Stephen Horton

Stephen Horton Email and Phone Number

Senior Information Security Advisor at Fiserv @ Fiserv
255 Fiserv Drive, Brookfield, Wisconsin 53045, us
Stephen Horton's Location
Greater Milwaukee, United States, United States
Stephen Horton's Contact Details

Stephen Horton personal email

n/a

Stephen Horton phone numbers

About Stephen Horton

Threat Intelligence Analyst - Provide indicators and warnings of attack on company confidential and its critical partners in order to facilitate defense and mitigation measures.High quality intelligence collector and analyst possessing the drive, determination and innovation to discovermany sources of information and always striving to find new sources, even in the most barreninformation wilderness.Ability to analyze large volumes of information rapidly, making informed decisions on the critical of suchinformation and communicating to the appropriate departments, allowing them to mitigate any securityconcerns to the infrastructure.Document and prepare detail, focused reports on suspected threats to the environment and communicate andcollaborate across the team, ensuring accurate and timely intelligence delivery.IT professional with experience implementing, managing and supporting IT Security systems within an Enterprise Environment. Sound understanding in Vulnerability assessment, threat and packet analysis, Product Evaluation & Recommendation, Project Management, Patch management, logs analysis, regulatory compliance, Customer Service and end User Training.Other areas of expertise include: Antivirus infrastructure monitoring and maintenance ( McAfee ePO 4.0/5/6,MDE 7, HIP 8, VSE, DEEP, Symantec endpoint protection 11/12), IDS/IPS, Websense URL Filtering, Blue Coat Proxy, Retina CS nessus Vulnerability Scanner tool, Mcafee SIEM, Mcafee ATD, CROWDSTRIKE, Tripwire File Integrity Monitoring, Symantec Brightmail gateway, Cisco Wireless Control System (Cisco WCS), Forensic Investigations, ITILv3, HIPAA.IBM Malware Defense Specialist - IBM Integrated Technology Delivery, Security & Risk Mgmt. (Mcafee Technical Expert)Sedona Technologies (Sedonatek) - Infrastructure Analyst) for John Deere Corporate. A computer programmer UNIX/AIX administrator with software including Mercator (IBM ) Data StageTX Transformation Extender), UNIX Scripting, Java, and PERL.

Stephen Horton's Current Company Details
Fiserv

Fiserv

View
Senior Information Security Advisor at Fiserv
255 Fiserv Drive, Brookfield, Wisconsin 53045, us
Website:
fiserv.com
Employees:
10
Stephen Horton Work Experience Details
  • Fiserv
    Senior Information Security Advisor
    Fiserv Mar 2020 - Present
    Milwaukee, Wisconsin, Us
  • Fiserv
    Senior Information Security Analyst/Engineer
    Fiserv Oct 2018 - Mar 2020
    Milwaukee, Wisconsin, Us
    Supported incident management processes and security monitoring alerts in preventing internal / external hackers from compromising Fiserv's data and assets.Supported new and existing security solutions and partner with the security engineering team for the implementation and integration of any new enhancements made to existing security solutions in support of improving overall enterprise security.Ensured security tools and solutions hardware/software/devices are operating effectively and updated in a timely manner.Developed and maintain operating guidelines and procedures in support of Fiserv s policies, standards and guidelines.Used appropriate and effective measures to respond to network security alerts.Ensured the confidentiality, integrity and availability of the data residing on or transmitted to/from/through enterprise networks.Performed ticket queue monitoring, resolution and prioritization, maintain diagrams and documentation as appropriate and support firewall rule set reviews, auditing and maintenance activitiesManagement Information Systems or Risk ManagementCrossbeam experiencePalo Alto /Panorama experienceVMWare NSX experienceCisco ASA experience / Juniper Firewall experienceScripting Bash or PythonVPN troubleshootingImperva Database, Web Application firewall and XML firewall exposureArcsight exposureSplunk exposureSolid grasp of OSI layers 2, 3, & 4SSL Certificate experienceProxy / Threat Management Gateway experienceExperience with PCI, FFIEC, and/or SSAE 16/18 audits/examinationsIT/Information Security framework knowledge (i.e. NIST CSF, ISO2700x, COBIT, etc.)Working knowledge of standard security systems, applications and protocols: firewalls, proxies, endpoint controls, IDS/IPS, DLP, SIEM, TLS, File Integrity Monitoring, vulnerability assessment toolsExcellent written and verbal communication skills
  • The Master Lock Company
    Lead Information Security Analyst
    The Master Lock Company Nov 2017 - Oct 2018
    Oak Creek, Wisconsin, Us
    The Information Security Analyst is responsible for the management and administration of security perimeter and internal network devices, security applications, and related hardware. This role is responsible for supporting the daily security operations and administration of the enterprise firewalls across the organization’s various global locations. The role involves planning, designing, and implementing new security technologies. This role will provide hands-on technical leadership and will manage enterprise-wide projects from initiation to completion
  • Footlocker.Com, Inc / Eastbay, Inc
    It Senior Security Analyst
    Footlocker.Com, Inc / Eastbay, Inc Jun 2016 - Oct 2017
    Wausau, Wisconsin, Us
    IT Senior Security Analyst is responsible for monitoring the IT security infrastructure in a corporate network, articulating technical security requirements, monitoring the effectiveness of the existing IT security controls framework, and raising the level of security awareness and policy compliance among Foot Locker Associates.• Assist in the continuous review, evaluation, and rollout of security tools• Governance, monitoring, and supporting security software/systems that will help ensure compliance with regulatory, industry, and corporate policies and procedures. This includes but is not limited to IDS/IPS (Host/Network/Wireless), secure file transfer, data loss prevention, full disk encryption, firewalls, log management/correlation (SIEM), application whitelisting, and vulnerability management.• Define and implement appropriate security requirements for IT projects• Identifying, responding to, investigating, and remediating potential breaches and issues surrounding data security• Participate in security incident response efforts to include remediation with an appropriate sense of urgency and criticality• Providing notification, input, or research for issues of actual or suspected security fraud, violations, or abuses• Participate in security team workflow and process improvement initiative.• Examines the results of penetration testing, and assists with the remediation as necessary• Enforce infrastructure security including Microsoft, Linux/Unix, Workstations, POS terminals, etc.• Assist with the definition, creation, and documentation of information security-related policies, procedures, standards, guidelines and metrics
  • Fidelity National Financial
    Cyber Security Analyst
    Fidelity National Financial Feb 2016 - May 2016
    Jacksonville, Fl, Us
    The IT Cyber Security Engineer participates in the identification, tracking, and monitoring of information security threats and service operations. Engineer utilizes established processes and tools to focus on threat identification, analysis, and remediation. Engineer supports the processes for technical risk management to protect company’s information assets.• Business Analyst Responsibilitieso Provides Subject Matter Expert performance of engineering, operations and maintenance of all Information Security related systems architecture to include: Domain Structures, Host-based Malware Defense and Management, Patch Management and OS hardening.o Operates security-related software and firmware (e.g., endpoint security, encryption, assessment scan tools) to maintain security and service continuity.o Monitors multiple security technologies to detect potential IT security events. o Assists with investigations of security events (e.g., unauthorized access, non-compliance with company policies, fraud, service exploitation, etc.) to determine malfunctions, breaches, and remediation steps.o Responds to service issues, problems, and critical situations to support resolution and minimize downtime.o Assists in development and implementation of security process and procedures. o Generate security metrics and reports and provide remediation actions as needed.o OS Patching & Maintenanceo Develop flow diagrams with Visio
  • Brookdale
    Information Security Engineer
    Brookdale Jul 2014 - Jan 2016
    Brentwood, Tn, Us
    IT Security Engineer providing administering security infrastructure such as firewall, corporate networks, antivirus, intrusion prevention systems, VPNs, gateways and vital company assets.• Evaluate technology updates and ensure ongoing vendor support.• Ensure that security configurations of key systems are properly implemented, monitored and reported• Provides technical support and consultation for enhancement of and change to network security configuration• Performs all security administration functions within Mission Critical maintenance of user profiles and roles. • Assist the business in achieving security certifications (e.g. external - SOX and HIPPA, internal - network, database, end user computing) and evaluates compliance of IT Policies. • Conduct risk assessments, compliance and control reviews for the organization• Identify process and technical improvements for the environment • Improve efficiencies in procedures within the tools via automation • Resolve and document complex issues including root cause analysis, prevention and workarounds • Report generation, query setup and dashboard population • McAfee ePolicy End Point Protection Suite administration• CrowdStrike administration, deployment and monitoring.• Vulnerability Assessment and scanning• McAfee SEIM and ATD administration monitoring and reporting• Tier III support for desktop, servers, infrastructure hardware and applications. • Responsibilities included engineering support for malware detection and remediation. • Develop Diagrams with Visio and provide documentation materials
  • Abbvie
    Senior Mcafee Security Engineer
    Abbvie Jan 2014 - Jun 2014
    North Chicago, Illinois, Us
    McAfee senior technician engineer providing advanced technical support for McAfee ePO technologies and End Point Protection suites including VSE, HIPS, EEPC, DLP, and related McAfee services. • Evaluate technology updates and ensure ongoing vendor support.• Identify process and technical improvements for the environment • Improve efficiencies in procedures within the tools via automation • Resolve and document complex issues including root cause analysis, prevention and workarounds • Report generation, query setup and dashboard population • McAfee ePolicy End Point Protection Suite administration • Tier III support for desktop. • Responsibilities included engineering support for malware detection and remediation.
  • Companyconfidential
    Cyber Security Threat Intelligence Analyst / Critical Business Process & Global Information Controls
    Companyconfidential Oct 2012 - Jan 2014
  • Ibm
    Information Security Specialist (Tier Iii Malware Defense)
    Ibm Sep 2009 - Oct 2012
    IBM Malware Defense Specialist - IBM Integrated Technology Delivery, Security & Risk Mgmt in Dubuque, IA. (Mcafee Technical Expert)Third Level SupportMaintaining the Anti-Virus and Personal Firewall infrastructure for IBM’s customers. This includes insuring the compliance and currency of the software version as well as the anti-virus definitions. Work closely with System Administrators, Network Administrators, Desktop Support, and Help Desk to ensure policies are being followed and appropriate steps are taken to protect the customer’s infrastructure.• Respond to audit requests relating to the currency of the customer’s infrastructure and take remediation steps to close any gaps in anti-virus coverage.• Monitor the AV Consol and provide current reports to System Administrator and Desktop Support Personnel. Also provide instruction as to specific actions needed to remediate gaps identified on the reports.• Provide 3rd level software support to the support groups and the customer to assist in resolving any non-standard anti-virus issue. Work closely with the anti-virus vendors to resolve outstanding issues. Provide virus samples to the anti-virus vendors for analysis and respond appropriately to the findings.• Design and rollout new product releases of anti-virus into the customer’s infrastructure. Prepare product comparisons and roll out a different vendor’s product if selected by the customer.• Respond to, and remediate virus infections in the customer’s infrastructure. Network connectivity limitations may require travel to the customer’s site to complete remediation activities and bring the customer’s network back up. Regular status reports should be made to IBM and IBM’s customer during an outbreak. A Root Cause Analysis may be required to determine the cause of the infection and the steps needed to remediate the issue.
  • Sedona Technologies
    Inrastructure Analyst
    Sedona Technologies Sep 2008 - Sep 2009
    Moline, Illinois, Us
    - Infrastructure Analyst) for John Deere Corporate. Work as a computer programmer UNIX/AIX administrator with software including Mercator (IBM (Websphere) Data StageTX Transformation Extender), UNIX Scripting, Java, and PERL. Support Mercator Infrastructure for various data types including SAP, MQ, BAPI, IDOC, COMAR, etc. Work with MIS (IIS) Garth Gause as supervisor.
  • Perot Systems
    System Specialist
    Perot Systems Sep 2007 - Sep 2008
    Round Rock, Texas, Us
    for the DoD. At Perot I worked as a 2nd Level Desktop Specialist on variety of related issues dealing with systems, OS systems, hardware break/fix issues with desktop, laptops, printers, high end workstations with 64 bit system applications and engineering software and other IT related infrastructures. Worked as senior support technician for Tech Team Global for the Boston Consultant Group as an IT Specialist, previous title was as a Support Technician providing technical support for John Deere Network (JDN), on the Enterprise Support Center Team.

