Bridges Consulting
John Kirkowski, CISSP, CEH, CPT, is a highly experienced Cyber Threat Analyst at Bridges Consulting since September 2020, with a strong background in information assurance and project management. Prior roles include Lead Technologist at Booz Allen Hamilton, where responsibilities encompassed IT Test Lab management and security policy development, as well as lead technician at ADT Advanced Integration, focusing on physical security systems for corporate clients. Additional experience includes project management at Openwave Systems and Harbor Technologies, technical support at Premier Partners, Inc., and election management at Election Systems & Software. John holds a BSBA in Marketing from Georgetown University and an AAS in Computer Information Systems from County College of Morris.
This person is not in any teams
Bridges Consulting
With the passion for making an impact, Bridges solves national security and commercial vulnerability challenges using cyber intelligence. In today’s cyber battleground, our team of elite experts makes Bridges an industry pacesetter and agile innovator that delivers success as a trusted partner. We are hiring top talent for a rapid growth trajectory while maintaining our culture and values of commitment, integrity, respect, and courage. Within the Bridges family, our employees are our first priority. We offer best-in-class compensation and benefits, a collaborative atmosphere, and opportunities to develop and advance. Not to mention, we have fun! Problems We Solve Cyber Security - Information Sharing (CDS, Firewalls, VPN, NAT, Load Balancing, etc.) - Security Assessment & Breach Response (Vulnerability Assessments, Penetration Testing, Security Audits, Threat Assessment, Breach Response) - Insider Threat (Monitoring, UAM Tools, Analytics, Alerting, Investigation) - Managing Networks (HPOV, Traffic Characterization, Mission Impact Analysis, Network Fault and Performance Monitoring, Active Configuration Management) - Securing Networks (Cyber Hunt, Vulnerability Assessments, Active Security/Configuration Enforcement, Fusing HUMINT with Network INT) Big Data - Systems Management (Systems Administration, Supercomputers, Implementation Architecture, Operations, Security, Cloud Migration) - Data Science (Big Unstructured/Structured Data, Batch and Real-Time Analytics, Tipping, AI) - Software Engineering (Workflow, Dashboards, Interfaces, Scalability) Frontier Innovations - Deep Learning Applications