Patrick Kelley Email and Phone Number
Patrick Kelley work email
- Valid
- Valid
- Valid
- Valid
- Valid
- Valid
Patrick Kelley personal email
Patrick Kelley phone numbers
Patrick Kelley is the founder of Léargas Security and Critical Path Security. He provides extensive network forensics training for NERC, CISA, CRISP, E-ISAC around the world.He has over 25 years in the Information Technology industry with an emphasis on Information Security and Network Forensics. He has spoken on panels with members from the FBI, CIA, and NSA. He is an ongoing CyberSecurity Expert for NBC News, as well as a guest lecturer for Georgia State University in regards to their Cyber Security Masters Program. Though he has 20 years supporting the Aerospace Industry, he is often requested to provide offensive security services for his customers with special requests, such as breaching and commandeering freight trains, luxury maritime vessels, and personal jets. His skill, precision, and discretion are sought after assets in the personal high net-worth market. His research has been covered by FORTUNE, Bleeping Computer, CNN, NBC News, The Guardian, Globe and Mail, and Krebs Security Online. His passion for working with non-profits with an emphasis on the prevention of child abuse is extensive. He has worked in leadership roles in this area for over 20 years, breaking ground for three emergency shelters.
-
Founder / Chief Executive OfficerLéargas Security Jan 2020 - PresentAs the Founder and CEO of Léargas Security, I spearhead the mission to deliver AI-powered extended detection and response services. My role encompasses strategic leadership, innovation in cybersecurity technology, and driving the development of the Léargas XDR Platform. I am committed to providing comprehensive cybersecurity solutions that are efficient, scalable, and cost-effective. Through my leadership, Léargas Security empowers organizations to proactively detect, investigate, and block security threats, ensuring compliance and protecting their most critical assets. -
Founder / Chief Executive OfficerCritical Path Security Aug 2017 - PresentCanton, Georgia, UsGuiding Critical Path Security as its CEO, I focus on enhancing cybersecurity defenses and protecting critical digital assets for diverse clients. My role encompasses strategic leadership, driving the company's vision in an ever-evolving cyber landscape. I am dedicated to fostering innovation in cybersecurity solutions, including the development of Léargas, our advanced security platform. I actively engage in community outreach and partnership development, ensuring that Critical Path Security remains at the forefront of cybersecurity expertise and service delivery. -
Senior Security ResearcherPacketsled Aug 2016 - Sep 2017Santa Barbara, California, UsAssist business segments with security design and architecture decisions for systems and applications that process, transmit, or store sensitive information as defined within Data Classification Standards.Develop and implement business and/or IS vision, critical success factors and operating plans; develop and communicate department/enterprise vision, strategies, critical success factors and plans; develop high level implementation plans. Anticipate and manage information security evolution and relate it to business solutions. Set direction based on alignment to business, industry and overall technology standards.Initiate and foster business partnerships with current and potential clients, vendors, and senior business executives; develops relationships that promote trust and increase efficiency and effectiveness; balance individual customer needs with business priorities assuring alignment with the business strategies and objectives.Research Cyber Threat Ontology and Heuristic Behaviors, leveraging psychology, sociology and data models to develop counter-initiatives of threat actors in efforts of better protecting corporate environments.Research, apply, and deliver intelligence about active and emerging information security threats. Interact directly with Service Managers and leverage customer experience and operational learning to build an innovative solution to solve complex incident response and security issues.Use threat research to develop actionable intelligence to drive customer protection to include producing analysis to inform countermeasure development.Provide expert advice to fellow security researchers and customers on security strategy, standards, policies, and procedures.Leverage BRO-IDS and similar IDS solutions for deep-packet analysis, threat/breach detection and network forensics. Including the detection of APT, Exploit Kits and Covert Communication Streams. -
Sr. Security Engineer / Research / ManagerCritical Assets Mar 2014 - Aug 2016Del Mar, Ca, UsAssist corporate clients in security initiatives requiring advanced architectural planning and implementation. Specifically through the use of Cisco ASA, SourceFire and Palo Alto Network Firewalls.Perform Product Security Testing using IXIA BreakingPoint and custom technologies. Develop and implement data visualization and automation controls (TCL/TK, Python) to provide greater efficiency and consistency for testing. Manage Security Assessments and Audits covering PCI-DSS, HIPAA and other regulatory compliances and gap analysis, leveraging NIST, COBIT, ITIL, NSA IAM/IEM and ISO standards.Develop and implement feature-rich client portals, using Splunk and open-source solutions that allow for better communication and shared prosperity.Maintain working knowledge of advanced cyber threat actor tactics, techniques and procedures, and emulate these threats to assess vulnerability and risk.Mentor and train fellow team members in new technologies and techniques.Document and present on new testing methodologies to internal and external teams.Development and management of Incident Response (IR) teams. Guidance and Implementation of Security Technical Implementation Guides (STIGs).Published: VU#568252Websense Triton Unified Security Center 7.7.3 Information Disclosure VulnerabilityPending:IPS/IDS Vendor (Pending Disclosure)Conditional Denial of Service -
Information Security AnalystBig 5 Sporting Goods Mar 2013 - Mar 2014El Segundo, Ca, UsMonitor and manage corporate security devices and applications including Firewalls, Intrusion Prevention Systems, Patch management Systems, Certificate Authority, Anti-Virus, Email Filters, Web Content Filters, Backup Devices and SSL Taps.Developed and implemented the 1st Information Security laboratory environment for research and threat analysis.Provide expert security consultancy during requirements and design phases of the development cycle.·Configure, support and evaluate security tools.·Review network designs and evaluate compliance to applicable security standards.·Conduct security audits and provide recommendations to mitigate risks.·Ensure compliance to security standards and policy.·Evaluate project initiation documents.·Design solutions, configure or support Firewalls, Content Engines, IPS/IDS.·Configure and support anti-virus software.·Configure and support patch management systems.·Produce or modify disaster recovery and business continuity work practices.·Configure and optimize Enterprise Patch Management Systems.·Ensure representation in change management working parties (PCI/SOX).·Configure and support VPNs and enterprise gateway devices.·Produce or update remote access policy.·Define and enforce controlled access to corporate security zones as required.Research and Development of Reflexive Web Applications.Development of LAMP-based PHP/jQuery SSO Initiatives.Implementation of Encryption frameworks. -
Director Of It/IsNor-Ral, Inc Nov 2010 - Mar 2013Holly Springs, Georgia, UsArchitected and implemented solutions for the protection of Classified and Controlled Unclassified Information in accordance with ITAR and related compliance requirements.Responsibilities included the management of all Information Technology assets and Business Continuity Plans. Management of a mixed platform network consisting of Windows 2003/2008 and Ubuntu / Fedora Linux Server platforms, facilitating Active Directory, LDAP, DNS, LAMP, Group Policy and DHCP. Desktop support of Windows XP/Windows 7 workstation platforms. Management of Sonicwall Firewalls. Management of the Epicor ERP platform with emphasis on acceleration of SQL environments with BPM-driven Crystal Reports. Development and implementation of Security Operations Center using Splunk Enterprise Security. Custom development of dashboards, reports, and alerts related to network security, efficiency, and threat intelligence.Application isolation, consolidation of assets, while conserving power consumption was achieved by using VMware ESXi 5.x/vSphere/vCenter for virtualization and DRS of server environments spanned across BlueArc and NexusOS SAN/NAS systems. DMZ-isolation of Exchange, custom web applications, and remote services, using IDS/IPS along with physically segregated networks for public resources. Deployment of a full VoIP Altigen Phone System leveraging phone connections through the manufacturing and engineering facility, using both LAN and WLAN, facilitated through Cisco AP.Software Development of multiple websites using WordPress as the core with custom plug-ins using PHP, ASP, AJAX and jQuery.Published:Bugtraq ID: 46574Altigen AltiServRemote Denial of Service Vulnerability / Boundary Condition Error -
Founder / Security Systems EngineerGhostnet, Inc. Oct 1999 - Dec 2010Jasper, Ga, UsProprietor of an IT support and solutions firm in North Georgia that emphasized support of small to medium sized business entities. Roles and responsibilities included the rollout of full feature, turn-key network solutions based on Microsoft and Linux technologies with the ability to automate most common maintenance routines, such as antivirus, security patches and backup/restoration procedures. Facilitation of NAS/SAN appliances for expanding existing storage possibilities. VPN connections between multiple branch offices using DSL, Frame Relay and Dial-up connections were also delivered to multiple clients. MySQL and PHP development tools were also used to pioneer the usage of Content Management Solutions, such as Postnuke, Joomla and WordPress in the North Georgia area. Participated in the technical advisory committee with Appalachian Technical College for creation and guidance of syllabus for Associate Degree course study in Computer Science. Lead Consultant to the Pickens County Board of Education for the creation of sustainable network topology and security strategies increasing technological offerings to 3 additional schools as well as migration from WinNT/Win95 network nodes to Windows 2003 Server/AD/WinXP with global policies and VPN.Employed BlueArc SANs to create Data Redundancy Solutions that mirrored onsite services to secondary assets in offsite data centers. Secure connectivity was achieved with the use of VPN tunnels built across WatchGuard Firewalls.Published:Wired RED Remote Denial of Service Vulnerability / Buffer Overflow / Boundary Condition Error -
It SpecialistIncanta Nov 1998 - Sep 1999Responsible for assisting in the building of a global support helpdesk using LivePerson and custom support applications. Leveraged technologies such as VMware, VALinux, Mixed-Mode server architecture using Linux Servers, Windows Servers while extending network resources to Apple workstations.I also shared responsibility for the maintaining of a global multimedia content delivery network which employed VALinux clusters and push-pull technologies while using geo-positioning schemas to direct client applications to the closest media server.Implementation and management of ShoreTel VoIP phone system with 50+ end-users.Performed security audits using nmap, dsniff, l0phtcrack, rhino9 toolkits, and similar.
-
It SpecialistLucent Technologies Bell Labs Innovations Jan 1998 - Dec 1998Managed the Support Desk for the 2,500+ employee fiber optic plant. Responsibilities included delegation of trouble tickets, resolution of end-user and immediate network issues, and employee training.I also acted at the primary liaison between HP Global Support and Lucent Technologies for hardware and software repair for the manufacturing plant. -
Jr. System AdministratorStructured Logic/Intellimark Jan 1997 - Jan 1998Novell 3.xx Server AdministratorWindows 3.xx / Windows 95 Desktop AdministratorAssistant to SAP R2/R3 Recruiters
Patrick Kelley Skills
Patrick Kelley Education Details
-
Uc Berkeley Extension -
Chattahoochee Technical CollegeInformation Technology
Frequently Asked Questions about Patrick Kelley
What company does Patrick Kelley work for?
Patrick Kelley works for Léargas Security
What is Patrick Kelley's role at the current company?
Patrick Kelley's current role is vCISO / Keynote Speaker / Mentor / Founder / Visiting Scholar / Author.
What is Patrick Kelley's email address?
Patrick Kelley's email address is pa****@****ity.com
What is Patrick Kelley's direct phone number?
Patrick Kelley's direct phone number is +177088*****
What schools did Patrick Kelley attend?
Patrick Kelley attended Uc Berkeley Extension, Chattahoochee Technical College.
What skills is Patrick Kelley known for?
Patrick Kelley has skills like Security, Firewalls, Virtualization, Networking, Vmware, Information Security, Disaster Recovery, Network Security, Windows Server, Data Center, Dns, Active Directory.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial