IT Security Manager at Matrix Service Company
Tulsa, Oklahoma
NORDAM
Network/System Administrator Sr Specialist
August 2013 to September 2018
Tulsa, Oklahoma Area
CDI Professional Services, Ltd.
Systems Management Specialist
April 2010 to April 2011
Tulsa, Oklahoma Area
Rogers State University
Network Manager
December 1999 to February 2010
Rogers State University
Instructor
December 1997 to December 1999
Rogers State University
Information Specialist
November 1993 to December 1997
Matrix Service Company
IT Security Manager
Tulsa, Oklahoma Area
Webco Industries
Systems Analyst
April 2011 to August 2013
Sand Springs, OK
Key Accomplishments: - Active Directory Security Project Implementation: Enhanced Active Directory security by implementing role-based administrator delegation. - Secure System Configuration and Management: Developed custom group policies and server hardening processes to implement secure baseline configurations for operating systems and common software applications.- Patch Management: Modernized patch management design to allow for automated patching of Dev/QA/Sandbox environments... Key Accomplishments: - Active Directory Security Project Implementation: Enhanced Active Directory security by implementing role-based administrator delegation. - Secure System Configuration and Management: Developed custom group policies and server hardening processes to implement secure baseline configurations for operating systems and common software applications.- Patch Management: Modernized patch management design to allow for automated patching of Dev/QA/Sandbox environments as well as non-critical productions systems and testing of patches prior to deployment to critical production systems. Instigated automated third-party patching system. - Vulnerability Assessment and Remediation: Applied vulnerability assessment and remediation scanning and reporting.- Auditing and Logging: Implemented security incident and event management to correlate logs from firewalls, IPS, reverse proxy, vulnerability scanners, antivirus, and Active Directory. - Security Architect: Designed network segmentation for deployment and migration of systems to secure enclaves. Completed a gap analysis to assess compliance with NIST SP 800-171. Authored several dozen policies, procedures, checklists, and guidelines documents to ensure that IT Security tasks and activities were standardized and scheduled. Created internal IT Security website, implemented security and awareness training, including phishing assessment activities. Originated an Insider Threat Protection "pull" monitoring process. - Incident Response and Forensics: Identified and contained a hacking attempt on an ERP system. Implemented successful counter measures four months before the TTP's were publicized by US-CERT.
What company does Timothy Potter work for?
Timothy Potter works for NORDAM
What is Timothy Potter's role at NORDAM?
Timothy Potter is Network/System Administrator Sr Specialist
What industry does Timothy Potter work in?
Timothy Potter works in the Construction industry.
Who are Timothy Potter's colleagues?
Timothy Potter's colleagues are Heather %28Anson%29 Everett%2C PHR, Daniel De Vries, Todd M Derringer, Jerry Brown, Walter Steele, Martha Carnes, John Hewitt, and Kevin Cavanah
📖 Summary
Network/System Administrator Sr Specialist @ NORDAM Key Accomplishments: - Active Directory Security Project Implementation: Enhanced Active Directory security by implementing role-based administrator delegation. - Secure System Configuration and Management: Developed custom group policies and server hardening processes to implement secure baseline configurations for operating systems and common software applications.- Patch Management: Modernized patch management design to allow for automated patching of Dev/QA/Sandbox environments as well as non-critical productions systems and testing of patches prior to deployment to critical production systems. Instigated automated third-party patching system. - Vulnerability Assessment and Remediation: Applied vulnerability assessment and remediation scanning and reporting.- Auditing and Logging: Implemented security incident and event management to correlate logs from firewalls, IPS, reverse proxy, vulnerability scanners, antivirus, and Active Directory. - Security Architect: Designed network segmentation for deployment and migration of systems to secure enclaves. Completed a gap analysis to assess compliance with NIST SP 800-171. Authored several dozen policies, procedures, checklists, and guidelines documents to ensure that IT Security tasks and activities were standardized and scheduled. Created internal IT Security website, implemented security and awareness training, including phishing assessment activities. Originated an Insider Threat Protection "pull" monitoring process. - Incident Response and Forensics: Identified and contained a hacking attempt on an ERP system. Implemented successful counter measures four months before the TTP's were publicized by US-CERT. From August 2013 to September 2018 (5 years 2 months) Tulsa, Oklahoma AreaSystems Management Specialist @ CDI Professional Services, Ltd. Contractor for IBM with key accomplishments as follows: - Re-engineered an existing project plan for completing a migration of servers to Windows 2003 using in-place upgrades to save time and money.- Upgraded Active Directory to a forest functional level of Windows 2003 and optimized Active Directory domain controller role placement and referrals.- Diagnosed CPU utilization issues on domain controllers and successfully resolved login problems by optimizing LDAP queries run by AIX and Linux servers.- Automated the application of security policy on hundreds of servers using Active Directory group policy.- Successfully upgraded dozens of servers to Windows 2003 with no failures and no downtime beyond the maintenance window.- Updated and created templates and work instructions for carrying out server security settings reviews to comply with newly released standards.- Created the first Windows Server 2008 build and recovery procedure checklist in use in the department and updated the Server 2003 procedures to align with best practices.- Resolved issues involving failed system state backups on dozens of servers by updating registry configurations. From April 2010 to April 2011 (1 year 1 month) Tulsa, Oklahoma AreaNetwork Manager @ Rogers State University - Designed and put into operation the University’s original Windows NT 4 domain as well as subsequent migrations to Windows 2000, 2003, and 2008 Active Directory domains containing thousands of faculty, staff, and student users.- Planned and implemented the creation of the University’s original Microsoft Exchange 5.5 e-mail gateway as well as subsequent migrations to Exchange 2000, 2003, and 2007 servers for faculty and staff users. Designed and put into service an Exchange 2007 e-mail system serving thousands of student users.- Designed the rack and power configurations for a new University data center. Executed the re-routing of network infrastructure and movement of network equipment, servers, and appliances to the new facility. - Configured and administered wireless-N deployments on three campuses that provide secure wireless access for faculty and staff as well as free access for students and guests. - Configured and administered network access control systems that performed posture assessment and remediation both for wired and wireless clients.- Configured Active Directory group policies to automate the application of security policies and the installation of software on both servers and desktops.- Designed and put into service a comprehensive system of security change configuration and management for desktops, including rapid deployment of new systems using Windows Deployment Services.- Configured all public-facing web servers for both business presence and academic use, using both Microsoft/IIS and Linux/Apache servers.- Configured and administered both external and internal firewalls, bandwidth management devices, VPN concentrators, routers, and switches. From December 1999 to February 2010 (10 years 3 months) Instructor @ Rogers State University Courses Taught: Microcomputer Applications, Microsoft Access, Windows 95, Windows 98, and Web Site Design & Development. Additional; Designed, installed, configured, monitored, administered and performed troubleshooting for the Applied Technology and the Health Sciences departmental local area network, systems and associated assemblies; including both Windows NT/Exchange 5.5 servers, 3Com switches, student computer labs, and faculty/staff desktops. From December 1997 to December 1999 (2 years 1 month) Information Specialist @ Rogers State University Responsible for designing, administering and troubleshooting Microsoft Access databases, generating reports, and creating statistical analyses of survey and demographic data. Responsible for designing, installing, configuring, monitoring, administering and troubleshooting the Health Sciences departmental local area network, systems and associated assemblies; including both Windows NT/Exchange 5.5 servers, 3Com switches, student computer labs, and faculty/staff desktops. From November 1993 to December 1997 (4 years 2 months) IT Security Manager @ Matrix Service Company Provides leadership, management, direction, or development and advocacy so the organization may effectively conduct cybersecurity work. Training, Education, and Awareness: - Develops, plans, coordinates, delivers and/or evaluates training courses, methods, and techniques as appropriate. Cybersecurity Management: - Oversees the cybersecurity program of an information system or network, including managing information security implications within the organization, specific program, or other area of responsibility, to include strategic, personnel, infrastructure, requirements, policy enforcement, emergency planning, security awareness, and other resources. Strategic Planning and Policy: - Develops policies and plans and/or advocates for changes in policy that support organizational cyberspace initiatives or required changes/enhancements. Identifies, analyzes, and mitigates threats to internal information technology (IT) systems and/or networks. Cyber Defense Analysis: - Uses defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from threats. Incident Response: - Responds to crises or urgent situations within the pertinent domain to mitigate immediate and potential threats. Uses mitigation, preparedness, and response and recovery approaches, as needed, to maximize survival of life, preservation of property, and information security. Investigates and analyzes all relevant response activities. Vulnerability Assessment and Management: - Conducts assessments of threats and vulnerabilities; determines deviations from acceptable configurations, enterprise or local policy; assesses the level of risk; and develops and/or recommends appropriate mitigation countermeasures in operational and nonoperational situations. Tulsa, Oklahoma AreaSystems Analyst @ Webco Industries - Migrated core switch stack from Dell to Cisco 3750X, optimizing both security and performance for ESXI servers. -Team member for server migration to new hardware, including implementation of ESXi cluster on Cisco UCS blades and the migration of over 90 servers to the new platform. -Implemented software updates, application, and operating system deployment using Configuration Manager.- Installed, configured and administered Operations Manager monitoring and alerting system.- Installed, configured and administered DirectAccess solution for remote access by employees.- Implemented external and mobile access to Lync Server.- Project leader for implementation of ITIL service manager framework using Microsoft Service Manager.- Installed, configured and administered Data Protection Manager Server backup solution for remote servers. From April 2011 to August 2013 (2 years 5 months) Sand Springs, OK
Introversion (I), Intuition (N), Thinking (T), Judging (J)
4 year(s), 2 month(s)
Unlikely
Likely
There's 87% chance that Timothy Potter is seeking for new opportunities
Enjoy unlimited access and discover candidates outside of LinkedIn
Trusted by 400K users from
76% of Fortune 500 companies
The most accurate data ever
Hire Anyone, Anywhere
with ContactOut today
Making remote or global hires? We can help.
No credit card required
Timothy Potter's Social Media Links
/company/m... /school/un...