Will Smith Email and Phone Number
Will Smith work email
- Valid
- Valid
Will Smith personal email
- Valid
Will Smith phone numbers
With over 20 years of experience in cybersecurity, information security, and risk management, I am a trusted leader and architect who designs and delivers innovative solutions for complex and high-impact challenges. As the Chief Cybersecurity Architect at RELI Group, I lead the planning and design of security capabilities that protect 16 million users from significant cyber threats. My mission is to align cybersecurity strategies with organizational goals and industry trends and to create value for clients and stakeholders through effective governance, compliance, and incident response. I have successfully managed large-scale projects and programs with budgets of up to $78M and directed teams of up to 97 staff across multiple functional areas. I have also leveraged machine learning and artificial intelligence to enhance cyber analytic capabilities and optimize system performance. I hold an active security clearance and a certificate in AI Business Strategy from MIT Sloan.
Clawpoint Security Collective
View- Website:
- clawpointsecuritycollective.com
-
Founder And CeoClawpoint Security CollectiveCharlotte, Nc, Us -
Founder\CeoCyber Strategy Consultants Jan 2018 - PresentCyber Strategy Consultants provides tailored, advanced cybersecurity solutions for DoD and Federal clients. Our flagship product, Infinite View (under development), goes beyond traditional systems. It integrates seamlessly into existing frameworks, offers scalable cloud-based architecture, and utilizes AI and machine learning for dynamic threat detection. Infinite View is designed to adapt to the cybersecurity landscape continuously, ensuring thorough protection and compliance. Its collaborative features facilitate enhanced team integration and decision-making.Key Areas of Expertise:• Cybersecurity Governance: We establish governance frameworks that align with global standards.• Strategic Planning and Risk Management: Our proactive planning and advanced threat intelligence keep your security a step ahead.• Innovative Product Solutions: Infinite View revolutionizes cybersecurity practices with cutting-edge technology.• Cloud Security: Our cloud deployments enhance system scalability and resilience.• Operational Excellence in IT Security: We ensure high-performance standards and user-centric designs for optimal security management. -
Director, Business Expansion & Solutions DesignReli Group, Inc. May 2024 - PresentCatonsville, Maryland, UsAppointed to lead and expand business strategies and solutions design, focusing on innovative approaches to drive growth and efficiency. Key responsibilities include:Developing and implementing expansion strategies to explore new markets and opportunities, enhancing the company's reach and impact.Designing and overseeing the integration of cutting-edge solutions that align with client needs and industry trends, ensuring a competitive edge in technology services.Leading cross-functional teams to foster collaboration and innovation, setting clear goals and metrics that align with the company's long-term objectives.Cultivating strategic partnerships and client relationships to bolster business prospects and operational excellence.Steering the design and execution of tailored solutions that meet specific market demands, enhancing customer satisfaction and retention. -
Director, Chief Cybersecurity ArchitectReli Group, Inc. Nov 2022 - May 2024Catonsville, Maryland, UsCyber Capture Management. Strategically spearheaded cyber capture management initiatives, fostering a substantial $100M pipeline expansion through adept cultivation of corporate partnerships and targeted engagement, poised to drive future success in high-stakes cybersecurity contracts.Information Security, Large Scale Systems, and Strategic Planning: Lead planning and design of security solutions and capabilities that enable the identification, protection, quick response to, and rapid recovery from significant cyber threats that could impact 16 million users. Development of Strategy, Policy Development, and Information Security Governance: Develop strategic direction and create action plans for policy development, governance, system hardening, incident response, disaster recovery, and emerging cybersecurity threats.Vulnerability Assessment, Threat Modeling, and Systems Analysis: Employ risk assessments, threat modeling, and system analysis to define comprehensive security requirements.Supplier Evaluation and Infrastructure Security: Evaluate vendors and drive partner technology acquisition to safeguard infrastructure. -
Solution Architect – Cyber Innovations And Emerging TechnologiesTeksynap 2018 - 2022Virginia, 1900 Oracle Way, UsSystem Architecture: Designed cyber enterprise architectures that met National Institute of Standards and Technology (NIST), Federal Risk and Authorization Management Program (FedRAMP), and other standards.• Strategic Partnerships, and New Business Development: Established corporate partnerships to capture new cybersecurity business opportunities and sustain a $100M pipeline.Organizational Leadership and People Management: As cybersecurity capture manager and operations manager, directed a team of 97 across 4 states.Program Management and Contract Management: As deputy program manager, supported 10-year, $460M IDIQ contract for 200+ personnel across 8 task orders.Cybersecurity and Budget Management: As cybersecurity program manager for a Defense Threat Reduction Agency (DTRA) contract, oversaw $78M budget and team of 40 across multiple functional areas, including cyber defense operations, cyber supply chain risk management, communication security, and cybersecurity policy.• Cross-functional Collaborations: Partnered with Joint Artificial Intelligence Center to deploy a collaborative artificial intelligence (AI) solution. Presented to and secured buy-in from senior leadership for proof of concept.• Transport Layer Security (TLS): Led team of 30 compliance specialists and systems administrators to leverage emerging data loss protection and encryption technologies, migrating DTRA from Transport Layer Security (TSL) 1.0 to TSL 1.2.• Machine Learning and Workflow Optimization: Leveraged machine learning to improve cyber analytic capabilities, slashing cyber analyst response times from hours to minutes and increasing ingestion of research data from 10 to 500 gigabytes per day.• Security and Recognition Awards: Set security strategy and vision that aligned with client priorities and delivered on program goals, resulting in company’s first-ever government letter of appreciation from the DTRA director. -
