Stephen Horton Email and Phone Number
Stephen Horton work email
- Valid
- Valid
- Valid
- Valid
Stephen Horton personal email
Stephen Horton phone numbers
Threat Intelligence Analyst - Provide indicators and warnings of attack on company confidential and its critical partners in order to facilitate defense and mitigation measures.High quality intelligence collector and analyst possessing the drive, determination and innovation to discovermany sources of information and always striving to find new sources, even in the most barreninformation wilderness.Ability to analyze large volumes of information rapidly, making informed decisions on the critical of suchinformation and communicating to the appropriate departments, allowing them to mitigate any securityconcerns to the infrastructure.Document and prepare detail, focused reports on suspected threats to the environment and communicate andcollaborate across the team, ensuring accurate and timely intelligence delivery.IT professional with experience implementing, managing and supporting IT Security systems within an Enterprise Environment. Sound understanding in Vulnerability assessment, threat and packet analysis, Product Evaluation & Recommendation, Project Management, Patch management, logs analysis, regulatory compliance, Customer Service and end User Training.Other areas of expertise include: Antivirus infrastructure monitoring and maintenance ( McAfee ePO 4.0/5/6,MDE 7, HIP 8, VSE, DEEP, Symantec endpoint protection 11/12), IDS/IPS, Websense URL Filtering, Blue Coat Proxy, Retina CS nessus Vulnerability Scanner tool, Mcafee SIEM, Mcafee ATD, CROWDSTRIKE, Tripwire File Integrity Monitoring, Symantec Brightmail gateway, Cisco Wireless Control System (Cisco WCS), Forensic Investigations, ITILv3, HIPAA.IBM Malware Defense Specialist - IBM Integrated Technology Delivery, Security & Risk Mgmt. (Mcafee Technical Expert)Sedona Technologies (Sedonatek) - Infrastructure Analyst) for John Deere Corporate. A computer programmer UNIX/AIX administrator with software including Mercator (IBM ) Data StageTX Transformation Extender), UNIX Scripting, Java, and PERL.
Fiserv
View- Website:
- fiserv.com
- Employees:
- 10
-
Senior Information Security AdvisorFiserv Mar 2020 - PresentMilwaukee, Wisconsin, Us -
Senior Information Security Analyst/EngineerFiserv Oct 2018 - Mar 2020Milwaukee, Wisconsin, UsSupported incident management processes and security monitoring alerts in preventing internal / external hackers from compromising Fiserv's data and assets.Supported new and existing security solutions and partner with the security engineering team for the implementation and integration of any new enhancements made to existing security solutions in support of improving overall enterprise security.Ensured security tools and solutions hardware/software/devices are operating effectively and updated in a timely manner.Developed and maintain operating guidelines and procedures in support of Fiserv s policies, standards and guidelines.Used appropriate and effective measures to respond to network security alerts.Ensured the confidentiality, integrity and availability of the data residing on or transmitted to/from/through enterprise networks.Performed ticket queue monitoring, resolution and prioritization, maintain diagrams and documentation as appropriate and support firewall rule set reviews, auditing and maintenance activitiesManagement Information Systems or Risk ManagementCrossbeam experiencePalo Alto /Panorama experienceVMWare NSX experienceCisco ASA experience / Juniper Firewall experienceScripting Bash or PythonVPN troubleshootingImperva Database, Web Application firewall and XML firewall exposureArcsight exposureSplunk exposureSolid grasp of OSI layers 2, 3, & 4SSL Certificate experienceProxy / Threat Management Gateway experienceExperience with PCI, FFIEC, and/or SSAE 16/18 audits/examinationsIT/Information Security framework knowledge (i.e. NIST CSF, ISO2700x, COBIT, etc.)Working knowledge of standard security systems, applications and protocols: firewalls, proxies, endpoint controls, IDS/IPS, DLP, SIEM, TLS, File Integrity Monitoring, vulnerability assessment toolsExcellent written and verbal communication skills -
Lead Information Security AnalystThe Master Lock Company Nov 2017 - Oct 2018Oak Creek, Wisconsin, UsThe Information Security Analyst is responsible for the management and administration of security perimeter and internal network devices, security applications, and related hardware. This role is responsible for supporting the daily security operations and administration of the enterprise firewalls across the organization’s various global locations. The role involves planning, designing, and implementing new security technologies. This role will provide hands-on technical leadership and will manage enterprise-wide projects from initiation to completion -
It Senior Security AnalystFootlocker.Com, Inc / Eastbay, Inc Jun 2016 - Oct 2017Wausau, Wisconsin, UsIT Senior Security Analyst is responsible for monitoring the IT security infrastructure in a corporate network, articulating technical security requirements, monitoring the effectiveness of the existing IT security controls framework, and raising the level of security awareness and policy compliance among Foot Locker Associates.• Assist in the continuous review, evaluation, and rollout of security tools• Governance, monitoring, and supporting security software/systems that will help ensure compliance with regulatory, industry, and corporate policies and procedures. This includes but is not limited to IDS/IPS (Host/Network/Wireless), secure file transfer, data loss prevention, full disk encryption, firewalls, log management/correlation (SIEM), application whitelisting, and vulnerability management.• Define and implement appropriate security requirements for IT projects• Identifying, responding to, investigating, and remediating potential breaches and issues surrounding data security• Participate in security incident response efforts to include remediation with an appropriate sense of urgency and criticality• Providing notification, input, or research for issues of actual or suspected security fraud, violations, or abuses• Participate in security team workflow and process improvement initiative.• Examines the results of penetration testing, and assists with the remediation as necessary• Enforce infrastructure security including Microsoft, Linux/Unix, Workstations, POS terminals, etc.• Assist with the definition, creation, and documentation of information security-related policies, procedures, standards, guidelines and metrics -
Cyber Security AnalystFidelity National Financial Feb 2016 - May 2016Jacksonville, Fl, UsThe IT Cyber Security Engineer participates in the identification, tracking, and monitoring of information security threats and service operations. Engineer utilizes established processes and tools to focus on threat identification, analysis, and remediation. Engineer supports the processes for technical risk management to protect company’s information assets.• Business Analyst Responsibilitieso Provides Subject Matter Expert performance of engineering, operations and maintenance of all Information Security related systems architecture to include: Domain Structures, Host-based Malware Defense and Management, Patch Management and OS hardening.o Operates security-related software and firmware (e.g., endpoint security, encryption, assessment scan tools) to maintain security and service continuity.o Monitors multiple security technologies to detect potential IT security events. o Assists with investigations of security events (e.g., unauthorized access, non-compliance with company policies, fraud, service exploitation, etc.) to determine malfunctions, breaches, and remediation steps.o Responds to service issues, problems, and critical situations to support resolution and minimize downtime.o Assists in development and implementation of security process and procedures. o Generate security metrics and reports and provide remediation actions as needed.o OS Patching & Maintenanceo Develop flow diagrams with Visio -
Information Security EngineerBrookdale Jul 2014 - Jan 2016Brentwood, Tn, UsIT Security Engineer providing administering security infrastructure such as firewall, corporate networks, antivirus, intrusion prevention systems, VPNs, gateways and vital company assets.• Evaluate technology updates and ensure ongoing vendor support.• Ensure that security configurations of key systems are properly implemented, monitored and reported• Provides technical support and consultation for enhancement of and change to network security configuration• Performs all security administration functions within Mission Critical maintenance of user profiles and roles. • Assist the business in achieving security certifications (e.g. external - SOX and HIPPA, internal - network, database, end user computing) and evaluates compliance of IT Policies. • Conduct risk assessments, compliance and control reviews for the organization• Identify process and technical improvements for the environment • Improve efficiencies in procedures within the tools via automation • Resolve and document complex issues including root cause analysis, prevention and workarounds • Report generation, query setup and dashboard population • McAfee ePolicy End Point Protection Suite administration• CrowdStrike administration, deployment and monitoring.• Vulnerability Assessment and scanning• McAfee SEIM and ATD administration monitoring and reporting• Tier III support for desktop, servers, infrastructure hardware and applications. • Responsibilities included engineering support for malware detection and remediation. • Develop Diagrams with Visio and provide documentation materials -
Senior Mcafee Security EngineerAbbvie Jan 2014 - Jun 2014North Chicago, Illinois, UsMcAfee senior technician engineer providing advanced technical support for McAfee ePO technologies and End Point Protection suites including VSE, HIPS, EEPC, DLP, and related McAfee services. • Evaluate technology updates and ensure ongoing vendor support.• Identify process and technical improvements for the environment • Improve efficiencies in procedures within the tools via automation • Resolve and document complex issues including root cause analysis, prevention and workarounds • Report generation, query setup and dashboard population • McAfee ePolicy End Point Protection Suite administration • Tier III support for desktop. • Responsibilities included engineering support for malware detection and remediation. -
Cyber Security Threat Intelligence Analyst / Critical Business Process & Global Information ControlsCompanyconfidential Oct 2012 - Jan 2014
-
Information Security Specialist (Tier Iii Malware Defense)Ibm Sep 2009 - Oct 2012IBM Malware Defense Specialist - IBM Integrated Technology Delivery, Security & Risk Mgmt in Dubuque, IA. (Mcafee Technical Expert)Third Level SupportMaintaining the Anti-Virus and Personal Firewall infrastructure for IBM’s customers. This includes insuring the compliance and currency of the software version as well as the anti-virus definitions. Work closely with System Administrators, Network Administrators, Desktop Support, and Help Desk to ensure policies are being followed and appropriate steps are taken to protect the customer’s infrastructure.• Respond to audit requests relating to the currency of the customer’s infrastructure and take remediation steps to close any gaps in anti-virus coverage.• Monitor the AV Consol and provide current reports to System Administrator and Desktop Support Personnel. Also provide instruction as to specific actions needed to remediate gaps identified on the reports.• Provide 3rd level software support to the support groups and the customer to assist in resolving any non-standard anti-virus issue. Work closely with the anti-virus vendors to resolve outstanding issues. Provide virus samples to the anti-virus vendors for analysis and respond appropriately to the findings.• Design and rollout new product releases of anti-virus into the customer’s infrastructure. Prepare product comparisons and roll out a different vendor’s product if selected by the customer.• Respond to, and remediate virus infections in the customer’s infrastructure. Network connectivity limitations may require travel to the customer’s site to complete remediation activities and bring the customer’s network back up. Regular status reports should be made to IBM and IBM’s customer during an outbreak. A Root Cause Analysis may be required to determine the cause of the infection and the steps needed to remediate the issue.
-
Inrastructure AnalystSedona Technologies Sep 2008 - Sep 2009Moline, Illinois, Us- Infrastructure Analyst) for John Deere Corporate. Work as a computer programmer UNIX/AIX administrator with software including Mercator (IBM (Websphere) Data StageTX Transformation Extender), UNIX Scripting, Java, and PERL. Support Mercator Infrastructure for various data types including SAP, MQ, BAPI, IDOC, COMAR, etc. Work with MIS (IIS) Garth Gause as supervisor. -
System SpecialistPerot Systems Sep 2007 - Sep 2008Round Rock, Texas, Usfor the DoD. At Perot I worked as a 2nd Level Desktop Specialist on variety of related issues dealing with systems, OS systems, hardware break/fix issues with desktop, laptops, printers, high end workstations with 64 bit system applications and engineering software and other IT related infrastructures. Worked as senior support technician for Tech Team Global for the Boston Consultant Group as an IT Specialist, previous title was as a Support Technician providing technical support for John Deere Network (JDN), on the Enterprise Support Center Team.
Stephen Horton Skills
Stephen Horton Education Details
-
St. Ambrose UniversityComputer Science
Frequently Asked Questions about Stephen Horton
What company does Stephen Horton work for?
Stephen Horton works for Fiserv
What is Stephen Horton's role at the current company?
Stephen Horton's current role is Senior Information Security Advisor at Fiserv.
What is Stephen Horton's email address?
Stephen Horton's email address is st****@****msn.com
What is Stephen Horton's direct phone number?
Stephen Horton's direct phone number is +141491*****
What schools did Stephen Horton attend?
Stephen Horton attended St. Ambrose University.
What skills is Stephen Horton known for?
Stephen Horton has skills like Voip, Infrastructure, Perl, Sccm, Service Delivery, Network Design, .net, Mysql, Vulnerability Assessment, Pmp, Virtualization, Vmware.
Who are Stephen Horton's colleagues?
Stephen Horton's colleagues are Prateek Sharma 🐦, Wesley Carter, Vandana Kanjani, Chad Wolff, Taneshia Raine, Kiersten Minter, Priyanka Madhukumar.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial