Mark Petersen Email and Phone Number
Mark Petersen work email
- Valid
- Valid
- Valid
Mark Petersen personal email
Mark Petersen phone numbers
Playbooks Covering Security-Privacy-CompliancePASSIONATE SECURITY PROFESSIONAL• Broad technical background, hands-on experience with infrastructure, architecture, agile software development, and information security technologies.• Experienced problem solver and communicator with management and leadership skills used to initiate and scale solution implementations (all levels of management).• Process-focused leader, long-range view of security, threat management, and improving data management to prevent security breaches (small, medium, and global firms, dealing with many types of regulations and legal situations).Reachable via email:mark-m-petersen@comcast.netACCUMULATED EXPERIENCE• Cybersecurity Risk Management (CRM)• Cybersecurity Operations Center (CSOC) Playbooks/Runbooks/Use Cases/Technology Roadmaps• Cybersecurity Policies, Standards, Procedures, and Guidelines• Compliance Plans & Metrics• Data Privacy Alignment with Legal Teams (U.S. and International)• Threat-Analysis, Mitigation & Risk Management Strategies (U.S. and Globally)• Security Incident Response & Corrective Action Planning/Managing Improvements• Data Leakage Protection (DLP)• Intrusion Detection/Prevention (IDS/IPS)• Data Protection (DP)• Digital Signatures and Systems (DSS)• Encryption, Cryptographic Key Management Processes & Standards• Identity & Access Management Planning, Initiating, Planning, & Implementing (IAM, PAM)• Authentication, Authorization Systems Planning, Initiating, Planning, & Implementing• Agile (Scrum) Secure Software Development Life Cycle (SDLC)• Technology and Cybersecurity Architecture and Engineering Leadership• Unit, System & User Acceptance Testing (UAT)• Operational Processes & Use Case Development• Analyzing Costs & Budgeting for Cost Reductions• Negotiating/Managing Technology and Cybersecurity Vendor Contracts/Engagements• Planning Cyber & Tech Strategies, RFPs• Managing Deployment Costs• Improving End-User Information Security Awareness• Defining Data Protection Requirements Across Global Systems• Defining Information Security Policy, Info Sec Risks & Compliance Gaps• Selecting Cyber and Tech Products• Estimating Staffing Requirements for Project & Ops Teams• Collaborating with Cross-Functional Teams• Developing & Implementing Solutions• Developing Metrics & Performance Reporting• Managing Program/Project Risks, Problems, Issues, Changes• Establishing & Improving Quality Controls for Tech Systems• Leading Program/Project Management (PMI PMF)
Fiserv
View- Website:
- fiserv.com
- Employees:
- 10
-
Cybersecurity Risk Manager (Crm)Fiserv Mar 2022 - PresentMilwaukee, Wisconsin, UsInformation security risk manager for several business divisions of a leading fintech firm. Conduct security vulnerability reviews for application code and system architectures based on code scanning system reports and submitted architecture diagrams. Work with code vulnerability tools and metrics to advise on cybersecurity and vulnerability management risks and facilitate application vulnerability remediation as part of cybersecurity risk management processes. -
Manager, Cybersecurity OperationsConfidential Aug 2021 - May 2022Security incident response manage responsible for all security incidents and processes through outsourced cybersecurity operations center (CSOC). Developed and enhanced approach to cybersecurity incident management based on Mitre Att&ck methodology with a baseline of known tactics and techniques and a view toward business risk management. Tracked and resolved security incidents and zero-day vulnerabilities internationally for locations in more that 40 countries. Worked with various law enforcement agencies around the world to document cases against illegal cybersecurity bad actors. Maintained service levels and communications at all levels of management based on predefined security incident management planbook/runbooks.
-
Security ConsultingUndisclosed Consulting Company For Undisclosed Client Sep 2018 - Aug 2021PlSecurity planning and playbooks, operations runbooks, and training engagements with private and government contractors involving U.S. critical infrastructure installations. Security clearance. -
Personal Goal PursuitCareer Break Sep 2018 - Sep 2019Completed long-term educational goal.
-
Senior Program Manager - Cybersecurity OperationsIconectiv Sep 2016 - Sep 2018Bridgewater, New Jersey, UsSenior Program Manager/Senior Info Sec Leader• Hired to realign full-scope security program with business, functional, and technical requirements & specifications ($200,000,000 Program)• Two-year assignment• Executive Security Playbook/Runbooks• Program Management Office• Cloud computing• Linux virtualization• DR hot site (400+ instances and servers)• Secure Software Development Lifecycle (S-SDLC)• Worked two years implementing iconectiv (Ericsson Telcordia, previously known as Bell Core) S-SDLC development processes• Product architecture & software development (scrum agile development framework)• Systems engineering/devops: Led security technology selection• Established security project work-streams internal and external threat assessments, security information and event management (SIEM), identity and access management (IAM), and application and perimeter firewalls, data center and physical security, staff vetting, advanced persistent threat (APT) and threat and vulnerability management (TVM), security compliance audits, third-party risk assessments and supply chain risk management (SCRM), and aligned cybersecurity operations center (CSOC) processes and standards• Developed security checklists for solution readiness• Led process development and implementation for third-party supply chain risk management (SCRM), aligned operations security incident response plans (SIRP), arranged and oversaw vulnerability scanning, penetration testing, and remediation across all primary and secondary environments (production and non-production)• Partnered with the corporate, suppliers, professional development staff to promote security awareness and training• Hands-on experience with security technologies, writing/directing all levels of business and technical documentation• Production Operations: Led activities to implement new cybersecurity operation center (CSOC) for NPAC -
Vp, Lead Program Manager, Data Protection Program - Global Ops & Tech Risk MgmtCiti Jan 2010 - Jul 2015New York, New York, UsChairman, Global Key Management (KM) Working Group for IS Risk Op Committee• Improved/centralized certificates• Aligned KM/encryption standards (ISO2700X, COBIT, PCI)• Developed base standards for crypto KM (asymmetric/symmetric) for network, systems, apps• Developed business requirements for central KM solution• Provided subject matter expertise• Conducted inventory reviews (use cases)• Established CoE to improve compliance/controls for KM/encryption architecture (CIO-level approvals)Program Mgr/Scaled Cert ManagementLed project management (PMI/PMF) with phases:- Wrote, approved documentation- Obtained budgets, presented cost savings- Accountable for solution sourcing and delivery (controlling)- Led communications for senior mgmt, training for end-users- Reported deployment and spending metrics to senior management• Provided subject matter expertise relating to digital signatures, email encryption, identity and access management, authentication, and authorization• Reduced costs by centralizing certificate management• Deployed custom client code to reduce security risks related to Microsoft Active Directory and simplify implementation• Upgraded infrastructure to realize cost savings with cloud virtualization and support diverse end-point solutions• Managed global privacy reviews for file and email encryption involving more than 100 countries• Improved threat and risk mitigation by conducting risk reviews and influencing secure-software development lifecycle at engineering, unit, system and user acceptance testing, operational process levels• Centralized encrypted email solutions for internal users, globally (~250,000)Co-Project Manager/Product Owner for Data-At-Rest Scanning (DLP) ImplementationDeveloped statement of work (SoW) including:- Design for system scanning platform for data centers- Scanning and business notification policies for PII, PCI within unstructured data file systems- Performance metrics for ongoing metrics -
Vice President/Lead Incident Manager, Global Information SecurityCiti Jan 2009 - Dec 2009New York, New York, UsIncident Manager on Cyber Security Incident Response Team (C/SIRT)Directly involved in activities for hundreds of internal and external (cyber security) incidents:• Participated in Daily Incident Triage• Supported Legal and HR Investigations• Provided Guidance to Security and Operations Staff • Led Incident Resolution Activities for Complex Security Issues• Recommended Process ImprovementsImplemented Incident Metrics Reporting for Senior Management (All Regions) -
