Lyndon W.

Lyndon W. Email and Phone Number

Chief Technology Officer at Scilent Networks @
Lyndon W.'s Location
Los Angeles, California, United States, United States
About Lyndon W.

I create innovative cyber security solutions using Cisco, Palo Alto, Juniper platforms to provide business acceleration by integrating AI with multi-cloud infrastructure to produce intelligent, resilient automated response and remediation systems. By leveraging local and global data from multiple sources we deliver collaborative custom orchestration solutions to reduce overhead, increase security, optimize network performance while providing increased value as well as an important ROI.

Lyndon W.'s Current Company Details
Scilent Networks

Scilent Networks

Chief Technology Officer at Scilent Networks
Lyndon W. Work Experience Details
  • Scilent Networks
    Chief Technology Officer
    Scilent Networks Dec 2015 - Present
    Beverly Hills, Ca
    Creating cognitive-based Integrated Security Compliance solutions to adapt to the evolving paradigm of enterprise business Threat Management & Compliance methodologies to secure corporate intellectual property while managing advanced persistent threats against Financial, Medical and other business partners to prevent information theft, personnel manipulation, fraud and other results of network infrastructure exploitation...or I could just say we do some really cool stuff to make your network secure, reliable and efficient so your IT Dept can concentrate on servicing users 8x5 instead of fighting fires 24/7.
  • Ucla Health
    Senior Information Security Engineer
    Ucla Health Jul 2015 - Dec 2015
    Greater Los Angeles Area
    Served as a dedicated Routing / Switching / Firewall / VPN SME supporting escalations from Network Operations, Incident Response, Compliance and EPIC Systems staff on a wide range of enterprise healthcare security initiatives utilizing Cisco ASA, ASR, Nexus and Catalyst Data Center platforms; Multi-Clustered Palo Alto Networks 5000 and 7000 HA pairs with Panorama; in addition to MacAfee Nitro SEIM for alerting and incident response with SOPHOS for maintaining compliance to develop and execute various projects to enhance & expand the security and performance of the UCLA Health network.•Designed, developed and executed major network upgrades involving over 1000 multi-vendor nodes running OSPF, BGP, EIGRP, Policy Routing, QoS, VRRP, ACL’s, VRF’s and Multi-Context IPSec VPN’s. •Demonstrated excellent customer service & team building skills along with implementation leadership, and will be required to routinely interact directly with customers, to serve as a SME & technical lead within the team, and to participate in & foster a “team environment.•Documented findings, assessed and advised management on the appropriateness of corrective action plans, and tracking of remediation progress for outages and other network performance events.•Analyzed proposed security and network systems for projects and potential information security and privacy issues. •Document issues, assess appropriateness of and advise on corrective action plans, and track remediation. · •Assisted in investigation of incidents, review logs, correlate events, document findings, interface with forensic and ISS teams.•Evaluated new and emerging information security technology to assist Chief Information Security Officer in responding to any security incidents and other issues as required. •Made recommendations for information security Program Development for assessments, audit and monitoring plan implementation in compliance with laws, regulations, contractual requirements and university policy.
  • Blokworx, Inc.
    Manager Of Product Development/Professional Services/24X7 Support
    Blokworx, Inc. Jan 2009 - Jul 2015
    Burlingame, Ca
    Tasked with supporting Sales, Professional Services and 24/7 NOC personnel for custom developed client solutions comprised of Cisco ISR, ISRG2 routers; Catalyst/Nexus switches (3X50, 6500) and ASA firewalls; Juniper JunOS and ScreenOS SRX/SSG firewalls and EX series switches; Palo Alto PAN-200’s & 500’s; SonicWall NSA & E-Class; Fortinet FortiOS; and Force10 300 & 500 series platforms.• Review of multi-vendor competitive and market analyses between competing products’ features, pricing and positioning to formulate competitive sales and marketing strategies.• Develops and tests product offerings comprised of routers, switches, firewalls, intrusion detection systems, application behavior (sandbox) technologies.• Designed high-availability solutions through vendor interoperability of Juniper, Cisco, SonicWall, Fortinet, and Palo Alto Networks platforms utilizing BGP, OSPF, and EIGRP routing protocols along with IPSec, MPLS and SOHO transports for reliable disaster recovery.• Tasked with implementation and troubleshooting of QoS (DiffServ), traffic shaping configurations on Cisco routers, switches and Juniper ScreenOS and JunOS platforms.• Experience with analyzing network performance elements with NMM platforms; Packet Trap, Science Logic, HP Openview and Accelops SEIM. • Responsible for translating forensic, monitoring and performance data into understandable reports and presentations in support of sales and troubleshooting efforts. • Responsible for maintaining a balancing between evolving project deadlines and on-going high demand customer expectations.• Analyzed technical needs, requirements with the state of customer's current infrastructure and operations. • Identified opportunities to develop technical solutions for customer's needs and requirements.• Reviewed and validated solutions to ensure compatibility and consistency with industry best practices and client security policies in order to reduce CAPEX and increase ROI.
  • At&T Advanced Services Solutions Group
    Senior Technical Services Engineer Iii
    At&T Advanced Services Solutions Group Feb 2004 - Jan 2007
    Dublin, Ca
    Responsible for the Support, Design, Development, and Integration of vendor products with emphasis on successfully maintaining system security and availability for global enterprise networks comprised of over 10,000+ routers, switches and security devices.• Tasked with the integration and on-going support of Cisco Voice, Security, Switching and WAN technologies in support of Manage Services customer contracts. • Responsible for troubleshooting of Cisco CME/Unity VoIP products utilizing SIP, H323 and MGCP gateways.• Served as an escalation point for advanced network issues and vendor quality assurance difficulties.• Responsible for the assessment of customer network issues and tasked with devising and executing a plan of action toward incident resolution.• Traveled extensively for face-to-face customer engagements in post-sales design and planning.• Coordinated sales, account and support efforts to ensure 100% customer satisfaction.• Worked with project managers in setting customer expectations and integration scheduling• Responded to network down failures on customer premise as on-site technician to provide rapid resolution and restoration to client operations.• Responsible for on-going training, mentoring and support of 40 Tier I & II individuals.• Passed CCIE Security Lab.
  • Us Navy
    Information Operations Systems Technician
    Us Navy 2000 - 2005
    Us Navy Reserve Camp Parks, Dublin, Ca
    Tasked with operating and monitoring communications systems and networks including satellite systems, network servers, patch panels, modems, router, multiplexers, and cryptographic devices. • Performed information security and computer network operation functions for secure networks and communication systems. • Provided Network Vulnerability Assessments and Incident Response/ Reconstruction Analysis as the Information System Security Administrator. • Analyzed, configured and monitored the operation of computer telecommunications and networking systems.• Created and executed 4-day networking course material to assist 24 other cryptologic personnel in rating conversion from various CTx fields to newly defined CTN rating with focus on OSI and TCP/IP models and practical applications involving Cisco routers, EIGRP, OSPF, BGP, ACL's as well as open source network administration tools.• Built a CCNA lab utilizing Cisco routers and switches along with lab scenarios and solutions for forward deployed assets during Active Duty Training.• Received an additional Navy Accommodation Medal from NavSecGruAct (Reserve) Admiral for continued commitment in training fellow personnel.• Extensive day to day operational experience with various proprietary *NIX platforms including Solaris, HP-UX, AIX, SCO as well as open source Linux distributions RedHat and UBUNTU.
  • Sbc Datacomm
    Security Implementation Engineer Ii
    Sbc Datacomm Jan 2002 - Feb 2004
    Dublin, Ca
    Responsible for the independent design validation, platform deployment and management of security solutions in support of over 100 DataComm Managed Security client contracts involving but not limited to network architecture design, device implementation, corporate security policy development, utilizing authorized penetration testing tools, documentation management as well as project scheduling and being ultimately accountable for client satisfaction.• Participated in team led research, evaluation, selection and business case development of supported vendor products.• Utilized Netcat, NMAP, Cain/Able and Nessus to validate firewall implementations.• Created scripts for automated cron jobs and OS hardening and maintenance. • Designed and implemented advanced authentication methods utilizing RADIUS, Cisco ACS (TACACS) and MS Active Directory.• Experienced with working one-on-one with clients to transform business requirements into attainable project goals. • Familiar with implementing layered security models for client networks involving multi-vendor distributed security architecture to ensure maximum security posture from end-to-end. • Served as single point of contact for all client escalations with 24/7 availability.• Implemented High Availability (HA) solutions utilizing Cisco PIX/ASA, Checkpoint 4.1-NG (IPSO) and Juniper NetScreen products. • Experience with Cisco Catalyst switches deploying VLANs, VTP, STP, Ether Channel, VLAN security techniques (ARP,MAC snooping/filtering).• Tasked with deploying multi-platform ACL's, IDS/IDP, QoS and VPN solutions on Checkpoint, Cisco, NetScreen and SonicWall routers and firewalls.• Tasked with creating client support documentation for Tier1 personnel to act as first-call 24/7.• Conducted training for 35 Tier1 personnel on supported VPN products, implementation practices, troubleshooting and escalation practices.
  • Pacbell Network Integration
    Network Security Administrator I
    Pacbell Network Integration Jan 2000 - Jan 2002
    Dublin, Ca
    Selected as a member of the PBNI Manage Security Service NOC responsible for 24/7 monitoring, incident response, management, and troubleshooting of multi-vendor security devices securing over 1,000 nodes in client LAN/WAN campus infrastructures comprised of; Cisco routers, switches, VPN concentrators and firewalls; RealSecure IDS systems; Checkpoint Firewalls 3.0-NG; SonicWall and NetScreen security devices. • Designated as first-responder responsible for 24/7 monitoring, incident response, management, and troubleshooting of multi-vendor security devices.• Trained to diagnose a wide range of network security problems related to mis-configured network routers, switches and firewall; troubleshooting e-mail, and other network services.• Experience with OS and system level hardening of *NIX and Windows based operating systems. • Expertise in the application of security analysis concerning information security best practices in support of network theory and application. • Recognized for achieving Cisco CCNP, Checkpoint CCSE and NetScreen certifications. • Demonstrated proficiency in Nokia IPSO, Sun Solaris and other *Nix based architectures.• Day to day hands on experience with firewall administration and management for over 300 solutions supporting Health Care, Education, Media and Govt industries.• Trained new hires on basic software installation and administration of supported Checkpoint and ISS Real Secure solutions.• Responsible for collaborating with deployed Security Engineering Team during remote installs.
  • Naval Security Group Activity
    Cryptologic Technical Operations (E1-E5)
    Naval Security Group Activity Jun 1996 - Jan 2000
    Naples, Italy
    Performed duties associated with operating telecommunications and computer network systems across the global communications spectrum to ensure the rapid, reliable and secure movement of large volumes of data, voice, and video information to operating forces ashore and afloat• Achieved all Job Qualification Readiness standards up to the rank of E6 prior to being promoted to E5.• Consistently promoted from E1-E5 for sustained superior performance.• Displayed exemplary proficiency in mastering operational messaging systems resulting in being tasked with training over 37 personnel in standard operating procedures and best practices.• Continuously displayed exemplary team-conscious attitude inside as well as outside of the work environment. • Assisted inter-office information systems department in network system management including LAN/WAN design, management, security, and maintenance. • Recognized expertise handling and control of various cryptologic communication materials, procedures, incident response and reporting criteria.• Tasked with reporting to flag level fleet commanders for status, situation and remediation reports of adverse service impacting operational and security based incidents as a part of facilities control. • Recognized for achieving newly created Cisco Certified Network Administration certification.• Awarded the Navy Accommodation Medal along with various Letters of Commendation for exemplary operational performance in support of wartime and peacekeeping operations.

Lyndon W. Education Details

Frequently Asked Questions about Lyndon W.

What company does Lyndon W. work for?

Lyndon W. works for Scilent Networks

What is Lyndon W.'s role at the current company?

Lyndon W.'s current role is Chief Technology Officer at Scilent Networks.

What schools did Lyndon W. attend?

Lyndon W. attended University Of California, Los Angeles.

Not the Lyndon W. you were looking for?

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.