Kristopher G.
About Kristopher G.
Kristopher G. is a Security Engineer with a background in cybersecurity and extensive experience in Identity and Access Management. He has worked for notable companies including Warby Parker, Twilio, and Riot Games, and holds a Bachelor's degree from Christopher Newport University.
Current Role at Riot Games
Kristopher G. serves as a Security Engineer at Riot Games, a position he has held since 2023. He works remotely, contributing to the company's cybersecurity efforts. His role involves employing advanced threat modeling and incident response techniques to enhance security measures within the organization.
Previous Experience at Warby Parker
Before joining Riot Games, Kristopher G. worked at Warby Parker as a Senior Security Engineer from 2021 to 2022. In this role, he was responsible for implementing security protocols and managing security risks. His tenure lasted for nine months in the New York City Metropolitan Area, where he also held the position of Security Engineer II.
Professional Background in Cybersecurity
Kristopher G. has a diverse background in cybersecurity, having worked at several notable companies. He was a Senior Information Technology Engineer at Twilio from 2020 to 2021 and at Segment from 2019 to 2020. His responsibilities included IT operations, security, and architecture, where he utilized various security tools and techniques.
Education and Expertise
Kristopher G. earned his Bachelor's degree from Christopher Newport University, where he studied from 2011 to 2015. He possesses expertise in Identity and Access Management (IAM) and is skilled in technical documentation and risk analysis. His knowledge contributes to secure network design and architecture.
Technical Skills and Tools
Kristopher G. utilizes a wide range of security tools in his work, including Carbon Black, Okta, and Cisco Meraki. He regularly works with cloud platforms such as AWS and employs Terraform for infrastructure management. His skill set includes advanced threat modeling and incident response techniques, which are essential in cybersecurity operations.