I'm a seasoned cybersecurity professional with a proven track record in penetration testing, vulnerability management, incident response, and threat hunting. My expertise spans enterprise network security, cloud security, and even critical OT/ICS environments.Beyond technical prowess, I'm known for my ability to bridge the gap between security and operations. I excel in engaging stakeholders, fostering collaboration, and driving cultural shifts that put security at the forefront of organizations.Core Expertise: Penetration Testing Vulnerability Assessments Incident Response Threat Hunting Network Security Monitoring Red Teaming Vulnerability Management Cloud Security OT/ICS SecurityValue Added: Top-Tier Communication: I simplify complex security concepts, ensuring actionable takeaways and project alignment across all levels. Culture Catalyst: I've spearheaded transformative initiatives, breaking silos and fostering a collaborative, security-conscious environment.Let's Connect! I'm passionate about securing organizations and empowering them to embrace a proactive security posture.
Protiviti
View- Website:
- accenture.com
- Employees:
- 10
- Company phone:
- (187) 788-9900
-
Senior ManagerProtivitiBuford, Ga, Us -
Manager Ics/Ot SecurityAccenture Aug 2024 - PresentDublin 2, Ie -
Founder/CeoBlack Orphan Security Nov 2014 - PresentActing as a Cybersecurity Subject Matter Expert and Advisory Board Member for Organizations
-
Senior Manager - Ot/Ics SecurityProtiviti Jul 2020 - Mar 2024Menlo Park, California, UsServed as the Industrial Cybersecurity expert with a proven track record of developing and implementing robust Security Compliance and Governance and Compliance programs for critical infrastructure (NERC CIP, TSA, CMMC, NIST, etc.). Leverages in-depth understanding of industry regulations and best practices to ensure organizations adhere to compliance standards, mitigate risks across ICS networks, and proactively address emerging threats. Possesses a strong ability to translate complex regulations into actionable security strategies, effectively communicating these strategies to technical and non-technical audiences. Guides teams in conducting thorough security assessments to identify vulnerabilities within ICS environments, employing a methodical approach that ensures no critical security gaps are overlooked. Develops and implements tailored remediation plans to address security gaps and ensure ongoing compliance. Effectively communicates complex technical findings to stakeholders at all levels, ensuring clear understanding and buy-in for security initiatives. -
Head Of Cyber Threat IntelligenceLeidos Oct 2017 - Jul 2020Reston, Virginia, UsSpearheaded Threat Intelligence through Incident Response and Forensics:* Leveraged extensive incident response and digital forensics experience to build a robust threat intelligence program.* Cultivated collaboration across the organization, harnessing technical and analytical expertise from diverse teams.* Analyzed cyber threats impacting a range of industries, producing actionable intelligence that empowered our security and investigative operations. -
Cybersecurity ConsultantSecurestrux Llc May 2015 - Dec 2018Lancaster, Pennsylvania, UsI was responsible for driving thought leadership across Information Security by identifying scalable and relevant patterns, driving adoption of new and emerging technology, interfaces closely with and influences first-line-of-defense technical owners. I was also appointed as trusted advisor on cybersecurity issues to multiple client IT Leadership Teams and Information Security Risk Management leadership. -
Director Of Vulnerability ManagementVectrus Aug 2016 - Oct 2017Colorado Springs, Colorado, UsI was responsible for the design, implementation, and operation of a comprehensive cyber threat management program. I managed and monitor a diverse portfolio of security technologies and services, including defensive and offensive cybersecurity technologies, in the cloud, industrial control environments, and corporate user environments. I worked closely with Incident Response, Cloud Engineers, System Engineers, Security Engineers, DevOps, Support Engineers, third-party managed services, and business stakeholders to ensure that the organization's systems and data are protected from cyber threats. -
Information Security OfficerUnited States Department Of Defense Nov 2013 - Nov 2014Washington, Dc, Usworked as apart of a larger incident response team which was responsible for predicting, detecting, and responding to cyber risk events corresponding to security and appropriate use threats. Our team maintained high degree of operational maturity in executing risk event management processes, to establish and maintain cross-functional relationships that enable end-to-end enterprise incident response, and to drive the adoption of innovative practices that proactively improve our ability to prevent, detect, disrupt, investigate, respond to, and recover from sophisticated threats.
Wesley L. Skills
Wesley L. Education Details
-
University Of Maryland Global CampusCyber Security -
Yale UniversityAccelerate Management -
Frostburg State UniversityCommunications
Frequently Asked Questions about Wesley L.
What company does Wesley L. work for?
Wesley L. works for Protiviti
What is Wesley L.'s role at the current company?
Wesley L.'s current role is Senior Manager.
What schools did Wesley L. attend?
Wesley L. attended University Of Maryland Global Campus, Yale University, Frostburg State University.
What skills is Wesley L. known for?
Wesley L. has skills like Leadership, It Strategy, Information Security, Network Monitoring Tools, Cybersecurity, Agile Project Management, Incident Response, Enterprise Risk Management, Cyber Defense, Data Privacy, Incident Management, Agile Methodologies.
Who are Wesley L.'s colleagues?
Wesley L.'s colleagues are Leopoldo Stanziola Neto, Wang Bo, Marta Kubacka, Manish Pal, Kannam Naidu Karanam, Angela Bender, José Sandoval, Mph.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial