Post Job Free
Sign in

Cyber Security

Location:
Iowa City, IA, 52245
Posted:
September 01, 2024

Contact this candidate

Resume:

Thad Cummins *** S. Gilbert Ct

Iowa City, IA ****0

319-***-****

********@**********.***

SUMMARY

Cyber Security Management

Thaddeus Cummins's experience is concentrated in Information Technology Consulting/ Cyber Security / Risk Analysis with 18 years of management experience, including a high-level position. EXPERIENCE

RKM Technologies, Inc., Denver, CO — Consulting

Led and trained a team of 5 computer engineers serving 40 clients. Achieved revenue growth to $1.2 million through marketing, sales and excellent customer service.

Developed and implemented security baselines, risk management and data safety by deploying firewalls and VPNs resulting in growing client list and revenue.

Utilized strong planning skills and strategic direction to business owners.

EDUCATION

Computer Education - Certification CompTIA Security + 701 (2024), Ethical Hacker Training, Certified Network Defender Training Syracuse University, Syracuse, NY — MPA

University of Iowa, Iowa City, IA — BA

SKILLS

CompTIA Security + 701 (2024)

Risk Management

Network Defender

Ethical Hacking

PROJECTS

Cost Controls - Idaho Cobalt

mine - $12.5 million

Global SaaS for mining

operations in Mexico and Peru

Published in peer reviewed

Journal of Applied Mathematics

Organized lobby team to meet

with elected officials

LANGUAGES

English/Spanish

30-60-90 Plan for Cyber SOAR

Implementation

Prepared by Thad Cummins

Aug 2024

30-Day Focus: Assessment and Preparation

● Assess Current Security Landscape:

Conduct a review of security tools, processes, and incident response procedures.

Identify gaps, inefficiencies, and areas for improvement.

Evaluate the organization's readiness for implementation.

● Define Goals and Objectives:

Clearly articulate the desired outcomes of the implementation.

Align goals with overall security strategy and business objectives.

● Identify Key Stakeholders:

Map out stakeholders involved in the project.

Establish communication channels and roles for each stakeholder.

● Select Platform:

Evaluate organizational needs, budget, and integration capabilities.

Create a shortlist of potential vendors for further evaluation.

● Form the Implementation Team:

Assemble representatives from security, IT, operations, and other relevant departments.

Define roles and responsibilities for team members. 60-Day Focus: Implementation and Integration

● Proof of Concept (POC):

Conduct a POC to test the platform's capabilities and compatibility with existing tools.

Identify potential challenges and develop mitigation strategies.

● Data Integration:

Integrate relevant data sources (e.g., SIEM, EDR, firewalls) with the platform.

Establish data mapping and normalization processes.

● Develop Playbooks:

Create standardized playbooks for common incident response procedures.

Incorporate automation wherever possible to streamline workflows.

● User Training:

Develop training materials and conduct initial user training sessions.

Focus on core functionalities and basic playbook execution.

● Pilot Implementation:

Start with a pilot project to test the platform in a controlled environment.

Monitor performance and gather feedback from users. 90-Day Focus: Optimization and Expansion

● Full Deployment:

Roll out the platform across the organization.

Provide ongoing user support and training.

● Performance Monitoring:

Continuously monitor platform performance and identify areas for improvement.

Optimize playbooks and automation based on performance metrics.

● Integration Expansion:

Integrate additional security tools and data sources as needed.

Explore opportunities for platform expansion.

● Threat Hunting Integration:

Incorporate threat hunting capabilities into the platform to proactively identify threats.

● Continuous Improvement:

Establish a feedback loop to gather user input and identify areas for enhancement.

Create a process for regular platform updates and upgrades. Key Considerations:

● Change Management: Effectively communicate to all stakeholders and address concerns.

● Security and Compliance: Ensure compliance with security and regulatory requirements.

● Measurement and Evaluation: Define (KPIs) to measure the impact of implementation.

● Collaboration: Foster collaboration between teams and departments.



Contact this candidate