Anthony Pierce

Anthony Pierce

About

Detail

Field CTO at Splunk, Cyber Strategist, Solutions Architect, and Cyber Security Evangelist
United States

Timeline


work
Job
school
Education
folder
Project
auto_stories
Publication

Résumé


Jobs verified_user 0% verified
  • Splunk
    Chief Technology Officer (Field)
    Splunk
    Jan 2023 - Current (3 years 5 months)
    Focusing on Enablement and Evangelism of Security Analytics.
  • EYT
    North america SIEM lead senior manager
    EYT
    Sep 2019 - Jan 2023 (3 years 5 months)
    Tony Pierce is the EY consulting North America Senior Manager in the Cyber Security practice of Ernst & Young LLP. His experience is concentrated in cyber security transformation leadership, information security strategy development, enterprise program management, and enterprise risk management. Tony works directly with CISO’s to frame and transform security organizations. He has broad security transformation program experience including risk posture, threat/ vulnerability management, identity and access management (IAM), threat intelligence, security infrastructure M&A, and incident management. Tony develops, Designs and leads EY’s “life of the packet data logging and monitoring / Operational SIEM strategy: The Outcome Based approach
  • R
    Professional Services and Cyber Security Architect at Redseal
    RedSeal, Inc.
    Sep 2018 - Dec 2019 (1 year 4 months)
    Communicate with the customer to understand their network and security architecture, infrastructure and operational environment and design a solution around their needs and help them understand the roles of a defense in depth solution for their unique environment. Continuously communicate with the customer to understand their network security objectives identifying Key Cyber Terrain and potential Threats from internal and external sources. Identify and Map customer network security objectives to RedSeal capabilities following a defense in depth strategy and the onion model to greatest threat first to least threat defined by the network security posture. Define a practical, customer enhanced plan for integrating RedSeal into a customer envir
  • Cisco
    Lead Cyber Investigator
    Cisco
    Oct 2017 - Aug 2018 (11 months)
    Conduct in-depth investigations into security breaches at customer sites using all available tools within customer environment, Cisco, and online. Resolve cases escalated from security analysts Tier 1 and Tier 2 analyst Resolve cases dispatched from premier customers (CAT6), maintain a daily dialog with the customer on cases until resolution Analyze device logs, packet capture, and all forms of telemetry; interpret data on global networks that exceed International lines, rules, and regulations. Conduct online forensic investigations of devices layered devices from Layer 7 to Layer 1. Conduct investigations into personnel to obtain information related to cyber-related investigations Maintain up-to-date information in secure case manage
  • M
    ISSA Sponsorship Director
    Metro Atlanta Information Systems Security Association
    Jan 2016 - Jan 2022 (6 years 1 month)
    Founding member and Director of ISSA Fort Bragg, NC helping Vets and anyone who is interested get into the pinnacles of Cyber Security. We focus on education, mentoring, training and getting our members and guests hired into the North Carolina Jobs whether at Fort Bragg or elsewhere. We are focused on the technologies of today and tomorrow and provide good solid feedback and roadmapping for our members so they can give their jobs after serving in the military. More information here https://www.linkedin.com/in/issa-fayetteville-and-fort-bragg-b99790142/
  • U
    (GS-13) System Architect / Cyber Security
    US Government Agencies
    Mar 2015 - Oct 2017 (2 years 8 months)
    • Technical Subject Matter Expert for the Mission Planning Squad of the MARFORCYBER Cyber Protection Site Team that specializes in Survey, Secure and Protect Cyber Defense Missions in the Department of Defense Environment. Provides Information Technology, Information Assurance and Cyber related leadership in all matters which includes: System architect for Cyber Security Tools integration in Command Infrastructure, Information Assurance (IA) policy and Planning Integration, Vulnerability assessment and STIG Compliance on the network, Research and Implementation of new technologies to meet emerging threats and plan, coordinate and conduct site assessments around the world. • Monitor the Network and conduct Incident Response processes and
  • A
    Cyber Defense, Network Security & Defense in Depth
    ARMA Global Corporation, A General Dynamics Company
    Sep 2013 - Mar 2015 (1 year 7 months)
    DOD and Industry best practices and STIG compliance for all Layer 2 and 3 devices on the network. Vulnerability assessment and Mitigation from an Global Enterprise overwatch. Internal Hunt activities to Q&A Infrastructure and Systems baseline compliance. Insider threat assessment using Tread analysis tools Utilize a series of tools for a 360 degree assessment to the Decision Makers, covering Compliance, Trend analysis, AV compliance, threat detection, Insider threat analysis, etc. Specialties: Redseal Engineer (Layer 2 and 3 monitoring, threat and Industry best practices and STIG compliance) Forescout (continuous monitoring, policy governance, etc.) McAfee Nitro (SIEM, trend analysis, etc.) McAfee HBSS (security suite, AV, DCM, etc) Solo
  • O
    IV Information Assurance Technician / HBSS Admin
    Ohm Systems, Inc.
    May 2013 - Sep 2013 (5 months)
    Information Level IV Cyber Security / Information Analyst for Hewlert Packard and OHM Systems. Specializing in the McAfee Systems Security Suite (HBSS), specifically DLP and HIPS application blocking. Troubleshoot over 3000 Severs and over 250,000 clients on the NMCI infrastructure.
  • F
    HBSS Administrator \ IAT III
    Focustech
    Sep 2012 - Apr 2013 (8 months)
    • Information Assurance Technician III for 2000+/ multi-domain Network. • Primarily responsible for the Host Bases Systems Security Suite, SCAP and SCCVI Scans for all enterprise enclaves to include NDU, Washington DC campus and JFSC Norfolk campus for Unclass and Classified systems. • Coordinates and implements all Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIG), Information Assurance Vulnerability Notices (IAVA) updates for .edu and .smil.mil networks. Send out IAVA and Microsoft KB via WSUS and SCCM to SIPR and UNCLASS Networks. • Provide weekly reports for intrusion detection, vulnerability scanning and Network maintenance for both campuses to the J6 and Information Technology Department
  • United States Navy
    Department Head Medical Records / IAT II
    United States Navy
    Feb 2012 - Sep 2012 (8 months)
    NAVAL MEDICAL CENTER OCEANA Direct Reports: 11 | Equipment/Material Responsibility: $25 | Annual Budget Responsibility: $100K Succeeds in leadership position with 11 direct reports by emphasizing customer service and increased productivity; developed a time management electronic tracking system that saved the organization $50000 a year in savings and 1.2 million for the Department of Defense.
  • P
    Information Systems Security Analyst
    Portaaviones USS Enterprise
    Dec 2010 - Feb 2012 (1 year 3 months)
    Direct Reports: 5 | Users managed: 6000 | Networks / Enclaves managed: 5 (NIPR/SIPR/SCI/JIANT/MED) • Information Assurance Manager for 6000+ user/workstation network. • Conducted response plan for intrusion attempts, virus infiltration and denial of service attacks with 100% integrity for all enclaves in real world operation environment. • Conducted several system audits on all Enclaves (NIPR, SIPR and SCI) daily using NSA toolsets to do “Cradle to Grave” resolution to all attempted intrusion and virus attempts on enclaves. • Started a training program for over 60 IT sailors to become DOD 8570-1M compliant with Security + and Network + certifications with overall success rate of 95%. • Instituted a ISSM training program for all new repor
  • J
    Joint Special Operations Control Center Manager / Joint Communcations Unit
    JSOC
    Aug 2007 - Dec 2010 (3 years 5 months)
    Direct Reports: 15| Equipment/Material Responsibility: $2.5M | • Managed 4 Joint Operational Control Centers in different global geographical locations; with over 250 senior leaders in three separate classified enclaves • Technical Lead for JSOC Commander for a new Intra-agency collaboration center in Washington DC, responsible for security documentation for personnel, floor layout, multi-touch collaboration software and hardware requirements/placement and was a subject matter expert on the decision making process for purchase requirements in excess of 27 million dollars.
  • C
    Information Systems Security Officer / LEAD IT Network Administrator
    CTF 76
    Jun 2005 - Jun 2007 (2 years 1 month)
    Direct Reports: 25 | Equipment/Material Responsibility: $125K | Annual Budget Responsibility: $125K • C7 Information Assurance Manager responsible for more than 8 ships and 3 stations for Information Assurance compliance in accordance with Naval Networks directives and the DOD 8570. 1M. • Supervised physical and network security standards in accordance with JAFAN 6/3 (Joint Air Force – Army – Navy Manual for Physical Security Standards ) and DCID 6/3 (Director of Central Intelligence Directive 1/14) for 4 ships and 2 Flag command SCIFFs to support Enduring Freedom, Naval and SOCOM Operations in the Pacific Area of Operations.
  • N
    Lead Supervisor for High Speed Global Ring and Department Training Supervisor
    NCTAMSPAC
    Aug 2002 - Jun 2005 (2 years 11 months)
    Direct Reports: 72 | Equipment/Material Responsibility: $150K | Annual Budget Responsibility: $50K The subject matter expert for all Asynchronous Transfer modules (ATM), Voice Over Information Protocols (VOIP) and Marconi TNX 1100 communications. Was instrumental of the deployment of the High Speed Global Ring for the USN and was a key player in the ongoing testing, maintaining and troubleshooting for the USS Ronald Reagan around the globe. Trained 92 personnel on ATM communications and was responsible for all training at NCTAMSPAC Combat Systems department to include over 270 personnel to meet the continuing evolving training requirements of modern Information Professionals.
  • U
    Information Technician
    USS Essex
    Oct 1999 - Jul 2002 (2 years 10 months)
  • T
    Airborne Infantry / Radio Operator
    The Salvation Army USA Eastern Territory
    Oct 1990 - Jun 1997 (6 years 9 months)
Education verified_user 0% verified
  • University of Maryland Global Campus
    Cyber Security and Information Assurance, Cyber/Electronic Operations and Warfare
    University of Maryland Global Campus
    Jan 2012 - Dec 2013 (2 years)
    Cyber Security
  • The University of Maryland, Office of Enrollment Management
    Cyber security and Information Assurance, Information Technology
    The University of Maryland, Office of Enrollment Management
    Jan 2012 - Current (14 years 5 months)
    Currently finishing my Bachelors Science Degree for Cybersecurity and Information Assurance
Projects (professional or personal) verified_user 0% verified
  • "
    "What is Cyber Security" for ISSA Fort Bragg, NC
    Jul 2017 - Current (8 years 11 months)
    Recently was asked to do a talk about NETCOP and "What is Cyber Security" for the Fort Bragg, NC Chapter of ISSA. Really enjoyed it and a lot of great minds in the room. The talk focused on using inherent tools that are already on the network, such as SolarWinds to do incident response and hunt missions in a DOD environment. So many times we get tunnel vision in the cyber world always looking for one more tool or using tools we are comfortable with. This talk revolved around getting out of the comfort zone and start talking and having a rapport with site engineers to leverage their tools to start a communication. I always say "People don't communicate with each other but tools do and thru tools we can start a conversation."
Publications verified_user 0% verified
  • N
    Information Assurance PQS (NAVEDTRA 43469)
    Navy Education and Training
    Jan 2009
    This PQS is a qualification for military Officers, Enlisted and civilians to meet the duty requirements in accordance with the DOD 8570-1M.
This is a community-created genome.