Post Job Free
Sign in

Cyber Security Vulnerability Management

Location:
Oklahoma City, OK
Posted:
July 22, 2025

Contact this candidate

Resume:

Jonathan Thibodeaux, CISSP

Oklahoma City, OK ****5

*******@*******.***

405-***-****

10+ years of Cyber Security Engineering with a CISSP. I’ve developed skills in incident response, risk assessment, API integrations, vulnerability management, SIEM, SOAR, automation, Identity management, web application security, project management, network security design, application development, budgeting, and compliance. I have excellent analytical, problem-solving and interpersonal skills with a proven ability to effectively manage and motivate within a team environment. I can build reports with python and SQL Server. I have experience working in environments who adhere to control frameworks and/or regulatory requirements including CIS, NIST,ISO, ITIL, HIPAA, PCI, CSA.

Work Experience

Endpoint Security Engineer

Watts Water Technology

October 2024 to May 2025 (Downsized)

Providing global support across Watts Water for the entire lifecycle of security tools that safeguard the environment. This includes planning, building, configuring, deploying, and maintaining threat protection, detection, and response tools.

Running & maintaining support of the security tools used to protect, detect, and respond to security threats. Deploy SIEM and SOAR tools. Lead setup of detections and alerting. Alert tuning.

Vulnerability Management – setup repeatable processes to conduct vulnerability assessments and risk analyses across on-prem, cloud, remote users devices and servers. Create reports via PowerBi

Aide IAM in creating login alerts, suspicious actions, lateral movement. Manage EntraID users, groups, and compliance policies.

Deployed new instance of JAMF Pro, JAMFConnect (Feb. 2025)

Identify key areas for improvement in the technology used.

Ensure tool effectiveness according to vendor specification, configuration, and deployment requirements.

Assist the Security Operations Manager by offering expertise in developing policies, standards, and guidelines, gaps in deployments, PowerBi reports

Evaluate and recommend new security technologies and tools to enhance endpoint protection.

Work closely with IT, network, and security teams to ensure cohesive security strategies and implementations.

Ensure all endpoints are regularly updated with the latest security patches and updates to mitigate vulnerabilities.

Cyber Security Cloud Analyst

Watts Water Technology

July 2022 to October 2024

Working with a global IT security team to perform risk analysis, vulnerability management, Azure cloud infrastructure and security programs.

Aiding transition from Sophos to SentinelOne. Deployed automation to migrate BitLocker management/key management to Intune.

Maintaining SentinelOne configurations and exclusions in accordance with vendor requirements.

Aiding in building of Intune endpoint compliance policies and user policies.

Working closely with distributed IT administrators to ensure security tools and strategies are aligned.

Management of Rapid7 Vulnerability management console.

Application Security scanning. IoT Hub, NSG, VM, security. Automate deployment of security tools.

IT Architect, Security Operations

University of Oklahoma - Norman, OK

June 2019 to July 2022

Working within a team to operate security technologies across all campuses. Develop, maintain and document operational processes and procedures for technology’s management. Using NIST and CIS frameworks to help Identify operational risks and bring them to an acceptable level for management. Collaborate in all aspects of threat intelligence activities including vulnerability management, threat hunting, malware analysis and forensics. Develop, maintain and document other security operational analysis processes as needed.

Tenable.sc vulnerability management team lead.

Conduct vulnerability testing and risk analyses to assess security. Performs internal and external security audits.

Endpoint security, Web Application security.

Code assessment: SAST(Visual Studio Security IntelliSense, Tenable SAStool), DAST and WAS (Qualys, Tenable), Tenable and Microsoft Code Analysis for 3rd party dependencies and licensing.

Personally built the university’s Secure Network (home built NAC) Access Program (SQL server, C#, Python).

Responsible for monitoring security systems in our organization to include securing cloud (Azure, and a little AWS) and on-premises infrastructures, filtering out suspicious activity, and finding and mitigating security risks before breaches can occur.

SIEM dataflow, pipelines, parsing raw data to syslog, graylog, devo

SOAR development.

Manage users and groups Active Directory. Automate cleaning unused accounts and unused computers.

Define, plan, implement, maintain, and upgrade security measures, policies, and controls.

Writes reports and provides insights on the efficacy of the current security policies, incident responses, assets, endpoint management, and other security-related information and KPIs. (IIS, C#, inhouse built SecOps Reports).

Assists with the creation of updates and training programs to secure the network.

Monitor security access and maintain the relevant data. (Bloodhound Enterprise)

Analyse security breaches to identify root cause and update incidence responses and disaster recovery plans.

Creates procedures for IT employees and trains in security awareness.

Senior Security Analyst

University of Oklahoma Health Sciences Center - Oklahoma City, OK

May 2015 to June 2019

Responsible for performing governance, risk, and compliance tasks that include: a) Conducting security and risk analysis using NIST risk management frameworks; b) Monitoring compliance with security policies, laws, and regulations such as GLBA, GDPR, FERPA, and HIPAA/HITECH; c) Responding to security incidents and providing support as needed; d) Provide actionable security advice through policy or standards creation that support data protection initiatives to protect OU from cybersecurity risks; and e) Create system security plans, security assessments reports, and supporting plan of actions and milestones (POAMs).

Responsible for monitoring the security systems in our organization to include securing online and on-premises infrastructures, filtering out suspicious activity, and finding and mitigating security risks before any breaches can occur.

Leads efforts to counter security breaches and anticipates and reduces the likelihood of future security alerts, incidents, and disasters.

Defines, plans, implements, maintains, and upgrades security measures, policies, and controls.

Writes reports and provides insights on the efficacy of the current security policies, incident responses, disaster recovery plans, and other security related information.

Assists with the creation of updates and training programs to secure the network. Trains the employees.

Keeps the security systems up to date.

Monitors security access and maintains the relevant data.

Conducts vulnerability testing and risk analyses to assess security. Performs internal and external security audits.

Analyse security breaches to identify the cause and to update incidence responses and disaster recovery plans.

Verifies and coordinates security plans with outside vendors.

Creates procedures for IT employees and trains in security awareness.

Vulnerability management (Tripwire)

KPI Reporting (SQL Server, PowerBI, SharePoint on-prem and cloud)

Asset Management – create and asset management system to report on endpoint compliance (ServiceNow CI)

Endpoint Compliance – ePO, Dell Ent Security, Endpoint Protector, custom built discovery

Staff training and security awareness

Phishing Simulator SME (KnowBe4)

DLP Prevention (Proofpoint, Absolute)

Incident Response

Technical Operations Manager

The I.T. Guys LLC - Oklahoma City, OK

July 2013 to May 2015

Managing a team of MSP technical support professionals.

Form long-term partnerships with our clients to help their technology keep pace with their businesses as trusted advisors.

Understand the issues Oklahoma City small businesses face in attempting to afford, monitor and maintain their IT infrastructure.

Creating security documentation for several OKC based clients. Creating backup plans and documentation for all clients.

Building, correcting, redesigning network infrastructure to meet growing needs of clients.

Project management.

Director of Software Engineering

Intermedix - Oklahoma City, OK

August 2011 to July 2013

Comprehensive Medical Billing Solutions was sold to Intermedix in August of 2011. I was asked to resume my normal functions and continue to manage the same team as the Director of Software Engineering. We continued to focus on meeting client needs by automation and the use of superior software design.

Performed extensive code testing and review using several static and dynamic web application security tools. Using scrum and agile project management methods.

Information Systems Director

Comprehensive Medical Billing Solutions - Oklahoma City, OK

2004 to August 2011

Manage and lead a team of 7 programmers, database administrators, and technicians with planning and development of information technology structures in order to meet and exceed business goals.

Meet regularly with team members to ensure an efficient work flow and collaborate.

Control all aspects of the corporate network, including workstations, servers, firewalls, and switches.

Create security plans, manage and monitor network security, and develop software and hardware security and support for local and remote computers, internally controlled applications, and network printers.

Develop back-up strategies and create and maintain back-up operations and recovery plans.

Create and maintain network infrastructure, user accounts, e-mail structure, and applications in order to meet the client's needs.

Recruit and train all information technology staff.

Lead a team that created applications which saved the company $1.2 million in just one year.

Built the network infrastructure, ran cabling, built servers, and maintained a well-functioning network to support an original workforce of 24 employees that has expanded to more than 1,300.

Develop security plans and controls to establish HIPPA and PHI compliance; ensured information security compliance with other federal and state regulations and laws.

Build and maintain relationships as primary vendor contact.

Computer Technician and Sales Associate

Norman Computer Hospital - Norman, OK

2002 to 2004

Managed the office, sold contracts, and handled hardware and software, laptop, and printer repair, as well as provided all cabling services.

Provided outstanding customer service for all clients.

Began employment as labor contract sales and service and sold a record-breaking 2000+ hours of labor contracts.

Increased overall profit by 25% in the first year and 35% in the second year.

Education

Certified Information Systems Security Professional (CISSP)

(ISC)2 Member ID: 417675

Awarded September 04, 2015

ITIL Foundation Certificate in IT Service Management

Certificate Number: GR750179832JT

Awarded June 25, 2015

Associates in Technology

OKLAHOMA CITY COMMUNITY COLLEGE - Oklahoma City, OK

2003

Bachelor of Science in Sciences

UNIVERSITY OF OKLAHOMA - Norman, OK

2000

Technical Skills

SCCM/MECM Administration

Intune policies, compliance,

IAM, EntraId, Active Directory, conditional access

SIEM Devo, Graylog, Rapid7 InsightIDR

JAMF Pro Administration (Created new site February 2025)

Patch Management (WSUS, SolarWinds, SCCM, Intune, Jamf)

Vulnerability Management (Tenable.sc, Tripwire, Rapid7 InsightVM)

Asset Management (Hand built discovery tools to import to asset system)

Endpoint Security (Encryption/Key Managements, Crowdstrike, SentinelOne, ePO, Defender)

Web Application Security: DAST, SAST, SCA(Tenable, Rapid7 AppSec, Snyk, Qualys, Visual Studio tools)

Ticketing Systems (ServiceNow, TeamDynamix, Jira)

Custom API work, Scripting, Reporting (Python, C#, PowerShell, SSRS, PowerBI, SQL Server, IIS)

MFA: Duo, PingID, MS Authenticator

Network Devices: Palo, Cisco ASA, Cisco Catalyst, and Cisco Meraki devices, SonicWall, FortiGate, Ubiquiti

Phish Simulation (KnowBe4, Proofpoint LMS)



Contact this candidate