Daniel Wallace

Senior Security Architect at Aquia
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Greater New Orleans Region
Languages
  • English Native or bilingual proficiency
  • Sign Languages Professional working proficiency

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

5.0

/5.0
/ Based on 2 ratings
  • (2)
  • (0)
  • (0)
  • (0)
  • (0)

Filter reviews by:

Guangkuo Wang

I had the pleasure of working with Daniel as our project team leader and can attest to his exceptional leadership, organizational, and time management skills. He is a natural leader who motivates the team, has a clear vision, and effectively delegates tasks. His excellent time management and ability to keep track of multiple tasks contributed to the project's success. I highly recommend Daniel for any role that requires strong leadership and organizational skills.

Brandon Trudeaux, PMP

I've had the pleasure of working with Daniel on an IT Support project. Great guy and his work always went above and beyond our expectations. Very knowledgeable in Cybersecurity, Risk Management, Artificial Intelligence, and many more spectrums of IT. I definitely would recommend working or partnering with Daniel.

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • Certified Information Systems Security Professional (CISSP)
    ISC2
    Oct, 2023
    - Nov, 2024
  • Professional Certificate in Machine Learning & Artificial Intelligence
    University of California, Berkeley, Haas School of Business
    Oct, 2022
    - Nov, 2024

Experience

    • United States
    • Computer and Network Security
    • 1 - 100 Employee
    • Senior Security Architect
      • Oct 2023 - Present

    • United States
    • IT Services and IT Consulting
    • Founder | Principal Consultant
      • Jul 2009 - Oct 2023

      Grew start-up to a robust and competitive information technology & cyber security consulting firm. Led team of engineers and support staff with a portfolio of clients in various industries including accounting, fintech, law, retail, construction, energy, healthcare, education, engineering, public advocacy, pharmaceutical, food, beverage & hospitality, environmental, etc . • Served as chief designer and architect on proprietary cybersecurity fraud AI/ML tool adopted by Fortune 200 client… Show more Grew start-up to a robust and competitive information technology & cyber security consulting firm. Led team of engineers and support staff with a portfolio of clients in various industries including accounting, fintech, law, retail, construction, energy, healthcare, education, engineering, public advocacy, pharmaceutical, food, beverage & hospitality, environmental, etc . • Served as chief designer and architect on proprietary cybersecurity fraud AI/ML tool adopted by Fortune 200 client and utilized for analysis of abnormalities in cyber insurance claims. Tool successfully detected and prevented 2,388 of fraudulent insurance claims. • Served as lead information security & information technology consultant for primary clients and ensured confidentiality, integrity and high availability. • Worked closely with client organization’s leadership team to identify future business requirements and strategic road mapping for ensuring success across multi-departmental arms of business. Continuous improvement strategies developed. • Ensured technical implementations and project alignment with business for both business and technical operations. • Provided lead role on information security projects including security reviews, cybersecurity operations development, security auditing, and incident response. • Provided technical expertise to Fortune 500 organization regarding Incident Response for insured claimants. • Provided subject matter expertise to client organizations regarding security architecture to ensure security was part of design and (re)development of processes and policies. • Served as expert to large-sized organizations on proactive identification of risks such that business units may properly prepare and execute on solutions for managing and reducing risks. Resulted in ability to identify tooling requirements in advance. Show less Grew start-up to a robust and competitive information technology & cyber security consulting firm. Led team of engineers and support staff with a portfolio of clients in various industries including accounting, fintech, law, retail, construction, energy, healthcare, education, engineering, public advocacy, pharmaceutical, food, beverage & hospitality, environmental, etc . • Served as chief designer and architect on proprietary cybersecurity fraud AI/ML tool adopted by Fortune 200 client… Show more Grew start-up to a robust and competitive information technology & cyber security consulting firm. Led team of engineers and support staff with a portfolio of clients in various industries including accounting, fintech, law, retail, construction, energy, healthcare, education, engineering, public advocacy, pharmaceutical, food, beverage & hospitality, environmental, etc . • Served as chief designer and architect on proprietary cybersecurity fraud AI/ML tool adopted by Fortune 200 client and utilized for analysis of abnormalities in cyber insurance claims. Tool successfully detected and prevented 2,388 of fraudulent insurance claims. • Served as lead information security & information technology consultant for primary clients and ensured confidentiality, integrity and high availability. • Worked closely with client organization’s leadership team to identify future business requirements and strategic road mapping for ensuring success across multi-departmental arms of business. Continuous improvement strategies developed. • Ensured technical implementations and project alignment with business for both business and technical operations. • Provided lead role on information security projects including security reviews, cybersecurity operations development, security auditing, and incident response. • Provided technical expertise to Fortune 500 organization regarding Incident Response for insured claimants. • Provided subject matter expertise to client organizations regarding security architecture to ensure security was part of design and (re)development of processes and policies. • Served as expert to large-sized organizations on proactive identification of risks such that business units may properly prepare and execute on solutions for managing and reducing risks. Resulted in ability to identify tooling requirements in advance. Show less

    • United States
    • Computer and Network Security
    • 700 & Above Employee
    • RSA Security Scholar
      • Nov 2021 - Jun 2022

