Summary
Overview
Work History
Education
Skills
Timeline
Generic

Kelsei Young

Houston,TX

Summary

AI Security Technology leader, skilled in guiding navigation of modern technology. Accustomed to driving efficiency and effectiveness by developing, delivering, and supporting strategic plans. Demonstrated skill in translating technical requirements to business solutions. A successful 9-year record of building positive relationships with internal and external stakeholders.

Overview

7
7
years of professional experience

Work History

Senior Director, Information Security

IBM
12.2019 - Current


  • Research and Development: Lead and conduct research in the field of AI, with a primary focus on how AI can be applied to mainframe computing environments.
  • Innovation Strategy: Develop and execute a strategic vision for AI innovation on mainframes, identifying areas of opportunity and potential use cases. Support strategic planning processes, including interdependencies between key business, technology, and financial planning processes Facilitate structured reviews of the enterprise portfolio of strategic initiatives & implications (e.g., budget considerations, resource allocation, etc. Support agenda and materials development for senior executive audiences & meetings e.g., Board Meetings, Executive Offsites.
  • Collaboration: Collaborate with cross-functional teams, including mainframe experts, software developers, and business stakeholders, to define AI projects, objectives, and deliverables.
  • Prototyping: Lead the development of AI prototypes and proof-of-concept solutions to demonstrate the feasibility and value of AI on mainframes.
  • Threat Modeling Planning: Align with security engineers to discuss the Ongoing Monitoring and Review of encryption products and Implement mechanisms for continuous monitoring and review of the threat landscape, ensuring that security measures evolve alongside emerging threats. Reporting and Governance, Overseeing the development of reports that outline the identified threats, associated risks, and recommended actions to ensure proper governance and oversight. Compliance and Regulation Adherence: Ensure that the threat modeling process and subsequent strategies comply with industry standards, regulations, and internal policies. Risk Management Strategy: Develop a comprehensive risk management strategy, including risk transfer, risk mitigation, risk acceptance, or risk avoidance, aligned with the organization's risk appetite.
  • Technology Evaluation: Stay up-to-date with the latest AI and mainframe technologies, evaluating their potential impact and applicability to the organization.
  • Project Management: Oversee project timelines, budgets, and resource allocation to ensure the successful execution of AI initiatives.
  • Documentation: Maintain comprehensive documentation of research findings, methodologies, and AI models.
  • Testing and Validation: Overseeing testing and validation procedures to ensure the accuracy and effectiveness of AI solutions.
  • Security and Compliance: Ensure that AI projects on mainframes comply with security and regulatory requirements

Sr Manager, Security Architect ( Fraud SPU)

Univeristy Of Houston
08.2016 - 12.2019
  • Risk Assessment: Proficiency in assessing and managing cybersecurity risks and vulnerabilities.
  • Incident Response: Expertise in developing and implementing incident response plans and procedures.
  • Compliance: Familiarity with relevant cybersecurity regulations, standards, and frameworks (e.g., NIST, ISO 27001, GDPR).
  • Cyber Threat Intelligence: Understanding of the cyber threat landscape and the ability to analyze and respond to emerging threats
  • Threat Modeling: Performed a threat modeling exercise for a web application, identifying potential security risks and vulnerabilities, and created a comprehensive report outlining the identified threats and proposed mitigation strategies, collaborating with the development team to implement security best practices. Threat Modeling Assessment: Defined Objectives and Scope Established the scope of the threat modeling. Determined which assets, systems, or processes will be considered and the level of depth required for the analysis. Align security with University Goals: Ensured that the threat modeling exercise aligned with the business's strategic objectives. Understand the balance between security measures and the operational efficiency of the organization.
  • Leadership: Strong leadership and team management skills, managed a student-led team of 6.
  • Communication: Effective communication skills to convey complex cybersecurity concepts to non-technical stakeholders and to collaborate with other departments.
  • Problem-Solving: Strong analytical and problem-solving skills to address cybersecurity challenges and incidents.
  • Knowledge Intake: Solid knowledge of cryptographic primitives and protocols and how they combine to form secure systems.
  • Leading development: Experience managing large-scale infrastructure with Chef, Ansible, etc.
  • Security Control Facilitation: Experience building security controls using OS mechanisms and protocols (eBPF, seccomp, Kerberos, ssh, etc).
  • Research & Development: A track record of performing cutting-edge security research.
  • Merger & Acquisitions Security: Experience designing, implementing, and integrating EDR Solutions with a variety of operating systems and data systems.
  • Cloud Security: Cloud Engineering experience in AWS, Azure, and/ or GCP.
  • Technical In-House/Third Party: Experience Hardening Cloud IaaS, PaaS, and SaaS. Experience integrating with and securing a combination of in-house developed and third-party solutions.

Education

Ph.D. - Artificial Intelligence CyberSecurity

Capitol Technology University
Laurel, MD

Master of Science - Comp Eng: BioMedical Cybersecurity Engineering

University of Houston
Houston, TX

Bachelor of Science - Criminal Science

University of Houston
Houston, TX

Skills

  • CIS Security control
  • PCI Compliance
  • Software Deployment
  • Threat Modeling
  • Safety Rules
  • ISO 13485
  • Machine Learning
  • NLP
  • IEC 62304
  • Ephemeral environments
  • Security integration (SECDEVOPS)
  • FIPS 140-2
  • NIST-CF
  • Kubernetes
  • Product Management
  • NIST 800-53
  • PCI-DSS
  • ISO 27001
  • OCP
  • Z Mainframe
  • ISO 27013
  • Data security
  • IBM cloud
  • AWS
  • AZURE
  • Tensor flow
  • Kafka
  • Confluence
  • JIRA
  • GITHUB
  • Interpersonal Communication Skills
  • Product Development
  • Multi-Channel Campaigns
  • Project Management

Timeline

Senior Director, Information Security

IBM
12.2019 - Current

Sr Manager, Security Architect ( Fraud SPU)

Univeristy Of Houston
08.2016 - 12.2019

Ph.D. - Artificial Intelligence CyberSecurity

Capitol Technology University

Master of Science - Comp Eng: BioMedical Cybersecurity Engineering

University of Houston

Bachelor of Science - Criminal Science

University of Houston
Kelsei Young