George Stephenson
IoT Information Security Architect
  • Chicago,
  • Illinois,
  • United States of America
Member Since: 2014/05/16
Industry: Manufacturing/Production/Operations
Tech Certifications:
View All

Cyber Risk, Privacy, Compliance & Security Professional

More bio
Activity
Points this month0
Total points0
Questions: 7
Solutions:
Articles:
Videos:
Tutorials:
Posts:
Professional Background
IoT Information Security Architect
CNH Industrial
July 2018 – Present
Burr Ridge, Illinois
Security strategist and point of contact across Risk, Compliance, Cybersecurity, Application Security, Identity and Access Management, Security Operations Management, and Business Continuity / Disaster Recovery disciplines. Partner with cloud and client development and delivery teams to ensure adherence to InfoSec architecture, policies, procedures, baselines and guidelines.  Coordinate and consult on Internet of Things developing standards and architecture for emerging connected vehicle solutions.  Responsible for PKI Infrastructures; Remote Assistance processes and solutions; Firmware Over The Air/Software Over The Air ; Threat and Risk Analysis and project management.
Instructor
Computer Systems Institute
January 2005 – Present
Technical Instructor for IT Auditing and Security certifications courses.  CISSP, CISA.
Information Security Adminstrator
Chicago Teachers Pension Fund
March 2016 – September 2017
Chicago, Illinois
Develop and maintain an Information Security Roadmap, setting, tracking, and engaging management with CTPF’s goals for risk awareness and reduction.
Enhance and administer CTPF security programs, including antivirus/malware, intrusion detection/prevention, and systems event monitoring /escalation, and patch management.
Monitor for CTPF compliance with applicable policies, laws, and regulations.
Conduct security awareness training and education.
Work with the IT Director and a Security Governance Committee to manage the development, implementation and maintenance of an Information Security Management program and its associated policies, standards and procedures; including the implementation and maintenance of a document retention program and required state filings.
More
Education
No Education Background shown
More
Full Biography

Information Technology Security Professional

Insightful, results-driven IT professional with considerable success directing a broad range of corporate IT Security initiatives while managing the strategic security direction and implementing solutions in support of business objectives. Excel at providing comprehensive secure network design and full life-cycle project management. Hands-on experience leading all stages of project development and management efforts, including requirements definition, design, architecture and support.

Ability to lead and motivate teams at any level. In-depth understanding of information systems, networking and security. . Experienced in overseeing the creation and maintenance of information security policies, leading security risk assessment efforts, and owning the security awareness and training programs. Can advise and collaborate with multiple business units on business continuity and disaster recovery plans as well as audit and governmental compliance practices.  Additionally have experience with the responsibility of building an information security-conscious company culture.
Extensive hands-on experience in building the information security strategy which includes implementing, directing, and overseeing the governance, assessment, consulting, and monitoring of all information security requirements.
Comprehensive working knowledge and experience of currently accepted information security standards, guidelines and theories.

Expertise with developing and implementing policies, procedures and standards that meet the defined information security management requirements. Capable of overseeing and managing a team of information security professionals whose primary responsibility is to coordinate enterprise-wide security efforts, implement security standards, test information security processes and controls, and provide management level reporting.

Specialties: Platforms:       Windows 9x / NT / 2000 / XP / Vista / Windows 7; Mac OS;
      
Networking:       Cisco Networking: including IOS, Catalyst OS. PIX Firewall, ASA.. Experience with Layer 2 and 3 LAN, PAN, MAN, WLAN and WAN technologies and protocols (VLAN’s, GigE, STP,  Etherchannel, 802.1x, 802.11a,b,g,n; WiMAX; FR, ATM, DWDM, SONET, MPLS, TCP/IP, QOS, OSPF, BGP, EIGRP, VoWiFi, Mesh Networking, IPv6, 4G Mobile Data, etc.)

More
Languages
No Languages shown

Level Progress

Current: Level 0
George needs 2,000 points to level up.
LVL 1
  • Overall
    0