Steven Walters

Steven Walters Email and Phone Number

Cybersecurity Professional | Chief Technology Officer | MBA| Executive Briefing | Organizational Leader | Strategy & Roadmap Development | NIST 800-53, ISO 27001 | Governance, Risk, & Compliance @ AbbVie
north chicago, illinois, united states
Steven Walters's Location
Raleigh, North Carolina, United States, United States
About Steven Walters

Senior Information Security Manager, Auditor, Vulnerability Tester, and former U.S. Army Information Systems Management Officer with over 17 years of combined experience serving within the Manufacturing Industry, Department of Defense (DoD), and National Security Agency (NSA). Highly accomplished and recognized leader with numerous successes in leading teams and performing offensive and defensive cyber operations. Proven expertise in:● NIST 800-53 Security Controls ● Risk Management Framework (RMF) ● Adversary Threat Emulation● Red Team Operations ● Vulnerability Assessments ● Penetration Testing ● Cyber Security Framework● Exploitation Methodologies ● Vendor & Contract Management ● Operational Planning ● Organizational Leadership● Legal Framework & Compliance Requirements ● Windows / Linux OS ● Networking ● Virtualization

Steven Walters's Current Company Details
AbbVie

Abbvie

View
Cybersecurity Professional | Chief Technology Officer | MBA| Executive Briefing | Organizational Leader | Strategy & Roadmap Development | NIST 800-53, ISO 27001 | Governance, Risk, & Compliance
north chicago, illinois, united states
Website:
abbvie.com
Employees:
46234
Steven Walters Work Experience Details
  • Abbvie
    Associate Director, Business Information Security | Ot Networks | Legal & Regulatory Compliance
    Abbvie Jul 2022 - Present
    Assist in the protection and safety of critical business IT assets, including manufacturing OT systems. Define and present cybersecurity KPIs to Senior Business Leaders. Manage the business's cybersecurity risk register. Advise senior business leaders regarding the prioritization of cybersecurity risks and ensure the appropriate allocation of capital.
  • Canary Cyber Solutions
    Cto, Partner, Co-Founder
    Canary Cyber Solutions Jun 2022 - Present
    Raleigh-Durham-Chapel Hill Area
    Partnering with SMBs to secure their business from cyber threats, so they can focus on growing their company.
  • Netapp
    Team Lead Manager, Security Engineering | Program Development | Secdevops | Ci/Cd
    Netapp Sep 2020 - Jul 2022
    Raleigh, North Carolina, United States
    Design, deploy, and manage a global network of cybersecurity tools to protect the company's critical assets. Manage the team responsible for ensuring that all cybersecurity infrastructure is available and operating at peak efficiency.
  • Netapp
    Vulnerability Management Program Manager
    Netapp Oct 2018 - Sep 2020
    Raleigh-Durham, North Carolina Area
    Established an enterprise vulnerability management program. Created and distributed executive reports and analytics about the company's vulnerabilities and cyber-risks. Instituted new standards and procedures to identify and remediate cyber vulnerabilities across the enterprise, including its data centers, cloud computing, global manufacturing sites
  • Ingersoll Rand
    Senior Manager, Vulnerability Mgmt And Security Architecture
    Ingersoll Rand Sep 2016 - Oct 2018
    Design and deploy an enterprise vulnerability management program that encompasses the company's multiple data centers, globally distributed manufacturing sites, and cloud computing environments. Ensure that the company deployed and maintained NIST CSF and ISO 27001 certifications.
  • Van Dyke Technology Group
    Vulnerability Asessment And Penetration Tester
    Van Dyke Technology Group Sep 2014 - Aug 2016
    Columbia, Maryland
    Perform vulnerability assessment and penetration testing operations on national security systems within the United States Government (USG), Department of Defense (DoD), and Intelligence Community (IC) classified and unclassified networks.• By emulating Advanced Persistent Threat Tactics, Techniques, and Procedures, provide the customer an in depth look at the effectiveness of their security techniques and procedures• Work with the customer in order to improve their information security posture• Author reports detailing all the security findings during the assessment and present it to the customer
  • National Security Agency
    Senior Penetration Tester
    National Security Agency Jun 2013 - Sep 2014
    Ft. Meade, Md
    Conduct NSA Red Team operations by providing vulnerability assessments and security evaluations of United States Government (USG), Department of Defense (DoD), and Intelligence Community (IC) classified and unclassified networks.• Accomplished customer requirements by conducting computer exploitation activities that emulate Advanced Persistent Threat Tactics, Techniques, and Procedures• Spearheaded development of new tactics, techniques and procedures during major annual combatant command exercise to support demonstrated impact through interactive hacking scenarios• Team lead for developing new network infrastructure exploitation methods, test and evaluation of commercial computer network operation tools• Developed and engineered a new non-attribution exploitation attack infrastructure• Co-authored final reports for each customer, which advised them on the discovered vulnerability vectors and possible mitigation strategies.
  • National Security Agency
    Nsa Red Team Mission Manager
    National Security Agency 2011 - Jun 2013
    Ft. Meade, Md
    Developed, trained, and supervised numerous penetration testers while providing command and control over multiple regional level operations.• Engaged in direct coordination and provided any necessary assistance to the customer during each phase of the operation• Identified technological vulnerabilities, potential attack vectors, policy vulnerabilities in the customer network• Authored detailed assessment and mitigation reports for the customer leadership, network management, and network defense personnel• Partnered and providing technical consultations with the customer leadership and network teams, detection and monitoring of malicious activities on the network
  • U.S. Army
    Division Signal Commander (1St Armored Division)
    U.S. Army Dec 2009 - Aug 2011
    Wiesbaden Area, Germany
    Managed 189 military personnel, 35 civilians, and over 45 million dollars worth of equipment to facilitate the establishment and maintenance of a distributed voice and data communications network• Employed satellite, microwave, radio, fiber optic, and twisted pair transmission mediums for the 1st Armored Division while in a deployed environment• Oversaw the administration of the Multi-National Division Network – Baghdad, which provided network services to over 35,000 customers throughout the central region of Iraq• Managed the operation of the Division’s Communication Security (COMSEC) vault for all cryptographic material up to the Top Secret / Sensitive Compartmented Information (TS/SCI) level• Carefully planned and emplaced over 20 communication extension nodes and ensured that each one met all physical and logical security requirements for each network classification• Developed new procedures for the procurement of equipment, equipment maintenance, individual skill training, and personnel management
  • Us Army
    Information Systems Manager
    Us Army 2009 - 2010
    Ft. Gordon, Ga
    Developed proficiency on securing information systems, at all classification levels, by applying NSA and Security Technical Implementation Guide (STIG) recommendations •Started a program for the auditing of information system systems across a diverse network environment•Implemented the separation of duties security concept by ensuring that each role and responsibility required for the administration of the network was properly divided amongst different administrators • Focused on the management, risk analysis, and risk mitigation programs• Provided detailed guidance on the proper countermeasure selection, procurement of data redundancy systems, and intrusion detection/protection (IDS/IPS) systems for each network classification level • Analyzed and provided risk mitigation techniques for limiting physical and logical access to DoD Unclassified, Secret, and Top Secret networks and secured facilities
  • Us Army
    Department Head Of Communications
    Us Army 2002 - 2009
    Multiple Locations
    Managed 19 military personnel and 15 million dollars worth of equipment, which provided signal support while in training and deployed environments. • Establish a reliable data and voice communication backbone by employing multiple types of communication systems. • Utilized satellite, microwave, fiber optic, and twisted pair communication mediums, the network provided service to over a 200 square mile area. • Implemented a fully redundant network for the Tactical Operations Center (TOC) in order to ensure that the data and voice communication were available in the event of an unplanned outage or disaster. • Managed and administered the network infrastructure to include 25 servers, 9 routers, and 5 servers. The infrastructure supported the administration of the unit’s Microsoft Active Directory, Microsoft Server Update Services, McAfee Endpoint Protection, and 150 various information systems. • Supervised the implementation of various network services to include enterprise email, centralized network file storage, SharePoint Services, instant messaging, and various real-time military video feeds. • Employed a patch management schedule which guaranteed that anti-virus definition updates and security policies were applied to all information systems. • Established the unit’s COMSEC account and supervised the distribution of all Unclassified, Secret, and Top secret cryptographic material throughout the unit.

Steven Walters Education Details

Frequently Asked Questions about Steven Walters

What company does Steven Walters work for?

Steven Walters works for Abbvie

What is Steven Walters's role at the current company?

Steven Walters's current role is Cybersecurity Professional | Chief Technology Officer | MBA| Executive Briefing | Organizational Leader | Strategy & Roadmap Development | NIST 800-53, ISO 27001 | Governance, Risk, & Compliance.

What schools did Steven Walters attend?

Steven Walters attended Unc Kenan-Flagler Business School, University Of Maryland University College, Embry-Riddle Aeronautical University, University Of Maryland Global Campus.

Who are Steven Walters's colleagues?

Steven Walters's colleagues are Ángela Morujo Duarte, Jonathan Perkins, Ben Ellis, Pratima (Patricia) Tamakuwala, Aidan O'shea, Hitesh Sumaria, Sarah Bose.

Not the Steven Walters you were looking for?

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.