Zach Sims, CISSP

Zach Sims, CISSP

Tier 1 Support Technician

Followers of Zach Sims, CISSP1000 followers
location of Zach Sims, CISSPGreater Birmingham, Alabama Area

Connect with Zach Sims, CISSP to Send Message

Connect

Connect with Zach Sims, CISSP to Send Message

Connect
  • Timeline

  • About me

    VCISO | Crafting Security Strategies That Align with Business Goals

  • Education

    • Virginia College

      -
      Bachelor's Degree Network Security
    • Virginia College

      -
      Associate's Degree Network Engineering
  • Experience

    • HealthSouth

      Mar 2004 - Dec 2007
      Tier 1 Support Technician

      • Expertly troubleshooted and resolved issues with Windows 2000 and Windows XP operating systems, ensuring smooth operation of critical business applications and systems. • Installed, configured, and maintained local and network printers, optimizing printing capabilities and minimizing downtime for 500+ users. • Led the initial setup and configuration of desktop machines, including hardware and software installations, ensuring all systems met performance and security standards. • Provided comprehensive troubleshooting and support for Microsoft Office 2000 and 2003 environments, addressing software issues promptly to maximize productivity. • Successfully set up, configured, and troubleshooted wireless connections, implementing secure protocols and resolving connectivity issues to support 300+ mobile devices. Show less

    • Brasfield & Gorrie, LLC

      Dec 2007 - Apr 2021

      • Managed and mentored a team of IT professionals supporting 1,800 end-users across multiple locations, providing comprehensive technical support ranging from general inquiries to incident response. • Cultivated a collaborative team environment centered on trust and open communication, fostering a culture of teamwork and continuous improvement. • Implemented robust incident tracking systems that enhanced IT service management capabilities, improving response times and resolution efficiency. • Spearheaded the planning and execution of a widescale Data Management Solution, optimizing data storage, retrieval, and security protocols to meet future organizational needs while aligning with strategic business objectives. • Led the strategic planning and rollout of Multi-Factor Authentication systems, significantly bolstering company-wide cybersecurity defenses and aligning with corporate security strategies. • Successfully implemented and integrated a company-wide ticketing system, improving service desk operations and user satisfaction metrics by 20%. • Proactively engaged with hardware and software vendors to negotiate contracts and optimize procurement processes, resulting in a 15% reduction in IT expenditure while maintaining service levels and supporting overall cost-saving strategies. • Collaborated cross-functionally with departments to assess IT needs and align technology solutions with business objectives, ensuring seamless integration and operational efficiency. Show less • Developed and implemented security policies and templates for various security solutions. • Designed and deployed comprehensive security solutions to safeguard organizational assets. • Conducted security assessments, network scans, and vulnerability assessments to identify and mitigate risks. • Contributed to business continuity planning and testing to ensure operational resilience. • Provided technical expertise on access control, security models, disaster recovery, and security awareness training. • Planned, implemented, monitored, and troubleshooted internal IT security policies, application security, access control, and corporate data safeguards. • Analyzed and defined security requirements for both local and wide area networks. • Updated secure configurations by monitoring vendor sites, bulletins, and notifications for security updates. • Reviewed and enhanced security internal control procedures to meet regulatory requirements. • Installed and maintained content filtering and encryption systems to protect sensitive data. • Educated personnel on the importance of computer data security and safe usage practices. • Interfaced with internal and external audit functions, as well as security and regulatory examiners. • Collaborated with law enforcement and legal representatives during investigations of potential security breaches. Show less • Provided technical support to 1,500+ end-users across hardware, Windows 7, Microsoft Office, network connectivity, copier installations, mobile devices, and Cisco IP Phones. • Served as Chairman of the ISS Security Committee, overseeing strategic security initiatives and policy development. • Installed and maintained content filtering systems to enhance network security and compliance. • Implemented and managed encryption systems to protect sensitive data and ensure regulatory compliance. • Administered Active Directory user accounts, ensuring secure access and permissions management. • Developed and updated the Information Systems and Services Security Policy to align with industry standards and organizational needs. • Conducted vulnerability assessments and network scans to identify and mitigate security risks proactively. Show less

      • Information Technology Manager

        Jul 2016 - Apr 2021
      • Information Security Administrator

        May 2015 - Jul 2016
      • Systems Technician

        Dec 2007 - May 2015
    • Hoar Construction

      Apr 2021 - Apr 2022
      Information Technology Support Manager

      In my role as an Information Technology Support Manager at Hoar Construction, I led a dedicated team responsible for delivering comprehensive IT support and services. Key responsibilities included: • IT Support Operations Management: Ensured high levels of service availability and performance, reducing downtime and enhancing user satisfaction. • Systems and Infrastructure Oversight: Directed the implementation, configuration, and maintenance of IT systems and infrastructure, including servers, networks, and software applications. • Technical Assessments: Conducted regular evaluations to identify and resolve potential technical issues, implementing proactive measures to prevent future problems. • Cross-Department Collaboration: Partnered with various departments to understand and meet their IT needs, ensuring seamless integration of IT solutions with business processes. • Best Practices Implementation: Applied industry best practices for IT support and service management, leading to improved efficiency and effectiveness of IT operations. • Vendor Management: Negotiated and managed relationships with IT vendors and service providers to ensure cost-effective and timely delivery of products and services. • IT Project Management: Led IT projects from inception to completion, including planning, execution, monitoring, and closure, ensuring projects met deadlines and budget constraints. • User Training and Support: Developed and delivered training programs to enhance user proficiency with IT systems, providing ongoing support and troubleshooting. • Security and Compliance: Ensured compliance with industry standards and regulations, implementing robust security measures to protect company data and systems. Show less

    • SecurIT360

      Apr 2022 - now
      Information Security Officer

      As an accomplished vCISO, I help organizations craft and implement security strategies that align with their business needs. With a deep background in regulatory compliance, risk management, and security program development, I focus on protecting sensitive data and systems while driving business success.What I Bring to the Table:Strategic Planning & Security Strategy: I don’t just set security measures; I develop strategies that fit the business, enhancing the security posture while supporting growth.Regulatory Compliance: Navigating complex standards like HIPAA, PCI-DSS, ISO, and FTC is second nature to me, ensuring companies stay compliant without getting bogged down in red tape.Security Audits & Assessments: I conduct thorough audits—including cloud environments—to spot vulnerabilities and promptly address them.Leadership & Cross-Functional Collaboration: I partner with teams across the organization, from IT to leadership, to proactively identify and manage security risks.Security Awareness Training: I deliver training programs and phishing simulations beyond check-the-box exercises to improve employee awareness.Project Management & Budgeting: Skilled in managing security initiatives from planning to execution while monitoring budgets and maximizing resources.Core Competencies:Information Security & Risk ManagementSecurity Policy Development & ImplementationVulnerability Management & Incident ResponseBudgeting for Security Programs & Strategic InitiativesProject Management & Operational LeadershipSecurity Awareness Training & Phishing SimulationsI’m passionate about building security programs that do more than tick off compliance boxes. I believe in finding the right balance between keeping things secure and supporting the organization’s goals. My strong communication skills and practical approach help bridge the gap between technical requirements and business priorities, making security a team effort across all levels. Show less

  • Licenses & Certifications

    • Lean Six Sigma Fundamentals

      LinkedIn
      Nov 2016
      View certificate certificate
    • CompTIA A+

      CompTIA
    • CompTIA Network+

      CompTIA
    • Microsoft MCP

      Microsoft
    • AWS Security Fundamentals Second Edition

      Amazon Web Services (AWS)
      Mar 2025
    • Procore Certification: Procore Administrator

      Procore Technologies
      May 2021
      View certificate certificate
    • (CISSP®) Certified Information Systems Security Professional

      (ISC)²
      Sept 2014
      View certificate certificate
    • Microsoft MCDST

      Microsoft
    • Microsoft MCTS

      Microsoft
    • Microsoft Certified IT Professional: Enterprise Desktop Administrator 7

      Microsoft