Kenneth Payton has over 10 years of experience in IT security management and analysis. He currently works as a Security Analyst for JP Morgan Chase, where he monitors security events, examines threats, and assists with understanding new security risks. Previously he served for 7 years in the US Army, where he supervised up to 60 personnel and managed a $2 million budget. He has a Bachelor's degree in Information Technology and Management from Syracuse University and an Associate's degree from Columbia College.
CCI training helps IT job applicants develop exceptional analytical, organizational, investigational and problem-solving skills organizations need. https://blog.ccitraining.edu/secure-your-career-shift-with-computer-security-training
The media has given a great deal of attention to the “insider threat”, the issue of someone within an organization harming or stealing data or assets. How does this happen and why? Shouldn’t we be more concerned with external threats like hackers and cyber-thieves?
Learning Nuggets
· Insider threat components and issues
· Current research
· Mitigation and good practices
CCI training helps IT job applicants develop exceptional analytical, organizational, investigational and problem-solving skills organizations need. https://blog.ccitraining.edu/secure-your-career-shift-with-computer-security-training
CCI training helps IT job applicants develop exceptional analytical, organizational, investigational and problem-solving skills organizations need. https://blog.ccitraining.edu/secure-your-career-shift-with-computer-security-training
The media has given a great deal of attention to the “insider threat”, the issue of someone within an organization harming or stealing data or assets. How does this happen and why? Shouldn’t we be more concerned with external threats like hackers and cyber-thieves?
Learning Nuggets
· Insider threat components and issues
· Current research
· Mitigation and good practices
CCI training helps IT job applicants develop exceptional analytical, organizational, investigational and problem-solving skills organizations need. https://blog.ccitraining.edu/secure-your-career-shift-with-computer-security-training
Managing Enterprise Risk: Why U No Haz Metrics?John D. Johnson
A panel with Alex Hutton, Jack Jones, Caroline Wong and David Mortman discussing measuring risk and the SMART use of metrics to quantify enterprise risk. RSA Conference 2013
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE360 BSI
This 4 day training program combines advanced technology and relevant practical experience to develop your IT security policies & create a robust IT infrastructure.
Information security is critical for modern business models today.
Organizations must be prepared to take crucial steps to strengthen their IT infrastructure from both internal & external threats.
Organizations must look to develop a security network that enhances business operations while improving its security position. Successful security architecture combines a mix of the latest policies & practices, technology, and a robust awareness program.
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and security. Participants will develop key skills and core competencies that will allow them to meet the ever-changing security demands of the 21st century.
Course Participants will:
- Master the tools & techniques for effective information & network security.
- Discover how to create a complete & sustainable IT security architecture.
- Gain knowledge on how to develop sound security policy together with your security architecture.
- Learn how to perform an IT governance assessment using CoBIT 4.0
- Learn how to perform smart security risk assessment within your organization.
- Gain valuable insights on implementing a proactive & robust security management system.
- Learn how to detect & prevent information security breaches due to inadequate IT security awareness within the organization.
Who should attend:
Vice Presidents, Directors, General Managers
Chief Information Officers
Chief Security Officers
Chief Information Security Officers
Chief Technology Officers
Contact Kris at kris@360bsi.com for further information.
Managing Enterprise Risk: Why U No Haz Metrics?John D. Johnson
A panel with Alex Hutton, Jack Jones, Caroline Wong and David Mortman discussing measuring risk and the SMART use of metrics to quantify enterprise risk. RSA Conference 2013
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE360 BSI
This 4 day training program combines advanced technology and relevant practical experience to develop your IT security policies & create a robust IT infrastructure.
Information security is critical for modern business models today.
Organizations must be prepared to take crucial steps to strengthen their IT infrastructure from both internal & external threats.
Organizations must look to develop a security network that enhances business operations while improving its security position. Successful security architecture combines a mix of the latest policies & practices, technology, and a robust awareness program.
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and security. Participants will develop key skills and core competencies that will allow them to meet the ever-changing security demands of the 21st century.
Course Participants will:
- Master the tools & techniques for effective information & network security.
- Discover how to create a complete & sustainable IT security architecture.
- Gain knowledge on how to develop sound security policy together with your security architecture.
- Learn how to perform an IT governance assessment using CoBIT 4.0
- Learn how to perform smart security risk assessment within your organization.
- Gain valuable insights on implementing a proactive & robust security management system.
- Learn how to detect & prevent information security breaches due to inadequate IT security awareness within the organization.
Who should attend:
Vice Presidents, Directors, General Managers
Chief Information Officers
Chief Security Officers
Chief Information Security Officers
Chief Technology Officers
Contact Kris at kris@360bsi.com for further information.
Transforming Information Security: Designing a State-of-the-Art Extended TeamEMC
This paper from the Security for Business Innovation Council (SBIC), sponsored by RSA, can help your organization build a state-of-the-art extended security team through seven actionable recommendations.
Transforming Information Security: Designing a State-of-the-Art Extended Team
Kenneth Payton Resume
1. Kenneth Payton
11597B Maple View Place Fort Drum, NY 13603 (609) 891-6501 kenpayton12@yahoo.com
IT Security Manager / Analyst
Experienced and detail-oriented manager that has made decisions in high pressure scenarios. Commanded up to 60 personnel, managed a
budget of over $2 million, and selected over peers for senior leadership positions. Proven to have strong deductive reasoning, critical
thinking, and problem solving skills. Competent in information security tasks such as identifying emerging threats, attacks, and
vulnerabilities. Demonstrated the ability to create and follow standard operating procedures, present complex solutions and methods,
find, assimilate, and synthesize information.
Technology Summary
Certifications: CompTIA A+, Network+, Security+, Install and Configure Windows Server 2012, CCENT
Systems: Microsoft XP/Vista/Windows7, Windows Server 2008/2012, Mac OS
Software: MS Visio, MS Office, VMware ESXi, Splunk, Fire Eye, ArcSight, Symantec Cloud, Sharepoint
IT Experience
JP Morgan Chase, Syracuse, New York
Security Analyst (June 2013 – Present):Handles the daily operational monitoring of information security events on the ArcSight
console. Also functions as an intrusion analyst to examine security events for context, appropriateness, and criticality. Assists the
organization with insight and understanding of new and emerging information security threats.
Conducts daily operational checklists and tasks such as: log analysis and review, vulnerability management activities, alert
analysis, investigating suspicious security event activity, and perform analysis on logs with the purpose of identifying threats and
conditions of concern.
Championed development of new onboarding procedures to ensure the new employees could move to full production status
sooner, increasing the overall productivity in the Security Operations Center.
Created the new template for the Indicators of Compromise, mentored other employees on their role in updating the new
database. This database became a key source of information for new employees as well as senior management.
United States Army - Worldwide
IT Supervisor (January 2007 – September 2012); IT Specialist (July 2005 – January 2007): I was promoted to IT Supervisor in
January 2007, a position that grew in responsibility until my honorable discharge from the United States Army in September of 2012.
Commanded up to 60 personnel, establishing relationships with each individual to better understand their strengths and
weaknesses.
Outperformed peers in leadership abilities; selected by Department of the Army to serve as a Drill Sergeant.
Selected over peers to manage the Brigade Information Technology shop.
Functioned in senior management roles that were beyond my level of responsibility.
Maintained budget of over $2 million, ensured proper accountability and maintenance of equipment.
Managed high priority projects while in high-stress environments, proven to work well under pressure.
Implemented new IT policies to ensure better security and movement of personnel around the company.
Earned commendation medals for leadership, presented complex ideas and solutions to management.
Educated employees on their roles, which created subject matter experts in a variety of fields.
Traveled across the globe working in conjunction with representatives from various countries while maintaining a standard of
professionalism that reflected the discipline of the United States Army.
Education
B.S. in Information Technology and Management, May 2014 (anticipated)
Syracuse University, Syracuse, NY 3.96 GPA
Minor in Global Enterprise Technology
Associate Degree in General Studies, July 2009, Columbia College, Columbia, MO