Summary
Overview
Work History
Education
Skills
Timeline
Education and Professional Training
SoftwareEngineer
Jay Everett

Jay Everett

Founder / Consultant
Austin,TX

Summary

Resilient and self-motivated professional in cybersecurity, known for high productivity and efficient task completion. Possess specialized skills in data governance, threat analysis, incident response, and security policy development. Excel in critical thinking, problem-solving, and communication, ensuring robust security strategies devised and executed.

Overview

25
25
years of professional experience

Work History

Founder

Security Minds Inc.
Austin, USA
12.2014 - Current
  • Security Consulting in the areas of Data Protection, Security Strategy and Cybersecurity
  • Development of Enterprise Security strategies to ensure industry compliance (HIPAA,PCI,GDPR)
  • Development of Cybersecurity Plans reducing business risk
  • Development of custom matrices for evaluating cybersecurity threats and security controls
  • Develop mobile device threat modeling programs for (BYOD)
  • Conducting risk assessments for enterprise security controls (NIST, HIPAA, PHI)
  • Company Brand development and marketing
  • Understand the needs of cybersecurity engineering to drive requirements and strategy for cybersecurity data collection, analysis, and operationalization with clients
  • Collaborate with Data Protection teams and corresponding stake holders to gather business and product requirements
  • Identify and document data protection use cases and advise on the solution planning lifecycle
  • Align Data protection technical controls with strategic projects to improve security posture
  • Develop success metrics and SLAs
  • Define Data Protection Roadmaps that help identify security control gaps advise on best practices to enhance security controls to close gaps
  • Ensure clear communication regarding data protection projects across teams
  • Security Consulting

Managing Principal Consultant - DLP

Accuvant (Now Optiv)
Denver, USA
01.2013 - 12.2014
  • Manage complex DLP engagements ensuring successful deployment while advising on best practices
  • Responsible for research and development efforts within the Data Loss Prevention (DLP) sector
  • Standardizing DLP engagement deliverables
  • Developing consulting training material
  • Developing strategic DLP offerings across core vendors
  • Streamlining the DLP business arm of Accuvant
  • Building partner relationships within data protection
  • Establishing the strategy and direction for the DLP technology sector
  • Technology Services

Sr. DLP Security Consultant

Accuvant (Now Optiv)
Denver, USA
12.2011 - 01.2013
  • Company Overview: Technology Services
  • Managed Security engagements for various clients in all sectors (Financial, Health Care, Energy)
  • Lead mobile device security (MDM) assessments for a large financial institution
  • Lead Security Assessments for Large Multi-National Corporations
  • Developed cybersecurity strategic frameworks using NIST 800-53A
  • Developed DLP Service offerings as for Account Managers, and Sales Engineers
  • Refined data protection strategies for C-Level executives utilizing core DLP principles
  • Conducted Symantec DLP assessment to validate the current maturity level
  • Conducted Risk Assessments using TARA and ISO 27001
  • Lead RFP and Pilot of Out of Band Authentication engagements
  • Provided clients with an in-depth analysis of Cybersecurity threats, gaps, and remediation tactics
  • Lead several DLP Design, Tuning and Implementation engagements
  • Technology Services

DLP Security Consultant

Insight Global
Los Angeles, USA
05.2011 - 12.2011
  • Company Overview: Data Loss Prevention
  • Refined Symantec DLP Policies and response rules to monitor financial data
  • Conducted Symantec DLP assessment to validate the current maturity level
  • Developed strategic plans for customers to build a DLP Program
  • Defined a short- and long-term strategy to mature components of Symantec DLP
  • Engaged with Information Security & Compliance teams to obtain DLP Requirements
  • Responsible for Symantec DLP Network Discover architecture improvements
  • Conducted Data at Rest pilot to assess the system functionality after Symantec DLP upgrade
  • Installed & configured the Symantec DLP Suite, including advanced integration with LDAP/AD Infrastructure for advanced risk reporting
  • Data Loss Prevention

DLP Security Consultant

Bay Dynamics
San Francisco, USA
10.2010 - 03.2011
  • Company Overview: Data Loss Prevention
  • Responsible for architecture & deployment of the selection Symantec DLP Security controls
  • Managed client expectations for specific security projects while fostering additional opportunities
  • Installed & configured the Symantec DLP Suite, including advanced integration with LDAP/AD Infrastructure for advanced risk reporting
  • Lead the integration, upgrade, & deployment of DLP solutions in various client environments, including the knowledge exchange to customer’s primary technical & business Stakeholders
  • Assist client in designing and implementing Symantec Vontu reporting for new DLP policies
  • Engaged with clients to develop a DLP remediation workflow & Strategy
  • Trained clients on developing Symantec DLP policies
  • Data Loss Prevention

Security Systems Architect

Wells Fargo
Charlotte, USA
12.2009 - 10.2010
  • Company Overview: Wholesale Technology Services
  • Lead Architect to design & integrate Wholesale Identity/Access Management control systems during enterprise transition
  • Responsible for designing and implementing security architectures
  • Leading (AAA) Reviews while communicating the value of security to support enterprise standards and strategies
  • Developing Security Architecture & Tactics (SAT) for Wholesale Technology
  • Designed & recommended secure authentication solution for 3rd (Private Label) International partners in Wholesale Technology
  • Utilize LDAP to identify users of EximBills while validating security of X and A identification numbers for (Clients, Employees, Contractors, and International In-sourcing users
  • Creating Security (LTA) Living Target Architecture for Identity/Access Management
  • Wholesale Technology Services

Assistant Vice President (Information Security Engineer)

Bank of America
Charlotte, USA
11.2006 - 08.2009
  • Company Overview: Enterprise Information Management
  • Engaged with senior executives on topics & strategies for growing the Insider Threat Program while creating a level of awareness around the need for security at the endpoint level
  • Developed custom laptop image for executives traveling to the 2008 Olympics in Beijing and ensured data on each workstation was destroyed upon return
  • Lead the enterprise implementation of Web mail Blocking while communicating to all lines of business the logistics of this effort; developed & maintained the content search/quarantine of sensitive data on our live link repository (7TB) to completion
  • McAfee DLP (Endpoint) Demonstrated ability to lead and instruct beta project team tasked with enterprise implementation and support of McAfee DLP (data loss prevention) application including: Setup & configuration of McAfee EPO (E-Policy Orchestrator), Deployment of McAfee DLP Client Configuration of the DLP Event Collector Service, Development of Device Rules based on corporate privacy policy and standards Development of Reaction, and Tagging Rules based on corporate privacy policy and standards
  • Symantec Vontu DLP (Data in Motion), (Data At Rest); Utilized a combination of Symantec DLP tools to scan, identify & quarantine sensitive information found on file servers, databases, Share Point, Live link, and intranet sites; developed & enforced several policies for data protection utilizing Symantec Network Monitor which examines network traffic (SMTP, FTP, HTTP, & IM)
  • Successfully completed the Integration of Symantec Vontu infrastructure during 3 Mergers (Enforce Servers, Sensors, and Policy alignment)
  • During ATM security assessments utilized Nmap, Nessus, and Wireshark to gather ATM network; conduct DOS attacks, along with the analysis of traffic from TCP Dumps
  • Configured vlans for UAT environments; new security policies/controls in UAT environments were tested before production and during software pilots; Created a risk ranking matrix that documented the level of risk associated with target line of business to mitigate internal/external threats related to data breaches
  • Conducted technical & business analysis to resolve system/user problems to maintain efficient operations
  • Provided data for operational metrics and progress reports while promoting security awareness
  • Collaborated with the online banking team to mitigate vulnerabilities, i.e., SQL injections, MIM attacks, DOS
  • Managed (NPI) nonpublic information collected from Teradata, using BTEQ & SQL
  • Configured vlans for UAT environments to evaluate security policy implementations
  • Enterprise Information Management

Forensic Consultant (Electronic Discovery)

Mentor 4/TekSystems
Charlotte, USA
03.2004 - 11.2006
  • Company Overview: Bank of America
  • Managed the E-discovery archiving/ recovery system utilizing
  • (Veritas Netbackup, Attenex, )
  • 50% of daily duties are responsible for forensics work, primarily using Encase & FTK (Forensic Tool Kit), 50% focused on network Security
  • Collaborated with the data collection team and case analysts for the precise requirements of data collection requests
  • Researched and developed software tools for various electronic discovery projects, i.e
  • (Power Controls), (Oakley SureView), (MKS Toolkit), (ExMerge), (DNA)
  • Developed strategy & Phishing server for E-discovery to investigate Phishing websites (Netbackup, WireShark)
  • Coordinated various operational efforts between the Collection, Processing and Case Managers to ensure effective use of resources and technologies
  • Collected active and archived email data using ExMerge
  • Created DLP policies/triggers for Sure view
  • Familiar with security policies & procedures that effect Active Directory & Exchange (Dedicated AD team due to the size of the environment)
  • Coordinated 2nd phase of enterprise testing of SureView in Banking Center environment
  • Bank of America

Systems Analyst

Wake Forest University
Charlotte, USA
01.2002 - 01.2004
  • Conducted weekly server backups utilizing Veritas, while ensuring optimal performance of the touch-screen technology in Classrooms, Labs, and Conference rooms
  • Administered all Networking related issues, along with routine support of A/V equipment
  • Directed and trained MBA candidates on technology available within facility
  • Developed website for the Business Essentials Program for the Babcock Graduate School
  • Diagnosed and repaired hardware related issues with printers, laptops, and desktops

Technical Analyst II

Corning
Hickory, USA
08.2000 - 07.2001
  • Chosen team lead in configuring IBM Notebooks (T, and X Series) by utilizing Ghost 6.0
  • Administered Windows 2000 Domains during migration from Windows NT
  • Created/Maintained User accounts for Field Engineers, enabling access to intranet via VPN/Shiva/Pal
  • Trained team members on a series of IBM Notebook configurations
  • Collaborated with the Helpdesk team in resolving various software and hardware issues effectively
  • Completed training in lighting fiber and managing Fiber Networks

Hardware Support Specialist

TekSystems
Charlotte, USA
05.2000 - 07.2000
  • Company Overview: Consultant
  • Managed the inventory of new and replaced equipment while updating database accordingly
  • Created Ghost images and structured configurations for deployment of IBM Notebooks and Compaq Desktops
  • Resolved technical issues effectively with attorneys, and the IT department
  • Ensured hardware related issues were resolved, while providing Network Administration for multiple offices (Charlotte, NC, Raleigh, NC, and Charleston SC)
  • Consultant

Education

Computer Information Systems -

Strayer University
05.2003

Management Information Systems (MIS) -

UNC-Charlotte
08.1999

Skills

  • Data Protection Strategies
  • Cybersecurity
  • Risk Management Strategy
  • Cybersecurity Expertise
  • Operational Resilience Strategies
  • Project Planning
  • ServiceNow
  • Splunk Proficiency
  • TCP/IP
  • IDS/IPS
  • SQL
  • BTEQ
  • Nessus
  • Nmap
  • BackTrack
  • Symantec DLP
  • Office 365 DLP
  • FTK Expertise
  • Veritas NetBackup Administration
  • Linux Administration
  • Windows Administration
  • Windows Server OS
  • HIPAA Assessments
  • SOX Assessments
  • PCI Assessments

Timeline

Founder

Security Minds Inc.
12.2014 - Current

Managing Principal Consultant - DLP

Accuvant (Now Optiv)
01.2013 - 12.2014

Sr. DLP Security Consultant

Accuvant (Now Optiv)
12.2011 - 01.2013

DLP Security Consultant

Insight Global
05.2011 - 12.2011

DLP Security Consultant

Bay Dynamics
10.2010 - 03.2011

Security Systems Architect

Wells Fargo
12.2009 - 10.2010

Assistant Vice President (Information Security Engineer)

Bank of America
11.2006 - 08.2009

Forensic Consultant (Electronic Discovery)

Mentor 4/TekSystems
03.2004 - 11.2006

Systems Analyst

Wake Forest University
01.2002 - 01.2004

Technical Analyst II

Corning
08.2000 - 07.2001

Hardware Support Specialist

TekSystems
05.2000 - 07.2000

Computer Information Systems -

Strayer University

Management Information Systems (MIS) -

UNC-Charlotte

Education and Professional Training

  • Strayer University, Computer Information Systems, 08/01/01, 05/31/03
  • UNC-Charlotte, Management Information Systems (MIS), 08/01/97, 08/31/99
  • Sourcefire: Snort IDS/IPS Technology Training
  • Access Data Forensics Toolkit (FTK); BootCamp
Jay EverettFounder / Consultant