• Résumé général
    Joseph Jones , CISSP
    Joseph Jones , CISSP
    Visting Professor at De Vry University
    Chicago, Illinois
    Aussi connu(e) soussecuritynewbie
    LocalisationChicago, Illinois
  • Informations de contact
  • D’où viennent les informations qui figurent sur ce profil? En savoir plus.
  • Biographie
    I'm a Information security specialist whose qualifications include former U.S. Marine , adjunct college professor, and team lead with advance degrees in computer science; detailed knowledge of security tools, technologies and best practices. I...
    En savoir plus
  • Expériences professionnelles
    07/2008 - Courant
    Instructs students on Cisco network fundamentals, routing and routing protocols, local area networks (LAN), virtual local area networks (VLANS) and wide area networks (WAN) Network infrastructure security issues, including perimeter security defense, firewalls, Virtual Private Networks, Intrusion Detection Systems, wireless security, network security auditing tools and ethical considerations. Advanced routing infrastructure implementation using OSPF, RIPv2, EIGRP, BGP, multi-homed BGP setups and IGP/EGP redistribution. TCP/IP and OSI networking models, history and need for user authentication systems, three factors of authentication ,difference between role and account-based security. The implementation of role-based security in operating systems and the use in various access control models, biometric authentication technology, application of cryptography to authentication through IPSec.
    04/2006 - 05/2011
    -Writes white paper, articles, and presentations promoting improved security through digital situational awareness and defensible network architectures -Teaches classes to security analysts/operators, engineers, architects and college students -Performs independent consulting/contract work for military, government, and commercial clients Design, deploy, operate, and augment the protection, detection, and response architectures for customers in accordance with industry best practices and government regulations
    03/2010 - 03/2011
    -Incident Response: Designed, lead and support in all phases of Computer Network Defense and Incident Response (malware analysis, intrusion detection, forensics, etc.) -Infrastructure: Co-Led a comprehensive Network, VoIP, Wireless, & Security infrastructure design for a billion dollar children’s hospital utilizing Juniper Avaya, and Aruba for Routing, Switching, VoIP, Wireless and Network access control (NAC). -Leadership: Taught a range of network, security, and digital forensics courses at several Chicago land colleges at the undergraduate and graduate levels. Researched, lead, and advised leadership on security trends and methods to defend the enterprise to include information security policy creation -E-Commerce and Web Application Security- Leveraging the F5 BIG-IP 3900 & Application Security Manager (ASM) with WhiteHat Sentinel security services, we have provided a secure method for families to view patient health information (PHI)
    02/2008 - 04/2009
    Instructs students on Cisco network fundamentals, routing and routing protocols, local area networks (LAN), virtual local area networks (VLANS) and wide area networks (WAN) Network infrastructure security issues, including perimeter security defense, firewalls, Virtual Private Networks, Intrusion Detection Systems, wireless security, network security auditing tools and ethical considerations. Advanced routing infrastructure implementation using OSPF, RIPv2, EIGRP, BGP, multi-homed BGP setups and IGP/EGP redistribution. TCP/IP and OSI networking models, history and need for user authentication systems, three factors of authentication ,difference between role and account-based security. The implementation of role-based security in operating systems and the use in various access control models, biometric authentication technology, application of cryptography to authentication through IPSec.
    11/2005 - 12/2007
    Ensured VISA PCI DSS, SOX, and CPNI compliancy of enterprise systems for U.S. Cellular® Designed and maintained multi-vendor Firewalls, intrusion prevention and VPN infrastructure in a service provider environment Perform security reviews and audits to help U.S. Cellular Engineering with network security issues Maintained perimeter router security and availability for the organizations gateway devices Provided external VPN transport for the federal, state, and local law enforcement Data and Voice CALEA Performed manual security risk assessment of vendor provided solutions Provided daily operational support of security owned technologies (i.e. DNS, Firewalls, VPN’s, edge router infrastructure acl’s, OOB console devices, and 1x cellular service’s critical to the U.S. Cellular customers
    04/2005 - 09/2005
    Analyzed vulnerability of company databases and applications, including internal and external Web sites to identify vulnerabilities. Ensured Sarbanes-Oxley and Visa CISP/PCI compliance of enterprise systems for fortune 100 company. Conducted technical configuration assessments of UNIX, Windows, Oracle Databases, and perimeter network security devices. Conducted gap analysis, designed control tests, tested, designed new controls, and provided recommendations to management for the Operations, Change Management, and Technical Configuration 404 control areas
    05/1993 - 09/1998
    Transmitted and received topographical, voice and data over satellite systems for the United States Marine Corps Surveillance Reconnaissance Intelligence Group (SRIG)
    Voir toutes les Expériences professionnelles (8)
  • Relations
    Chargement... Veuillez patienter...
Bienvenu sur Yatedo!

Yatedo est un moteur de recherche de personnes.

Les robots de Yatedo parcourent Internet et collectent toutes les informations publiques sur une personne donnée (profils sur les réseaux sociaux, pages web, blogs, photos...) et produisent un profil digital.

Un profil attractif

Yatedo, c’est avant tout un profil très structuré et entièrement modifiable qui rassemble toutes vos informations publiques (y compris vos profils sur les réseaux sociaux). Vous avez enfin le contrôle sur votre présence en ligne et sur votre empreinte digitale!

Une visibilité améliorée

Vos informations sont centralisées, votre présence en ligne est synthétisée sur un beau profil aux allures de CV digital, ce qui saura attirer l’attention et faciliter le travail des recruteurs...!

L’accès à des données clés concernant votre profil

Que ce soit pour des raisons professionnelles ou personnelles, vous aurez accès à des chiffres parlants qui révéleront la nature et la source des visites sur votre profil.

Si ces choses vous parlent…
  • Avoir accès à un profil modifiable qui centralise toutes mes informations publiques et ma présence sur Internet
  • Pouvoir améliorer ma visibilité et mon image professionnelle en ligne.
  • Connaître l’intérêt que mon profil suscite sur Internet.

Créez un compte Yatedo

Non merci!

Cherchez-vous un(e) autre Joseph Jones , CISSP ?