Image of Timothy Potter

Timothy Potter

Network/System Administrator Sr Specialist

IT Security Manager at Matrix Service Company

Tulsa, Oklahoma

Section title

Timothy Potter's Email Addresses & Phone Numbers

Timothy Potter's Work Experience

NORDAM

Network/System Administrator Sr Specialist

August 2013 to September 2018

Tulsa, Oklahoma Area

CDI Professional Services, Ltd.

Systems Management Specialist

April 2010 to April 2011

Tulsa, Oklahoma Area

Rogers State University

Network Manager

December 1999 to February 2010

Timothy Potter's Education

University of Iowa

Master of Arts, Film Studies

1986 to 1989

UC Irvine

Bachelor's of Arts, Humanities

1984 to 1986

Timothy Potter's Professional Skills Radar Chart

Based on our findings, Timothy Potter is ...

Strategic
Methodical
Logical

What's on Timothy Potter's mind?

Based on our findings, Timothy Potter is ...

56% Left Brained
44% Right Brained

Timothy Potter's Estimated Salary Range

About Timothy Potter's Current Company

NORDAM

Key Accomplishments: - Active Directory Security Project Implementation: Enhanced Active Directory security by implementing role-based administrator delegation. - Secure System Configuration and Management: Developed custom group policies and server hardening processes to implement secure baseline configurations for operating systems and common software applications.- Patch Management: Modernized patch management design to allow for automated patching of Dev/QA/Sandbox environments...

Frequently Asked Questions about Timothy Potter

What company does Timothy Potter work for?

Timothy Potter works for NORDAM


What is Timothy Potter's role at NORDAM?

Timothy Potter is Network/System Administrator Sr Specialist


What is Timothy Potter's personal email address?

Timothy Potter's personal email address is t****[email protected]


What is Timothy Potter's business email address?

Timothy Potter's business email addresses are not available


What is Timothy Potter's Phone Number?

Timothy Potter's phone (405) ***-*270


What industry does Timothy Potter work in?

Timothy Potter works in the Construction industry.


Who are Timothy Potter's colleagues?

Timothy Potter's colleagues are Heather %28Anson%29 Everett%2C PHR, Daniel De Vries, Todd M Derringer, Jerry Brown, Walter Steele, Martha Carnes, John Hewitt, and Kevin Cavanah


About Timothy Potter

📖 Summary

Network/System Administrator Sr Specialist @ NORDAM Key Accomplishments: - Active Directory Security Project Implementation: Enhanced Active Directory security by implementing role-based administrator delegation. - Secure System Configuration and Management: Developed custom group policies and server hardening processes to implement secure baseline configurations for operating systems and common software applications.- Patch Management: Modernized patch management design to allow for automated patching of Dev/QA/Sandbox environments as well as non-critical productions systems and testing of patches prior to deployment to critical production systems. Instigated automated third-party patching system. - Vulnerability Assessment and Remediation: Applied vulnerability assessment and remediation scanning and reporting.- Auditing and Logging: Implemented security incident and event management to correlate logs from firewalls, IPS, reverse proxy, vulnerability scanners, antivirus, and Active Directory. - Security Architect: Designed network segmentation for deployment and migration of systems to secure enclaves. Completed a gap analysis to assess compliance with NIST SP 800-171. Authored several dozen policies, procedures, checklists, and guidelines documents to ensure that IT Security tasks and activities were standardized and scheduled. Created internal IT Security website, implemented security and awareness training, including phishing assessment activities. Originated an Insider Threat Protection "pull" monitoring process. - Incident Response and Forensics: Identified and contained a hacking attempt on an ERP system. Implemented successful counter measures four months before the TTP's were publicized by US-CERT. From August 2013 to September 2018 (5 years 2 months) Tulsa, Oklahoma AreaSystems Management Specialist @ CDI Professional Services, Ltd. Contractor for IBM with key accomplishments as follows: - Re-engineered an existing project plan for completing a migration of servers to Windows 2003 using in-place upgrades to save time and money.- Upgraded Active Directory to a forest functional level of Windows 2003 and optimized Active Directory domain controller role placement and referrals.- Diagnosed CPU utilization issues on domain controllers and successfully resolved login problems by optimizing LDAP queries run by AIX and Linux servers.- Automated the application of security policy on hundreds of servers using Active Directory group policy.- Successfully upgraded dozens of servers to Windows 2003 with no failures and no downtime beyond the maintenance window.- Updated and created templates and work instructions for carrying out server security settings reviews to comply with newly released standards.- Created the first Windows Server 2008 build and recovery procedure checklist in use in the department and updated the Server 2003 procedures to align with best practices.- Resolved issues involving failed system state backups on dozens of servers by updating registry configurations. From April 2010 to April 2011 (1 year 1 month) Tulsa, Oklahoma AreaNetwork Manager @ Rogers State University - Designed and put into operation the University’s original Windows NT 4 domain as well as subsequent migrations to Windows 2000, 2003, and 2008 Active Directory domains containing thousands of faculty, staff, and student users.- Planned and implemented the creation of the University’s original Microsoft Exchange 5.5 e-mail gateway as well as subsequent migrations to Exchange 2000, 2003, and 2007 servers for faculty and staff users. Designed and put into service an Exchange 2007 e-mail system serving thousands of student users.- Designed the rack and power configurations for a new University data center. Executed the re-routing of network infrastructure and movement of network equipment, servers, and appliances to the new facility. - Configured and administered wireless-N deployments on three campuses that provide secure wireless access for faculty and staff as well as free access for students and guests. - Configured and administered network access control systems that performed posture assessment and remediation both for wired and wireless clients.- Configured Active Directory group policies to automate the application of security policies and the installation of software on both servers and desktops.- Designed and put into service a comprehensive system of security change configuration and management for desktops, including rapid deployment of new systems using Windows Deployment Services.- Configured all public-facing web servers for both business presence and academic use, using both Microsoft/IIS and Linux/Apache servers.- Configured and administered both external and internal firewalls, bandwidth management devices, VPN concentrators, routers, and switches. From December 1999 to February 2010 (10 years 3 months) Instructor @ Rogers State University Courses Taught: Microcomputer Applications, Microsoft Access, Windows 95, Windows 98, and Web Site Design & Development. Additional; Designed, installed, configured, monitored, administered and performed troubleshooting for the Applied Technology and the Health Sciences departmental local area network, systems and associated assemblies; including both Windows NT/Exchange 5.5 servers, 3Com switches, student computer labs, and faculty/staff desktops. From December 1997 to December 1999 (2 years 1 month) Information Specialist @ Rogers State University Responsible for designing, administering and troubleshooting Microsoft Access databases, generating reports, and creating statistical analyses of survey and demographic data. Responsible for designing, installing, configuring, monitoring, administering and troubleshooting the Health Sciences departmental local area network, systems and associated assemblies; including both Windows NT/Exchange 5.5 servers, 3Com switches, student computer labs, and faculty/staff desktops. From November 1993 to December 1997 (4 years 2 months) IT Security Manager @ Matrix Service Company Provides leadership, management, direction, or development and advocacy so the organization may effectively conduct cybersecurity work. Training, Education, and Awareness: - Develops, plans, coordinates, delivers and/or evaluates training courses, methods, and techniques as appropriate. Cybersecurity Management: - Oversees the cybersecurity program of an information system or network, including managing information security implications within the organization, specific program, or other area of responsibility, to include strategic, personnel, infrastructure, requirements, policy enforcement, emergency planning, security awareness, and other resources. Strategic Planning and Policy: - Develops policies and plans and/or advocates for changes in policy that support organizational cyberspace initiatives or required changes/enhancements. Identifies, analyzes, and mitigates threats to internal information technology (IT) systems and/or networks. Cyber Defense Analysis: - Uses defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from threats. Incident Response: - Responds to crises or urgent situations within the pertinent domain to mitigate immediate and potential threats. Uses mitigation, preparedness, and response and recovery approaches, as needed, to maximize survival of life, preservation of property, and information security. Investigates and analyzes all relevant response activities. Vulnerability Assessment and Management: - Conducts assessments of threats and vulnerabilities; determines deviations from acceptable configurations, enterprise or local policy; assesses the level of risk; and develops and/or recommends appropriate mitigation countermeasures in operational and nonoperational situations. Tulsa, Oklahoma AreaSystems Analyst @ Webco Industries - Migrated core switch stack from Dell to Cisco 3750X, optimizing both security and performance for ESXI servers. -Team member for server migration to new hardware, including implementation of ESXi cluster on Cisco UCS blades and the migration of over 90 servers to the new platform. -Implemented software updates, application, and operating system deployment using Configuration Manager.- Installed, configured and administered Operations Manager monitoring and alerting system.- Installed, configured and administered DirectAccess solution for remote access by employees.- Implemented external and mobile access to Lync Server.- Project leader for implementation of ITIL service manager framework using Microsoft Service Manager.- Installed, configured and administered Data Protection Manager Server backup solution for remote servers. From April 2011 to August 2013 (2 years 5 months) Sand Springs, OK


Timothy Potter’s Personal Email Address, Business Email, and Phone Number

are curated by ContactOut on this page.

10x your recruitment & sales conversations

Contact over 200M professionals
instantly by email or phone. Reveal
personal & work email addresses, as
well as phone numbers accurately with
our ContactOut Chrome extension.

In a nutshell

Timothy Potter's Personality Type

Introversion (I), Intuition (N), Thinking (T), Judging (J)

Average Tenure

4 year(s), 2 month(s)

Timothy Potter's Willingness to Change Jobs

Unlikely

Likely

Open to opportunity?

There's 87% chance that Timothy Potter is seeking for new opportunities

Timothy Potter's Social Media Links

/company/m... /school/un...
Engage candidates 10x faster

Enjoy unlimited access and discover candidates outside of LinkedIn

Trusted by 400K users from

76% of Fortune 500 companies

Microsoft Nestle PWC JP Morgan Merck Rackspace WarnerMedia Randstad Yelp Google

The most accurate data ever

CCPA Compliant
GDPA Aligned
150M Personal Emails
300M Work Emails
50M Direct Dials
200M Professional Profiles
30M Company Profiles

Hire Anyone, Anywhere
with ContactOut today

Making remote or global hires? We can help.

  • 50 contacts/month
  • Works on standard LinkedIn only
  • Work emails, personal emails, mobile numbers
* 1 user per company limit

No credit card required

Try ContactOut for Free