Stephen Horton Skills

Voip Infrastructure Perl Sccm Service Delivery Network Design .net Mysql Vulnerability Assessment Pmp Virtualization Vmware Disaster Recovery Windows Server Servers Active Directory Dns Firewalls Information Security Information Technology Mcafee Security System Administration Technical Support Edr Carbon Black Proof Point Email Security Email Content Filtering Cloud Security Project Management Computer Networking Application Control Siem Endpoint Security Bluecoat Bluecoat Proxies Nextgen Security Incident Response Threat And Vulnerability Management Dashboard Metrics Symantec Security Logrhythm Proofpoint Email Security Managed File Transfer Nessus Dlp Active Directory Experience Intelligence Analysis

Stephen Horton Education Details

  • St. Ambrose University
    St. Ambrose University
    Computer Science

Frequently Asked Questions about Stephen Horton

What company does Stephen Horton work for?

Stephen Horton works for Fiserv

What is Stephen Horton's role at the current company?

Stephen Horton's current role is Senior Information Security Advisor at Fiserv.

What is Stephen Horton's email address?

Stephen Horton's email address is st****@****msn.com

What is Stephen Horton's direct phone number?

Stephen Horton's direct phone number is +141491*****

What schools did Stephen Horton attend?

Stephen Horton attended St. Ambrose University.

What skills is Stephen Horton known for?

Stephen Horton has skills like Voip, Infrastructure, Perl, Sccm, Service Delivery, Network Design, .net, Mysql, Vulnerability Assessment, Pmp, Virtualization, Vmware.

Who are Stephen Horton's colleagues?

Stephen Horton's colleagues are Prateek Sharma 🐦, Wesley Carter, Vandana Kanjani, Chad Wolff, Taneshia Raine, Kiersten Minter, Priyanka Madhukumar.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.