Will Morgan Email and Phone Number
Will Morgan work email
- Valid
- Valid
- Valid
- Valid
Will Morgan personal email
- Valid
Will Morgan phone numbers
I am a security technologist with 25 years of experience in IT security, software development security, and financial/payment industry security. I am very goal oriented and self motivated. Not everyone has the opportunity to do what they love every day and I'm grateful that I do. I thrive on complex problems and the tremendous satisfaction that comes with implementing the right solution at the right time.I am passionate about technology in general, and specifically with security. My broad background and excitement for new technologies has allowed me opportunities to truly lead transformational change. I am a critical thinker and enjoy solving complex problems that cross technology areas. I am currently working to provide security capabilities that work with the modernization of IT through cloud resources, software defined infrastructure, and DevSecOps. Technology is moving at an unprecedented pace, as are the threats that face us. The challenge of securing valuable data has never been more daunting. What a time to be in Cyber Security!
Fiserv
View- Website:
- fiserv.com
- Employees:
- 10
-
Head Of Security ArchitectureFiserv Aug 2019 - PresentMilwaukee, Wisconsin, UsDevelop a services-based approach to security that provides self-service security capabilities as scale and speed, especially as the adoption of cloud services expands.Develop capabilities that directly support the modern capabilities and address the unique threats of a non-datacenter based infrastructure.Drive metrics-based decisions by relating activities to objectives, ultimately reflecting the effectiveness of the security program to the risks that face Fiserv.Drive Cyber Security program across the enterprise.• Manage a global team comprised of the firms security technology experts.• Drive enhancement of services where needed to address the evolving threat landscape.• Research and development of new capabilities through the adoption of strategic technologies.• Collaborate with lines of business to coordinate priorities to ensure security keeps pace with the threats.• Regularly review the technology footprint to ensure the greatest cost effectiveness. -
Vice President Architecture And Strategy, Global Cyber Security And FraudFirst Data Corporation Jun 2014 - Sep 2019Brookfield, Wisc., UsChief Architect for Global Cyber Security and FraudDrive Cyber Security program across the enterprise to defend against continuously evolving threats to the largest payment processor in the world.• Manage a global team of information security architects whose scope include all aspects of IT security.• Lead the design of a secure cloud native infrastructure and the tooling needed to enable rapid deployments while remaining secure and compliant.• Research and development of cutting edge capabilities to enable to the business to execute faster and more securely.• Collaborate with other internal organizations to set direction and influence priorities to ensure security keeps pace with the threats.• Developing strategies for the tools and processes needed to combat evolving threats and working with the technology teams toward successful implementation.• Drive adoption of the Cyber Security Framework for addressing risk.• Creating a framework for engaging in cloud services and establishing the security and contractual requirements for those engagements.• Design controls and execute security assessments for emerging financial technologies such as mobile wallets and online transaction processing.• Oversight and contributing author on security policies and standards. • Technical security contractual reviews of new business acquisitions and partnerships. -
Architect, Information Security And Cyber DefenseFirst Data Corporation Aug 2001 - Jun 2014Brookfield, Wisc., UsResearch, security evaluations, design. 3rd level technical support.2013-2014 - Designing security standards that allow the use of cloud resources. Aspects include data-at-rest encryption, virtual firewall governance, rapid automation, and general compliance in a cloud environment.2012-2013 - Created and blueprint for new malware detection, analysis/forensics, and remediation processes. During this time I created global architectures for network packet capture/forensics as well as host analysis. I supported the global deployment of several forensics and advanced malware detection tools both on endpoints and on the network.2008-2012- Architecture and design of security infrastructure for one of the largest datacenter consolidation projects undertaken. Transformational technologies included in the design such as identity based network access control saved the company money and time.Research, architecture, and deployment of numerous other technologies including threat vector analysis, perimeter messaging security, and wireless network security.2009 - Design and build of the first Web Application Firewall infrastructure solutions globally across First Data internet hosting presences.2007-2009 - Building and organizing the First Data secure software development process, including training, tool evaluation and deployment, and coding standards development.2001-2006 - Lead the redesign and standardization of network security controls and technologies across First Data, including those associated with Federal tax payments. -
Network/Security EngineerNuclio Aug 2000 - Aug 2001As a technology startup, with a very small team I designed and built the network and security infrastructure from the ground up. I developed many of the managed service offerings of Nuclio as well as deployed some of the initial managed solutions for customers. Those included a VoIP installation and a global leased-line to VPN conversion for a large manufacturing company.
-
Network/Security EngineerO/E 1996 - 2000Starting as a systems engineer consulting for Windows Domain, SMS, Exchange deployments, eventually promoted to senior network an security engineer. Specialties include Microsoft backoffice, network, and security design and solutions.
Will Morgan Skills
Will Morgan Education Details
-
Illinois Institute Of TechnologyComputer Science -
Regis UniversitySoftware Engineering -
Illinois Institute Of TechnologyComputer Science -
Stichting Assurantie Registratie (Sar)Computer Software Engineering
Frequently Asked Questions about Will Morgan
What company does Will Morgan work for?
Will Morgan works for Fiserv
What is Will Morgan's role at the current company?
Will Morgan's current role is Cyber Security Professional.
What is Will Morgan's email address?
Will Morgan's email address is wi****@****ata.com
What is Will Morgan's direct phone number?
Will Morgan's direct phone number is +130396*****
What schools did Will Morgan attend?
Will Morgan attended Illinois Institute Of Technology, Regis University, Illinois Institute Of Technology, Stichting Assurantie Registratie (Sar).
What skills is Will Morgan known for?
Will Morgan has skills like Network Security, Security, Information Security, Data Center, Firewalls, Cissp, Pci Dss, Information Security Management, Checkpoint, Vpn, Vulnerability Assessment, Vulnerability Management.
Who are Will Morgan's colleagues?
Will Morgan's colleagues are Danielle Nicole, Ankur Bhutani, Harry Hayward, Amit Kumar, Reyna M. Reyes, Paul Eberly, Phyllis Ferguson, Pmp, Csm, Cspo, Cdp.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial