David Thornton Email and Phone Number
David Thornton work email
- Valid
- Valid
David Thornton personal email
- Valid
Over the past 20+ years, I have gained extensive experience in leading technical teams and in designing, implementing, and securing end-to-end technical infrastructure - including technology strategy and standards, policies and procedures, security frameworks, architecture frameworks, and risk management frameworks - to support business transformation, in alignment with strategic goals.Career Impressions:★ Developed and wrote McAfee Secure Zoning Reference Architecture for both Cloud Service Provider Environments and On-Premise Environments, establishing the groundwork for secure operations within the respective environments, in alignment with business strategies.★ Oversaw the network and security operations team and a $1.5M annual budget at AIR, while instituting enterprise information security architecture and policies to support business, IT, and information security strategies.★ Developed enterprise information security reference architectures using the IBM Security Architecture Framework (based on the Zachman Framework for enterprise architecture) for enterprise and global clients in multiple industries.★ Developed enterprise information security policies for enterprise and global customers of IBM per ISO 27002 best practices, utilizing the NIST 800-53 and COBIT control catalogs.★ Examined the enterprise information security function for a regional insurance company at IBM, and developed a mobile media encryption solution for the Federally Funded Research and Development Center (FFRDC).
Lending Club
View- Website:
- lendingclub.com
- Employees:
- 1334
-
Information Security ArchitectLending ClubLinden, Va, Us -
Cybersecurity Solution ArchitectGeneral Dynamics Information Technology Apr 2024 - PresentFalls Church, Virginia, Us -
SabbaticalSabbatical Nov 2023 - Mar 2024 -
Information Security ArchitectLendingclub May 2022 - Oct 2023San Francisco, California, Us -
SabbaticalSabbatical Jan 2022 - May 2022 -
Director, Enterprise ArchitectureMcafee Jul 2021 - Dec 2021San Jose, California, UsResponsible for developing and maturating strategic roadmaps and planning, organizational standards, and thought leadership to execute organizational technical strategy -
Enterprise Architect, Information SecurityMcafee Apr 2020 - Jul 2021San Jose, California, UsKEY ACHIEVEMENTS:★ Oversee the development and implementation of risk-driven information security technical strategy and standards to ensure alignment with organizational objectives, in partnership with various teams and business units. ★ Deliver leadership, guidance, training, and coaching to fellow enterprise and solution architects, while cultivating professional relationships across various business units. ★ Co-developed multiple security architecture frameworks and standards, including:• McAfee Malware Handling and Processing Reference Architecture to update the basis for operation and handling of Malware (McAfee’s core business).• Enterprise Architecture Methodology and Practice to re-structure Technology Services processes for systems delivery and system/capability lifecycle.• McAfee Secure Zoning Foundational Control Concepts and Principles to establish the foundation for secure use of cloud-native modern software building blocks.• McAfee Production Environments: Foundational Concepts and Requirements to implement baseline taxonomy and requirements of all production-class environments. -
Senior Security ArchitectMcafee Jan 2018 - Apr 2020San Jose, California, UsKEY ACHIEVEMENT:★ Developed and deployed enterprise security architecture methodology and procedures in addition to conducting solution security architecture design, review, and execution for application, system, and infrastructure environments. -
Principal ArchitectMcafee (Contract Via P2 Solutions, Inc.) Jan 2017 - Dec 2017KEY ACHIEVEMENT:★ Served as the enterprise security architect to McAfee, LLC, with responsibility for establishing global Security Operations Centers that provided internal security operations and incident response services to the company.
-
Senior ConsultantNavy Federal Credit Union (Contract Via Celerity It, Llc) Jul 2016 - Dec 2016KEY ACHIEVEMENT:★ Provided consultancy services to a large financial organization on IT risk management program design/execution, large enterprise encryption solutions, and enterprise encryption key management, as part of a PCI DSS compliance effort.
-
Professional Services ConsultantTripwire Apr 2013 - Jun 2016Portland, Oregon, UsKEY ACHIEVEMENT:★ Designed and implemented solution architectures, based on customer use cases and requirements for several enterprise-class organizations, including the development of solutions in small, medium, and enterprise-class organizations, for file integrity monitoring, configuration assessment, compliance, and logging. -
Senior Practice ConsultantRsa The Security Division Of Emc Jun 2012 - Feb 2013Burlington, Massachusetts, UsKEY ACHIEVEMENTS:★ Conducted Breach Readiness assessments for clients to effectively assess the client’s ability to perform incident response, mitigation, and recovery, in response to modern advanced threats and malware.★ Established security intelligence-focused Security Operations Centers for various clients, including alignment with client business goals, business process changes, and technical architecture design, to assist clients, in managing advanced threats and malware. -
Data Security OfficerAmerican Institutes For Research Jul 2009 - Jun 2012Arlington, Virginia, UsKEY ACHIEVEMENTS:★ Implemented technical information security metrics to assess the technical security posture as an element of the information security architecture.★ Led a comprehensive technical security vulnerability examination and implemented a multi-year remediation plan, consisting of changes to operational practices/standards.★ Implemented an enterprise encryption solution for whole disk encryption and encrypted messaging, and an enterprise secure remote access solution within set budgetary and schedule limits, to support mobile computing as a component of business strategy. -
Information Security Architecture ConsultantIbm 2006 - 2009Armonk, New York, Ny, UsKEY ACHIEVEMENTS:★ Instituted IT risk management strategy and organization alignment utilizing ISACA Risk IT, and created a solution security architecture and plan for a secure mobile computing solution, for a large city government organization.★ Delivered technical oversight and operational support to security operations staff to deploy a network intrusion detection system for a nationwide financial clearinghouse.★ Analyzed network security architecture and strategy to assist business continuity for a multi-regional financial institution and implemented a secure remote access solution for a national retailer, using custom bulk configuration routines.★ Developed substantial expertise in sales enablement and support, including instructing the sales staff of service offerings/ assessing and validating statements of work with sales staff and clients.
David Thornton Skills
David Thornton Education Details
-
Norwich UniversityInformation Assurance -
University Of Central FloridaManagement Information Systems -
Community College Of The Air ForceInstructor Of Technology And Military Science -
Community College Of The Air ForceInformation Systems Management
Frequently Asked Questions about David Thornton
What company does David Thornton work for?
David Thornton works for Lending Club
What is David Thornton's role at the current company?
David Thornton's current role is Information Security Architect.
What is David Thornton's email address?
David Thornton's email address is dt****@****ire.com
What schools did David Thornton attend?
David Thornton attended Norwich University, University Of Central Florida, Community College Of The Air Force, Community College Of The Air Force.
What are some of David Thornton's interests?
David Thornton has interest in Information Security, Risk Management, Digital Photography And Blues Guitar, Information Security Management, Enterprise Security Architecture.
What skills is David Thornton known for?
David Thornton has skills like Information Security Management, Information Security, Security, Information Assurance, It Risk Management, Enterprise Security, Security Architecture Design, Vulnerability Assessment, Vulnerability Management, Encryption, Computer Security, Data Security.
Who are David Thornton's colleagues?
David Thornton's colleagues are Lucas Damaceno, Nikhila Reddy Yenugu, Cynthia R., Benjamin Blazer, Steele Doyle, Richard Figueroa, Brenda Park.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial