Thomas J. Email and Phone Number
Thomas J. work email
- Valid
- Valid
- Valid
Thomas J. personal email
- Valid
Thomas J. phone numbers
I like Privacy and Cybersecurity.
Oracle
View- Website:
- oracle.com
- Employees:
- 202102
-
Principal Privacy And Security Program ManagerOraclePittsboro, Nc, Us -
Senior Security And Privacy Program Manager, Cloud OperationsOracle Dec 2022 - PresentAustin, Texas, UsServes as organizational spokesperson for strategic initiatives. Advisor to senior management on complex technical security and privacy compliance projects. Provides information security, privacy, and legal requirements for business and product teams. Conducts incident response investigations and plans and develops incident response tabletop exercises. Regularly consults with in-house legal teams to minimize organizational risk as needed. -
Senior Privacy Program Manager, Global PrivacyOracle Jun 2020 - PresentAustin, Texas, UsManaged Privacy Engineering, Incident Response, and Program Management Office Programs. Partnered with cross-functional teams to identify and provide advice and solutions for privacy issues. Developed and strengthened privacy and information governance programs, practices, and procedures. Created, standardized, and automated Privacy Engineering controls into the SDLC process. Consulted on strategic initiatives with business, product, security, and legal teams. Created the Privacy Champions Education and Awareness Program as well as a professional development framework for Privacy personnel. -
Third Party Risk Strategist, CybersecurityTruist Mar 2020 - Jun 2020Charlotte, North Carolina, UsNegotiated terms of Third Party Risk vendor security addendums in Truist Master Service Agreements. Ensured vendor performance with security addendums through the Third Party Risk Management Continuous Monitoring program. Led the Continuous Monitoring Program and presented holistic security risk reports to internal business and technology leaders, on-site audit teams, security and threat intelligence teams, and general counsel. Prioritized vendor engagement by creating quantitative vendor risk profiles that analyze vendor attributes, business relationships, regulatory findings, and published research. Reviewed contracts, on-site compliance assessments, and third party security monitoring events with vendors for accountability and remedial action. Documented vendor security trends for breach of contract and referral to general counsel. -
Virtual Ciso | Threat Assessment ManagerOne Source Communications Sep 2019 - Feb 2020Greenville, Nc, UsEstablished the Threat Assessment Manager program to strategically and operationally evaluate and enhance Managed Security Services for One Source Communications, its customers, and prospective customers.Provided strategic and operational security architectures, strategies, methodologies, and workflows to drive Managed Security Services toward best practice operations and reasonable security standards.Coordinated strategic vendor partnerships to define security service portfolio and its operational capabilities. Assessed customer threat landscapes using threat intelligence resources to identify and mitigate various risks to customers.Security tools included: FireMon, Splunk, FireEye Helix, OpenDNS, Qualys, Cofense/PhishMe, Cisco Meraki, and Palo Alto Firewalls. -
Global Threat Management Lead, CybersecurityMetlife Dec 2017 - Sep 2019New York, Ny, UsConducted direct oversight of global network security by managing cybersecurity implications that included, but were not limited to, strategic initiatives, legal or regulatory obligations, information privacy, policy and standards enforcement, business and infrastructure requirements, and secure configuration of network devices.Established vision and direction for global network security. Was accountable for the overall success of the network security configuration assessment program. Conducted evaluations of network security configurations to determine compliance with published standards and/or regulatory compliance. Developed control standards and procedures that supported global network security.Determined strategic and operational effectiveness for cybersecurity events and whether network security systems performed as expected. Assessed risk level of threats and vulnerabilities relevant to global network security and recommended appropriate mitigating countermeasures.Used defensive measures and information collected from a variety of sources to identify, analyze, report, and mitigate events that occurred, or that might occur, within the global network infrastructure to protect company information, information systems, or networks. Investigated, analyzed, and responded to crises or urgent network security situations when necessary to mitigate threats or potential threats to company information, information systems, and networks.Security tools included: FireMon, Tufin, Splunk, Cisco AMP, McAfee DLP, Tanium, OpenDNS, Qualys, Kenna Security, Cisco ASA, Juniper SRX, Checkpoint, and Palo Alto Firewalls. -
