Tony G. work email
- Valid
- Valid
Tony G. personal email
- Valid
- Valid
- Valid
I do not use LinkedIn for soliciting nor sales functions. Vendors and third parties attempting sales should contact supply chains. The views and comments reflect my personal views and my years of observations as well as experience. No one entity is referenced in my posts. Cyber Security-24+ years Expert in full cybersecurity program design, implementation and direction. With proven results in building holistic teams and creating/directing IT & OT programmatic approaches that focus on key strategic elements such as: • Policy and standard management and generation aligned to industry-leading frameworks / practices (NIST CSF, SOX, COBIT, IT/OT Hybrid frameworks, etc.). - 17 years • Develop and apply models to enterprise cybersecurity programmatic design and implementation• Measure, Assess, and Plan (MAP) for programmatic / governance enablement (30-60-90 Planning Enablement)• Design cybersecurity capability management modes with a focus on profitability• IT and OT Network and Endpoint hardening sub-programs & practices (to include plan, do, check, act lifecycles)• Creating, directing, and managing end-to-end IT and OT Risk Management programs (Qualitative and Quantitative)• Industry 4.0 / Digitization, Digitalization, and Digital Transformation• Personnel Capability Management Models (PCMM) to build world class cybersecurity teams integrating enhancements by adoption of frameworks like NIST NICE.• Leverage a people, processes, and technology integration and business process enhancement approach.Advanced Cybersecurity Architecture & Engineering Management / Performance (SABSA Aligned) – 15 years• Systems of Systems Engineering of diversified security technology – 18 yearsHolistic planning and direction of CSOC Planning, Implementation, and operations – 14 Years• Forensics Investigations & Vulnerability Management - 11 years Military Service-US Army | Honorable Discharge FCC Licensed | KG5ETS | Radio Frequency ExpertiseInternational Society of Automation Member Cyber Security Standards Generation-ANSI/IEC/ISA 62443 / instructor
-
Manager, Ot Cybersecurity SocCenterpoint EnergyMaumee, Oh, Us -
Energy Portfolio Technical DirectorIdaho National Laboratory Jun 2023 - PresentIdaho Falls, Id, UsOperate as senior technical oversight directly interfacing and supporting the portfolio, program, and project managers to ensure synergy drives compounding return on security investment for industry but also return on investment for federal sponsor(s).I create, expand, and interlace programmatic approaches through my 26 years of experience and discover new methods to optimize the technical capabilities across several millions of dollars of sponsored OT Cybersecurity focused activities. -
Technical Relationship ManagerIdaho National Laboratory Jun 2022 - PresentIdaho Falls, Id, Us -
Ot/Ics Cybersecurity Coordinator (Volunteer)Hou.Sec.Con Oct 2022 - PresentHouston, Tx, Us -
Board MemberLucius Seneca Wellness Group Apr 2014 - PresentThe LSWG is 501(c)(3) under section 170 non-profit.The goal of our organization is to make available unique literature, specifically developed for the needs of veterans and their families, Web Podcast episodes mirroring the topics included in the literature, and access to a software analysis tool intended to enhance the effectiveness of traditional talk therapy.Our methods are designed to complement professional behavioral health treatment plans. We are retired veterans and spouses who care about the mental health of this nations veterans and their families.You can contact us at info@luciussenecawg.org. Please investigate the website also at www.luciussenecawg.org.Please consider becoming a corporate sponsor or donating to our cause. Interested corporate sponsors can email sponsorship@luciussenecawg.org
-
Enterprise Ot Cybersecurity ManagerMarathon Petroleum Corporation Nov 2018 - Jun 2022Findlay, Ohio, UsManage all cybersecurity aspects of over 500 ICS / OT environments of varying types.Direct, subject matter expert, and oversee:• All risk assessments, POA&M Generations, and remediation efforts -Align risk assessments with process hazard assessments for real world affects• Programmatic design, implementation, and executive alignments• Threat and Vulnerability management of ICS / OT environments• Penetration testing of ICS / OT Environments• Support Model sustainment to accommodate business needs and OT environments• NIST NICE Alignment for enabling personnel capability management • NIST CSF and NIST 800-82 integration into differing types of OT environments• Project management of large complicated projects distributed across large geographical areas• Created and implemented an SABSA aligned programmatic approach to streamline OT Cybersecurity architecture and engineering efforts in OT environments. This establishes effective ownership, VIA RACI-V and other management tools, as well as substantiates ROSI. The process ensures alignment across the entire Cybersecurity department as well as non-Cybersecurity, business unit, alignments.• Business Change Champion for greater implementation of Cybersecurity• Alignment of cybersecurity to business strategies, goals, and objectives -
Sr Cyber Security ArchitectMarathon Petroleum Corporation Jul 2018 - Nov 2018Findlay, Ohio, Us -
SergeantTexas State Guard Sep 2016 - Feb 2018Austin, Texas, UsProud member of the Texas State Guard. -
Co-Founder & Principal Cyber Security Sme (It/Ot/Ics)Red Trident Inc Jun 2015 - Sep 2017Houston, Tx, UsRed Trident INC is the manifestation of a multi-year idea that has the support of a very large partnership network of small, medium and large (Fortune 100 and 500) sized businesses.These partnership networks functions as an enabler to support a broader client base but also enable our delivery of superior solutions and services to clients.We are focused on market verticals where technology can be leveraged to establish or improve an organizations or companies security posture. Those verticals that have a direct contribution to public safety, economic health or national security are of special interest to us. We are a Disabled Owned Business that takes safeguarding our country to absolute heart.Leverage frameworks such as Nominal Group Technique, Decreasing Options, and other group leadership techniques to effectively lead or manage groups.Subject matter expertise in the designing, implementation, and/or sustainment of cyber security architectures in IT and ICS/OT environments.Routinely perform thought leadership or service fulfillment in vulnerability assessments, risk management, incident management, network security, host security, as well as building and implementing comprehensible governance models and cyber security programs. -
Director Of Cyber SecurityCimation May 2014 - May 2015• Developing long-term plans to accomplish strategic objectives for dynamic ICS Cyber Security solutions• Maintains and improves the effectiveness of the company’s ICS Cyber Security Services• Develops and implements critical success factors and operating plans for service delivery to clients.• Creating and Implementing a Business Plan / Strategy for the ICS Cyber Security Market• Streamline services to dynamically shift to evolving client environments• Services integration with product development to provide scalable and robust ICS Cyber Security solutions.• Ensuring that each ICS Cyber Security Service adheres to a Defense-In-Depth Philosophy• Leveraged Industry Standards such as but not limited to NIST 800-82, ANSI/IEC/ISA 62443 for road mapped approaches to implementing cyber security.• Built a comprehensive IT and OT Cybersecurity Practice
-
Team Manager (Sr Ot Security Arch / Engineer)Enterprise Products Oct 2012 - May 2014Houston, Texas, Us• Scored 89% compliance with emerging Department of Homeland Security ICS Standards• Designed and implemented a centralized monitoring system• Administrative leadership responsibility of Jr and Sr Cyber Security Engineers and Analysts• Responsible for 2013 over 5 million dollars of cyber security projects• Over approximately 40 million dollars of ICS projects reliant upon my implementation plans• Approximately 20 million of daily revenue generation dependent upon my coordination• Cyber Security Strategy and strategic portfolio management of cyber security and ICS Services• Collaboration and project management portal creation for implementation efficiency• Thought Leadership in dynamic SCADA / ICS architectures• Program development and implementation strategistTo accomplish this task, I govern a team of network/security engineers to ensure projects executed within compliance with authorized architectures and/or policies.To ensure that PLCs and HMI Computer systems can communicate I configure and approve changes to Cisco ASA Firewalls, Catalyst Switches and 3750 Router/Switches. I have experience in administration VIA a Cisco Security Manager but prefer the command line interface for some activities.I have developed an ICS framework based on NIST, COBIT and other industry standards for developing a security architecture for safeguarding the critical infrastructure of plants and pipelines.Identification of and development of mitigations to threat vectors is a primary responsibility of mine as it applies to the deployed architectures that are resident in the business units. I use various open source tools to accomplish this as well as industry standard tools.As an industry first I have engineered and integrated a Security Information & Event Management system into the ICS environment where it relied upon as an essential initiation tool to the incident response process. -
Sr It Security EngineerDynegy Oct 2011 - Sep 2012Irving, Texas, Us• Architectural Management for electric generating facilities.• Budgetary planning and program financial forecasting needs for the cyber security program• IT Security Roadmap development and strategic implementation • Program governance development for IT Security Initiative • Large implementation of central log management and security correlation for ICS environmentsI was a Systems of System IT Security Engineer that has responsibilities for the sustainability of a Intrusion Prevention Systems, capable SIEM, various network forensic tools, compliance automating technologies, and other IT Security tools in an effort to ensure a dynamic IT Security posture.I was also responsible for the operating procedures and IT Security program strategy of the organization. This entails ensuring methodical practices are in place to ensure operational efficiencies which contribute to a highly responsive IT Security program. -
Info SecNasa - National Aeronautics And Space Administration Jul 2010 - Apr 2011Washington, Dc, Us• Information security officer with responsibilities overseeing $300 Million of contracted projects.• Project Manager of Top Secret department of defense programs.• Oversight of 23 Cyber Security professionals and approximately 45 indirect reports. • Cyber Security Engineering Program design and implementation • Composition of Request for proposals and solicitations for contracts• Information Systems Security Officer (ISSO)• Organizational Computer Security Officer (OCSO)• IT Projects Management• IT Security Engineering -
It Security Operations ManagerNasa - National Aeronautics And Space Administration Feb 2009 - Jul 2010Washington, Dc, UsMEI Technologies, Inc.• Business Development and final award of a $200 Million Dollar Contract that supported 300 full time contracted positions.• Supervisor and Manager of the Johnson Space Center Cyber Security Program• Designed and implemented the Cyber Security Program• Systems of Systems engineering for cross hardware operation• NASA Operations Manager (contractor), I am responsible for overseeing the strategic planning, tactical planning, and operations of the tier three Johnson Space Center NASA Information Technology Security Group. I coordinate between the various IT Security departments to ensure that a unified approach is taken and that projects are executed with maximum resource utilization in a time efficient manner. I oversee the IT Security engineering of the responsible network to ensure consolidation of IT Security related equipment occurs and that the current threats are met.My duties at the Johnson Space center includes coordinating the implementation of IT security programs across diversified platforms, establishing IT vulnerability reporting criteria, evaluating IT security incident response policies, identifying the need for IT security changes based on new technologies or emerging threats, instituting measures to ensure IT security awareness/compliance, reviewing proposed new systems/networks/software for potential IT security risks, information technology project management, and / or resolving IT integration security issues.I have managed and presently oversee the management of the intrusion detection systems (IDS), intrusion detection and prevention (IDP) systems, Consolidating Logging and Analysis equipment and processes, Host based and Network Based Forensics, Vulnerability discovery and mitigation tools or processes and other equipment relating to the successful governing of information technology security.I adhere to the ISC(2) standard and other NIST guidance for IT Security practices. -
Electronic Warfare Program ManagerMantech International May 2005 - Dec 2008Herndon, Virginia, Us• Revitalized a inhibited Department of Defense program that cost human life for a geographical area of South West Asia to one of the most efficient in any country• Program design and implementation manager of a multiple billion dollar DOD program• Governance and Program Implementation for Electronic Warfare Program• Utilized team building concepts to understand personality traits and for unit cohesion• Contract key person for responding to renewal solicitation and developed an winning response• Technical program evolution plan to meet evolving technologies utilized by insurgent forces• 31 million dollars of classified government equipment with 100% accountabilityI governed the shop that was directly related to the fielding of Counter radio controlled improvised explosive device (RCIED) systems. This entailed ensuring sound project plans were created, time lines are made, and property accountability of over 31 million dollars of classified equipment or resources was accomplished. To assist with this I utilized Microsoft Project and other tools to track or update the customer on the active project. Any project deviations that occurred were always done so with little impact to the client, detailed quality assurance checks were performed to address any concerns from the military fielding entity before they arrived. This quality assurance action provided higher levels of performance from the actual shop, and provided professional as well as personal guidance to the civilians assigned to the shop.I was awarded several certificates of appreciation from multiple government organizations for outstanding and professional services. Likewise, I have been awarded several coins of achievement from various organizations for the same work ethics. Reviews have brought to light that the FOB Warrior system of governance is one of if not the best system in South West Asia. -
Crypto Engineer / It AdministratorCimarron Software Feb 2004 - Apr 2005Houston, Texas, Us• Cost Analysis of classified projects and feasibility studies of technological solutions.• Implemented management, automating and encryption programs for multiple million dollar prototype equipment and initiatives • Team member technical and professional development initiativesWhile employed with Cimarron at NASA I quickly became the Sr. Linux administrator for a set of classified servers. On a day to day basis I performed basic to advanced administrative tasks. I designed and implemented a training program to familiarize technicians with the RedHat operating system. I oversaw and gave training to these technicians in the areas of installation, configuration, and maintenance. This was extremely beneficial to the support of the shuttle and space station by yielding technicians that can go far beyond the day to day operations of these systems. -
SoldierUs Army 2000 - 2004Arlington, Virginia, Us• ComSec & Electronics Engineer that troubleshoots to component level faults• Squad Leader and highly competent in leading US Army soldiers • Designer and implementer of a division wide database for tracking personal information of soldiers deployed in Iraq. Responsible for 17 Million in Personnel equipment• Information Assurance Security Officer for a large organization in the US Military • Planned and implemented an IT Security program customized for non-deployed assets while stationed at FT Hood TX. -
Network EngineerLouisiana Sheriff'S Office May 1997 - Dec 1999Assisted in the establishment of the Automated Finger Print Identification SystemEstablished and supported Local Area Networks for various small sheriff departments.Tier 1 IT Support
Tony G. Skills
Tony G. Education Details
-
University Of PhoenixGeneral -
Us ArmyComsec / Electronics
Frequently Asked Questions about Tony G.
What company does Tony G. work for?
Tony G. works for Centerpoint Energy
What is Tony G.'s role at the current company?
Tony G.'s current role is Manager, OT Cybersecurity SOC.
What is Tony G.'s email address?
Tony G.'s email address is tj****@****ail.com
What schools did Tony G. attend?
Tony G. attended University Of Phoenix, Us Army.
What are some of Tony G.'s interests?
Tony G. has interest in Hippa, Computer Security, Industrial Control Systems, Scada, Medical Cyber Security, Electronics Engineering.
What skills is Tony G. known for?
Tony G. has skills like Information Security, Security, Computer Security, Vulnerability Assessment, Information Assurance, Network Security, Intrusion Detection, Information Technology, Information Security Management, Networking, Ips, Ids.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial