Jim West - Founder (Top Cyber Pro)
Jim West possesses more than 30 years’ experience in the Information Technology field with over 18 years focused within Cybersecurity. He has worked in the IT and Security industry across many sectors of commercial, space, federal, and defense with expertise in Biometrics, Risk Management, Security Analysis, and Network and Systems Auditing. Jim holds multiple certifications which include; CISSP-ISSEP, ISSMP, GSLC, GCIH, GSNA, GPEN, G2700, PMP, C-CISO, S-CISO and many others. Jim has been invited to speak at Cyber Security conferences and events worldwide to include the NSA IA Symposium, Texas Technology Summit, CSfC Tech Day, TechNet Korea, Global CISO Forum, Cyber Bowl, Best Cyber Ranger, and many others. He was shortlisted as a finalist for Personality of the Year for the 2018, 2019, and 2020 Cyber Security Awards, and won in 2021. West is also an award-winning author and writer. Jim’s “Cyber Security and Test Tips” eBook placed in the “100 Best Cyber Security Books of All Time” list by Bookauthority.org. For years he has developed and overseen IT and Cybersecurity strategy and solutions which solve complex problems for National Security systems and networks. West possesses a wide range of IT specialization to include systems integration, enterprise-wide and cloud security, network engineering, penetration testing, and more.
Certifications
- PMI Project Management Professional (PMP)
- ISACA Certified Information Security Manager (CISM)
- (ISC)2 Certified Information Systems Security Professional (CISSP)
- (ISC)2 Information Systems Security Management Professional (ISSMP)
- (ISC)2 Information Systems Security Engineering Professional (ISSEP)
- (ISC)2 Information Systems Security Architecture Professional (ISSAP)
- (ISC)2 Certified in Governance, Risk, and Compliance (CGRC/CAP)
- (ISC)2 Systems Security Certified Practitioner (SSCP)
- SECO-Institute Certified Information Security Officer (S-CISO)
- EC-Council Certified Information Security Officer (C-CISO)
- EC-Council Certified Network Defense Architect (CNDA)
- EC-Council Certified Ethical Hacker (CEHv11)
- EC-Council Certified Threat Intelligence Analyst (CTIA)
- EC-Council Certified Encryption Specialist (ECES) *In Study-Exam Nov 2023*
- EC-Council Computer Hacking Forensic Investigator (CHFI) *In Study-Exam Nov 2023*
- GIAC Security Leadership Certification (GSLC)
- GIAC ISO 27000 Specialist (G2700)
- GIAC Systems and Network Auditor (GSNA)
- GIAC Certified Incident Handler (GCIH)
- GIAC Penetration Tester (GPEN)
- GIAC Certified Windows Security Administration (GCWN)
- ITIL v4 Foundation for Service Management
- Microsoft Certified IT Professional Enterprise Administrator (MCITP)
- Microsoft Certified Cybersecurity Architect Expert (SC-100)
- Microsoft Certified Security Operations Analyst Associate (SC-200)
- Microsoft Certified Azure Database Administrator Associate (DP-300)
- CompTIA CySA+ Security+ Network+ A+ Certification
- Cloud Security Alliance (CSK) Certificate of Cloud Security Knowledge (CCSK)
- Linux Professional Institute (LPI) Linux Essentials
- Python Institute Certified Associate in Python Programming (PCAP) *In Study-Exam Nov 2023*
- Intel WAN Solutions & Technologies Certification
- NSTISSI-4011 INFOSEC Professional
- Defense Counterintelligence & Security Agency, Marking Special Categories Classified Information 2023
- Defense Counterintelligence & Security Agency, Mandatory Controlled Unclassified Information 2023
- Defense Counterintelligence & Security Agency, Introduction to Information Security 2023
- Defense Counterintelligence & Security Agency, CI Awareness & Reporting 2023
- Defense Counterintelligence & Security Agency, Derivative Classification 2023
- Defense Information Systems Agency Endpoint Security Solutions (ESS)501-Analyst 3/2022
- Defense Information Systems Agency JRSS ArcSight, SecureCRT and Schnozz
- Defense Information Systems Agency JRSS Intro to Stealthwatch, TippingPoint, Fidelis Direct
- Defense Information Systems Agency JRSS InfoVista Performance Management
- Defense Information Systems Agency JRSS Riverbed Performance Management
- Defense Information Systems Agency JRSS Intro InQuest & OPSWAT
- Joint Knowledge Online Operations Security (OPSEC) 3/2022
- AttackIQ Foundations of Operationalizing MITRE ATT&CK 2022
- AttackIQ Intermediate MITRE ATT&CK 2022
- AttackIQ AttackIQ Foundational Blueprints 2022
- AttackIQ Foundations of Purple Teaming 2022
- AttackIQ Intermediate Purple Teaming 2022
- AttackIQ Foundations of Breach & Attack Simulation 2022
- AttackIQ Intermediate Breach & Attack Simulation 2022
- AttackIQ Top ATT&CK Techniques 2022
- AttackIQ Countering Ransomware with MITRE ATT&CK 2022
- AttackIQ Threat-Informed Architecture 2022
- AttackIQ Threat Alignment for Purple Teams 2022
- AttackIQ Emulation Planning for Purple Teams 2022
- AttackIQ Extending ATT&CK with Workbench 2022
- AttackIQ MITRE ATT&CK Security Stack Mappings: AWS 2022
- AttackIQ MITRE ATT&CK Security Stack Mappings: Azure 2022
- AttackIQ Mapping MITRE ATT&CK to CVE for Impact 2022
- AttackIQ Application of ATT&CK Navigator 2022
- AttackIQ Delivering Value with ATT&CK Sightings Report 2022
- AttackIQ Beyond Atomic Testing with Attack Flows 2022
- AttackIQ menuPass Emulation Plan Execution 2022
- AttackIQ Intro into FIN6 Emulation Plans 2022
- AttackIQ Intro toEASY Framework for Threat Intelligence 2022
- AttackIQ Cybersecurity Crisis Management 2022
- AttackIQ Evidence-Based Security Management 2022
- AttackIQ Strategic Cybersecurity Management 2022
- AttackIQ Uniting Threat & Rick Management with NIST 800-53 & MITRE ATT&CK 2022
- ISC2 CISO’s Guide to Success 2022
- ISC2 Intro to Artificial Intelligence (AI) 2022
- ISC2 Web Application Penetration Testing 2022
- ISC2 Practical Intrusion Analysis Using the Diamond Model 2022
- ISC2 Leveraging the Intelligence Cycle 2022
- ISC2 Techniques for Malware Analysis 2022
- ISC2 Preparing for Zero Trust 2022
- ISC2 Securing the Remote Workforce 2022
- ISC2 Mobile Security 2022
- ISC2 Privacy Regulation Roadmap 2022
- ISC2 Security in the IoT Ecosystem 2022
- ISC2 Purple Team Playbook 2022
- ISC2 Incident Management Preparation & Response 2022
- Splunk Fundamentals 1 & 2 2022
- Tel Aviv University edX, Unlocking Information Security 1 & 2 (60 hours)
- Delft University of Technology edX, Fundamentals of Quantum Information (30 hours)
- Caltech & Delft University of Technology edX, Quantum Cryptography (80 hours)
- NYU edX, InfoSec – Authentication & Access Control (50 hours)
- NYU edX, InfoSec –Advanced Topics (50 hours)
- NYU edX, Network Security Protocols (50 hours)
- NYU edX, Network Security Advanced Topics (50 hours)
- NYU edX, Advanced Database Queries (40 hours)
- NYU edX, Penetration Testing – Discovering Vulnerabilities (50 hours)
- NYU edX, Penetration Testing – Exploitation (50 hours)
- NYU edX, Penetration Testing – Post Exploitation (50 hours)
- TXAM/DHS/FEMA – Digital Forensics Basics (7 Hours)
- CodeRED – Cyber Deception Demystified
- CodeRED – Pentesting Fundamentals
- CodeRED – Computer Networks Security from Scratch to Advanced
- CodeRED – Network Defense Essentials (NDE)
- CodeRED – Ethical Hacking Essentials (EHE)
- CodeRED – Digital Forensics Essentials (DFE)
- CodeRED – Data Analysis with Python Masterclass
- CodeRED – Complete Python Hacking Course: Beginner to Advanced
- CodeRED – Web Hacker’s Toolbox
- CodeRED – Web hacking: Full-Stack Exploitation Mastery
- CodeRED – DevSecOps: Implementing Security in DevOps Processes
- CodeRED – Open Source Intelligence using Windows Host
- CodeRED – Deep Dove Open Source Intelligence Windows Host
- CodeRED – Applied Data Loss Prevention
- CodeRED – Securing Endpoint with Microsoft Defender
- CodeRED – Introduction to Dark Web, Anonymity, and Cryptocurrency
- Defense Counterintelligence Security Agency – Insider Threat Awareness
- Defense Counterintelligence Security Agency – Counterintelligence
- Defense Counterintelligence Security Agency – Supply Chain Threat
- Defense Counterintelligence Security Agency – Counter-Proliferation
- Defense Counterintelligence Security Agency – Continuous Monitoring
- Defense Counterintelligence Security Agency – Behavioral Science in Insider Threat
- Defense Counterintelligence Security Agency – Applying A&A in NISP
- Defense Counterintelligence Security Agency – Prot. Assets in the NISP
- Dept of Army, Cyber Security Fundamentals (CSF) (25 hours)
- Dept of Army, Cyber Awareness Challenge (2 hours)
- CIO G-6/NETCOM Information Assurance Technical Level 1 Certification
- CIO G-6/US Army PKI Enhanced Trusted Agent (ETA) v2
- CIO G-6/US Army NSS PKI Trusted Agent (TA) v2
- CIO G-6/US Army Privileged User Cybersecurity Responsibilities v5
- CIO G-6/US Army Portable Electronic Devices & Removable Storage Media
- CIO G-6/US Army DoD Cybersecurity Policy v1.2
- CIO G-6/US Army Social Networking v4
- CIO G-6/US Army Phishing Awareness v6
- CIO G-6/US Army Personally Identifiable Information (PII) v4
- CIO G-6/US Army Safe Home Computing
- CIO G-6/US Army Assured Compliance Assessment Solution (ACAS)
- DoD Enterprise Mission Assurance Support Service Training (eMASS)
- DoD Information Assurance Certification and Accreditation Process
- DoD DIACAP Valuator
- DISO (DuPont Information Security Organization) Training.
- DoD Cyber Exchange – Using Mobile Devices in DoD Environment v4
- DoD Cyber Exchange – Phishing & Social Engineering v6
- DoD Cyber Exchange – Cyber Protect v3 (2 hours)
- DISA – Cyber Law 1 & 2 (10 hours)
- DISA – Information Assurance for DoD Auditors and IGs (6 hours)
- DISA – IA Briefing for Senior Operation Leaders
- DISA – Information Operations (IO) Fundamentals (2 hours)
- DISA – DoD DIACAP (2 hours)
- DISA – IA/CND Computer Network Defense Information Sharing
- DISA – Computer Network Defense (CND) (1 hour)
- DISA – Information Assurance Policy & Technology (IAP&T) (4 hours)
- DISA – Information Assurance Security Officer (IASO) Lvl .1,
- DISA – System Administration and Network Management Security
- DISA – Enhancing IA through Physical Security (2 hours)
- DISA – Physical Security for SIPRNet (1.5 hours)
- DISA – DoD Intrusion Detection System (IDS) Analysis (6 hours)
- DISA – Information Systems Security Monitoring Course (Army CIO/G6)
- DISA – HBSS HIP Training
- DISA – Wireless Security Awareness Course (CX-I AMN)
- DISA – Flying Squirrel Training
- DISA – OPSEC and Web Content Course (Army CIO/G6)
- DISA – SCCVI Retina Network Security Scanner Training
- DISA – Retina Enterprise Manager (REM 3.0) Training
- DISA – Incident Handling (Army CIO/G6)
- DISA – STIG Training (CX-I AMN)
- DISA – Zero Day Attacks and Prevention (CX-I AMN)
- DISA – SQL Injection Training
- DISA – IA Vulnerability Management v5.0 (CX-I AMN)
- DISA – Social Engineering v3.0 (CX-I AMN)
- DISA – Insider Threat v3.0 (CX-I AMN)
- DISA – Information Assurance for DoD Auditors and IGs (6 hours)
- DISA – IA Briefing for Senior Operation Leaders
- DISA – Information Operations (IO) Fundamentals (2 hours)
- DISA – DoD DIACAP (2 hours)
- DoD DISA Public Key Infrastructure (PKI) Course
- Defense Acquisition University Fundamentals of Acquisition Management
- DHS/FEMA IS-546a Continuity of Operations (COOP) Awareness (4 hours)
- DHS/FEMA IS-547a Introduction to Continuity of Operations (1 hour)
- DHS/FEMA IS-120a An Introduction to Exercises (1 hour)
- DHS/FEMA IS-130 Exercise Evaluation Improvement Planning (5 hours)
- JTF-GNO NetOps:An Overview Course (1 hour)
- Army G3 Computer Security
- Army Information Systems Security Monitoring
- 3Com Remote Access System VLAN Manager Certification
Awards and Recognition
Cyber Awards & Recognitions:
EC Council CEH Hall of Fame Finalist, 2023
Cyber Security Awards Winner, Personality of the Year 2021
Cyber Security Awards Shortlisted Finalist, Personality of the Year 2020
Cyber Security Awards Shortlisted Finalist, Personality of the Year 2019
Cyber Security Awards Shortlisted Finalist, Personality of the Year 2018
American Cyber Awards Finalist 2020
Top Cyber Pro Honorary Level 99 Award 2020
Book Authority Top 100 Best Cyber Security eBooks of All Time, Cyber Security Test Tips & Methods
1st TSC (FWD) G6 Appreciation Award 2010
1st TSC (FWD) G6 Appreciation Award for Outstanding Support 2009
Unisys Service Award – Award a coin for excellent support and service 2007
Multi National Division – Baghdad (MNDB) Commander’s Certificate for outstanding support 2006
DuPont Service Award – Awarded for service during the aftermath of Hurricane Katrina 2005
CSC Service Award – Awarded for excellent customer service 2005
CompUSA Service Award 1998 – Awarded 2 silver coins for outstanding service
US Army Europe G6 Certification and Accreditation Branch Appreciation Award, 2014
ISC2 US Military Germany Chapter Appreciation Award, 2016
Book & Publication Awards & Recognitions:
Reader’s Favorite Book Award 2015, Libellus de Numeros
Independent Publisher’s Book Award 2015, Libellus de Numeros
Moonbeam Children’s Book Award 2015, Libellus de Numeros
New York Book Festival Honorable Mention 2015, Libellus de Numeros
San Francisco Book Festival Honorable Mention 2015, Libellus de Numeros
Hollywood Book Festival Honorable Mention 2015, Libellus de Numeros
Reader’s Favorite Book Award 2016, Circulus de Potentia
AuthorShout Reader Ready Award Top Pick 2019, Circulus de Potentia
INDIEFAB Book of the Year Finalist 2016, Circulus de Potentia
Kindle Book Awards Semi Finalist 2016, Circulus de Potentia
New York Book Festival Honorable Mention 2016, Circulus de Potentia
San Francisco Book Festival Honorable Mention 2016, Circulus de Potentia
Hollywood Book Festival Honorable Mention 2016, Circulus de Potentia
AuthorShout Reader Ready Award Recommended Read 2019, Divide et Impera
AuthorShout Reader Ready Award Top Pick 2019, Leaving Home Behind: Poems from my Youth
AuthorShout Reader Ready Award Top Pick 2019, Circulus de Potentia
AuthorShout Reader Ready Award Recommended Read 2019, Cyber Security Test Tips & Methods
AuthorShout Reader Ready Awards Honorable Mention 2019, The One: Al Wahid
ReverbNation Top Ranked Hip Hop Artist (#1 Houston, #12 Globally) 2019-2020
AuthorShout Reader Ready Award Top Pick 2020, Divide et Impera
AuthorShout Reader Ready Award Recommended Read 2020, ECHO
AuthorShout Reader Ready Award Recommended Read 2020, Comin Home Again
AuthorShout Reader Ready Awards Honorable Mention 2020, ARROW
Independent Author Network Book of the Year Award Finalist 2020, ECHO
Book Excellence Awards 2021, Bellum de Numeros
AuthorShout Reader Ready Award Recommended Read 2021, Bellum de Numeros