      As an RSAC Security Scholar, I was provided an opportunity for autonomous research. My research topic of interest covered risk management frameworks for managing and defending against AI-powered adversarial exploration, poisoning, and reconnaissance. Background: Artificial Intelligence is rapidly growing in areas of military technology, health, law enforcement, transportation, etc. AI highly promotes offensive tactics of malicious actors. There has been magnified proliferation of cyber… Show more As an RSAC Security Scholar, I was provided an opportunity for autonomous research. My research topic of interest covered risk management frameworks for managing and defending against AI-powered adversarial exploration, poisoning, and reconnaissance. Background: Artificial Intelligence is rapidly growing in areas of military technology, health, law enforcement, transportation, etc. AI highly promotes offensive tactics of malicious actors. There has been magnified proliferation of cyber breaches and mass disruption in the past 5 years. AI has translated into increased difficulty in defending against cyberattacks as malware is becoming adaptive in its nature. Problem: New AI offensive capabilities may be able to identify vulnerabilities in systems, sooner than humans. Thus, can defensive AI be deployed to overcome threats with adaptive countermeasures and security controls? There are great efforts to implement defensive AI systems in response to ever-changing threats. But AI will heavily rely on machine learning intelligence and algorithms for response. Will defensive AI systems be able to detect, adapt and respond to cyberattacks, all while protecting itself against tampering and misuse? There is an underlying problem of deception to beat AI algorithms, so how might this be overcome? Theoretical solutions: Foreseeable and forecastable defensive AI tactics and strategy to prevent exploitation. Current solutions that have been implemented are automated vulnerability discovery tools such as reverse engineering deceptions, artificial intelligence mitigations of emergent execution, offensive-scaling and deep reinforcement fuzzing. New AI tools must be developed to close the gap between automated vulnerability discovery and forecast vectors. Show less As an RSAC Security Scholar, I was provided an opportunity for autonomous research. My research topic of interest covered risk management frameworks for managing and defending against AI-powered adversarial exploration, poisoning, and reconnaissance. Background: Artificial Intelligence is rapidly growing in areas of military technology, health, law enforcement, transportation, etc. AI highly promotes offensive tactics of malicious actors. There has been magnified proliferation of cyber… Show more As an RSAC Security Scholar, I was provided an opportunity for autonomous research. My research topic of interest covered risk management frameworks for managing and defending against AI-powered adversarial exploration, poisoning, and reconnaissance. Background: Artificial Intelligence is rapidly growing in areas of military technology, health, law enforcement, transportation, etc. AI highly promotes offensive tactics of malicious actors. There has been magnified proliferation of cyber breaches and mass disruption in the past 5 years. AI has translated into increased difficulty in defending against cyberattacks as malware is becoming adaptive in its nature. Problem: New AI offensive capabilities may be able to identify vulnerabilities in systems, sooner than humans. Thus, can defensive AI be deployed to overcome threats with adaptive countermeasures and security controls? There are great efforts to implement defensive AI systems in response to ever-changing threats. But AI will heavily rely on machine learning intelligence and algorithms for response. Will defensive AI systems be able to detect, adapt and respond to cyberattacks, all while protecting itself against tampering and misuse? There is an underlying problem of deception to beat AI algorithms, so how might this be overcome? Theoretical solutions: Foreseeable and forecastable defensive AI tactics and strategy to prevent exploitation. Current solutions that have been implemented are automated vulnerability discovery tools such as reverse engineering deceptions, artificial intelligence mitigations of emergent execution, offensive-scaling and deep reinforcement fuzzing. New AI tools must be developed to close the gap between automated vulnerability discovery and forecast vectors. Show less

    • United States
    • Chemical Manufacturing
    • Information Technology Consultant
      • Jan 2008 - May 2009

      • Developed new system modules for task automation. • Stabilized, expanded and protected organization’s network thru asset management, automation of event management, vulnerability management, and continuous monitoring. • Revamped backup procedures and policies. Introduced Incident Response and Disaster Recovery Playbook. Designed strategy and rolled out successful cybersecurity culture program. • Researched, recommended and implemented network enhancements that improved system… Show more • Developed new system modules for task automation. • Stabilized, expanded and protected organization’s network thru asset management, automation of event management, vulnerability management, and continuous monitoring. • Revamped backup procedures and policies. Introduced Incident Response and Disaster Recovery Playbook. Designed strategy and rolled out successful cybersecurity culture program. • Researched, recommended and implemented network enhancements that improved system reliability and performance. Show less • Developed new system modules for task automation. • Stabilized, expanded and protected organization’s network thru asset management, automation of event management, vulnerability management, and continuous monitoring. • Revamped backup procedures and policies. Introduced Incident Response and Disaster Recovery Playbook. Designed strategy and rolled out successful cybersecurity culture program. • Researched, recommended and implemented network enhancements that improved system… Show more • Developed new system modules for task automation. • Stabilized, expanded and protected organization’s network thru asset management, automation of event management, vulnerability management, and continuous monitoring. • Revamped backup procedures and policies. Introduced Incident Response and Disaster Recovery Playbook. Designed strategy and rolled out successful cybersecurity culture program. • Researched, recommended and implemented network enhancements that improved system reliability and performance. Show less

    • United States
    • Higher Education
    • 700 & Above Employee
    • System Development Consultant
      • Feb 2006 - Jan 2009

      Key Achievements: • Developed and maintained student program databases. • Designed web-based program for online teaching modules. • Created web-based program for online testing modules. Key Achievements: • Developed and maintained student program databases. • Designed web-based program for online teaching modules. • Created web-based program for online testing modules.

Education

  • UC Berkeley School of Information
    Master of Information and Cybersecurity, 4.0
    2021 - 2022
  • University of California, Berkeley
    Professional Certificate, Machine Learning & Artificial Intelligence
    2022 - 2022
  • University of Florida
    Philosophy
    2004 - 2009
  • St. Augustine High School - New Orleans
    High School Diploma
    2000 - 2004
  • University of Florida
    Computer Engineering
    2004 -

Community

You need to have a working account to view this content. Click here to join now