Justin Shipe
Details
Computer Science
Bloomsburg University of Pennsylvania
2000 : 2003
I direct global cybersecurity strategies by developing maturity plans and building roadmaps for the security of the company. I solve architectural problems for large-scale, complex deployments which would otherwise serve as a potential risk.
I provide direction to manage the technology portfolio in terms of investing, maintaining, and divesting. Through my relationships with vendors, I am able to research and identify new technologies, participating in proof-of-concept and proof-of-value exercises. I also ensure that products, platforms, and infrastructure are built to meet all security and compliance, as well as business objectives.
Recent Highlights :
◆ Integrated 4 acquired companies with a combined value of $3B into the global cyber program
◆ Developed a tech rationalization process : identified $10.2M of a $75M cybersecurity software budget that could be recuperated
◆ Led the engineering and deployment of a $600,000 security platform upgrade
Fiserv acquired CardConnect/First Data in 2019.
2019 : Present
Fiserv
VP Information Security ◆ Cybersecurity Architect ◆ Information Strategist
First Data was acquired by Fiserv in 2019.
2017 : 2019
First Data Corporation
VP Information Security
After helping to build the startup, CMC, and then transitioning to the large corporate environment of Comcast, I realized I loved the energy and innovation that came with startup life. At a startup, there's something intangible but so motivating : a sense of creating something new and being a part of a team building from the ground up. CardConnect had the organization, structure, and methodology already in place--they brought me in to streamline IT and security.
When I was hired, the company was small, with ~30 employees. It was a close group by design that made all employees feel like stakeholders in the product and business model. When the company went public a few years later, we had approximately 300 employees. Our tremendous growth and upward mobility were testaments to our success as a team. I enjoyed the sense of community the company provided for us as employees; it made the job seem less like work and more like opportunity.
I expanded my role, taking initiative and more responsibility the longer I was there. I led security engineering and operations, information security program management, high-availability architectural design, disaster recovery planning, and analytics.
In 2017, CardConnect was acquired by First Data.
2013 : 2017
CardConnect
VP Information Security ◆ Original Team Member ◆ Acting CISO
Product Engineer for Xfinity Home - Security, Control, Energy
◆ Provided systems engineering expertise for maintaining the confidentiality, integrity, and availability of the Xfinity Home product
◆ Interfaced with vendors and other business units to make Xfinity Home the best security and automation service available
2012 : 2013
Comcast
Product Engineer, Xfinity Home
I joined the Katabat team, formerly known as CMC, in the exciting phase of a startup. I was one of a handful of employees working on building the company from the ground up. I gained valuable work experience in this position and learned that I love the energy and momentum of a startup.
Responsibilities
Information Security Manager
◆ Responsible for creating and maintaining company security policies and documents
Software Release Manager
◆ Managed production software releases
Linux and Windows Systems Administrator
◆ Maintained all production and development server infrastructure, including patching, system hardening, event monitoring, and access control
◆ Engineer for all corporate office infrastructure including Active Directory, DNS, WSUS, centralized virus management, and end-user workstation deployment
Script Developer
◆ Reviewed all production and development scripts for functionality, correctness, and error handling. Ad-hoc script developer for custom implementations
◆ Created and maintained all automated scripts for the corporate office infrastructure
2009 : 2012
Katabat
Information Security Manager ◆ Acting CISO
Skills
Access Control, Active Directory, Apache, Bash, Budget Management, Cross-functional Team Leadership, Cybersecurity Incident Response, Data Analysis, Data Center, Disaster Recovery, Endpoint Security, Global Security, High Availability, Information Security Management, Integration, IT Compliance, IT Risk Management, IT Security Best Practices, IT Security Operations, IT Security Policies & Procedures, Linux, MySQL, Nagios, Nessus, PCI DSS, Penetration Testing, Performance Tuning, Perl, PHP, Physical Security, Postfix, Process Automation, Process Improvement, Python, SCCM, Security, Servers, Software Development, SQL, Strategic Leadership, Strategic Thinking, System Administration, Team Leadership, Team Management, Unix Shell Scripting, VBScript, Vulnerability Assessment, Vulnerability Management, Windows, Windows Server
About
Developing strategies and solutions for complex problems is what teams rely on me to do as a company leader and information security architect. Nothing brings me more career satisfaction than working with a team to take an idea from whiteboard to completion.
If there's one thing that inspires me to work harder, it's a challenge. Although I have always worked in IT, I gravitated towards security early in my career because it presented a set of unique challenges that spoke to my interests. Security is an ever-evolving landscape that forces everyone in its orbit to evolve. That energy propels me to strategize, problem-solve, and work smarter.
As an Architect and Vice President, I lead team members to collectively develop ways to enhance our processes in managing compliance and security assessments, on-site assessments, and third-party assessments. We communicate risks, incidents, and program efficacy to business leaders daily.
Accomplishments:
◆ Fully developed and validated the second PCI P2PE Solution in the US under P2PE v1.1
◆ Deployed the company’s first installation of payment-focused hardware security modules to three data
centers for end-to-end payment encryption
◆ Built a 24x7x365 security operation using in-house personnel and a managed service provider
◆ Completed a full re-architecture of the production environment supporting a level 1 payment gateway,
moving from standalone servers to a virtualization model
Leading the Way in cybersecurity-I'm always up for a challenge.
I look forward to connecting with you.