Jim C.
Details
Cybersecurity
Strayer University
2021
Associate of Arts - AA
Information Systems
Strayer University
2012
Availity
Senior Director, Deputy Chief Information Security Officer
Various responsibilities including Incident Response and Crisis Management, Threat Intelligence, Insider Threat and Data Security, GRC
2015 : 2021
Deloitte
Director - Risk/Cybersecurity
The Communications Chair is responsible for all communications with the chapter members to include, but not limited to, email, phone, and out of band channels. This role helped to facilitate the quarterly meetings with ISSA Delaware Valley members, setup a tracking mechanism to trend outreach and help foster relationships between the sponsors and its membership.
2017 : 2018
ISSA Delaware Valley Chapter
Board Member - Communications Chair
Reporting directly to the Global CISO, Jim was responsible for building and operating an intelligence-driven network defense program for TransUnion. He was able to quickly build relationships with business and technology leaders across the company and design a three year strategy that received board level approval.
Areas of responsibility included Cyber Threat Hunting and Intelligence, Global Privacy, Security Operations Center development, Penetration Testing and red team activities, Incident Response and blue team activities.
2015 : 2015
TransUnion
Director, Global Head of Cyber Threat and Intelligence
Reporting to the global CISO, Jim was responsible for multiple areas of security, including but not limited to :
-Security Operations Center development
-Incident Response
-Security Architecture and Design
-Security Intelligence (Cyber Threat Intelligence)
2005 : 2015
Deloitte
Senior Manager, Global Information Security Office
Skills
Coaching, Communication, Computer Forensics, Confidentiality, Crisis Management, Cyber Defense, Cyber Insurance, Cyber Operations, Cybersecurity, Cybersecurity Incident Response, Cyber Threat Intelligence, Cyber Threat Intelligence (CTI), Data Analysis, Data Privacy, DLP, Enterprise Risk Management, Executive Leadership, Incident Response, Information Security Management, Insider Threat Detection, IT Risk Management, IT Strategy, Leadership, Malware Analysis, Management, Network Forensics, Organizational Leadership, Panel Discussions, Personally Identifiable Information (PII), Program Management, Risk Management, Security Incident Response, Security Information and Event Management (SIEM), Security Operations, Security Operations Center, Team Leadership, Threat Detection, Vendor Relations, Vulnerability, Vulnerability Assessment, Vulnerability Management