George Sprague

Chief Information Security Officer at Roll-Call Security & Communications
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
New Braunfels, Texas, United States, US
Languages
  • English Native or bilingual proficiency

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

5.0

/5.0
/ Based on 2 ratings
  • (2)
  • (0)
  • (0)
  • (0)
  • (0)

Filter reviews by:

Dawn Cole

George has helped our company successfully tackle several networking and security challenges. He offers expert knowledge and skills. I also greatly appreciate his ability to work with -- and effectively communicate with -- technicians, end users and management. It is rare to find a senior, technical expert who offers outstanding communications skills and works well on a team. But George is just that. It will be a bonus to work with him again.

Mauricio Moreno

George is a very knowledgeable and capable trainer. His knowledge in cyber security and networking has enabled us (his students at McLane Advanced Technologies) to obtain an ample body of knowledge in these subjects. Maintains a lively class room through thoughtful conversation while at the same time ensuring that the materials covered in his classes are well understood. Thank you George, you have enabled me to gain the knowledge I needed to pass the Network+, Security+ and Certified Ethical Hacker exams.

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • Certified Cloud Security Professional
    ISC2 AUSTIN CHAPTER
    Jun, 2017
    - Oct, 2024
  • Splunk Architect
    Splunk
    Jan, 2016
    - Oct, 2024
  • CCFP
    -
  • CCNA
    -
  • CEH
    EC-Council
  • CISA
    -
  • CISM
    -
  • CISSP
    (ISC)²
  • C\CISO
    EC-Council

Experience

    • United States
    • Computer and Network Security
    • 1 - 100 Employee
    • Chief Information Security Officer
      • Mar 2014 - Present

      Our Motto: You Hack...we Hunt....there is NO ESC. Our Motto: You Hack...we Hunt....there is NO ESC.

  • Atos
    • Provence-Alpes-Cote d'Azur, France
    • Threat Intelligence Manager/ Sr. project manager
      • Feb 2017 - Dec 2021

      My team was directly responsible for Threat Intelligence operations, delivery, and Malware forensic for North American and European division. And used the Diamond model for Intrusion analysis with Maltego Responsible for managing all reverse engineering projects of malware, Bots, and other programs that effect the Atos network for 12 digital forensics analyst and engineers. Also help in the collection data mining for federal and state legal cases uses several different method collecting data (virus total, threat crowd). ●Evaluates internet and SIEM security alerts to comply regulatory requirements (NIST, ISO27001) for customers that used Cisco ICE and Nexus 9000. ●Set goals and security risks assessments and vulnerability assessment for team members to resolve highly complex technical and business issues. Also, setup metrics to measure team preforance for clients. ●Created and developed several projects for transferring data and security applications to the AWS and the Azure cloud environment this including a IAM, for the security of the clients. Show less

    • United States
    • Transportation, Logistics and Storage
    • 1 - 100 Employee
    • Director of Cyber Security
      • Jan 2015 - Jan 2017

      •Created and directed the cyber security analyst curriculum, which was vetted and approved as a graduate level program through a major Texas university Computer Science department head. •Develop project scope and created capture timelines, dependencies for IT security architecture project which encompasses vision and strategy, standards and guidelines, for the McLane group cyber security team. •Developed the IT security operations include vulnerability and threat management, processes and standards, identity and risk assessment implications, and created audit compliance activities that allow MAT pass the DOD audit with high scores. •Plan, design, install, and the network and wireless equipment to meet Federal (DOD) regulation on Federal and Military security policies to include, encryption, intrusion detection, IDM and DMZ security to meet FIBS 140-2, HIPPA, EU GDPR (EU General Data Protection Regulations), NIST 800-53, 171, TAC 202, COBIT and PCI requirements, as well as the Federal AWS Cloud security procedures . •Developed and directed the IT security vulnerability and threat management team, with both an incident response team , so that we could be complaint with the new DOD and the GDPR laws Show less

  • Fort Meade
    • Austin, Texas Area
    • Senior Cyber Security Architect/Project manager
      • Jan 2010 - Dec 2014

      •Pivotal role in ensuring strict adherence with established policies, process and security compliance controls and maintain security equipment such as intrusion detection / prevention system (IDS/IPS (source fire), Nessus vulnerability scanner, security information and event management (SIEM) through the Qradar SIEM IT Security architecture and also using the Splunk architecture to link 10 national datacenters together. •Plan, design, install, maintain and troubleshoot Cisco network and wireless equipment to meet Federal (DOD) regulation on Federal security policies to include, encryption, intrusion detection, and DMZ security to meet FIBS 140-2, HIPPA, New NIST 800-53A and PCI requirements. •Responsibilities included the writing and implementation of the procedures and process for transferring VA personnel (H.R) data to the Federal AWS cloud. Show less

    • Law Enforcement
    • 700 & Above Employee
    • Contract Sr. Network Security Architect
      • Jan 2010 - Mar 2012

      • Helped in the configurations of Cisco Nexus 7000 and 4500 (Nx-OS) switches and several Cisco ASA 5580 routers and Cisco Wireless Controllers to bring the Texas DPS main office up to CJIS and FIBS 140-2 standards. • Responsibly for the implementation of Q-radar, Tipping Point, F5 Big IP load balancing, Cisco Iron port 660s to help secure the DPS DL Headquaters. • Spearheaded the writing and implementation of Network security policies for securing several DPS data center sites. • Responsibilities included the writing and implementation of strict Risk Assessment security policies for sensitive HIPAA, PCI Data and its storage on separate controlled servers. • Responsibilities for conducting and training incident response teams, this was to ensure security events are properly identified, correlated, documented and mitigated in accordance with DOD and NIST 800-61 standards for auditing purposes (SOX, AIG) . Show less

    • United States
    • Semiconductor Manufacturing
    • 700 & Above Employee
    • Product Manager Customer Software
      • Jan 2009 - Feb 2010

      Supervised a remote software coding team to develop the new FME (Fusion Media Explorer), Fusion for Gaming Utility, and AMD Over-Drive software. Responsible for managing the build and testing of new gaming systems and servers for media trade shows (CES 2009) and media reviewers and testers. Supervised a remote software coding team to develop the new FME (Fusion Media Explorer), Fusion for Gaming Utility, and AMD Over-Drive software. Responsible for managing the build and testing of new gaming systems and servers for media trade shows (CES 2009) and media reviewers and testers.

    • United States
    • IT Services and IT Consulting
    • 700 & Above Employee
    • Product Manager
      • Mar 2006 - Jan 2009

      ● Created Security Standards for the configuration of all network security devices such a Check-Point, Bluecoat IDS, and set up a Central Logging Server using Syslog with custom rules for all Unix, Linux, Window, MacOS systems. ● Managed, maintained and supported Dell’s Intrusion Detection System (IDS) application and infrastructure, globally using Bluecoat IDS management system. ● Configured firewalls globally using Check-Point firewall management system and forwarded suspicious logs, identify traces, and indicators of compromise hosts, to the Austin branch of Homeland security for event correlation and analysis from these manufacturing offices in Porto Alegre, Brazil Bangalore, India and Penang, Malaysia. Show less

    • United States
    • Telecommunications
    • 700 & Above Employee
    • Business Internet Services Manager
      • Feb 2004 - Mar 2006

      Spearheaded a project team made up of developers and database administrators. To develop code written in C# on Oracle's Siebel CRM to connect 7 telecommunication companies and deliver a new DSL system for AT&T's new Spanish speaking interactive web based Credit card ordering system for customers in Latin America. Managed a team of 45 developers to write code in J2EE and Oracle's Siebel CRM architecture to link PacBell & Ameritech's data systems to several state telecom systems, which including LDAP, Call Tracker, and several Oracle Databases to the new AT&T U-verse system. Reduced the downtime on several new video telecommunication projects by coordinating the creation of a large WiMax networks, and then implemented a security driven architecture management system running on a managed 24 by 7 schedule. Show less

  • Connect South Communication
    • Austin,Texas/Charlotte, NC
    • Senior Security Manager/Architect/Developer
      • Jan 1998 - Jan 2004

      Architect the redesign of several OSS systems which used security strategies and architecture according to NIST standards, developed and created disaster recovery planning's and testing procedures, and implemented network stability and Client security authentication procedures. Created the software systems requirements using System Development Life Cycle, which resulted in the use of Vitria web-server integration, thru business objects and J2EE sub programs as the data bus for all new real time software connections. Spearheaded the implementation of the VoIP and the multiple VPN projects, which used Cisco Routers and switches. Created daily, weekly and monthly reports for the Broad of Directors and other senior management using Crystal Reports for monitoring workflow and project objectives. Spearheaded the implementation of Citrix Presentation Server to manage network stability and Client security authentication, Terminal service issues and network Load balancing to several facilities using Cisco VPN client. Managed the implementation of several remote servers for security and disaster recovery issues for several large DSL companies in five different states. Managed 13 Novell network administrators and created a help desk tracking system using Oracle and Cold Fusion on a Linux Redhat 7.2 server. Show less

Education

  • The King’s University
    Master of Divinity - MDiv, MESSIANIC JEWISH STUDIES
    2019 - 2021
  • The King’s University
    Bachelor of Biblical & Theological Studies, Messianic Rabbinical Studies
    2018 - 2021
  • Kaplan University
    Master of Technology - MTech, Digital Forensics
    2010 - 2012
  • Kaplan University
    B.S, Business/Information Systems
    2005 - 2009
  • Austin Community College
    AS, Computer Science
    1979 - 1983

Community

You need to have a working account to view this content. Click here to join now