Cybersecurity Governance ManagerGovplace 2017 - 2018Bethesda, Md, UsGovernment Project Management and IT Governance: Co-authored the Continuous Diagnostics and Monitoring (CDM) Governance Support Plan for enterprise privilege management, which provided a governance framework for all 22 Department of Homeland Security (DHS) departments and 30 supporting agencies. Technical Editing, Technical Documentation, and Quality Improvement: Transformed a CDM document that had been returned with 97 findings from the previous 2 authors over 3 years. Restructured and successfully submitted the plan within 60 days, as well as authoring amplifying documentation.Training & Development, Access Management, and IT Security Best Practices: Trained 4 CDM deployment managers on governance best practices related to privileged access management. -
Project Lead | Identity Management ConsultantTrivir 2015 - 2017Centreville, Virginia, UsTeam Management and Technical Advisory: Oversaw 8 direct reports and served as the onsite contracting point of contact for a $9M task order.Team Building, Decision-Making, Compliance Management, and Risk Management: Stepped in to reshape team and operations at a critical juncture when the organization was at risk of compliance failure. Turned around performance and achieved compliance-ready system 3 months ahead of schedule. Server Management and Data Integrity: Processed and received the IT accreditation of the server farm responsible for deploying the 2020 U.S. Census, enabling confirmation of identity integrity for collecting national privacy data. -
Senior Identity Services EngineerHewlett Packard Enterprise 2006 - 2015Houston, Texas, UsIT Strategy, Data Governance, Security Controls, and Emerging Technologies: Defined strategies for security governance, controls, and emerging technologies. Digital Identity and Technical Solution Development: Conducted review, modeling, design, development, testing, and deployment of crucial enterprise identity solutions.Software Development, Software Implementation, Assured Compliance Assessment Solution (ACAS), and Continuous Improvement: Developed and implemented Centrify access management software to continuously improve administrative provisioning for systems supporting Assured Compliance Assessment Solution (ACAS) deployment. Software Analysis, Security Information and Event Management (SEIM), and Security Audits: Led analysis of alternatives for the most powerful single security software used on the Navy Marine Corps Intranet (NMCI) project, producing the first detailed gap reports on privileged access management, security information and event management (SIEM), and change auditing solutions for the NMCI enterprise. • IT Risk Management: This safeguarded 22,000 elevated accounts that were at risk of compromise.• Vendor Contracts: Analysis led to one of the contract’s most significant single vendor awards ($250K). -
Junior ArchitectCgs (Computer Generated Solutions) 2005 - 2006New York, Ny, UsNetwork Architecture: Supported creation of the first consolidated network for the U.S. Holocaust Museum in Washington, D.C. -
Deployment EngineerItss 2005 - 2005Plan-Les-Ouates, Ge, ChServer Administration: Completed 13 enterprise server build deployments for the Air National Guard, finishing the project 3 months ahead of schedule. -
Enterprise Platforms Lead & Escalation ManagerElectronic Data Systems 2001 - 2005West Hartford, UsEscalations Management, Team Coordination, and Global Strategy: Oversaw the work of the escalation team, supporting 300,000 users across the globe. -
Aviation Maintenance Administrationman (E5),Us Navy 1995 - 2001Washington, Dc, UsOperational Support: Supported operations for NEC ECAMS (6301) and S.A.M.E (6302).
Will Smith Skills
Will Smith Education Details
-
Old Dominion UniversityInterdisciplinary Studies With A Major In Leadership -
Old Dominion UniversityProfessional Leadership -
Mit Sloan Executive EducationArtificial Intelligence: Implications For Business Strategy -
Ecpi UniversityComputer Information Science And Networking
Frequently Asked Questions about Will Smith
What company does Will Smith work for?
Will Smith works for Clawpoint Security Collective
What is Will Smith's role at the current company?
Will Smith's current role is Founder and CEO.
What is Will Smith's email address?
Will Smith's email address is wi****@****ail.com
What is Will Smith's direct phone number?
Will Smith's direct phone number is +170326*****
What schools did Will Smith attend?
Will Smith attended Old Dominion University, Old Dominion University, Mit Sloan Executive Education, Ecpi University.
What are some of Will Smith's interests?
Will Smith has interest in Science And Technology, Children, Economic Empowerment.
What skills is Will Smith known for?
Will Smith has skills like Active Directory, Integration, Disaster Recovery, Servers, Security, System Deployment, Troubleshooting, Windows Server, It Management, It Service Management, Computer Security, Enterprise Software.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial