Tom Morabito Email and Phone Number
Tom Morabito work email
- Valid
- Valid
- Valid
Tom Morabito personal email
- Valid
Tom Morabito phone numbers
Experienced Information Security professional with an active top secret clearance and over ten years of experience including seven years in security and two years of Project Management. My experiences include managing and training personnel, leading enterprise-wide migration projects as well as protecting the confidentiality, integrity and availability of fellow employee's and customer's information. I have obtained the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH) certifications and have a solid understanding of security issues, concepts, tools and techniques. My strong technical skills are supported by excellent communication, time management and an eagerness to learn new skills.Specialties: Platforms: Windows 9x/NT/2000/XP/Vista/7/Server 2003/Server 2008, LinuxTools: Host-Based Security System (HBSS), McAfee E-Policy Orchestrator, Microsoft Project, McAfee Intrushield, Enterasys Dragon, Wireshark/Ethereal, RSA Network Intelligence, ISS SiteProtector, Symantec Vontu, VMWare, SQL Server 2005, SQL Server 2008, Microsoft Word, Excel, Powerpoint, Outlook, Access, OneNote, SharePoint, OSI Model, IP, TCP/IP, Active Directory, Nagios
Teksynap
View- Website:
- teksynap.com
- Employees:
- 289
-
Program ManagerTeksynap Jan 2022 - PresentColumbus, Ohio, United States -
Program ManagerNes Associates, Llc Oct 2013 - PresentColumbus, Ohio AreaProgram Manager responsible for the planning, development and sustainment of the Host-Based Security System (HBSS) solution for the Department of Defense's (DoD) Defense Logistics Agency (DLA). Direct team of 9 information security specialists providing supervision for information risk management, audit and compliance, operations and incident response. Coordinate change requests and newly released requirements with government personnel for awareness and approval. Create project plans and present status updates to senior management, contract stakeholders and end users. Created a Document Management System in order to create a controlled way to manage document creation, publication and revisions. -
Senior Information Assurance EngineerNes Associates, Llc Nov 2012 - Oct 2013Columbus, Ohio Area•Create project plans for deployment of new software modules and hardware tech refresh•Create SQL queries to manipulate data within the McAfee database due to limitations within the application•Review Host Intrusion Prevention events for false positives and create exceptions where necessary -
Senior Security EngineerNes Associates, Llc Nov 2010 - Nov 2012Columbus, Ohio Area•Host-Based security global administrator for a network of 35,000+ systems•Create and maintain policies across multiple modules within the ePolicy Orchestrator application•Subject matter expert for McAfee Rogue System Detection and Asset Baseline Monitor modules -
Security EngineerJpmorgan Chase & Co. Dec 2009 - Nov 2010Columbus, Ohio Area•Performed security administration on Enterprise Password Vault infrastructure•Analyzed requests for potential risk and assess approval requirements•Interfaced with customers in order to ensure satisfaction with the system functionality•Participated in migration of over 100,000 accounts to the new Enterprise Password Vault system•Developed innovative reporting procedures to proactively identify and correct access issues•Co-lead of Application Identity Management implementation across multiple lines of business•Wrote SQL queries to provide multiple reports for lines of businesses as well as the Operations team -
Security AnalystJpmorgan Chase Mar 2007 - Dec 2009•Perform real-time network monitoring and scanning using Dragon and IntruShield intrusion detection systems (IDS)•Analyze potential malicious packets with Wireshark to determine intended action•Review intrusion detection signatures for false positives and work with IDS engineers and vendor to provide a more efficient environment•Trained our peers on using IDS software and escalation procedures•Wrote technical documentation for several of our reporting and IDS processes•Protect the confidentiality of our customer’s information with data loss prevention tools such as Vontu•Work with Fraud Prevention and Investigation Team (FP&I) to investigate potential cyber fraud concerns•Complete penetration testing on new servers deployed firm wide using ISS SiteProtector•Review network vulnerability assessment (NVA) request from user to determine the proper change control has been created•Scheduling NVA scans and communicating the results to the requestor•Trained our peers on NVA software and processes•Monitor security information management (SIM) tool with RSA Network Intelligence•Analyze SIM event and user logs to detect and deter fraud•Analyze event logs across a multi-platform environment•Work with engineering to edit signatures alerting false positives•Analyze proxy logs to protect company from the actions of trojans, worms and viruses as well as inappropriate computer usage•Work closely with the Computer Security Incident Response Team (CSIRT) to remediate policy violations•Review of company Information Security policy with end users•Perform daily reports for global LAN/Midrange systems•Led daily turnover conference calls and participated in several calls including Threat and Vulnerability Management call and Intrusion Detection call•Work closely with Infrastructure Operations Center (IOC) to remediate brute force attacks, DDoS and other forms of malicious attacks -
Lan Analyst IiJpmorgan Chase Sep 2004 - Mar 2007•Completed projects and conversions essential to following the company’s direction throughout the merger•Performed hardware and software support for corporate and retail users across a multi-platform enviroment•Supported entire network including desktops, laptops, printers and servers•Configured and supported data encryption software on client computers•Performed asset disposal on hardware including wiping hard drives and removing from inventory•Disabled accounts after employees were terminated•Worked with remote desktop services team to add/remove access rights for users•Worked with multiple lines of businesses (LOBs) to develop a business continuity/disaster recovery plan•Trained new employees how to use ticketing system as well as how to troubleshoot and resolve issues•Work with software engineering team to correct issues with the standard operating system build•Tracked calls using Eagle, Peregrine and Smart ticketing systems•Performed server builds for JPMC Target conversions -
Systems AdministratorAcor Orthopaedic Dec 2002 - Sep 2004•Wrote financial reports for President, CEO and CFO•Managed anti-virus server using Symantec Corporate software and handled all malicious software issues•Performed hardware and software support for 75 end users•Managed Active Directory and Microsoft Exchange on servers running NT 4.0•Created and processed reports by writing queries within Microsoft Access using SQL•Implemented wireless internet for management where security was our top concern•Researched and purchased computer related products including desktops, laptops, servers, printers, switches and routers
-
Systems AdministratorAcor 2002 - 2004
-
AssociateWorld Financial Group (Wfg) 2002 - 2004 -
Faculty Technology AssistantMount Union College 1999 - 2002
Tom Morabito Skills
Tom Morabito Education Details
-
Information Systems -
Girard High SchoolDiploma
Frequently Asked Questions about Tom Morabito
What company does Tom Morabito work for?
Tom Morabito works for Teksynap
What is Tom Morabito's role at the current company?
Tom Morabito's current role is Program Manager at TekSynap.
What is Tom Morabito's email address?
Tom Morabito's email address is to****@****tes.com
What is Tom Morabito's direct phone number?
Tom Morabito's direct phone number is +170322*****
What schools did Tom Morabito attend?
Tom Morabito attended University Of Mount Union, Girard High School.
What skills is Tom Morabito known for?
Tom Morabito has skills like Security, Information Security, Networking, Cissp, Servers, Active Directory, Tcp/ip, Sharepoint, Vmware, Linux, Network Security, Microsoft Exchange.
Who are Tom Morabito's colleagues?
Tom Morabito's colleagues are Sarah Keiper, Daniel Lyons, Joshua Rosario, Cory Brown, Kevin Huynh, Troy Vargas, Matthieux Roger.
Not the Tom Morabito you were looking for?
-
3traveltrust.com, traveltrust.com, traveltrust.com
1 +172789XXXXX
-
2gmail.com, bankofamerica.com
-
Tom Morabito
Atlanta, Ga2veritivcorp.com, deluxe.com
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial