including restoration after catastrophic failure at client sites. BNA was acquired by Alpha Engineering in 1997.
-
Local Area Network AdministratorCalifornia Microwave Apr 1994 - Jun 1995Supported a 225 user, Novell 3.12/4.1 WAN at two separate geographic locations Implemented various hardware solutions including 100VG/10BaseT and Cisco/Rockwell routers Installed software applications for software metering, cc:Mail/MSMail gateways, server/client virus protection, and office productivity suites from Microsoft/WordPerfect Network setup and maintain printers from Hewlett-Packard, IBM/Lexmark, Xerox/Tektronics
Lawrence Grim Skills
Lawrence Grim Education Details
-
University Of Maryland Global CampusMaster Of Business Administration (M.B.A.) -
University Of Maryland Global CampusInformation Technology - Information Assurance -
National Defense UniversityInternational Relations And Affairs -
Excelsior UniversitySociology -
Civilian Marksmanship ProgramCmp Advanced Maintenance Class
Frequently Asked Questions about Lawrence Grim
What company does Lawrence Grim work for?
Lawrence Grim works for Grim Enterprises
What is Lawrence Grim's role at the current company?
Lawrence Grim's current role is President.
What is Lawrence Grim's email address?
Lawrence Grim's email address is ld****@****ail.com
What is Lawrence Grim's direct phone number?
Lawrence Grim's direct phone number is +181448*****
What schools did Lawrence Grim attend?
Lawrence Grim attended University Of Maryland Global Campus, University Of Maryland Global Campus, National Defense University, Excelsior University, Civilian Marksmanship Program.
What skills is Lawrence Grim known for?
Lawrence Grim has skills like Security, Information Security, Network Security, Computer Security, Information Technology, Integration, Firewalls, Networking, Cissp, Program Management, Information Assurance, Information Security Management.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial