Richard Dahl work email
- Valid
- Valid
Richard Dahl personal email
Richard Dahl phone numbers
Security management expert proficient in: regulatory compliance, IT governance, and risk management.Definitive understanding of comprehensive security concepts including management, operational, and technical controls required to implement an appropriate security posture.Specialties: Information Technology and Operational Technology Security ManagementEnterprise Security Integration
Cmplid:// Inc.
-
Cmplid:// Inc.Chicago, Il, Us
-
Founder & CeoCmplid:// Inc. Jun 2015 - PresentResponsible for the development and commercialization of security management automation solutions.
-
Principal EngineerContract Jun 2015 - Dec 2015Nuclear cyber security consulting
-
DirectorBlack & Veatch Nov 2011 - Jun 2015Overland Park, Ks, UsManaged Nuclear Cyber Security sub-practice within greater cyber security practice including:- Engagement management for nuclear cyber security projects- Managed relationships with clients and sub-contractor organizations working on B&V engagements- Strategic adviser to consulting clients Participated in potential M&A analysisInstrumental in identifying and managing partnership opportunities with other professional service firmsResponsible for developing marketing initiatives for cyber security industryMet with prospective clients to determine and document appropriate engagement proposals for nuclear, bulk electric system (NERC CIP) and smart grid security servicesPerformed engagement financial management including resolving billing issues, reviewing and approving client and sub-contractor invoices -
Methodology And Application DeveloperComplid.Info Nov 2009 - Jun 2015Created highly efficient and effective security management methodology and a free and open application that implements it. The Security management and coordination application (www.complid.info) is currently populated with energy-sector (NERC CIP and NRC/NEI) and U.S. Government (NIST SP 800-53) cyber security requirements.Developed complid-based managed service methodologies designed to produce significant increases in efficiency and effectiveness compared to traditional consulting services model.
-
Sr. ConsultantAt&T Sep 2011 - Nov 2011Dallas, Tx, UsSenior Consultant in the GRC practice. -
Contract Project Manager, Cyber Security ProjectExelon Nuclear May 2010 - Sep 2011Baltimore, Maryland, UsNEI 08-09 cyber security implementation project:Developed Traceability Matrix providing implementation guidance for each NEI 08-09 security controlManaged development of all IT procedures required for compliance with NEI 08-09Managed the Data Diode test labParticipated in the development of NEI 10-09 guidance document -
CtoScif Software Inc. Jul 2008 - Jun 2010Lead developer and product evangelist.
-
VpHsbc Nov 2009 - May 2010London, GbPerformed security consulting for third-party reviews and internal applications -
Contract Project Manager, Nerc Cip Implementation ProjectExelon May 2006 - Oct 2008Chicago, Il, UsConducted an enterprise-wide gap analysis to identify compliance shortfalls with the NERC Cyber Security Standards. Assisted in developing and implementing a two-year remediation plan for all identified deficiencies. -
Senior Security ConsultantNeohapsis Jun 2007 - Mar 2008Chicago, Il, UsNetwork and Endpoint Security Consultant -
Senior ConsultantSilvertrain, Inc. May 2005 - Nov 2005UsCompliance and risk management consulting. -
Security ConsultantSecurepipe Jan 2004 - May 2005Provide pre-sales engineering assistance to account managers throughtout the sales cycle.Develop and document client specific solutions utilizing SecurePipe's managed security services.Provide training and educational seminars to groups such as the FDIC, The Independent Community Bankers of America, and other trade-groups and associations. The primary topics covered are Network Security Architecture, Risk Assessment, Security Operations, Holistic Security Program Management, and compliance with Government regulations such as SOX404, HIPAA, and GLBA.
-
Principal Systems EngineerSymantec / Recourse Technologies Jul 2002 - May 2003San Jose, California, UsPre and post sales support of IDS and other security technologies. -
Security ConsultantLurhq 2003 - 2003Atlanta, Ga, UsProvided presales engineering and consulting to potential managed services clients.Provided security architecture and design services to managed services clients.Configured and implemented firewalls, routers, and Intrusion Detection systems for managed services clients.Spoke at industry trade shows on network security topics. -
Security ConsultantEsystems Security Feb 2000 - Jul 2002Built security consulting practice servicing large national and multinational financial service and health care firms in the design and implementation of various components of a holistic security program including: Ecommerce security systems, firewalls and IDS, policies, security evaluation services, and incident reponse and technical investigations.
-
Senior Network Systems ConsultantInternational Network Services 1998 - 2000UsSecurity consulting -
Counterintelligence AgentUs Army May 1993 - Apr 1998Arlington, Virginia, UsLed teams investigating computer network intrusions into military computers.Led teams conducting vulnerability assessments on military computer network systems.Conducted counter-espoinage investigations and force-protection operations.Functioned as unit security manager
Richard Dahl Skills
Richard Dahl Education Details
-
Us Army Intelligence SchoolCounterintelligence
Frequently Asked Questions about Richard Dahl
What company does Richard Dahl work for?
Richard Dahl works for Cmplid:// Inc.
What is Richard Dahl's role at the current company?
Richard Dahl's current role is Founder, CEO cmplid:// Inc..
What is Richard Dahl's email address?
Richard Dahl's email address is ri****@****dahl.us
What is Richard Dahl's direct phone number?
Richard Dahl's direct phone number is (913) 458*****
What schools did Richard Dahl attend?
Richard Dahl attended Us Army Intelligence School.
What skills is Richard Dahl known for?
Richard Dahl has skills like Network Security, Computer Security, Risk Assessment, Security, Risk Management, Information Security, Security Management, Governance, Security Policy, Risk Analysis, Vulnerability Assessment, Project Planning.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial