Macaire D J. Email and Phone Number
Macaire D J. work email
- Valid
- Valid
- Valid
- Valid
Macaire D J. personal email
- Valid
- Valid
- Valid
Macaire D J. phone numbers
I’m Macaire Jackson and I’ve been in technology for what seems to be forever. But technology has its limits and businesses are run by humans. Rules are what enable a business to sustain, address technical risk, and to scale. That is why even though technology is a great enabler of growth, growth without regulation results in an inefficient use of resources and an aggregation of unresolved risks. As a Head of Information Security with over 10 years of experience, I have led and scaled security teams and programs across various industries and environments, from e-commerce to social services, from on-prem to cloud, and from HIPAA to SOC 2 to PCI. I have helped organizations to align their security and technology strategies with their business objectives and values, while ensuring compliance, resilience, and innovation.
-
Head Of Information SecurityInterpaymentsWilmington, De, Us -
Head Of Information SecurityInterpayments Oct 2023 - PresentSan Francisco, California, UsMerchants, payment software vendors, and merchant acquirers use InterPayments to recover processing fees without compliance risks. -
Full-Time ParentingCareer Break Apr 2023 - Sep 2023Nintendo Switch proficient, Dutch Wonderland Gauntlet, Great Wolf Lodge Swim Team
-
Director Of Cybersecurity And Cloud EngineeringBenefits Data Trust May 2020 - Apr 2023Philadelphia, Pennsylvania, UsThe 3 Cs - Cybersecurity, Cloud, and Compliance.100% remote workforce.Creating change within an organization to move the business forward.And tons of Google Cloud Platform architecting and managing. -
Information Security ManagerBenefits Data Trust Aug 2019 - May 2020Philadelphia, Pennsylvania, UsDesigning and implementing a Zero Trust Security Program in a SOC2 and HIPAA compliant environment. Bringing DevSecOps practices with practical solutions to a Data focused organization. -
Senior Security EngineerQurate Retail Group Aug 2018 - Aug 2019West Chester, Pennsylvania, UsArchitecting, integrating, and automating vulnerability management into operational and business processes. Taking an array of disparate tools and bringing them together to help create a cohesive security organization. Automating processes, ingesting data, and making good decisions using a combination of commercial off the shelf and open source tools to implement security controls. Creating meaningful presentations to communicate risk and assessments to be communicated to executives throughout the global organization. Design and implement vulnerability management strategies to meet PCI compliance and effectively reduce risk of the windows, Unix/Linux, IBM zOS/RACF environment. Provide guidance in addressing Vulnerability Assessment and use Hardening guidelines such as CIS on virtual images to minimize attack surface area and exploits.As greenfield cloud services (Azure, GCP) are rolled out make sure vulnerability management is firmly in place as well as other security controls. Work closely with various teams to ensure security is ingrained within the culture.Use my diverse experience to provide leadership, direction, and strategy for the team and the cybersecurity program. -
Senior Information Technology AuditorComcast Aug 2017 - Aug 2018Philadelphia, Pa, UsAs a member of Comcast Global Audit (formerly CAAT) I was responsible for evaluating scope, creating audit programs, and engaging with executives in the organization to assist in their efforts to align with Comcast/NBCUniversal's policies and priorities. I have come to focus on security from the perspective of Secure Software Development Life Cycle (SSDLC), Application, Infrastructure Vulnerability Management, and Platform Operations. My broad technology experience enabled me to expand the scope of what we are able to evaluate when partnering a client so they are to align with policies, procedures, guidelines, and best practices. -
Senior Threat And Vulnerability OfficerThe Bancorp Aug 2015 - Aug 2017Sioux Falls, South Dakota, UsResponsible for threat hunting and remediation strategies throughout the organization.Continuously monitor the security posture of existing controls and evaluate for improvement.Create meaningful metrics and refine them for delivery to Enterprise Risk and Board members.Penetration testing of internal critical applications on a regular basis.Ensure our vulnerability management meets and exceeds PCI compliance.Maintenance of our security infrastructure and expanding its scope and efficacy.Communicating threats to all levels of the organization in an effective manner.Perform incident response as necessary according to established guidelines.Be aware and aid in maintaining compliance with policies created from compliance and audit frameworks (PCI-DSS, ISO 27001:2013, NIST).Monitor, improve, and expand the SOC functionality using various products (SIEM, DLP, IPS/IDS) for detection and data analysis.Manage the transformation, normalization, and analysis of internal threat data.Perform internal and external penetration tests of critical applications on a regular basis.Pro-actively analyze controls and policies for gaps and propose solutions.Monitor our Threat Intelligence feed and react to information that is relevant to our environment.Preform regular audits of Firewall, Cloud, and Identity security policies.And of course, Threat & Vulnerability Management and Cyber-security in general.Auditing our Amazon Web Services (AWS) environment to establish security best practices and guidelines and critical services were transitioned off-prem. Provided regular audits of the CheckPoint firewalls.Engage in Security Incident Response per departmental runbooks and guidelines. Engage in Forensic analysis of company assets as necessary while using procedures to maintain chain of custody. -
Senior Systems EngineerThe Bancorp Mar 2012 - Aug 2015Sioux Falls, South Dakota, UsResponsible for the storage, virtualization, and system maintenance in multiple data centers. Compliance PCI was focus of creating and maintaining a Secure Network Architecture while still meeting the needs of the business.
Macaire D J. Skills
Macaire D J. Education Details
-
Temple UniversityComputer Science And Applied Mathematics
Frequently Asked Questions about Macaire D J.
What company does Macaire D J. work for?
Macaire D J. works for Interpayments
What is Macaire D J.'s role at the current company?
Macaire D J.'s current role is Head of Information Security.
What is Macaire D J.'s email address?
Macaire D J.'s email address is ma****@****ail.com
What is Macaire D J.'s direct phone number?
Macaire D J.'s direct phone number is +161030*****
What schools did Macaire D J. attend?
Macaire D J. attended Temple University.
What are some of Macaire D J.'s interests?
Macaire D J. has interest in Children, Kids, Electronics, Civil Rights And Social Action, Economic Empowerment, Gardening, Education, Environment, Home Improvement, Science And Technology.
What skills is Macaire D J. known for?
Macaire D J. has skills like Cloud Computing, Computer Hardware, Management, Active Directory, It Management, Microsoft Exchange, Blackberry Enterprise Server, Disaster Recovery, Virtualization, Information Security, Vendor Management, Troubleshooting.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial