Tim Kramer

Tim Kramer Email and Phone Number

Director - Senior Lead Engineering Manager | Cloud Security | Container Platform Cloud Service Manager | Platform Engineering Manager | Hybrid Cloud | Cloud Cost Save @ CME Group
Tim Kramer's Location
Greater Chicago Area, United States, United States
Tim Kramer's Contact Details

Tim Kramer personal email

n/a
About Tim Kramer

Email: tkramer@timtech.comProven technology expert with Security/Cloud management and long term IT skills, fuses knowledge of current technology with customer and peer focused support to deliver solutions and solve quick turnaround situations. Enterprise level engineer with strong abilities to collaborate with team leaders, engineering teams, and internal customers, in addition to partners and vendors, supporting multi-site, national and international operations. Detailed technical knowledge of operating system security. Oversee security systems, firewalls, intrusion detection systems, content delivery networks, DNS, web application firewalls, anti-virus software, authentication systems, log management, and content filtering (proxy servers). Develop technical solutions and new security tools to mitigate security vulnerabilities and automate repeatable tasks. Proven problem solving skills and ability to work under pressure. SkillsSecurityRed Hat / CentOS Linux EngineeringKubernetes platform as a service - Red Hat OpenShift / AWS EKSTeam ManagementInfrastructure as a Service (IaaS) – Amazon AWS, RackSpace, OpenStackContainersVirtualization – VMWare / KVMElastic ComputeCloud ImplementationStrategic RoadmapsTechnology Roadmaps

Tim Kramer's Current Company Details
CME Group

Cme Group

View
Director - Senior Lead Engineering Manager | Cloud Security | Container Platform Cloud Service Manager | Platform Engineering Manager | Hybrid Cloud | Cloud Cost Save
Tim Kramer Work Experience Details
  • Cme Group
    Mgr Security Engineering - Cyber Defense Engineering
    Cme Group Aug 2024 - Present
    Chicago, Il, Us
    Execute a pivotal role in protecting and defending the nation’s critical infrastructure.Lead a team of engineers of the Perimeter, Network & System Cyber Defense Engineering Tower responsible for the following solutions, including but not limited to, File Identity Monitoring solution (FIM), Security Information and Event Management (SIEM), User and Entity Behavior (UEBA), and Cloud Security Logging and Monitoring.Position Responsibilities:This position will provide direction and guidance to the development, configurations, and architecture of the cyber defense technologies that the team is responsible for.You will participate as an SME and/or Mentor within the cyber defense engineering team for multiple tools \ solutions for both on-premises and cloud resources.Implement cyber defense solutions and lead the overall cyber defense engineering team in accordance with CME’s CyberDefense Roadmap.Manage projects according to project plans with a keen eye to objective delivery, cost adherence and minimizing risk.Advanced understanding and awareness of the cyber defense product landscape, emerging and rising threat landscape and the latest/newest protocols/techniques/evolution in cyber security.Create complete Service Designs including, but not limited to, Technical Requirement Documents, Proof of Concept use cases, Technology Architecture/Engineering Documents, Service Operations Guides, etc…Position Requirements:7+ years in IT Engineering, and\or CyberSecurity Engineering, 4+years in a leadership role.Solid working knowledge of ITILA solid understanding of Industry Security standards.Specific expertise in: SIEM, Log Management, and User Behavior Analytics.Experience building scalable Cyber Defense solutions in various Cloud Platforms.Advanced technical experience with Linux operating systems.Exceptional interpersonal skills; must build strong relationships with partners.Proven execution capabilities.
  • Tiaa
    Director - Senior Lead Engineering Manager - Container Platform Cloud Services
    Tiaa May 2018 - May 2024
    New York, Ny, Us
    TIAA, formerly TIAA-CREF, is a Fortune 100 financial services organization that is the leading provider of financial services in the academic, research, medical, cultural and governmental fields.Architect and manage the engineering of the firms Red Hat OpenShift, Tibco Silver Fabric, and AWS EKS cloud platforms.Docker containers with KubernetesIdentify, design and implement flexible, responsive, and secure technology platforms focused around IaaS and PaaS platforms.Conduct technology assessments to validate an enterprise baseline and establish a technical direction.Coordinate, direct, and co-architect between various technology teams.Advise management of enterprise PaaS solutions that include, risk, cost and benefits analysis along with other impacts to infrastructure solutions.Set technical standards for cloud infrastructure, security baselines, policies and procedures.Develop and document infrastructure support policies and guidelines.Monitor trends and recommend future architecture strategies and roadmaps.Educate and mentor technology support staff as needed, including requisite training on technology and governance.Research and stay current on infrastructure best practices and function as a subject matter expert.Cloud Native applications: Prometheus, Grafana, Karpenter, Ansible, Kong, ISTIO, and Kiali.Security: Twistlock, Sysdig Secure, OpenScap, Kyverno, Venafi, Microsoft MFA, and CyberArk.Monitoring: Splunk, AlertMonitor, Advanced Cluster Manager, Sysdig Monitor, and Dynatrace.GitOps: ArgoCD, Git, and Jenkins.Cost: Aptio Cloudability, Cloud Health, and Red Hat Cost Operator.AI/ML: Domino and Starburst.
  • Vail Systems
    Director Of Systems Engineering
    Vail Systems Jun 2017 - May 2018
    Chicago, Il, Us
    Manage the Platform Operations team, responsible for managing production Linux servers that are part of a 24x7 carrier-grade voice platform. This includes patching, OS upgrades, maintenance, application/platform deployments, tier II and III trouble-shooting and issue escalations, on-call teams, etc. CentOS 7, Docker, and Kubernetes.Operationalize new application and platform components, infrastructure, and critical systems.Create and maintain system administrative documentation and procedures.Work with other departments on collaborative efforts and to facilitate requests that require participation of the Platform Operations team.Participate on project teams in delivering and designing solutions.Troubleshoot problems with Linux Servers that are part of the 24x7 carrier-grade voice platforms (sometimes in customer facing situations).Oversee system performance, capacity planning, etc.Maintain compliance with security standards such as PCI and HIPAA.Work with vendors for solutions to issues with third party applications.Utilize agile tools such as JIRA to lead projects and manage operational workloads.Evaluate new technologies and solutions. Develop migration strategies when switching to new technologies.Ensure SLA compliance.Hire and train staff.
  • Conversant Llc
    Systems Engineering Manager
    Conversant Llc Nov 2015 - Jul 2017
    Chicago, Illinois, Us
    ~5,800 bare metal serversEight separate businesses merging to create a unified environmentAll co located in low latency data centersStandardizing to one deployment tool and configuration management (Foreman and Puppet)Storage by Netapp and Gluster.Highly available with LVS and NetScalersMore transaction per day than the New York Stock Exchange.Single sign on for SOX compliance with FreeIPA.Testing Docker containers for higher density of application stack per server.Virtualization for development on oVirt and soon to be decomed OpenStack.Amazon AWS for locations where the governments make it hard to deploy servers.
  • Rovi
    Senior Cloud Security Architect
    Rovi May 2014 - Jul 2015
    Securing a hybrid OpenStack cloud while lead moving it to a full public cloud.(Amazon AWS, RackSpace, OpenStack, OpenShift, VMware ESX, Google Compute Engine and Mirantis)Responsible for security direction and implementation of current and future Cloud offeringArchitecting and lead implementing local OpenStack Cloud to public OpenStack Cloud providerMonitoring tools used for the IaaS layer and within the guest OS for maintaining security (Nagios)Defining services moved to DMZ and their protection for hybrid cloud modelDefine security risk levels for each server instance in the public cloud designed never to be viewed by publicAssure Personally Identifiable Information (PII) is placed in the proper area and secured as defined by International laws and product requirementsDesign and implement zero downtime rolling deployments (Red/Black Push and Rolling Upgrade)Compare public IaaS providers and their security policies to see which best matches the corporate policiesPerformance sizing and troubleshooting for scaleMigrate instances to free up local hardware to be repurposedMaintained authentication of users to the IaaS for both local and public OpenStackCreated Product Backlog Items (PBI's) that are security related for Devops team to implementCreate additional network monitoring checks (Nagios and Zabbix) to assure the monitoring dashboard contains live security issues such as patch updates, if IPTables is working properly, SCAP reporting, etcDefined rolls and responsibilities for Devops team (moving from an old operations model)Managed creation and migration of hybrid Cloud for public data access within the corporate firewallencompassing the following protocols: VPN design from within the corporation to the public cloudProtocols utilized on the data flow diagrams and how are they hardened / removedCloud providers: Amazon Web Service (AWS) RackSpace OpenStack
  • Red Hat
    Managing Principal Architect - Openshift Cloud Security Lead
    Red Hat Oct 2001 - May 2014
    Raleigh, Nc, Us
    Responsible for OpenShift’s online information security and threat response in Amazon AWS.Created and implement Security Policy for OpenShift PaaSSecOpsPuppetGitLead the Security Response Team and external users/vendors to close issuesOpenShift security liaison to legal teamTeam lead for crisis security responsesEngineering and implementing code to ensure services are secure and usable – encryption protocols, keys, etcPerform code reviews before taking code public and also open sourcePerform penetration testing and vulnerability assessments and process found issuesManage security controls and applications with configuration management tools (puppet)Validate SELinux, IPTables, cgroups and polyinstantiation to protect user’s environmentAudit infrastructure, software stack, and configuration to prevent and correct vulnerabilitiesRespond to, and remedy security vulnerabilities, bug tracking, risk assessment, and remediationIntegrate emerging security technologies with automated operationsDevelop and operate infrastructure for high-volume auditing and logging of internal systemsImplement HTTP Strict Transport Security (HSTS) on OpenShift.com as well as maintain the Chromium whitelistGenerated Cloud Security Alliance STAR creation and submissionCollaborate with customers and partners to generate understanding of OpenShift’s security modelManage users to the Terms of Service including removing users and their applicationsProvided guidance and mentoring to engineering teamsLead and implemented compliance with industry certifications and standards such as ISO 27001, PCI-DSS, and HIPAAMaintain rhcloud.com on the Public Suffix ListSupport OpenShift project by providing community outreach via blogs and IRCManaged a group of security focused consultants
  • Ubs
    Red Hat Consultant - Linux Engineering
    Ubs Feb 2005 - Aug 2011
    Zurich, Ch
    On site Red Hat Consultant for Linux EngineeringDesigning, developing, and implementing highly scalable infrastructure solutions for the Red Hat Professional Consulting Service group with both open source and closed source products. Infrastructure solutions including load balancing, scientific clusters, high availability service fail over, multi-path disk, virtualization, stateless computing, Network Attached Storage (NAS) and Storage Area Networks (SAN) integrating with all other platforms (mainframe, midrange, and lower tier servers). Designed VMware ESX 3.5 common builds with PXE and Kickstart to support over 4,000 virtual Extended the common bare metal RHEL3 and RHEL5 builds to work in the VMware 3.5 and ESX 4i infrastructure implementing proper VM Tools to match the hypervisor and building preferred device drivers into the install ram disk (pvscsi, vmxnet3, etc). Created the template RHEL3 and RHEL5 builds to be deployed via an automated tool. This uses the VMware Developer tools to script the API for creating the virtual machine container resources and stage the virtual machine. Created Autobuild, a tool that takes the latest RHEL bits from RHN Satellite, hardware vendor applications, third party applications, along with the customers custom configurations and have it automatically create a build every night that gets staged and automatically tested. Reducing the amount of man hours required to create fresh custom builds with a high level of assurance that the build was tested. This was created with CVS / Subversion, Perl, Python, and lots of BASH in a chrooted environment. Assisted creating the P2V process and tools to live migration of all RHEL to an ESX 4i environment.Assisted creating the V2V process and tools to migrate virtual machines from ESX 3.5 to ESX 4 utilizing the VMware APIs to create the containers with the updated hardware types.Created unit tests to support the work engineered for automated test harness.
  • Va Linux Systems
    Professional Consulting Director Of Information Security
    Va Linux Systems Jun 2000 - Oct 2001
    Us
    Securing the .com Linux world.Engaged with high level customers (CIO’s, CFO’s and CTO’s) to design, develop and architect complete IT solutions 
Designed, developed and implemented the security product offering for the Professional Services group 
Managed a team of security focused infrastructure engineers including all levels of employee care
Managed research and development budget to profit and losses
Analyzed merger and acquisitions for feasibility
Maintain 60% billing utilization to customers
  • Allstate
    Consultant Of Information Security
    Allstate 1999 - 2000
    Northbrook, Il, Us
    Internet information securitySecurity team for Extranet, Internet, and Intranet networks including Windows, Unix, IBM midrange (AS/400), and IBM mainframe (S/390)
System penetration testing (ethical hacking) with various tools, vulnerability scanners, command line utilities and knowledge learned from published exploits
Enterprise risk assessment
Audit network security policies and procedures
Computer incident response team (CIRT)
Management of intrusion detection systems (IDS)
Create detailed documentation including security policies and procedures
Evaluation and recommendation of tools to be used by security practice (audit compliance, PKI, etc)
  • Eds
    Sr Consultant
    Eds 1994 - 1999
    Houston, Texas, Us
    Management consulting along with technical delivery.
  • Value Behavioral Health
    Regional It Manager - Business Systems Manager
    Value Behavioral Health 1990 - 1994
    Managed three office locations of all technology including local information technology staff
  • Preferred Health Care
    Business Systems Manager
    Preferred Health Care 1990 - 1994
    Preferred Health Care became Value Behavioral Health

Tim Kramer Skills

Virtualization Cloud Computing Linux Unix Security High Availability Red Hat Linux Shell Scripting Information Security Enterprise Architecture Open Source Redhat Network Security Cloud Security Infrastructure Bash Solaris

Frequently Asked Questions about Tim Kramer

What company does Tim Kramer work for?

Tim Kramer works for Cme Group

What is Tim Kramer's role at the current company?

Tim Kramer's current role is Director - Senior Lead Engineering Manager | Cloud Security | Container Platform Cloud Service Manager | Platform Engineering Manager | Hybrid Cloud | Cloud Cost Save.

What is Tim Kramer's email address?

Tim Kramer's email address is tk****@****hat.com

What is Tim Kramer's direct phone number?

Tim Kramer's direct phone number is +140843*****

What skills is Tim Kramer known for?

Tim Kramer has skills like Virtualization, Cloud Computing, Linux, Unix, Security, High Availability, Red Hat Linux, Shell Scripting, Information Security, Enterprise Architecture, Open Source, Redhat.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.