Jim Guckin

As a cyber-security expert, Jim is trusted by large companies to protect their assets, clients, and customers who use his products and services. Thus, if someone is looking for a job or wants to become an Information Technology expert in the future, visiting Jim’s blog can be beneficial to them.

He has a passion for bringing security standards to life by providing solutions that exceed expectations within budget and on time; oftentimes delivering results well before completion. His goal is to instill cyber security best practices into any team he is hired into whether it be an internal department or client services organization. His philosophy can be summed up this way:

“No Matter how secure a target the user is always the weakest link”

What I Do

Cyber Security Leadership

As a cyber security leader, my primary focus is on protecting the organization's data and systems from external and internal threats. I work closely with the IT team and other departments to implement and maintain strong security measures, such as education, equipment and encryption protocols. It is also my responsibility to educate and train employees on best practices for security, as well as to regularly assess and update our security strategies to stay ahead of evolving threats.

Technology Mentor

As a technology mentor, I am committed to helping others develop and improve their skills in the field. I provide guidance and support to individuals looking to learn more about technology and how to apply it in their work or personal projects. Whether it's answering questions, providing resources, or collaborating on projects, I strive to be a valuable resource for those seeking to grow their knowledge and expertise in technology.

Technology Educator

As a technology educator, I am passionate about sharing my knowledge and experience with others. I design and deliver engaging lessons and hands-on activities that help students understand and apply key concepts in technology. Whether I am teaching in a classroom or online, my goal is to inspire and empower learners to become proficient and confident in their use of technology.

Speaker and Thought Leader

As a speaker and thought leader in my field, I am always seeking opportunities to share my insights and expertise with others. I am passionate about staying current on the latest trends and developments in my field, and I enjoy sharing this knowledge through my talks and writings. My goal is to educate and inspire others through my talks and writings, and to spark meaningful discussions and debates on important issues in technology and cyber security.

Testimonials

Industries worked with

Resume

20+ Years of Experience

Education

2022

Harvard University

Certificate: Cybersecurity: Managing Risk in the Information Age

An in-depth exploration of cybersecurity that is valuable for executives and specialist roles such as cybersecurity analyst, security administration, or information security manager. Business leaders will gain the knowledge needed to lead their organizations through the complexities of the cybersecurity landscape, and develop the know-how to set appropriate budget guides for this task.

2003

CHI Institute

Associates Degree, Specialized Technology

with a 2-year course of study that prepared me to work as a network engineer or network architect. Coursework combined general education requirements with hands-on technical training.

Experience

2022 – Present

Cutomers Bank

Senior Vice President, Digital Security Operations

I am responsible for overseeing and managing the security operations center, threat intelligence, vulnerability management, and advanced cyber operations. This includes implementing and maintaining security systems and protocols, monitoring and analyzing security data, and responding to security events or incidents. I work closely with the IT team and other operational departments to ensure the organization’s data and systems are protected from external and internal threats.

2022 – Current

Thinkful

Cyber Security Mentor

As a security mentor, it is my responsibility to provide guidance and support to individuals looking to improve their knowledge and skills as they transition into the field of security. This may involve answering questions, providing resources, or collaborating on projects to help mentees understand and apply key concepts in cyber security. I strive to be a valuable resource for those seeking to grow their expertise in security, and I am committed to helping them reach their goals and succeed in their careers.

2021 – 2022

Vision Solar

IT Security Director

As an IT security director, it was my responsibility to oversee and manage the security of the organization’s information technology systems and data. This includes developing and implementing security strategies and policies, as well as monitoring and analyzing security data to identify and respond to potential threats. I work closely with the IT team and other departments to ensure the protection of the organization’s data and systems from both external and internal threats. Part of my role also involves educating and training employees on security best practices, as well as conducting regular assessments to identify and address any potential vulnerabilities.

2021 – 2021

Delaware Valley Intelligence Center

Director, Cyber Security Operations

During my short time as director of cyber security operations for the Delaware Valley Intelligence Center, it was my responsibility to oversee and manage the cyber security efforts of the agency for the region. This included developing cyber security alerts and briefs disseminated to regional governments to help identify and respond to potential threats. I work closely with federal, state, and local governments to ensure the protection of government data and systems from threats. Part of my role also involves educating and training employees on cyber operations and techniques.

2019 – 2021

City of Philadelphia

Cyber Security Manager

Personally recruited by the vCISO to assist in building a strong culture of Cyber Security. As a cyber security manager, my job was to protect the city’s computer systems and networks from cyber threats and attacks. This involved identifying and assessing potential vulnerabilities, implementing security measures and controls, and monitoring networks for any suspicious activity. I also worked closely with other teams to ensure that all employees are aware of security best practices and distribute alert notifications on remediations. In addition, I was responsible for responding to and managing any security incidents that may occur.

2014 – 2019

City of Philadelphia

Support Center Manager

Recruited by COO, to mature the small Service Desk team into a technologically and customer service-focused organization.  This involved managing staff, setting goals and targets, and ensuring that customers received timely and effective assistance. I also worked closely with other teams to troubleshoot and resolve complex issues, and I implemented processes and procedures to improve the efficiency and effectiveness of the support center. In addition, I was responsible for analyzing data and metrics to identify trends and areas for improvement.  Through these measures, the team grew 400% and became a staple in the technology maturity model.

2010 – 2014

City of Philadelphia: Office of Emergency Management

IT Program Manager

Coordinated technology integrations with local, state, and federal agencies in order for proper information flow during emergencies. Maintained technology in several different configurations and types to make sure emergency personnel could grab the technology kit and have confidence in it working. Acquired the Pennsylvania Emergency Management Agency’s basic certification to ensure proper response protocol and best practices.

2010 – 2010

Kepner-Tregoe

Network Administrator

My job was to audit and maintain the computer networks that supported the company. This involved configuring network hardware and software, monitoring network performance, and troubleshooting any issues that arose. I was responsible for installing and configuring new equipment as needed, keeping up-to-date with advances in technology, and making improvements were necessary.

2009 – 2010

Deb Shops, Inc

System Administrator

my job was to ensure that the organization followed the Payment Card Industry Data Security Standard (PCI DSS). This involved assessing the organization’s current compliance status, identifying any gaps or vulnerabilities, and implementing controls and processes to address them. In addition, I was responsible for monitoring the organization’s systems and networks for compliance, and for conducting regular audits to verify that we remained compliant.

2004 – 2009

Swartz Campbell

Systems Administrator/Helpdesk Manager

My job was to oversee the operation of the computer systems and networks and helpdesk staff. This involved managing and maintaining servers, workstations, and other hardware and software, as well as troubleshooting and resolving technical issues. I managed the helpdesk team and provided technical support to employees and ensured that they had the resources they needed to be productive.

2023 – Present

Customers Bank

Senior Vice President, Digital Security Operations

Soft Skills

Leadership

75%

Negotiation

65%

Presenting

90%

Organization

80%

Hard Skills

People Managment

85%

Decision Making

80%

Team Leadership Skills.

85%

Supporting Employees

90%

Creative Thinking Skills

90%

Project Management

85%

Portfolio

My Works
YouTube: CyberSecurity News Byte Podcast: Episode 65: July 24 2023

YouTube: CyberSecurity News Byte Podcast: Episode 65: July 24 2023

Podcast Videos
CyberSecurity News Byte Podcast: Episode 64: July 17 2023

CyberSecurity News Byte Podcast: Episode 64: July 17 2023

Podcast Videos
CyberSecurity News Byte Podcast: Episode 63: July 10 2023

CyberSecurity News Byte Podcast: Episode 63: July 10 2023

Podcast Videos
CyberSecurity News Byte Podcast: Episode 62: June 26 2023

CyberSecurity News Byte Podcast: Episode 62: June 26 2023

Podcast Videos
CyberSecurity News Byte Podcast: Episode 61: June 20 2023

CyberSecurity News Byte Podcast: Episode 61: June 20 2023

Podcast Videos
CyberSecurity News Byte Podcast: Episode 60: June 12 2023

CyberSecurity News Byte Podcast: Episode 60: June 12 2023

Podcast Videos
CyberSecurity News Byte Podcast: Episode 59: June 05 2023

CyberSecurity News Byte Podcast: Episode 59: June 05 2023

Podcast Videos
CyberSecurity News Byte Podcast: Episode 58: May 28 2023

CyberSecurity News Byte Podcast: Episode 58: May 28 2023

Podcast Videos
CyberSecurity News Byte Podcast: Episode 57: May 22 2023

CyberSecurity News Byte Podcast: Episode 57: May 22 2023

Podcast Videos
CyberSecurity News Byte Podcast: Episode 56: May 15 2023

CyberSecurity News Byte Podcast: Episode 56: May 15 2023

Podcast Videos
ClickArmor: LastPass and password managers. Live CSAF panel.

ClickArmor: LastPass and password managers. Live CSAF panel.

Other's Videos
YouTube: Cyber Security News Byte: Ep 42: 01/23/2023

YouTube: Cyber Security News Byte: Ep 42: 01/23/2023

Podcast Videos
YouTube: CyberSecurity News Byte Podcast -Ep 41 01/16/2023

YouTube: CyberSecurity News Byte Podcast -Ep 41 01/16/2023

Podcast Videos
YouTube: CyberSecurity News Byte Podcast -Ep 40 1/9/2023

YouTube: CyberSecurity News Byte Podcast -Ep 40 1/9/2023

Podcast Videos
udemy: Cyber Security Table Top

udemy: Cyber Security Table Top

Classes
udemy lesson: Understanding the Dark Web

udemy lesson: Understanding the Dark Web

Classes
Checklist: Server Reboot List

Checklist: Server Reboot List

Documents
End User Guide to Safely using WiFi

End User Guide to Safely using WiFi

Documents
YouTube: CyberSecurity News Byte Podcast – Ep:39 12/19/22

YouTube: CyberSecurity News Byte Podcast – Ep:39 12/19/22

Podcast Videos

Business Personality Test

Kolbe A - Kolbe measures your instinctive way of doing things and the result is called your MO (method of operation). It is the only validated assessment that measures a person’s conative strengths.

[Results]

Contact

Get in Touch

Philadelphia, PA

me@jimguckin.com

Available

CyberSecurityNewsByte.com