John Powell
Vice President of Services at Cyber Defense Group- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
Topline Score
Bio
Jerry Drew
J.J. is a highly motivated technician who works and learns at a very fast pace. He shows a passion to grow and succeed. His knowledge, troubleshooting skills, and excellent customer service are a perfect fit for any IT department. He is a rising star, and I would recommend him to anyone.
Jeff Cobb
JJ is a very organized, hard working individual. His technical knowledge is outstanding and he has the ability to pick up new concepts very quickly. He is that type of person that anyone would want to have on their staff. I look for JJ to accomplish great things in his IT/Information Security career.
Jerry Drew
J.J. is a highly motivated technician who works and learns at a very fast pace. He shows a passion to grow and succeed. His knowledge, troubleshooting skills, and excellent customer service are a perfect fit for any IT department. He is a rising star, and I would recommend him to anyone.
Jeff Cobb
JJ is a very organized, hard working individual. His technical knowledge is outstanding and he has the ability to pick up new concepts very quickly. He is that type of person that anyone would want to have on their staff. I look for JJ to accomplish great things in his IT/Information Security career.
Jerry Drew
J.J. is a highly motivated technician who works and learns at a very fast pace. He shows a passion to grow and succeed. His knowledge, troubleshooting skills, and excellent customer service are a perfect fit for any IT department. He is a rising star, and I would recommend him to anyone.
Jeff Cobb
JJ is a very organized, hard working individual. His technical knowledge is outstanding and he has the ability to pick up new concepts very quickly. He is that type of person that anyone would want to have on their staff. I look for JJ to accomplish great things in his IT/Information Security career.
Jerry Drew
J.J. is a highly motivated technician who works and learns at a very fast pace. He shows a passion to grow and succeed. His knowledge, troubleshooting skills, and excellent customer service are a perfect fit for any IT department. He is a rising star, and I would recommend him to anyone.
Jeff Cobb
JJ is a very organized, hard working individual. His technical knowledge is outstanding and he has the ability to pick up new concepts very quickly. He is that type of person that anyone would want to have on their staff. I look for JJ to accomplish great things in his IT/Information Security career.
Credentials
-
Amazon Web Services Cloud Practitioner
Amazon Web Services (AWS)Oct, 2021- Nov, 2024 -
Certified Information Systems Security Professional (CISSP)
(ISC)2Aug, 2010- Nov, 2024 -
Project Management Professional (PMP)
Project Management InstituteJun, 2013- Nov, 2024 -
Certified Ethical Hacker (CEH)
EC-CouncilJul, 2012- Nov, 2024 -
A+
CompTIA -
Microsoft Certified Professional
Microsoft -
Network+
CompTIA -
Security+
CompTIA
Experience
-
Cyber Defense Group
-
United States
-
Computer and Network Security
-
1 - 100 Employee
-
Vice President of Services
-
Dec 2022 - Present
Running delivery and services for Cyber Defense Group.
-
-
vCISO
-
Jan 2022 - Dec 2022
Outcomes based virtual CISO services.
-
-
-
Allvue Systems
-
United States
-
Software Development
-
400 - 500 Employee
-
Information Technology Security Engineer - Team Lead
-
Mar 2020 - Jan 2022
Investment software that challenges what's possible. By pairing private equity expertise with robust credit knowledge, Allvue offers innovative software solutions that represent a new standard in alternative investments. Investment software that challenges what's possible. By pairing private equity expertise with robust credit knowledge, Allvue offers innovative software solutions that represent a new standard in alternative investments.
-
-
-
5ironCyber
-
United States
-
Computer and Network Security
-
1 - 100 Employee
-
Vice President of Operations and Chief Information Security Officer
-
Mar 2016 - Mar 2020
Advanced Cybersecurity Solutions for Financial Institutions With threats becoming increasingly sophisticated and persistent, your cybersecurity program needs to push beyond the basics. We bring the power of the best – years of information security experience combined with best in class tools. Five Iron’s Managed solutions mean you are free to focus on training your team and improving internal operations, resting assured that your systems are strong, carefully monitored, and optimized to the… Show more Advanced Cybersecurity Solutions for Financial Institutions With threats becoming increasingly sophisticated and persistent, your cybersecurity program needs to push beyond the basics. We bring the power of the best – years of information security experience combined with best in class tools. Five Iron’s Managed solutions mean you are free to focus on training your team and improving internal operations, resting assured that your systems are strong, carefully monitored, and optimized to the highest standards possible. FOCUSED We work exclusively with financial institutions. That means we know the regulations, demands, challenges and the threats you face. You can rest knowing you have the right measures in place to ensure your organization is protected. BEST IN CLASS TOOLS We make the most powerful enterprise level solutions available to any sized organization. Managed Email Security, SEIM, and Firewall are all optimized for your organization from day one. INDUSTRY OPTIMIZED SOC Partnering with Five Iron means you leverage the power of one of the financial industry’s most advanced Security Operations Centers. Our machine learning capability combines real-time threat intelligence from our tools, deployments, and industry data to form the most comprehensive cybersecurity platform available. Show less Advanced Cybersecurity Solutions for Financial Institutions With threats becoming increasingly sophisticated and persistent, your cybersecurity program needs to push beyond the basics. We bring the power of the best – years of information security experience combined with best in class tools. Five Iron’s Managed solutions mean you are free to focus on training your team and improving internal operations, resting assured that your systems are strong, carefully monitored, and optimized to the… Show more Advanced Cybersecurity Solutions for Financial Institutions With threats becoming increasingly sophisticated and persistent, your cybersecurity program needs to push beyond the basics. We bring the power of the best – years of information security experience combined with best in class tools. Five Iron’s Managed solutions mean you are free to focus on training your team and improving internal operations, resting assured that your systems are strong, carefully monitored, and optimized to the highest standards possible. FOCUSED We work exclusively with financial institutions. That means we know the regulations, demands, challenges and the threats you face. You can rest knowing you have the right measures in place to ensure your organization is protected. BEST IN CLASS TOOLS We make the most powerful enterprise level solutions available to any sized organization. Managed Email Security, SEIM, and Firewall are all optimized for your organization from day one. INDUSTRY OPTIMIZED SOC Partnering with Five Iron means you leverage the power of one of the financial industry’s most advanced Security Operations Centers. Our machine learning capability combines real-time threat intelligence from our tools, deployments, and industry data to form the most comprehensive cybersecurity platform available. Show less
-
-
-
Lifepoint Health®
-
United States
-
Hospitals and Health Care
-
700 & Above Employee
-
Senior Manager, Information Security
-
Dec 2014 - Mar 2016
CYBERSECURITY - Development and implementation of LifePoint Heath's cybersecurity program. This involved threat intelligence, vulnerability management, security information and event management, incident response, endpoint security, security architecture, email and phishing protections, and security tool implementations like two-factor authentication. INFORMATION SECURITY TRAINING AND AWARENESS - Development and implementation of LifePoint Health's information security training and… Show more CYBERSECURITY - Development and implementation of LifePoint Heath's cybersecurity program. This involved threat intelligence, vulnerability management, security information and event management, incident response, endpoint security, security architecture, email and phishing protections, and security tool implementations like two-factor authentication. INFORMATION SECURITY TRAINING AND AWARENESS - Development and implementation of LifePoint Health's information security training and awareness program. INCIDENT RESPONSE - Development, implementation, and lead on responding to security incidents. SECURITY ARCHITECTURE - Served as an internal security consulting on enterprise projects. Show less CYBERSECURITY - Development and implementation of LifePoint Heath's cybersecurity program. This involved threat intelligence, vulnerability management, security information and event management, incident response, endpoint security, security architecture, email and phishing protections, and security tool implementations like two-factor authentication. INFORMATION SECURITY TRAINING AND AWARENESS - Development and implementation of LifePoint Health's information security training and… Show more CYBERSECURITY - Development and implementation of LifePoint Heath's cybersecurity program. This involved threat intelligence, vulnerability management, security information and event management, incident response, endpoint security, security architecture, email and phishing protections, and security tool implementations like two-factor authentication. INFORMATION SECURITY TRAINING AND AWARENESS - Development and implementation of LifePoint Health's information security training and awareness program. INCIDENT RESPONSE - Development, implementation, and lead on responding to security incidents. SECURITY ARCHITECTURE - Served as an internal security consulting on enterprise projects. Show less
-
-
-
Access TeleCare
-
United States
-
Hospitals and Health Care
-
200 - 300 Employee
-
Director, Information Security
-
Mar 2014 - Dec 2014
SECURITY ARCHITECTURE: Architected a security program in an extremely fast paced environment. Implemented the HITRUST framework. Built a gap analysis and corrective actions plan based on risk to appropriately apply the most cost effective controls to reduce the greatest amount of risk. CUSTOMER RELATIONS MANAGEMENT (CRM): Served as the face of the information security program in procuring new business. Routinely worked with sales teams to answer any security questions of potential… Show more SECURITY ARCHITECTURE: Architected a security program in an extremely fast paced environment. Implemented the HITRUST framework. Built a gap analysis and corrective actions plan based on risk to appropriately apply the most cost effective controls to reduce the greatest amount of risk. CUSTOMER RELATIONS MANAGEMENT (CRM): Served as the face of the information security program in procuring new business. Routinely worked with sales teams to answer any security questions of potential clients, filled out assessments, and developed security white-papers. INCIDENT RESPONSE: Built out an incident response program and ran table top exercises. Documented all potential incidents and the appropriate and reasonable response to said incidents. HIPAA AND PRIVACY OFFICER: Served as the HIPAA security and privacy officer in regards to being the business associate to many large healthcare corporations involving patient data. VULNERABILITY AND THREAT MANAGEMENT: Created the vulnerability and threat management program. This involved scanning all assets and incorporating IT to effectively remediate all vulnerabilities found. DISASTER RECOVERY: As the disaster recovery program manager, developed the business continuity plan as well as the disaster recovery plan. Ran table top exercises to ensure the program ran according to plan and everyone was on the same page. Show less SECURITY ARCHITECTURE: Architected a security program in an extremely fast paced environment. Implemented the HITRUST framework. Built a gap analysis and corrective actions plan based on risk to appropriately apply the most cost effective controls to reduce the greatest amount of risk. CUSTOMER RELATIONS MANAGEMENT (CRM): Served as the face of the information security program in procuring new business. Routinely worked with sales teams to answer any security questions of potential… Show more SECURITY ARCHITECTURE: Architected a security program in an extremely fast paced environment. Implemented the HITRUST framework. Built a gap analysis and corrective actions plan based on risk to appropriately apply the most cost effective controls to reduce the greatest amount of risk. CUSTOMER RELATIONS MANAGEMENT (CRM): Served as the face of the information security program in procuring new business. Routinely worked with sales teams to answer any security questions of potential clients, filled out assessments, and developed security white-papers. INCIDENT RESPONSE: Built out an incident response program and ran table top exercises. Documented all potential incidents and the appropriate and reasonable response to said incidents. HIPAA AND PRIVACY OFFICER: Served as the HIPAA security and privacy officer in regards to being the business associate to many large healthcare corporations involving patient data. VULNERABILITY AND THREAT MANAGEMENT: Created the vulnerability and threat management program. This involved scanning all assets and incorporating IT to effectively remediate all vulnerabilities found. DISASTER RECOVERY: As the disaster recovery program manager, developed the business continuity plan as well as the disaster recovery plan. Ran table top exercises to ensure the program ran according to plan and everyone was on the same page. Show less
-
-
-
UnitedHealth Group
-
Hospitals and Health Care
-
700 & Above Employee
-
Senior Information Technology Security Team Lead, Information and Risk Management (IRM) Team
-
Jul 2012 - Mar 2014
VULNERABILITY MANAGEMENT: Led vulnerability management teams over new acquisitions and a health information exchange. This involved assets across the U.S. and internationally. PERSONNEL MANAGEMENT: Effectively managed teams remotely including international teams. Assigned appropriate metrics and tasks via projects to ensure work was completed in a timely manner. CYBERSECURITY: Researched and stayed on top of the latest threats to make sure our systems were scanned for and… Show more VULNERABILITY MANAGEMENT: Led vulnerability management teams over new acquisitions and a health information exchange. This involved assets across the U.S. and internationally. PERSONNEL MANAGEMENT: Effectively managed teams remotely including international teams. Assigned appropriate metrics and tasks via projects to ensure work was completed in a timely manner. CYBERSECURITY: Researched and stayed on top of the latest threats to make sure our systems were scanned for and provided proper remediation recommendations. Show less VULNERABILITY MANAGEMENT: Led vulnerability management teams over new acquisitions and a health information exchange. This involved assets across the U.S. and internationally. PERSONNEL MANAGEMENT: Effectively managed teams remotely including international teams. Assigned appropriate metrics and tasks via projects to ensure work was completed in a timely manner. CYBERSECURITY: Researched and stayed on top of the latest threats to make sure our systems were scanned for and… Show more VULNERABILITY MANAGEMENT: Led vulnerability management teams over new acquisitions and a health information exchange. This involved assets across the U.S. and internationally. PERSONNEL MANAGEMENT: Effectively managed teams remotely including international teams. Assigned appropriate metrics and tasks via projects to ensure work was completed in a timely manner. CYBERSECURITY: Researched and stayed on top of the latest threats to make sure our systems were scanned for and provided proper remediation recommendations. Show less
-
-
-
Ingenuity Associates
-
Brentwood, TN
-
Sr. Information Security Consultant
-
Nov 2011 - Jul 2012
PROJECT MANAGEMENT: Provided project management within the information security field for large healthcare clients. Included from conception (charter) to building the project plan, execution, deliverables, and successful transition to operations. INFORMATION SECURITY CONSULTATION: Provided expert opinions and guidance on information security architecture, engineering, project planning, threats, intelligence, vulnerabilities, risk management, vendor management, vendor selection… Show more PROJECT MANAGEMENT: Provided project management within the information security field for large healthcare clients. Included from conception (charter) to building the project plan, execution, deliverables, and successful transition to operations. INFORMATION SECURITY CONSULTATION: Provided expert opinions and guidance on information security architecture, engineering, project planning, threats, intelligence, vulnerabilities, risk management, vendor management, vendor selection, etc. SECURITY OPERATIONS: Resource to organizations who needed expert security operations personnel to help maintain or develop their security operations programs. Show less PROJECT MANAGEMENT: Provided project management within the information security field for large healthcare clients. Included from conception (charter) to building the project plan, execution, deliverables, and successful transition to operations. INFORMATION SECURITY CONSULTATION: Provided expert opinions and guidance on information security architecture, engineering, project planning, threats, intelligence, vulnerabilities, risk management, vendor management, vendor selection… Show more PROJECT MANAGEMENT: Provided project management within the information security field for large healthcare clients. Included from conception (charter) to building the project plan, execution, deliverables, and successful transition to operations. INFORMATION SECURITY CONSULTATION: Provided expert opinions and guidance on information security architecture, engineering, project planning, threats, intelligence, vulnerabilities, risk management, vendor management, vendor selection, etc. SECURITY OPERATIONS: Resource to organizations who needed expert security operations personnel to help maintain or develop their security operations programs. Show less
-
-
-
HCA Healthcare
-
United States
-
Hospitals and Health Care
-
700 & Above Employee
-
Division Information Security Officer
-
Aug 2010 - Nov 2011
INFORMATION SECURITY ENGINEERING: Researched, developed, and implemented information security controls appropriate to the organization. DISASTER RECOVERY: Implemented disaster recovery programs for over 100 physician practices. Developed a process that was standardized, repeatable, and effective. SECURITY OPERATIONS: Maintained day to day security operations around vulnerability management, encryption, and enforcing security policy and standards. CONTRACTING: Worked with… Show more INFORMATION SECURITY ENGINEERING: Researched, developed, and implemented information security controls appropriate to the organization. DISASTER RECOVERY: Implemented disaster recovery programs for over 100 physician practices. Developed a process that was standardized, repeatable, and effective. SECURITY OPERATIONS: Maintained day to day security operations around vulnerability management, encryption, and enforcing security policy and standards. CONTRACTING: Worked with potential vendors on completing HCA's risk assessment document, business associate agreements, and also worked to remediate any potential red flags prior to doing business with the organization. Show less INFORMATION SECURITY ENGINEERING: Researched, developed, and implemented information security controls appropriate to the organization. DISASTER RECOVERY: Implemented disaster recovery programs for over 100 physician practices. Developed a process that was standardized, repeatable, and effective. SECURITY OPERATIONS: Maintained day to day security operations around vulnerability management, encryption, and enforcing security policy and standards. CONTRACTING: Worked with… Show more INFORMATION SECURITY ENGINEERING: Researched, developed, and implemented information security controls appropriate to the organization. DISASTER RECOVERY: Implemented disaster recovery programs for over 100 physician practices. Developed a process that was standardized, repeatable, and effective. SECURITY OPERATIONS: Maintained day to day security operations around vulnerability management, encryption, and enforcing security policy and standards. CONTRACTING: Worked with potential vendors on completing HCA's risk assessment document, business associate agreements, and also worked to remediate any potential red flags prior to doing business with the organization. Show less
-
-
-
UHS
-
United States
-
Hospitals and Health Care
-
700 & Above Employee
-
Information Security Administrator
-
Nov 2009 - Aug 2010
SYSTEM OPERATIONS: Ensured all systems were compliant to company security policies and standards. CUSTOMER SUPPORT: For any security related issues, was top level support for all security related tickets and incidents. ENCRYPTION: Led an encryption project with several contractors to encrypt all endpoints enterprise wide. SYSTEM OPERATIONS: Ensured all systems were compliant to company security policies and standards. CUSTOMER SUPPORT: For any security related issues, was top level support for all security related tickets and incidents. ENCRYPTION: Led an encryption project with several contractors to encrypt all endpoints enterprise wide.
-
-
-
Community Health Systems
-
United States
-
Hospitals and Health Care
-
700 & Above Employee
-
System Engineer
-
Jun 2009 - Nov 2009
PERSONNEL MANAGEMENT: Managed a team of contractors per site to unpack, install, configure, and troubleshoot a roll out of all new equipment and applications. CUSTOMER SUPPORT: Was front line support for all new acquisition project and technical related work. Had to win over local IT support to ensure efficient transition to new applications, standards, and policies. PROJECT MANAGEMENT: Tracked all tasks per facility to keep deadlines on track to migrate and go-live on all new… Show more PERSONNEL MANAGEMENT: Managed a team of contractors per site to unpack, install, configure, and troubleshoot a roll out of all new equipment and applications. CUSTOMER SUPPORT: Was front line support for all new acquisition project and technical related work. Had to win over local IT support to ensure efficient transition to new applications, standards, and policies. PROJECT MANAGEMENT: Tracked all tasks per facility to keep deadlines on track to migrate and go-live on all new systems and hardware. Show less PERSONNEL MANAGEMENT: Managed a team of contractors per site to unpack, install, configure, and troubleshoot a roll out of all new equipment and applications. CUSTOMER SUPPORT: Was front line support for all new acquisition project and technical related work. Had to win over local IT support to ensure efficient transition to new applications, standards, and policies. PROJECT MANAGEMENT: Tracked all tasks per facility to keep deadlines on track to migrate and go-live on all new… Show more PERSONNEL MANAGEMENT: Managed a team of contractors per site to unpack, install, configure, and troubleshoot a roll out of all new equipment and applications. CUSTOMER SUPPORT: Was front line support for all new acquisition project and technical related work. Had to win over local IT support to ensure efficient transition to new applications, standards, and policies. PROJECT MANAGEMENT: Tracked all tasks per facility to keep deadlines on track to migrate and go-live on all new systems and hardware. Show less
-
-
-
Concept Technology Inc.
-
United States
-
IT Services and IT Consulting
-
1 - 100 Employee
-
Information Technology Consultant
-
Jun 2008 - Jun 2009
IT CONSULTATION: Served as a general consultant for any IT related matters. This was anything from removing malware to architecting entire networks. CUSTOMER SUPPORT: First contact for all current and new customers to resolve issues in a timely manner. BUSINESS DEVELOPMENT: Served on the board to provide direction and growth for new business opportunities and help steer all new technology. IT CONSULTATION: Served as a general consultant for any IT related matters. This was anything from removing malware to architecting entire networks. CUSTOMER SUPPORT: First contact for all current and new customers to resolve issues in a timely manner. BUSINESS DEVELOPMENT: Served on the board to provide direction and growth for new business opportunities and help steer all new technology.
-
-
-
National Renal Alliance
-
Hospitals and Health Care
-
1 - 100 Employee
-
Systems Administrator
-
Dec 2006 - Jul 2008
SYSTEMS ADMINISTRATION: Served as systems administrator in a Windows and Linux environment providing installation, maintenance, and troubleshooting of all hardware, operating systems, and applications. EXCHANGE ADMIN: Administered the Exchange environment for the enterprise. That included high availability, backups, and mail support. SUPPORT: Level 3 support for complex issues not resolved at lower levels of support. SYSTEMS ADMINISTRATION: Served as systems administrator in a Windows and Linux environment providing installation, maintenance, and troubleshooting of all hardware, operating systems, and applications. EXCHANGE ADMIN: Administered the Exchange environment for the enterprise. That included high availability, backups, and mail support. SUPPORT: Level 3 support for complex issues not resolved at lower levels of support.
-
-
-
Dell Technologies
-
United States
-
IT Services and IT Consulting
-
700 & Above Employee
-
Gold Support Technician
-
Nov 2005 - Dec 2006
TECHNICAL SUPPORT: Served as a premium tier of support for small medium business (SMB) at Dell. Provided support via phone, email, and chat for clients who paid a premium for top level/certified support. METRICS: #1 gold level support technician for an entire quarter scoring highest in all metrics across gold level support. TECHNICAL SUPPORT: Served as a premium tier of support for small medium business (SMB) at Dell. Provided support via phone, email, and chat for clients who paid a premium for top level/certified support. METRICS: #1 gold level support technician for an entire quarter scoring highest in all metrics across gold level support.
-
-
Education
-
Western Governors University
Master of Business Administration (MBA), IT Management -
Middle Tennessee State University
B.S., Political Science, Economics, Psychology