Information Security Specialist: Network SecurityUniversity Of North Carolina At Chapel Hill Oct 2013 - Dec 2017Chapel Hill, Nc, UsArchitected, configured, and deployed the campus firewall infrastructure, intrusion prevention systems, and vulnerability management appliances in a privacy-centric zero trust architecture. Supported security operations, information security projects, compliance efforts, change control, security research, risk analysis, vulnerability testing, auditing, information security systems analysis, and the utilization of a variety of information security and computer forensic investigation tools. Supported the information security liaison community among various other security education and outreach efforts. Authored and assessed RFIs and RFPs for various information technology and security services.Assisted Privacy and General Counsel with respect to incident management investigations and copyright infringements. Led organizational change through creation of team-based operational structure. Developed workflows for incident management triage and assessment. Created Splunk tools for analytics-driven business intelligence and process/workflow efficiency. Published the network security web presence and created tools to streamline customer interaction and management.Security tools included: Tufin, Splunk, Cisco AMP, Microsoft SCEP, Palo Alto Traps, OpenDNS, Qualys, Juniper SRX, and Palo Alto Firewalls. -
Network Security EngineerVerizon Cloud Dec 2012 - Oct 2013Responsible for network security engineering and support for the Computing as a Service (CaaS), IP and Remote application hosting, and Private Datacenter hosting environments. Serves on the Continual Process Review (CPR) Committee as one of two members representing the Global Support Center for Verizon Terremark. This Committee addresses current policy alignment with internal operations, business strategy and objectives, and company integration.Security tools included: Tufin, Splunk, Cisco ASA, Juniper SRX, Checkpoint, and Palo Alto Firewalls.
-
Senior Network Engineering ConsultantRedacted Company Jun 2012 - Oct 2012Provided consultation, guidance, and implementation of IT solutions including but not limited to routing and switching, security, and voice technologies. Sustained efficient and effective customer relationships with clear and effective verbal, and written communication. Maintained thorough documentation that enables and promotes collaborative engineering capabilities, further enhancing customer potential for effective decision-making.
-
Itil Change And Problem ManagerUnited States Department Of Defense Apr 2012 - Jun 2012Washington, Dc, UsServed as the Change/Problem Process Management Officer in the Plans, Architecture, Services, and Operations Branch of the Network Enterprise Center at Ft Bragg NC. Developedpolicy, plans, and procedures for organizational change management. Performed a continuing, detailed and highly technical assessment of performance metrics to identify trends and potential problem areas which require investigation and, possibly, remedial action including systems design or business process change. Provides oversight for the investigation of major incidents, and conducts follow-up analysis to ensure that corrective actions are effective in resolving immediate issues and preventing reoccurance. -
Director Of Plans And Programs (Scx)United States Department Of Defense Jan 2011 - Apr 2012Washington, Dc, UsProvided direct management for three departments (Training, Communications Security, and Project Management) and indirect management of six departments (Network Infrastructure, System Administration, Records and Retention, Help Desk, Radio Services, and Aircraft Ground Communication Systems) with a total of 42 direct and indirect reports.Outlined and released project initiatives for completion. Supervised contractor accountability on project productivity and quality. Projects included technology refresh cycles, infrastructure upgrades, systems migrations, upgrading and implementing IT service offerings, and BRAC communications integration with Ft Bragg. Conducted feasibility studies to identify and analyze network failures and improve IT systems. Analyzed LAN/WAN utilization statistics, evaluated network systems requirements, coordinated LAN installation, and ensured vigorous application of information security/information assurance policies in the delivery of network services. Additional duties: Unit Antiterrorism Officer, Alternate Base Information Security Manager, and Alternate Base Emissions Security Manager. -
Senior Network Analyst | Site LeadUnited States Department Of Defense Jul 2010 - Dec 2010Washington, Dc, UsDefined network communications and designs and implements solutions within existing networks. Evaluated and reports on new communications technologies to enhance the capabilities of the data network. Worked under consultative direction towards predetermined long-range goals and objectives. Developed advanced technological ideas and guides their development into a final product. Work checked through consultation and agreement with others, rather than by formal review of superior. Served as organization spokesperson on advanced projects and/or programs. Acted as advisor to management and customers on advanced technical research studies and applications. Worked on unusually complex technical problems and provides solutions which are highly innovative and ingenious. -
Network AnalystUnited States Department Of Defense Nov 2009 - Jul 2010Washington, Dc, UsResponsible for the operations and sustainment of the Tier-2 U.S. Air Force classified (SIPR) and unclassified (NIPR) enterprise network infrastructure. Environment encompasses the Global Command and Control Communications for the Air Force provisioned portion of the Global Information Grid, Air Force Network Operations (AFNetOps), and Joint Task Force – Global Network Operations (JTF-GNO). Responsibility includes full spectrum management and defense for 4 Major Commands encompassing 65 bases, 325,000 personnel, and more than 100 Million dollars of equipment.Daily operations occurred within a classified sensitive compartmented information facility (SCIF) and cannot be disclosed.Security tools included: Cisco ASA and VPN client product stacks. -
Research AssistantUniversity Of North Carolina At Chapel Hill Sep 2008 - May 2009Chapel Hill, Nc, UsResponsibilities include management of campus wireless infrastructure, specifically wireless location appliances. This includes over 1,200 wireless access points distributed across 200 buildings used for asset tracking, asset recovery, and physical location of rouge wireless devices that disrupt campus infrastructure services. -
Technical Services EngineerCisco Systems Jul 2005 - Jun 2008San Jose, Ca, UsManaged Field Engineers to resolve live customer network outages. Resolutions involved troubleshooting production networks, service restoration, and subsequent root cause analysis of hardware or configuration errors. Support provided for all product lines from access routers and switches, to Gig/Switch Routers (GSR’s), Content Engines, Adaptive Security Appliances, Wireless appliances, Voice and Telepresence Systems. Direct interaction with customer Network Operation Centers, Field Engineers, and Telco’s were common and paramount in customer restoration. -
Network Infrastructure Systems TechnicianUs Air Force Reserve Jun 2000 - Jun 2006Robins Afb, Ga, UsNon-Commissioned Officer (E-5) with functional role of systems and network administration specializing in fixed and mobile network infrastructure and communications packages (e.g. TDC/ICAP). Duties included supervision, guidance and mentorship of subordinates, and oversight of subordinate training. IT Management to include classified and unclassified networks. -
Assistant Systems AdministratorUniversity Of North Carolina At Chapel Hill Apr 2005 - Jul 2005Chapel Hill, Nc, Us-Managed department Active Directory tree with roaming profiles.-Hardware maintenance, troubleshooting, and upgrades of lab and faculty computers.-Windows XP SP1/SP2 domain. -
Computer ConsultantUniversity Of North Carolina At Chapel Hill Sep 2003 - Apr 2004Chapel Hill, Nc, Us-Primary responsibility included direct support for the Deans Suite.-Secondary responsibilities include upkeep of specialty computer rooms, and lab rooms. -Maintained current software images, monitor statuses of peripheral devices, and provide secondary support to help desk personnel.-Support Windows 98, 2000, and XP operating systems. -
Computer ConsultantUniversity Of North Carolina At Chapel Hill Aug 2002 - Aug 2003Chapel Hill, Nc, UsWalk-in support to a customer base of 30,000 people. Near three year tenure allocated between 3 departments within the University. Primarily a desktop support environment with supplemental systems administrator duties. -Computer consultant for Walk-In services providing support for a network of 30,000 Faculty, Staff, and Students.-Troubleshot: hard drive recovery, password resets, data recovery, networking consultation, software installation, e-mail and internet configuration, and virus removal. -Supported Windows 98, 2000, and XP operating systems.
Thomas J. Skills
Thomas J. Education Details
-
Wake Forest University School Of LawLaw -
Wake Forest UniversityCybersecurity -
U.S. Army Military Police SchoolAntiterrorism -
Syracuse UniversityInformation Systems And Telecommunications -
University Of North Carolina At Chapel HillInformation Science
Frequently Asked Questions about Thomas J.
What company does Thomas J. work for?
Thomas J. works for Oracle
What is Thomas J.'s role at the current company?
Thomas J.'s current role is Principal Privacy and Security Program Manager.
What is Thomas J.'s email address?
Thomas J.'s email address is ci****@****tcm.com
What is Thomas J.'s direct phone number?
Thomas J.'s direct phone number is +141787*****
What schools did Thomas J. attend?
Thomas J. attended Wake Forest University School Of Law, Wake Forest University, U.s. Army Military Police School, Syracuse University, University Of North Carolina At Chapel Hill.
What skills is Thomas J. known for?
Thomas J. has skills like Security, Networking, Network Security, Troubleshooting, Cloud Computing, Network Administration, Firewalls, Information Technology, Project Management, Information Security, Switches, Information Assurance.
Who are Thomas J.'s colleagues?
Thomas J.'s colleagues are Muhammad Umair Hassan, Petar Milosavljevic, Collins Tui, Paresh Thakar, Belén Otero García, Shreya N Naik, Bhupinder Singh.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial