William J. Storey Iii

William J. Storey Iii Email and Phone Number

AICO | AI-Driven Risk Strategist | Cognitive Security Expert | Veteran Advocate | ISSO @ Advanced Consulting Experts
William J. Storey Iii's Location
Greater Columbus Area, United States
William J. Storey Iii's Contact Details

William J. Storey Iii work email

William J. Storey Iii personal email

About William J. Storey Iii

As a seasoned Information System Security Officer (ISSO) and AICO Strategist, I blend 17+ years of expertise in cybersecurity, information assurance, and system implementation with a forward-thinking approach as an Artificial Intelligence Compliance Officer (AICO). My experience spans across diverse sectors including defense, aerospace, and government, collaborating with agencies like DHS and CISA to ensure compliance with the highest security standards.I specialize in AI-Powered Risk Mitigation and Cognitive Security, developing and implementing cutting-edge AI technologies to enhance threat detection, decision-making processes, and operational efficiency. My career has evolved from managing traditional cybersecurity to pioneering AI applications that proactively address risks, driving innovation in complex security environments.

William J. Storey Iii's Current Company Details
Advanced Consulting Experts

Advanced Consulting Experts

View
AICO | AI-Driven Risk Strategist | Cognitive Security Expert | Veteran Advocate | ISSO
William J. Storey Iii Work Experience Details
  • Advanced Consulting Experts
    Aico (Ai Compliance Officer)
    Advanced Consulting Experts Jun 2024 - Present
    United States
    As an AICO Strategist and Cognitive Security Expert, I lead the forefront of integrating advanced AI technologies into cybersecurity and operational frameworks for defense and aerospace sectors. My role involves pioneering AI-driven solutions that enhance risk mitigation, optimize decision-making, and bolster overall security postures.Key Responsibilities:AI-Powered Risk Mitigation: Develop and implement AI-driven strategies for risk assessment and mitigation, utilizing machine learning and cognitive operations to anticipate and address emerging threats.Cognitive Security Solutions: Design and deploy cognitive security frameworks that enhance threat detection and response capabilities, leveraging AI to improve situational awareness and decision-making processes.Integration of AI Technologies: Collaborate with defense and aerospace organizations to integrate cutting-edge AI technologies into their existing security infrastructures, ensuring seamless and effective adoption.Strategic Consulting: Provide expert consulting on the adoption and integration of AI-driven security solutions, tailoring strategies to meet the unique requirements of each client.Innovation and Research: Lead initiatives in researching and developing new AI applications in cybersecurity, continuously exploring innovative methods to enhance operational efficiency and security.Training and Development: Conduct workshops and training sessions to educate teams on AI applications in cybersecurity, fostering a culture of continuous learning and adaptation to technological advancements.
  • Radial Solutions Inc.
    Information Sytems Security Officer/It Manager
    Radial Solutions Inc. Sep 2019 - Jun 2024
    Fort Moore, Georgia
    Architected and implemented a defense-in-depth network architecture for the U.S. Army Ranger Training Battalion, prioritizing 99.9% uptime for mission-critical UH-60 Blackhawk operations and proactively safeguarding sensitive data.Spearheaded a comprehensive risk management program, utilizing lifecycle analysis, vulnerability scanning (Nessus/Tenable), and rigorous DISA STIG enforcement to significantly reduce downtime and proactively mitigate cyber threats.Collaborated with leadership to design and implement enterprise-grade cybersecurity policies, procedures, and best practices, ensuring continuous compliance with DoD mandates and optimizing risk mitigation across multiple DoD contracts.Championed the modernization of legacy security infrastructure, implementing secure collaboration platforms (Egnyte) and enabling resilient data exchange within government networks while enforcing strict information security controls.Managed a Windows Server 2019 environment, leveraging Active Directory and Group Policy to enforce granular access controls, implement least-privilege principles, and uphold stringent security standards.Designed and deployed VLANs (Cisco) to enhance network segmentation and data protection, optimizing performance across distinct internal, commercial, and classified (NASE) networks.Deployed and administered CrowdStrike , bolstering enterprise-wide threat detection, enabling proactive incident response, and strengthening the overall security posture.Provided strategic counsel to multiple DoD contractors, advising on cybersecurity solutions, risk mitigation strategies, and compliance frameworks to elevate their security maturity and safeguard sensitive assets.
  • Cherokee Nation Businesses
    Information Systems Security Officer (Isso)/Information Management Officer
    Cherokee Nation Businesses Sep 2014 - Sep 2019
    Fort Benning, Georgia, United States
    Vulnerability Management Initiatives: Led vulnerability management efforts, employing lifecycle analysis, Nessus/Tenable scanning, and DISA STIG enforcement to mitigate cyber risks and ensure compliance with stringent DoD standards.Proactive Threat Identification: Utilized network analysis tools like Wireshark to analyze traffic, proactively identify threats, troubleshoot network issues, and maintain operational resilience for mission-critical systems.Automation of Security Workflows: Leveraged PowerShell scripting to automate routine tasks, streamline security workflows, and enhance the overall security posture through efficient and reliable automation processes.Active Directory and Group Policy Management: Engineered robust Active Directory and Group Policy strategies, enforcing granular access controls and maintaining compliance with DoD security standards to protect sensitive assets.Cyber Risk Assessments: Collaborated with leadership on cyber risk assessments, developing mitigation strategies and aligning IT initiatives with organizational security objectives to ensure a secure operational environment within the DoD contract.Database Administration: Managed SQL Server 2019 databases, ensuring data integrity, availability, and compliance with DoD security protocols through meticulous administration and proactive monitoring.Asset Management: Conducted thorough hardware and software inventories, managing assets, tracking licenses, and optimizing resource utilization to uphold a secure and compliant infrastructure.Cybersecurity Awareness and Training: Developed and delivered engaging training programs on OPSEC, iWatch, and cybersecurity best practices, enhancing end-user awareness and minimizing human-related security risks.Incident Management and Threat Mitigation: Played a key role in leading the team, proactively managing incidents, and safeguarding critical operations to ensure the integrity and security of DoD systems.
  • Sikorsky
    Information Management Officer
    Sikorsky Mar 2008 - Sep 2014
    Fort Benning, Georgia, United States
    • Installed and configured entire computer networks including Cisco cabling, switches, routers and servers Including sub netting and configuration of networks• Responsible for running and supporting entire network for aviation software.• Managed and monitored computer activity to comply with government security regulations including software protocols. • Maintained administrative duties of PBUSE, SAMS(E) and ULLS-A(E).• Maintained servers and workstations for STAMMIS systems.• Performed network upgrades and repairs.• Maintained position as Information Assurance Security Officer.• Maintained and processed employees for computer security access.• Enforced strict security policies and managed incident reporting.• Kept accountability of portable devices and configured blackberry’s.• Performed regular software and hardware upgrades.• Knowledge of all aspects of Windows OS’s and programs. Performed SQL scripts Provided IT Consulting for all aspects of network infrastructure
  • Netplanner Systems, Inc.
    Network Technician
    Netplanner Systems, Inc. Jun 2006 - May 2008
    Norcross, Ga
    Configured networks installing pc’s and wireless routers. Installed Cat 5, 6, voice and data, fiber and coaxial cable. Terminated and tested cables. Dressed cable and punched down data and voice. Pulled and marked cable according to blue prints. Terminated fiber optic cables. Configured and Maintained Servers. Programmed Cisco switches and routers.
  • Mediacom Communications
    Internet Support Representative/Computer Technician
    Mediacom Communications Apr 2005 - Dec 2006
    Gulf Breeze, Fl
    Established and maintained High Speed internet connections. Troubleshooting Routers, Modem configurations and settings. Worked with all windows operating systems. Maintained network and office network. Configured network settings and connections Provided Fast and efficient customer service. Trained with multiple programs to monitor signal strengths.Installed Pc’s, hardware and software components providing technical Support.
  • Us Army
    Multi-Channel Systems Operator Maintainer
    Us Army Oct 1996 - Oct 2000
    South Korea
    Telecommunications and encryption

William J. Storey Iii Skills

Troubleshooting Networking Routers Servers Customer Service Microsoft Office Technical Support Information Technology Security Management Hardware Software Installation Optical Fiber E Commerce Windows Program Management Process Improvement Information Assurance Government Analysis Cables Logistics Cisco Technologies Switches Computer Security Cabling Mobile Devices Cisco Nexus Maintenance And Repair Team Building Leadership Strategic Planning Maintenance

William J. Storey Iii Education Details

Frequently Asked Questions about William J. Storey Iii

What company does William J. Storey Iii work for?

William J. Storey Iii works for Advanced Consulting Experts

What is William J. Storey Iii's role at the current company?

William J. Storey Iii's current role is AICO | AI-Driven Risk Strategist | Cognitive Security Expert | Veteran Advocate | ISSO.

What is William J. Storey Iii's email address?

William J. Storey Iii's email address is kn****@****hoo.com

What schools did William J. Storey Iii attend?

William J. Storey Iii attended Columbus Technical College.

What are some of William J. Storey Iii's interests?

William J. Storey Iii has interest in Motorcycle Riding, New Technology Interests, Eccommerce, Shark Fishing, Networking With Business Minded People.

What skills is William J. Storey Iii known for?

William J. Storey Iii has skills like Troubleshooting, Networking, Routers, Servers, Customer Service, Microsoft Office, Technical Support, Information Technology, Security, Management, Hardware, Software Installation.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.