SlideShare a Scribd company logo
RESUME – TIMOTHY J. NOLAN
Timothy J. Nolan
218 Brown Lane  Shelbyville, TN 37160  931-842-0273  tim.nolan@charter.net
https://w w w.linkedin.com/in/timothyjnolan
Information Security Consultant
Director, Cyber Defense Solutions
The Sylint Group Oct 2012 – Aug 2015
 At The Sylint Group I performed security monitoring, incident response, malware
analysis, security posture assessments, vulnerability scans, penetration testing, social
engineering, password cracking, security architecture and design, policy and
standards development, and remediation. Performed ongoing monitoring, cyber
investigations, and performed computer forensics in conjunction with incident
response and malware analysis.
 Defended customers and responded to incidents of advanced cyber-attacks,
intrusions, data breaches, thefts, and scams.
 Customers include “Fortune Global 500” firms to mid-sized organizations.
Manager, Information Security
Intrusion Detection, Incident Response, and Cyber Investigations
Bridgestone Americas, Inc. Nov 2010 – Oct 2012
 Information security professional with experience protecting a large $35B “Fortune
Global 500” organization with 144,000 employees worldwide.
 Designer and manager of Bridgestone’s global SOC (Security Operations Center) to
effectively monitor and provide detection of cyber threats in the Americas, Europe,
and Japan. Manager overseeing the development of ground-breaking solutions that
provide world-class protection of networks, systems, business processes, and
sensitive data. Actively developed and used threat intelligence, reputation data, and
known indicators-of-compromise. Implemented layered signature-based and
behavioral-based detective and preventative solutions.
 Lead investigator of numerous instances of employee and third-party cyber-crimes
and unauthorized activity. Effectively led incident response and protected Bridgestone
from intrusions, malware infections and propagation, thefts of intellectual property,
and malicious or unauthorized activity for almost 13 years.
Information Security Officer (ISO, ISSO)
Bridgestone/Firestone, Inc.
Bridgestone Americas, Inc. Sept 1999 – Nov 2010
 First Information Security Officer (ISO) for Bridgestone/Firestone, a role that I
served in for over 11 years. Led the development of a new information security
program and iteratively developed policies, standards, & procedures designed to
bring alignment and compliance with regulatory requirements, including
FFIEC/OCC banking regulations, PCI DSS payment card industry regulations,
Japanese Sarbanes Oxley (JSOX), GLBA, C-TPAT, HIPAA, etc.
 Managed and performed vulnerability scanning and penetration testing. Oversaw
Bridgestone’s vulnerability, risk, and security posture assessments. Managed web
portal and application assessments, as well as source code reviews. Provided
analysis and remediation recommendations. Designed and instituted security
controls and solutions. Led project-based and enterprise security engineering and
architecture planning. Developed and instituted corporate strategies and
requirements for safeguarding of enterprise networks, systems, applications, and
data.
 Overall responsibility for perimeter and network security, system security,
application security, and information protection. Researched and communicated
information on current and emerging threats, new protective strategies and
tactics, and manufacturer security bulletins and patches.
Senior Information Security Analyst
Omnipoint Communications 1997 – Sept 1999
 Information security leader for a $4.8B US GSM Cellular Telephone Carrier.
 Led a new information security program. Administered firewalls and IDS.
Performed vulnerability scans and pen tests. Led incident response, light
forensics, and cyber investigations.
 Provided security engineering and controls recommendations.
What others say…
“Tim has always been a
knowledgeable, up-to-date
resource for security
questions & best practice
recommendations.
Through Tim's leadership
we have implemented and
practiced a "defense-in-
depth" methodology that
has proven quite
successful in protecting
our infrastructure.” - EM
“I can honestly say there
was never a time when his
ideas were not thoroughly
researched and provided
the best security,
protection, and forensics
possible. The time he must
spend on his own in
keeping up with the latest
threats and security
measures is substantial.
Regardless of what was
thrown his way, he was
always ready to react and
mitigate the risk. He takes
pride in his work and has a
passion that is unmatched
by anyone I know.” -RG
“ Tim exceeded all
expectations and his
abilities and value were
quickly evident with the
reduction in security
incidents experienced by
Bridgestone following his
addition to the company.
Tim has an extensive
knowledge of Information
Security and a clear
understanding of how it
can bring the most value
to an organization. He has
a contagious passion for
Information Security and a
tireless dedication to
securing the assets of the
company he has been
hired to protect. I have
never met a more
trustworthy individual
who prides himself on
leading by example and
doing the right thing.”
- JP

More Related Content

What's hot

Thinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker VisionThinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker Vision
PECB
 
Cybersecurity and data privacy
Cybersecurity and data privacyCybersecurity and data privacy
Cybersecurity and data privacy
Katherine Cancelado
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
Don Grauel
 
Cybersecurity seminar brochure
Cybersecurity seminar brochureCybersecurity seminar brochure
Cybersecurity seminar brochure
Andy Kim
 
IT Security - Guidelines
IT Security - GuidelinesIT Security - Guidelines
IT Security - Guidelines
Pedro Espinosa
 
Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for Businesses
Alex Rudie
 
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best PracticesSEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
Kroll
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
National Retail Federation
 
Tripwire University: Cyberwar Boot Camp – Introduction and Overview
Tripwire University: Cyberwar Boot Camp – Introduction and OverviewTripwire University: Cyberwar Boot Camp – Introduction and Overview
Tripwire University: Cyberwar Boot Camp – Introduction and Overview
Tripwire
 
Harnessing UEBA and Machine Learning technologies to protect enterprises from...
Harnessing UEBA and Machine Learning technologies to protect enterprises from...Harnessing UEBA and Machine Learning technologies to protect enterprises from...
Harnessing UEBA and Machine Learning technologies to protect enterprises from...
ZoneFox
 
Navigating Cybersecurity
Navigating CybersecurityNavigating Cybersecurity
Navigating Cybersecurity
Segun Ebenezer Olaniyan
 
IT Security
IT SecurityIT Security
IT Security and Risk Mitigation
IT Security and Risk MitigationIT Security and Risk Mitigation
IT Security and Risk Mitigation
Mukalele Rogers
 
Jyotin gambhir
Jyotin gambhirJyotin gambhir
Jyotin gambhir
janetlouis
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber Attacks
Tripwire
 
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasBlack Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Tripwire
 
Enhancing your Organization's Security IQ to Meet Emerging Threats & New Real...
Enhancing your Organization's Security IQ to Meet Emerging Threats & New Real...Enhancing your Organization's Security IQ to Meet Emerging Threats & New Real...
Enhancing your Organization's Security IQ to Meet Emerging Threats & New Real...
IBM Sverige
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
PECB
 
Aella Bios & Certifications
Aella Bios & CertificationsAella Bios & Certifications
Aella Bios & Certifications
Gregory Bernardo
 
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial SectorCapitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
CapitolTechU
 

What's hot (20)

Thinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker VisionThinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker Vision
 
Cybersecurity and data privacy
Cybersecurity and data privacyCybersecurity and data privacy
Cybersecurity and data privacy
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Cybersecurity seminar brochure
Cybersecurity seminar brochureCybersecurity seminar brochure
Cybersecurity seminar brochure
 
IT Security - Guidelines
IT Security - GuidelinesIT Security - Guidelines
IT Security - Guidelines
 
Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for Businesses
 
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best PracticesSEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
Tripwire University: Cyberwar Boot Camp – Introduction and Overview
Tripwire University: Cyberwar Boot Camp – Introduction and OverviewTripwire University: Cyberwar Boot Camp – Introduction and Overview
Tripwire University: Cyberwar Boot Camp – Introduction and Overview
 
Harnessing UEBA and Machine Learning technologies to protect enterprises from...
Harnessing UEBA and Machine Learning technologies to protect enterprises from...Harnessing UEBA and Machine Learning technologies to protect enterprises from...
Harnessing UEBA and Machine Learning technologies to protect enterprises from...
 
Navigating Cybersecurity
Navigating CybersecurityNavigating Cybersecurity
Navigating Cybersecurity
 
IT Security
IT SecurityIT Security
IT Security
 
IT Security and Risk Mitigation
IT Security and Risk MitigationIT Security and Risk Mitigation
IT Security and Risk Mitigation
 
Jyotin gambhir
Jyotin gambhirJyotin gambhir
Jyotin gambhir
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber Attacks
 
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasBlack Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
 
Enhancing your Organization's Security IQ to Meet Emerging Threats & New Real...
Enhancing your Organization's Security IQ to Meet Emerging Threats & New Real...Enhancing your Organization's Security IQ to Meet Emerging Threats & New Real...
Enhancing your Organization's Security IQ to Meet Emerging Threats & New Real...
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Aella Bios & Certifications
Aella Bios & CertificationsAella Bios & Certifications
Aella Bios & Certifications
 
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial SectorCapitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
Capitol Tech Talk Feb 17 2022 Cybersecurity Challenges in Financial Sector
 

Similar to Resume - Timothy Nolan 8-5-2015

Gill_Pat.2016.Resume.CISO.1
Gill_Pat.2016.Resume.CISO.1Gill_Pat.2016.Resume.CISO.1
Gill_Pat.2016.Resume.CISO.1
Patrick Gill, MBA, CRISC
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
Kroll
 
Looking into the future of security
Looking into the future of securityLooking into the future of security
Looking into the future of security
Southern Cross Group Services
 
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Happiest Minds Technologies
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Mighty Guides, Inc.
 
Jyotin gambhir – a complete it security expert
Jyotin gambhir – a complete it security expertJyotin gambhir – a complete it security expert
Jyotin gambhir – a complete it security expert
janetlouis
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
Bala Guntipalli ♦ MBA
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
Shawn Tuma
 
SBIC Enterprise Information Security Strategic Technologies
SBIC Enterprise Information Security Strategic TechnologiesSBIC Enterprise Information Security Strategic Technologies
SBIC Enterprise Information Security Strategic Technologies
EMC
 
Whitepaper Pro-active Security Management 2006.pdf
Whitepaper Pro-active Security Management 2006.pdfWhitepaper Pro-active Security Management 2006.pdf
Whitepaper Pro-active Security Management 2006.pdf
serve&solve
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
Ward Pyles
 
IBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, ExpertiseIBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, Expertise
Shwetank Jayaswal
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022
Matthew Rosenquist
 
Rcs triumfant watchful_webinar_final
Rcs triumfant watchful_webinar_finalRcs triumfant watchful_webinar_final
Rcs triumfant watchful_webinar_final
Patrick Florer
 
Mark Goldstein Value Proposition
Mark Goldstein Value PropositionMark Goldstein Value Proposition
Mark Goldstein Value Proposition
uke5wvTp
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
Daren Dunkel
 
The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of Security
Karina Elise
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsis
Vasuki Kashyap
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
EC-Council
 

Similar to Resume - Timothy Nolan 8-5-2015 (20)

Gill_Pat.2016.Resume.CISO.1
Gill_Pat.2016.Resume.CISO.1Gill_Pat.2016.Resume.CISO.1
Gill_Pat.2016.Resume.CISO.1
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
 
Looking into the future of security
Looking into the future of securityLooking into the future of security
Looking into the future of security
 
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
 
Jyotin gambhir – a complete it security expert
Jyotin gambhir – a complete it security expertJyotin gambhir – a complete it security expert
Jyotin gambhir – a complete it security expert
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
 
SBIC Enterprise Information Security Strategic Technologies
SBIC Enterprise Information Security Strategic TechnologiesSBIC Enterprise Information Security Strategic Technologies
SBIC Enterprise Information Security Strategic Technologies
 
Whitepaper Pro-active Security Management 2006.pdf
Whitepaper Pro-active Security Management 2006.pdfWhitepaper Pro-active Security Management 2006.pdf
Whitepaper Pro-active Security Management 2006.pdf
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
 
IBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, ExpertiseIBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, Expertise
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022
 
Rcs triumfant watchful_webinar_final
Rcs triumfant watchful_webinar_finalRcs triumfant watchful_webinar_final
Rcs triumfant watchful_webinar_final
 
Mark Goldstein Value Proposition
Mark Goldstein Value PropositionMark Goldstein Value Proposition
Mark Goldstein Value Proposition
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
 
The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of Security
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsis
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 

Resume - Timothy Nolan 8-5-2015

  • 1. RESUME – TIMOTHY J. NOLAN Timothy J. Nolan 218 Brown Lane  Shelbyville, TN 37160  931-842-0273  tim.nolan@charter.net https://w w w.linkedin.com/in/timothyjnolan Information Security Consultant Director, Cyber Defense Solutions The Sylint Group Oct 2012 – Aug 2015  At The Sylint Group I performed security monitoring, incident response, malware analysis, security posture assessments, vulnerability scans, penetration testing, social engineering, password cracking, security architecture and design, policy and standards development, and remediation. Performed ongoing monitoring, cyber investigations, and performed computer forensics in conjunction with incident response and malware analysis.  Defended customers and responded to incidents of advanced cyber-attacks, intrusions, data breaches, thefts, and scams.  Customers include “Fortune Global 500” firms to mid-sized organizations. Manager, Information Security Intrusion Detection, Incident Response, and Cyber Investigations Bridgestone Americas, Inc. Nov 2010 – Oct 2012  Information security professional with experience protecting a large $35B “Fortune Global 500” organization with 144,000 employees worldwide.  Designer and manager of Bridgestone’s global SOC (Security Operations Center) to effectively monitor and provide detection of cyber threats in the Americas, Europe, and Japan. Manager overseeing the development of ground-breaking solutions that provide world-class protection of networks, systems, business processes, and sensitive data. Actively developed and used threat intelligence, reputation data, and known indicators-of-compromise. Implemented layered signature-based and behavioral-based detective and preventative solutions.  Lead investigator of numerous instances of employee and third-party cyber-crimes and unauthorized activity. Effectively led incident response and protected Bridgestone from intrusions, malware infections and propagation, thefts of intellectual property, and malicious or unauthorized activity for almost 13 years. Information Security Officer (ISO, ISSO) Bridgestone/Firestone, Inc. Bridgestone Americas, Inc. Sept 1999 – Nov 2010  First Information Security Officer (ISO) for Bridgestone/Firestone, a role that I served in for over 11 years. Led the development of a new information security program and iteratively developed policies, standards, & procedures designed to bring alignment and compliance with regulatory requirements, including FFIEC/OCC banking regulations, PCI DSS payment card industry regulations, Japanese Sarbanes Oxley (JSOX), GLBA, C-TPAT, HIPAA, etc.  Managed and performed vulnerability scanning and penetration testing. Oversaw Bridgestone’s vulnerability, risk, and security posture assessments. Managed web portal and application assessments, as well as source code reviews. Provided analysis and remediation recommendations. Designed and instituted security controls and solutions. Led project-based and enterprise security engineering and architecture planning. Developed and instituted corporate strategies and requirements for safeguarding of enterprise networks, systems, applications, and data.  Overall responsibility for perimeter and network security, system security, application security, and information protection. Researched and communicated information on current and emerging threats, new protective strategies and tactics, and manufacturer security bulletins and patches. Senior Information Security Analyst Omnipoint Communications 1997 – Sept 1999  Information security leader for a $4.8B US GSM Cellular Telephone Carrier.  Led a new information security program. Administered firewalls and IDS. Performed vulnerability scans and pen tests. Led incident response, light forensics, and cyber investigations.  Provided security engineering and controls recommendations. What others say… “Tim has always been a knowledgeable, up-to-date resource for security questions & best practice recommendations. Through Tim's leadership we have implemented and practiced a "defense-in- depth" methodology that has proven quite successful in protecting our infrastructure.” - EM “I can honestly say there was never a time when his ideas were not thoroughly researched and provided the best security, protection, and forensics possible. The time he must spend on his own in keeping up with the latest threats and security measures is substantial. Regardless of what was thrown his way, he was always ready to react and mitigate the risk. He takes pride in his work and has a passion that is unmatched by anyone I know.” -RG “ Tim exceeded all expectations and his abilities and value were quickly evident with the reduction in security incidents experienced by Bridgestone following his addition to the company. Tim has an extensive knowledge of Information Security and a clear understanding of how it can bring the most value to an organization. He has a contagious passion for Information Security and a tireless dedication to securing the assets of the company he has been hired to protect. I have never met a more trustworthy individual who prides himself on leading by example and doing the right thing.” - JP