Steven Walters Email and Phone Number
Senior Information Security Manager, Auditor, Vulnerability Tester, and former U.S. Army Information Systems Management Officer with over 17 years of combined experience serving within the Manufacturing Industry, Department of Defense (DoD), and National Security Agency (NSA). Highly accomplished and recognized leader with numerous successes in leading teams and performing offensive and defensive cyber operations. Proven expertise in:● NIST 800-53 Security Controls ● Risk Management Framework (RMF) ● Adversary Threat Emulation● Red Team Operations ● Vulnerability Assessments ● Penetration Testing ● Cyber Security Framework● Exploitation Methodologies ● Vendor & Contract Management ● Operational Planning ● Organizational Leadership● Legal Framework & Compliance Requirements ● Windows / Linux OS ● Networking ● Virtualization
Abbvie
View- Website:
- abbvie.com
- Employees:
- 46234
-
Associate Director, Business Information Security | Ot Networks | Legal & Regulatory ComplianceAbbvie Jul 2022 - PresentAssist in the protection and safety of critical business IT assets, including manufacturing OT systems. Define and present cybersecurity KPIs to Senior Business Leaders. Manage the business's cybersecurity risk register. Advise senior business leaders regarding the prioritization of cybersecurity risks and ensure the appropriate allocation of capital. -
Cto, Partner, Co-FounderCanary Cyber Solutions Jun 2022 - PresentRaleigh-Durham-Chapel Hill AreaPartnering with SMBs to secure their business from cyber threats, so they can focus on growing their company. -
Team Lead Manager, Security Engineering | Program Development | Secdevops | Ci/CdNetapp Sep 2020 - Jul 2022Raleigh, North Carolina, United StatesDesign, deploy, and manage a global network of cybersecurity tools to protect the company's critical assets. Manage the team responsible for ensuring that all cybersecurity infrastructure is available and operating at peak efficiency. -
Vulnerability Management Program ManagerNetapp Oct 2018 - Sep 2020Raleigh-Durham, North Carolina AreaEstablished an enterprise vulnerability management program. Created and distributed executive reports and analytics about the company's vulnerabilities and cyber-risks. Instituted new standards and procedures to identify and remediate cyber vulnerabilities across the enterprise, including its data centers, cloud computing, global manufacturing sites -
Senior Manager, Vulnerability Mgmt And Security ArchitectureIngersoll Rand Sep 2016 - Oct 2018Design and deploy an enterprise vulnerability management program that encompasses the company's multiple data centers, globally distributed manufacturing sites, and cloud computing environments. Ensure that the company deployed and maintained NIST CSF and ISO 27001 certifications. -
Vulnerability Asessment And Penetration TesterVan Dyke Technology Group Sep 2014 - Aug 2016Columbia, MarylandPerform vulnerability assessment and penetration testing operations on national security systems within the United States Government (USG), Department of Defense (DoD), and Intelligence Community (IC) classified and unclassified networks.• By emulating Advanced Persistent Threat Tactics, Techniques, and Procedures, provide the customer an in depth look at the effectiveness of their security techniques and procedures• Work with the customer in order to improve their information security posture• Author reports detailing all the security findings during the assessment and present it to the customer
-
Senior Penetration TesterNational Security Agency Jun 2013 - Sep 2014Ft. Meade, MdConduct NSA Red Team operations by providing vulnerability assessments and security evaluations of United States Government (USG), Department of Defense (DoD), and Intelligence Community (IC) classified and unclassified networks.• Accomplished customer requirements by conducting computer exploitation activities that emulate Advanced Persistent Threat Tactics, Techniques, and Procedures• Spearheaded development of new tactics, techniques and procedures during major annual combatant command exercise to support demonstrated impact through interactive hacking scenarios• Team lead for developing new network infrastructure exploitation methods, test and evaluation of commercial computer network operation tools• Developed and engineered a new non-attribution exploitation attack infrastructure• Co-authored final reports for each customer, which advised them on the discovered vulnerability vectors and possible mitigation strategies. -
Nsa Red Team Mission ManagerNational Security Agency 2011 - Jun 2013Ft. Meade, MdDeveloped, trained, and supervised numerous penetration testers while providing command and control over multiple regional level operations.• Engaged in direct coordination and provided any necessary assistance to the customer during each phase of the operation• Identified technological vulnerabilities, potential attack vectors, policy vulnerabilities in the customer network• Authored detailed assessment and mitigation reports for the customer leadership, network management, and network defense personnel• Partnered and providing technical consultations with the customer leadership and network teams, detection and monitoring of malicious activities on the network -
Division Signal Commander (1St Armored Division)U.S. Army Dec 2009 - Aug 2011Wiesbaden Area, GermanyManaged 189 military personnel, 35 civilians, and over 45 million dollars worth of equipment to facilitate the establishment and maintenance of a distributed voice and data communications network• Employed satellite, microwave, radio, fiber optic, and twisted pair transmission mediums for the 1st Armored Division while in a deployed environment• Oversaw the administration of the Multi-National Division Network – Baghdad, which provided network services to over 35,000 customers throughout the central region of Iraq• Managed the operation of the Division’s Communication Security (COMSEC) vault for all cryptographic material up to the Top Secret / Sensitive Compartmented Information (TS/SCI) level• Carefully planned and emplaced over 20 communication extension nodes and ensured that each one met all physical and logical security requirements for each network classification• Developed new procedures for the procurement of equipment, equipment maintenance, individual skill training, and personnel management -
Information Systems ManagerUs Army 2009 - 2010Ft. Gordon, GaDeveloped proficiency on securing information systems, at all classification levels, by applying NSA and Security Technical Implementation Guide (STIG) recommendations •Started a program for the auditing of information system systems across a diverse network environment•Implemented the separation of duties security concept by ensuring that each role and responsibility required for the administration of the network was properly divided amongst different administrators • Focused on the management, risk analysis, and risk mitigation programs• Provided detailed guidance on the proper countermeasure selection, procurement of data redundancy systems, and intrusion detection/protection (IDS/IPS) systems for each network classification level • Analyzed and provided risk mitigation techniques for limiting physical and logical access to DoD Unclassified, Secret, and Top Secret networks and secured facilities -
Department Head Of CommunicationsUs Army 2002 - 2009Multiple LocationsManaged 19 military personnel and 15 million dollars worth of equipment, which provided signal support while in training and deployed environments. • Establish a reliable data and voice communication backbone by employing multiple types of communication systems. • Utilized satellite, microwave, fiber optic, and twisted pair communication mediums, the network provided service to over a 200 square mile area. • Implemented a fully redundant network for the Tactical Operations Center (TOC) in order to ensure that the data and voice communication were available in the event of an unplanned outage or disaster. • Managed and administered the network infrastructure to include 25 servers, 9 routers, and 5 servers. The infrastructure supported the administration of the unit’s Microsoft Active Directory, Microsoft Server Update Services, McAfee Endpoint Protection, and 150 various information systems. • Supervised the implementation of various network services to include enterprise email, centralized network file storage, SharePoint Services, instant messaging, and various real-time military video feeds. • Employed a patch management schedule which guaranteed that anti-virus definition updates and security policies were applied to all information systems. • Established the unit’s COMSEC account and supervised the distribution of all Unclassified, Secret, and Top secret cryptographic material throughout the unit.
Steven Walters Education Details
-
Business Administration, Management And Operations -
Cyber Security -
Bachelor'S Degree
Frequently Asked Questions about Steven Walters
What company does Steven Walters work for?
Steven Walters works for Abbvie
What is Steven Walters's role at the current company?
Steven Walters's current role is Cybersecurity Professional | Chief Technology Officer | MBA| Executive Briefing | Organizational Leader | Strategy & Roadmap Development | NIST 800-53, ISO 27001 | Governance, Risk, & Compliance.
What schools did Steven Walters attend?
Steven Walters attended Unc Kenan-Flagler Business School, University Of Maryland University College, Embry-Riddle Aeronautical University, University Of Maryland Global Campus.
Who are Steven Walters's colleagues?
Steven Walters's colleagues are Ángela Morujo Duarte, Jonathan Perkins, Ben Ellis, Pratima (Patricia) Tamakuwala, Aidan O'shea, Hitesh Sumaria, Sarah Bose.
Not the Steven Walters you were looking for?
-
Steven Walters
Indianapolis, In3gmail.com, yahoo.com, cookmedical.com6 +131794XXXXX
-
-
Steven Walters
Katy, Tx2bytedevelopment.com, onecallcm.com -
Steven Walters
Minneapolis, Mn7aol.com, gmail.com, tmail.com, renterswarehouse.com, renterswarehouse.com, prodigy.net, secondnature.com12 +161253XXXXX
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial