Daniel Smith

Federal Sales Engineer at FireMon
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
US

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • ITIL-F
    EXIN
    Dec, 2013
    - Nov, 2024
  • CEHv6
    EC-Council
    Jun, 2011
    - Nov, 2024
  • Security+
    CompTIA
    Mar, 2010
    - Nov, 2024

Experience

    • United States
    • Software Development
    • 100 - 200 Employee
    • Federal Sales Engineer
      • Apr 2020 - Present

      • Experienced Sales Engineer and Subject Matter Expert supporting two Sales Reps across Federal, Intelligence Community, Military, and Commercial territories. • Engages in all stages of the sales lifecycle with a heavy focus on the pre-sales stages to include prospect introductory engagements, demonstrations, RFI/RFQ, architectural recommendations, pricing configurations, and otherwise all technical aspects of the pre-sales life cycle. • Interfaces with Channel to develop and strengthen partner relationships through demonstrations, training, seminars, and social events. • Proactively builds client relationships to find new avenues for expansion through upselling and cross-sale opportunities. • Provides historical details and technical guidance to the TAM, Professional Services, and Support team members throughout the installation and support phases of the lifecycle. • Works with partners through the extensive submission process for Approved Product Listings. • Builds partner and client relationships to gain credibility as their preferred technical point of contact. • Works with Customer Experience Management to conduct regular operational status cadence meetings with existing clients to ensure they are continuing to get their money’s worth, that support issues are being resolved in a timely manner, ensure health and architecture are solid, review new revision developments and roadmap initiatives, review any new license requirements, and discuss plans for integration and expansion. • Conducts lab testing of solutions and integrations and provides feedback to Developers. • Serves as Technical SME at various security conferences including RSA, Blackhat, SecureSense, and SecTor to name a few. • Serves as panelist for ATARC Federal solution discussions on Cyber Security, Cloud, and Zero Trust topics.

    • United States
    • IT Services and IT Consulting
    • 700 & Above Employee
    • Manager - Network Security
      • Apr 2019 - Mar 2020

      Contract Prime was formerly Defense Point, LLC which merged with AFS in 2019 • Served as the Cybersecurity Program Manager for the U.S. Securities and Exchange Commission Cybersecurity team. Interfaced directly with the Cyber Security Director, Chief Information Security Officer, and Contracting Officer Representative providing oversite on all matters related to Cybersecurity operations, contract financial data, billing, and adherence to all contractual obligations. • Created and lead the daily status review calls of critical outages, network and system service impacts on network infrastructure and High-Value Assets, reviewed support and change management tickets, and addressed ticket deficiencies. • Provided leadership and oversight of active Cybersecurity breaches and events. Maintained real-time crisis situational awareness reporting directly to the Cyber Security Director and Chief Information Security Officer. Provided official reports on all critical and high-priority network security events and security breaches. • Coordinated service degradations and outages with the engineering team. • Created weekly and monthly client program management metrics and conducted the associated meetings with the Director, CISO, and stakeholders. • Provided staff guidance concerning both professional and personal concerns. • Acted as the hiring manager and conducted interviews with potential candidates. • Coordinated access and escort of uncleared visitors with facility security. • Oversaw staff performance and all matters related to conflict resolution. • Managed SOC coverage to ensure continuous 24x7 operation and coordinated with team members to ensure no disruption to operations.

    • United States
    • IT Services and IT Consulting
    • 700 & Above Employee
    • Senior Network and Information Security Engineer
      • Jul 2007 - Mar 2019

      • Final escalation point for the Government Network Operations Security Center (GNOSC) Advanced Technical Support (ATS) Team, supporting federal customer-managed security devices. Oversaw multiple simultaneous projects at any given time. • Provided daily briefing for project and high-priority issue statuses to executive management. • Configured Firewalls for new deployment and replacements (RMAs). Managed deployment projects from start to finish including risk management, coordinating resources, scheduling, on-site tech resource accesses, communications, post-maintenance lessons learned, and maintained associated SOP documentation. • Primary escalation point for customer outages, performed emergency device troubleshooting for issues related to VPN, resource connectivity, and security device failures. • Worked with Information Assurance to prioritize and address scan findings, perform baseline hardening, and facilitate Plan of Action and Milestones (POA&M) mitigation activities. • Worked with Governance and Product Lifecycle Engineering, to test device version compatibility, and to make hardware and software recommendations to customers. • Reversed engineered proprietary backend feed connections to resolve service monitoring disruptions, resolve back-end feeds, document the associated procedures (SOPs), and conduct team training exercises. • Managed security device software version upgrades for Federal Managed Security Customers. • Trained SOC and junior engineers using a post-maintenance/troubleshooting lessons-learned style approach.

  • US Courts (contract)
    • Washington, District of Columbia, United States
    • Network Security Engineer
      • Jul 2006 - Jul 2007

      • Lead Supervisor of the Security Operations Center incident handling team. • Trained new analysts and provided procedural clarification, and guidance. • Performed payload analysis against security threats, Syslog searches, and real-time packet traces. • Performed vulnerability scans using Nessus. Performed patch management and hardware database maintenance for network infrastructure systems and servers residing on the national gateways for the Federal Judiciary • Provided detailed security incident reports to executive management. • Change management and troubleshooting firewall policy, and IDS/IPS signature sets. • Maintained an extensive secure knowledge base that details Judiciary specific threats, security controls, and procedures.

    • NOC Engineer
      • Nov 2001 - Sep 2006

      • Lead Supervisor of the Security Operations Center incident handling team. • Trained new analysts and provided procedural clarification, and guidance. • Performed payload analysis against security threats, Syslog searches, and real-time packet traces. • Performed vulnerability scans using Nessus. Performed patch management and hardware database maintenance for network infrastructure systems and servers residing on the national gateways for the Federal Judiciary • Provided detailed security incident reports to executive management. • Change management and troubleshooting firewall policy, and IDS/IPS signature sets. • Maintained an extensive secure knowledge base that details Judiciary specific threats, security controls, and procedures.

Education

  • Strayer University
    BSCS, Information Systems
    1996 - 2001
  • AV-ED Aeronautical Flight School
    Licensed Private Pilot, Single Engine Land Aircraft
    1999 - 2000

Community

You need to have a working account to view this content. Click here to join now