Vice President/Information Security Controls AnalystCiti Sep 2006 - Dec 2008New York, New York, UsData Protection Team LeadTechnical leader, Fast Track Programs, identified new information security solutions, established IS technical standards to alignment with IS policies, and globally coordinated international IS technology group meetings (core team and plenary meetings).Solutions:• Conducted hands-on IS technology research evaluations• Shepherded IS multiple efforts across security domains• Leader involved with centralizing out-going network content monitoring to prevent unintentional data leakage• Leader involved with centralized encrypted email solutions for external customers• Managed multi-year, global IS program deployment budgets• Managed Staffing Requirements with Focus on Minimized/Reduced Cost, Improved IS CapabilityIS Policies/Controls/Compliance:• Published insider threat working papers• Developed IS policies/technical standards• Improved IS compliance/controls for security (for CIO-level approvals)• Developed Insider Threat/Risk Mitigation Strategy• Influenced Secure-Software Development Lifecycle Standards -
Information Security Consultant/Subject Matter ExpertCiti Mar 2006 - Sep 2006New York, New York, UsLed and managed multiple efforts, including end-point controls and encryption solutions for desktops and laptops (includes USB, CD/DVD, chip cards, other potable media, data leakage protection, intrusion prevention, data protection). Accomplishments included delivery for:• Business Requirements• Request for Proposal (RFP)• Technical Requirements• Supplier Short List Recommendation• Leader of Global Advisory Committee (Formal Alignment of Business/Technology Working Group) -
Business Consultant/Senior Business AnalystJpmorgan Chase & Co. Jul 2005 - Dec 2005New York, Ny, UsProvided expertise for various security systems, developed business and technical documentation including, but not limited to, RFI/P for procurement and project teams, business requirements for business leaders, functional and technical specifications for vendor contracts (SoW). Also developed service level agreement (SLA) for JPM Investment Bank IAM support organization. -
Team LeadPharmaceutical Companies And Financial Services Firms Feb 1998 - Jul 2005Led definition, initiation, planning, product selections (RFP), and implementation for various security systems (scaled deployments)Encryption systems with key management and recovery processes including, but not limited to, - Integrated LDAP directories, - Public key infrastructures, - Secure electronic mail, - Secure physical media transportNetworking enhancements for global firewall redundancy- Routing protocol upgrade to OSPF on Cisco WANNetwork Security- Intrusion detection and prevention systems- Vulnerability scanning for network servers and end user computing- Wrote contract SoWs for penetration testing, vulnerability reporting, and remediation planning/implementation for Internet connected systems
Mark Petersen Skills
Mark Petersen Education Details
-
Thomas Edison State University& Information Systems
Frequently Asked Questions about Mark Petersen
What company does Mark Petersen work for?
Mark Petersen works for Fiserv
What is Mark Petersen's role at the current company?
Mark Petersen's current role is Advise business teams that develop software and integrate fintech products on information security risk and vulnerability management..
What is Mark Petersen's email address?
Mark Petersen's email address is ma****@****iti.com
What is Mark Petersen's direct phone number?
Mark Petersen's direct phone number is +191774*****
What schools did Mark Petersen attend?
Mark Petersen attended Thomas Edison State University.
What skills is Mark Petersen known for?
Mark Petersen has skills like Information Security, It Strategy, Program Management, Information Technology, Cissp, Sdlc, Enterprise Software, Unix, Vendor Management, Business Analysis, Project Management, Security Architecture Design.
Who are Mark Petersen's colleagues?
Mark Petersen's colleagues are Matt Anderson, Henrique Carvalho, Christopher Mikeworth, David Fisher, Joseph Lilly, Indranil Banerjee, Sonal Goyal.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial