Jim Walker
About Jim Walker
Jim Walker is a Director at Focal Point Data Risk, where he has worked since 2022. He has extensive experience in Identity & Access Management and IT strategy, with a career spanning roles in both academia and government administration.
Current Role at Focal Point Data Risk
Jim Walker currently serves as the Director at Focal Point Data Risk, a position he has held since 2022. In this role, he oversees various initiatives related to identity and access management. His leadership contributes to the strategic direction of the organization, leveraging his extensive experience in IT and security.
Previous Experience at Focal Point Data Risk
Prior to his current role, Jim Walker worked as the IAM Manager at Focal Point Data Risk from 2019 to 2022. During this time, he focused on implementing and managing identity and access management solutions, enhancing security protocols, and ensuring compliance with industry standards.
Professional Background in IT
Jim Walker has a robust background in information technology, having worked in various capacities. He served as a Sr Network Engineer at Ohio University from 1995 to 2001 and later as a Technical Support Analyst at the same institution. His experience also includes roles at the U.S. Department of the Treasury and Bureau of the Public Debt, where he managed IT systems and programs.
Education and Expertise in Computer Science
Jim Walker earned a Bachelor of Science degree in Computer Science from Ohio University, where he studied from 1989 to 1993. His educational background provides a strong foundation for his expertise in identity and access management and Entrust PKI, which he has developed throughout his career.
Experience in Government Administration
Jim Walker has demonstrated significant experience in the government administration sector. He held positions such as Logical Access Control Systems Program Manager at the U.S. Department of the Treasury and Supervisory IT Specialist at the Bureau of the Public Debt. His roles involved managing system programs and ensuring the security of sensitive information.