William J. Storey Iii Email and Phone Number
William J. Storey Iii work email
- Valid
William J. Storey Iii personal email
- Valid
As a seasoned Information System Security Officer (ISSO) and AICO Strategist, I blend 17+ years of expertise in cybersecurity, information assurance, and system implementation with a forward-thinking approach as an Artificial Intelligence Compliance Officer (AICO). My experience spans across diverse sectors including defense, aerospace, and government, collaborating with agencies like DHS and CISA to ensure compliance with the highest security standards.I specialize in AI-Powered Risk Mitigation and Cognitive Security, developing and implementing cutting-edge AI technologies to enhance threat detection, decision-making processes, and operational efficiency. My career has evolved from managing traditional cybersecurity to pioneering AI applications that proactively address risks, driving innovation in complex security environments.
Advanced Consulting Experts
View-
Aico (Ai Compliance Officer)Advanced Consulting Experts Jun 2024 - PresentUnited StatesAs an AICO Strategist and Cognitive Security Expert, I lead the forefront of integrating advanced AI technologies into cybersecurity and operational frameworks for defense and aerospace sectors. My role involves pioneering AI-driven solutions that enhance risk mitigation, optimize decision-making, and bolster overall security postures.Key Responsibilities:AI-Powered Risk Mitigation: Develop and implement AI-driven strategies for risk assessment and mitigation, utilizing machine learning and cognitive operations to anticipate and address emerging threats.Cognitive Security Solutions: Design and deploy cognitive security frameworks that enhance threat detection and response capabilities, leveraging AI to improve situational awareness and decision-making processes.Integration of AI Technologies: Collaborate with defense and aerospace organizations to integrate cutting-edge AI technologies into their existing security infrastructures, ensuring seamless and effective adoption.Strategic Consulting: Provide expert consulting on the adoption and integration of AI-driven security solutions, tailoring strategies to meet the unique requirements of each client.Innovation and Research: Lead initiatives in researching and developing new AI applications in cybersecurity, continuously exploring innovative methods to enhance operational efficiency and security.Training and Development: Conduct workshops and training sessions to educate teams on AI applications in cybersecurity, fostering a culture of continuous learning and adaptation to technological advancements. -
Information Sytems Security Officer/It ManagerRadial Solutions Inc. Sep 2019 - Jun 2024Fort Moore, GeorgiaArchitected and implemented a defense-in-depth network architecture for the U.S. Army Ranger Training Battalion, prioritizing 99.9% uptime for mission-critical UH-60 Blackhawk operations and proactively safeguarding sensitive data.Spearheaded a comprehensive risk management program, utilizing lifecycle analysis, vulnerability scanning (Nessus/Tenable), and rigorous DISA STIG enforcement to significantly reduce downtime and proactively mitigate cyber threats.Collaborated with leadership to design and implement enterprise-grade cybersecurity policies, procedures, and best practices, ensuring continuous compliance with DoD mandates and optimizing risk mitigation across multiple DoD contracts.Championed the modernization of legacy security infrastructure, implementing secure collaboration platforms (Egnyte) and enabling resilient data exchange within government networks while enforcing strict information security controls.Managed a Windows Server 2019 environment, leveraging Active Directory and Group Policy to enforce granular access controls, implement least-privilege principles, and uphold stringent security standards.Designed and deployed VLANs (Cisco) to enhance network segmentation and data protection, optimizing performance across distinct internal, commercial, and classified (NASE) networks.Deployed and administered CrowdStrike , bolstering enterprise-wide threat detection, enabling proactive incident response, and strengthening the overall security posture.Provided strategic counsel to multiple DoD contractors, advising on cybersecurity solutions, risk mitigation strategies, and compliance frameworks to elevate their security maturity and safeguard sensitive assets. -
Information Systems Security Officer (Isso)/Information Management OfficerCherokee Nation Businesses Sep 2014 - Sep 2019Fort Benning, Georgia, United StatesVulnerability Management Initiatives: Led vulnerability management efforts, employing lifecycle analysis, Nessus/Tenable scanning, and DISA STIG enforcement to mitigate cyber risks and ensure compliance with stringent DoD standards.Proactive Threat Identification: Utilized network analysis tools like Wireshark to analyze traffic, proactively identify threats, troubleshoot network issues, and maintain operational resilience for mission-critical systems.Automation of Security Workflows: Leveraged PowerShell scripting to automate routine tasks, streamline security workflows, and enhance the overall security posture through efficient and reliable automation processes.Active Directory and Group Policy Management: Engineered robust Active Directory and Group Policy strategies, enforcing granular access controls and maintaining compliance with DoD security standards to protect sensitive assets.Cyber Risk Assessments: Collaborated with leadership on cyber risk assessments, developing mitigation strategies and aligning IT initiatives with organizational security objectives to ensure a secure operational environment within the DoD contract.Database Administration: Managed SQL Server 2019 databases, ensuring data integrity, availability, and compliance with DoD security protocols through meticulous administration and proactive monitoring.Asset Management: Conducted thorough hardware and software inventories, managing assets, tracking licenses, and optimizing resource utilization to uphold a secure and compliant infrastructure.Cybersecurity Awareness and Training: Developed and delivered engaging training programs on OPSEC, iWatch, and cybersecurity best practices, enhancing end-user awareness and minimizing human-related security risks.Incident Management and Threat Mitigation: Played a key role in leading the team, proactively managing incidents, and safeguarding critical operations to ensure the integrity and security of DoD systems. -
Information Management OfficerSikorsky Mar 2008 - Sep 2014Fort Benning, Georgia, United States• Installed and configured entire computer networks including Cisco cabling, switches, routers and servers Including sub netting and configuration of networks• Responsible for running and supporting entire network for aviation software.• Managed and monitored computer activity to comply with government security regulations including software protocols. • Maintained administrative duties of PBUSE, SAMS(E) and ULLS-A(E).• Maintained servers and workstations for STAMMIS systems.• Performed network upgrades and repairs.• Maintained position as Information Assurance Security Officer.• Maintained and processed employees for computer security access.• Enforced strict security policies and managed incident reporting.• Kept accountability of portable devices and configured blackberry’s.• Performed regular software and hardware upgrades.• Knowledge of all aspects of Windows OS’s and programs. Performed SQL scripts Provided IT Consulting for all aspects of network infrastructure -
Network TechnicianNetplanner Systems, Inc. Jun 2006 - May 2008Norcross, GaConfigured networks installing pc’s and wireless routers. Installed Cat 5, 6, voice and data, fiber and coaxial cable. Terminated and tested cables. Dressed cable and punched down data and voice. Pulled and marked cable according to blue prints. Terminated fiber optic cables. Configured and Maintained Servers. Programmed Cisco switches and routers. -
Internet Support Representative/Computer TechnicianMediacom Communications Apr 2005 - Dec 2006Gulf Breeze, FlEstablished and maintained High Speed internet connections. Troubleshooting Routers, Modem configurations and settings. Worked with all windows operating systems. Maintained network and office network. Configured network settings and connections Provided Fast and efficient customer service. Trained with multiple programs to monitor signal strengths.Installed Pc’s, hardware and software components providing technical Support. -
Multi-Channel Systems Operator MaintainerUs Army Oct 1996 - Oct 2000South KoreaTelecommunications and encryption
William J. Storey Iii Skills
William J. Storey Iii Education Details
-
Computer Systems Networking And Telecommunications
Frequently Asked Questions about William J. Storey Iii
What company does William J. Storey Iii work for?
William J. Storey Iii works for Advanced Consulting Experts
What is William J. Storey Iii's role at the current company?
William J. Storey Iii's current role is AICO | AI-Driven Risk Strategist | Cognitive Security Expert | Veteran Advocate | ISSO.
What is William J. Storey Iii's email address?
William J. Storey Iii's email address is kn****@****hoo.com
What schools did William J. Storey Iii attend?
William J. Storey Iii attended Columbus Technical College.
What are some of William J. Storey Iii's interests?
William J. Storey Iii has interest in Motorcycle Riding, New Technology Interests, Eccommerce, Shark Fishing, Networking With Business Minded People.
What skills is William J. Storey Iii known for?
William J. Storey Iii has skills like Troubleshooting, Networking, Routers, Servers, Customer Service, Microsoft Office, Technical Support, Information Technology, Security, Management, Hardware, Software Installation.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial