Malcolm Blow

Director of Cyber Security at ELROI
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Washington, District of Columbia, United States, US

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Experience

    • United States
    • IT Services and IT Consulting
    • 1 - 100 Employee
    • Director of Cyber Security
      • Jun 2020 - Present

      ➣Serve as a thought leader within the executive team and board of directors to continually improve the long-range cyber strategy in a method that will enable business development while mitigating risk ➣Build metrics and deliver KPIs on corporate security posture and threat landscape ➣Propose and oversee budget for the corporate cybersecurity program ➣Design, build, maintain a zero trust infrastructure to support and secure enterprise networks utilizing cloud-based, open source, and third party solutions ➣Construct policies, documentation, and processes necessary to obtain and maintain industry compliance certifications ➣Build and grow a team of security engineers to support the tech stack in place for enterprise networks ➣Support global cross-functional teams and individual contributors to ensure that all personnel and technologies or operating within the established cyber risk profile ➣Establish and maintain relationships with consumers, vendors, and B2B strategic partners ➣Lead and manage business operations and DevSecOps to utilize cyber awareness, and best practices within the corporate and cloud environments Show less

    • IT Services and IT Consulting
    • 700 & Above Employee
    • Team Lead | Threat Hunting | Incident Response
      • May 2017 - Present

      ➣Provide quick response capabilities and solutions during critical cyber incidents while informing senior leadership via constant updates and providing guidance to client engineers and system admins ➣Helped build the framework for an internal training program for new hires that will also serve as continuing education for current team members. ➣Coordinate with consumers and stakeholders to ensure proper infrastructure installation, configuration, and maintenance ➣Take part in recruiting campaigns as a technical speaker to present and discuss cyber operations with candidates ➣Report to customer and senior leadership to keep proper authorities informed of development and results over the course of active investigation engagements ➣Develop/evolve analytics, signatures and procedures based on sourced and researched threat intelligence ➣Respond to malicious activity caused by external and internal threats to Department of Defense computers and networks ➣Conduct computer network defense (CND) and incident triage while providing recommendations for mitigation/remediation ➣Perform endpoint and network forensic analysis to identify threats, misconfigurations, and artifacts that will further strengthen the security posture of DoD networks ➣Proactively analyze enterprise networks for undetected indicators of compromise (IOC) ➣Regular training to maintain certification as a DoD red team operator Show less

    • Government Administration
    • 700 & Above Employee
    • Cyber Ops Engineer
      • May 2012 - Jul 2016

      ➣Worked with a cyber red team to set up infrastructure, developed and tested protocols for enterprise level use. ➣Worked with a team whose purpose was mission management, and performing forensics on devices for future investigative use. Additionally, worked on an instruction manual for use by both technical and non-technical users. ➣Worked on a blue team to help organize data and perform analytics on data returned from both an enterprise level network and the Internet. ➣Used open source coding to provide specific functionalities to a computer system. Conducted forensic analysis on a prototype system. Presented findings to upper management. Show less

    • United States
    • Aviation and Aerospace Component Manufacturing
    • 700 & Above Employee
    • Unmanned Aircraft Engineer Trainee
      • Jun 2011 - Aug 2011

      Designed, built, and tested a version of the communication system that will switch from analog audio to VoIP by utilizing the Ku satellite constellation (instead of Iridium) . Designed, built, and tested a version of the communication system that will switch from analog audio to VoIP by utilizing the Ku satellite constellation (instead of Iridium) .

    • Government Administration
    • 700 & Above Employee
    • EPP Scholar
      • May 2010 - Aug 2010

      Research in the field of Unmanned Aerial Vehicles. A past project was to configure a UAS (platform and payload) to detect, monitor, and/or map maritime oil spills. Research in the field of Unmanned Aerial Vehicles. A past project was to configure a UAS (platform and payload) to detect, monitor, and/or map maritime oil spills.

Education

  • North Carolina Agricultural and Technical State University
    Master’s Degree, Computer Science
    2013 - 2016
  • North Carolina Agricultural and Technical State University
    Bachelor’s Degree, Electrical and Electronics Engineering
    2008 - 2013
  • North Carolina Agricultural and Technical State University
    Bachelor’s Degree, Computer Engineering
    2008 - 2013

Community

You need to have a working account to view this content. Click here to join now