Jordan Jankoviak

Cybersecurity Professional

Systems Administrator

Network Engineer

WordPress Developer

Jordan Jankoviak

Cybersecurity Professional

Systems Administrator

Network Engineer

WordPress Developer

About Me

Hello! I’m Jordan Jankoviak.

I am an experienced professional with an established record of technology solutions and cybersecurity engineering experience. Recognized for demonstrating a natural aptitude for overseeing the planning, analysis, and implementation of security initiatives, as well as for presiding over a wide range of key cybersecurity activities and for leading the development of innovative solutions. Professional focal points include relationship management, team leadership and collaboration, information security, risk assessment and management, data protection, incident response, disaster recovery, patch management, technology solutions, vulnerability management, system administration, and project management. Delivering superior performance on the latter areas of expertise requires utilization of effective communication and interpersonal skills, as well as technical acumen, analytical thinking, and problem-solving to support maximum success.

 

Colleagues describe me as a driven, innovative, precise, down-to-earth, dynamic, and cybersecurity engineering expert who can be relied on to offer superior solutions and operations that deliver effective results.

 

My Expertise
Vulnerability Management

Vulnerability Platforms: InsightVM, Nessus, Green Bone, Tanium Comply
Capabilities: Spearheaded the design, development, and implementation of the company’s vulnerability management program. I highlighted the company's risk posture and create a remediation plan that reduced the company's risk by over 50% in one year.

EDR Management

EDR Platforms: Crowdstrike, SentinelOne, Cylance, BitDefender
Capabilities: Effectively performed multiple deployments of EDR solutions to over 50,000 assets without causing any interruption to business. Revamped platform policies and configurations to improve detections and functionality of the platform.

Offensive Security

Toolsets: Kali Linux, Metasploit, BurpSuite, Shodan, Wireshark
Capabilities: Perform extensive cybersecurity assessments to search for and identify potential gaps and risks to ensure success. I've utilized security toolsets to discover gaps in web applications, system configurations, and network policies.

Security Information and Event Management

SIEM Platforms: Splunk Enterprise, Devo, Graylog
Capabilities: Contributed in the configuration, access control, tuning, integration, and continuous improvement actives within multiple SIEM platforms. I was one of the points of escalation for SIEM and provide guidance and mentoring to the SOC.

Systems Administration

OS Platforms: Windows, Linux, Mac
Capabilities: Played a key role by presiding over and maintaining 300 mixed assets, including Windows, Linux, and Mac devices. Carried out the ongoing evaluation and assessment of system performance and implemented corrective actions. Operated with a strong and ongoing focus on improving and enhancing the patch management program while guaranteeing all servers were compliant. Administered the general troubleshooting, backup, and repair of various computer systems and peripheral equipment.

Network Management

Network Platforms: Meraki, UniFi, pfSense, Sonic Wall, Cisco, TP-Link
Capabilities: Orchestrated multiple network designs and implementations, from redeploying new hardware to configuring policy changes within the devices themselves. Ensuring the most up-to-date standards and best practices for networking and security policies.

WordPress Development

Website Platforms: WordPress
Capabilities: Utilized WordPress's content management system to implement designed layout with attention to details such as style and size of type, photographs, graphics, animation, etc. for the web and various other media.

KPIs & Databases

Metric Platforms: Splunk, Devo, Grafana, DataStudios, Crystal Reports, MySQL, BigQuery
Capabilities: Chart the creation and preparation of key cybersecurity KPIs to provide visibility into security risk and drive action on remediation strategies.

Programming

Programming Languages: Python, C++, Java
Capabilities: Utilized Python to streamline data collection and correlations for leadership and infrastructure teams.

My Hobbies
Playing Guitar
Movies & TV Shows
Family & Friends
Technology Projects
Video & Card Games
Taveling
Gym
Walk My Dog
Quote
There’s no silver bullet solution with cyber security, a layered defense is the only viable defense.
James Scott
James Scott
Institute for Critical Infrastructure Technology
My Resume
Experience
2022-Present
Cybersecurity Manager of Vulnerability Management and Threat Intelligence
MultiCare Health System
  • Oversee the daily operation of the vulnerability management program and proactively identify
    cyber threats and risks via the delivery of vulnerability management and threat intelligence.
  • Bring leadership and expertise in the delivery of these services by efficiently managing the people, processes, and technology that support these cybersecurity services.
  • Architect dashboards presenting key performance and risk indicators, driving targeted remediation efforts and fostering accountability, resulting in a remarkable 60% reduction in risk within the first year.
  • Employ strategic monitoring of vulnerabilities and intelligence sources to provide actionable insights.
  • Seamlessly integrate threat intelligence into Security Operations Center toolsets, amplifying data richness and elevating threat hunting capabilities.
  • Strategically align threat intelligence with the organization’s security infrastructure, ensuring a unified and fortified defense strategy.
  • Spearhead the development of tailored solutions for asset management, proactively identifying and addressing gaps within each platform.
2022 - 2022
IT Cyber Defense Senior Specialist
Selective Insurance
  • Acts as a subject matter expert to the enterprise and a mentor to other IT security staff. Independently initiates work as needed to meet cyber defensive needs, and exercises significant levels of accountability and ownership of security issues. Performs assessments, and incident response/threat intelligence consultation on security topics to enterprise projects and technology acquisitions, in support of Manager, IT Cyber Defense.
  • Responsible for taking a lead expert role in false positive detection, event correlation, identifying indicators of threat activity, and executing actionable recommendations. Possesses an expert level of expertise in making recommendations that enable expeditious remediation. Independently identifies, assesses, and recommends cyber defense software, processes, and services to Manager, IT Cyber Defense based on business plans and security gaps, as appropriate. Able to translate high level designs, recommendations ,and industry trends into effective solutions, and leads the execution of these solutions.
  • During incident response events works with ITS Cyber Defense Manager to perform event triage, scoping, criticality and impact. Perform defensive actions such as incident handling, forensic analysis and chain of custody documentation in support of incident response. Possesses an expert level of knowledge in intrusion detection methodologies and techniques for detecting host and network-based intrusions and considered an expert in in protecting a network against malware. (E.g. NIPS, anti-malware, restrict/prevent external devices, spam filters)
  • Recognizes and identifies potential areas where existing data security policies, procedures, and controls require change, or where new ones need to be developed, especially regarding future business expansion. Maintains an awareness of industry trends and emerging risks, and proposes relevant company response.
  • Identifies, initiates, and manages contact with vendors regarding new cyber defensive technologies, security system updates, and technical support of security products.
  • Acts as a third-level support to manage critical issues that may affect clients, including determining short-term solutions. Completes status and statistical reports in assigned area as required while recommending long term solutions.
  • Leads the development and execution of a remediation strategy for routine and potential areas where existing cyber defensive policies and procedures may require change, or where new ones need to be developed Takes a leadership role in supporting the ITS Cyber Defense Manager in partnering with legal and audit departments to ensure compliance with policy and regulatory requirements.
  • Leads analysts in maintaining and enhancing vulnerability management procedures. Plans, manages, and executes upgrades to existing systems and communicates and coordinates change with impacted departments, directly or through delegation.
  • Under direction of management and counsel, plays a leading role in the incident response process, and contributes to recovery activities.
  • Participates in the Cyber Defense Center on call rotation. Coaches Developers, Technicians, Architects, and Managers as a thought leader in the development and enforcement of Enterprise Architecture and Security standards.
2022 - Present
Co-Founder | CISO
CyberLake Security

As a co-founder of CyberLake Security, an esteemed cybersecurity company founded in 2022, I have been instrumental in shaping the company’s online presence and driving a significant emphasis on vulnerability management services.

One of my key contributions has been leveraging my corporate knowledge and expertise to establish robust documentation, automated workflows, key performance indicators (KPIs), and strategic planning frameworks for vulnerability management. By implementing these initiatives, I have assisted our clients in establishing their own comprehensive vulnerability management programs within our organization.

2019 - 2022
Senior Cybersecurity Analyst
Whirlpool Corporation
  • Received rapid promotions to this position in recognition of extensive efforts and operations in previous roles.
  • Closely collaborate and communicate with senior personnel and other team members on a daily basis to perform a wide range of cybersecurity-related activities.
  • Spearheaded the design, development, and implementation of the company’s vulnerability management program.
  • Served in an integral role by effectively employing multiple SIEMs to provide KPIs to leadership and departments.
  • Chart the creation and preparation of key cybersecurity documents and reports, including security assessment reports, system security plans, disaster recovery plans, and more.
  • Contribute extensively to the creation and development of security policies and plans for specific issues and problems.
  • Perform extensive cybersecurity assessments to search for and identify potential gaps and risks to ensure success.
  • Effectively managed and deployed EDR application across the enterprise.
  • Headed the digital forensics for the legal department on highly confidential cases.
2016 - Present
Owner | WordPress Designer
Elevate Designs
  • Implements designed layout with attention to details such as style and size of type, photographs, graphics, animation, etc. for the web and various other media
  • Exhibits follow-up skills in order to ensure projects are completed accurately, timely and within budget constraints
  • Develops new website features and seeks out existing solutions to meet client needs
  • Executes web-based production of marketing and advertising products
  • Ensures cross browser compatibility
  • Maintained customer relationships and satisfaction by constant
  • Marketing materials development to enhance customers brand presence (flyers, web banners, PowerPoints, logos and videos)
  • Monitor uptime, hosting, and databases to ensure site is performing at maximum capacity
2019 - 2019
Systems Administrator
Bethel University
  • Leveraged extensive expertise in system administration on a large scale while operating in this position.
  • Orchestrated the redesign and revamp of the university’s disaster recovery plan to increase resiliency and data protection.
  • Drove a significant reduction in server infrastructure and a decrease in costs for the university and ensure success.
  • Operated with a strong and ongoing focus on improving and enhancing the patch management program while guaranteeing all servers were compliant.
  • Dealt with, resolved, and addressed a wide range of technical problems and issues in a swift and effective manner.
  • Oversaw and led all aspects of technical projects from inception to completion in collaboration with other personnel.
2015 - 2019
Systems Administrator
Vero Orthopaedics & Vero Neurology
  • Obtained a wide range of new skills and abilities while serving in this role, including IT support and system administration.
  • Played a key role by presiding over and maintaining 200 mixed assets, including Windows and Linux devices.
  • Effectively implemented major application upgrades for their EMR platform and provided application support.
  • Led the effective implementation of multi-factor authentication within the company through utilization of expertise.
  • Carried out the ongoing evaluation and assessment of system performance and implemented corrective actions.
  • Administered the general troubleshooting, backup, and repair of various computer systems and peripheral equipment.
EDUCATION
2015 - 2018
Indian River State College
Fort Pierce, FL

Bachelor’s Degree in Cybersecurity & Computer Management

2012 - 2015
Indiana University
South Bend, IN

Focus in Computer Science

2008 - 2012
Edwardsburg High School
Edwardsburg, MI

High school Diploma

Certificates
Splunk 7.x Fundamentals
2019
Splunk 7.x Fundamentals

Direct Link

Metasploit Pro Specialist
2022
Metasploit Pro Specialist

Direct Link

Certified Information Systems Security Professional (CISSP)
2023
Certified Information Systems Security Professional (CISSP)

Direct Link

HarvardX - Cybersecurity: Managing Risk in the Information Age
2024
HarvardX - Cybersecurity: Managing Risk in the Information Age

Direct Link

My Skills
Personality Type
  • Collaboration
    85
  • Communication
    90
  • Active Listener
    80
  • Positivity
    95
Core Competencies
  • Cybersecurity Engineering
  • Vulnerability Management
  • Risk Management
  • Leadership & Collaboration
  • Relationship Management
  • Project Management
  • Disaster Recovery
  • Incident Response
  • Data Protection
  • Patch Management
  • Systems Administration
  • Network Administration
  • Technology Solutions
  • WordPress Development
  • Website Hosting
  • VoIP Management
  • Analytical Thinking
  • Problem Solving
Testimonials
Recent Works
Selective Insurance
Cybersecurity
Whirlpool
Cybersecurity
Bethel University
System Administration
Gossamer Crossing
System Administration, Website Design
Platinum Roofing & Exteriors
System Administration, Website Design
Faith For Life Church
System Administration, Website Design
Latest Posts
May 27, 2024 Patch Management: Essential Strategies to Enhance Your Cybersecurity in 2024
CybersecuritySystems Administration

In the ever-evolving world of cybersecurity, patch management plays a critical role in maintaining the integrity and security of your systems. This comprehensive guide explores the importance of patch management, offering essential strategies, best practices, and tools to help you stay ahead of potential threats in 2024.

May 20, 2024 Reducing Risk with Vulnerability Management: Essential Strategies for 2024
Cybersecurity

In today’s digital landscape, cyber threats are ever-evolving, making vulnerability management crucial for any organization. This comprehensive guide explores how to effectively reduce risk through vulnerability management, providing you with the strategies, tools, and best practices needed to protect your assets in 2024.

March 14, 2023 Vulnerability Management Platforms for Your Program
Cybersecurity

As organizations continue to embrace digital transformation, the complexity of their IT infrastructure increases, making them more vulnerable to cyberattacks….

February 13, 2023 Vulnerability Management on IoT Devices
Cybersecurity

Internet of Things (IoT) devices have become an essential part of our daily lives. From smart homes to connected cars,…

Get in Touch
  • Location: Michigan, USA
  • Phone: 1 (269) 340-0030
  • Freelance: Employed, Open To Offers
Contact Form