Unknown_person

Jake Mattison

Directory of Identity Management

Table of Contents

Jake's Bio

Jake Mattison stands at the forefront of cybersecurity innovation, specializing in Identity and Access Management (IAM), Privileged Access Management, Identity Governance, Zero Trust, and Data Security. As the Director of Identity Management at e360, he is recognized for his strategic foresight and ability to translate complex cybersecurity challenges into robust, user-centric solutions.

With an impressive track record of building three identity management practices from the ground up, Jake's expertise is not just in leading teams and projects but in pioneering solutions that redefine security protocols and practices. His experience spans across a variety of sectors, including government, defense, financial services, healthcare, and more, showcasing his ability to tailor security strategies to the unique needs of each industry.

Jake's journey through the cybersecurity landscape is complemented by a background in technology Mergers and Acquisitions (M&A) banking, providing him with a unique perspective on the intersection of technology, finance, and security. This experience enhances his ability to foresee and mitigate potential risks, making him a valuable ally in any cybersecurity initiative. What sets Jake apart is his visionary approach to cybersecurity. He is the architect behind multiple proprietary tools and methodologies that revolutionized role-mining processes and risk modeling, reflecting his commitment to advancing the field.

Jake's methodology integrates a dynamic security roadmap and proprietary risk modeling capabilities, allowing businesses to prioritize IAM initiatives based on an objective analysis of their unique risk landscapes.

For organizations navigating the complexities of digital security, Jake Mattison represents a beacon of knowledge and leadership. His strategic vision, combined with a hands-on approach to cybersecurity challenges, positions him as a trusted advisor for any business looking to enhance its security posture in the digital age.

Personal Summary

I am dedicated to forging secure futures for my clients by deeply investing in understanding their unique challenges and objectives. Leveraging 17 years of experience across a spectrum of industries, I implement a risk-based approach to cybersecurity, meticulously aligning strategies with executive needs while prioritizing the mitigation of risks.

My mission is to empower organizations to navigate the complexities of digital security, ensuring their strategies are not only visionary but practical and grounded in a profound commitment to their success and security

Degrees and Certifications

TCU
Cornell

Degrees

  • BBA - Business Systems Information (TCU)
  • MBA - Finance and Strategy (Cornell)

Technology Skills

  • Okta Identity Cloud
  • Okta SSO
  • Ping Identity
  • CA Identity Management Suite
  • Hashicorp Vault
  • Hitachi ID Identity and Access Management Suite
  • Microsoft Forefront Identity Manager
  • Saviynt
  • Oracle Identity Management Suite
  • SailPoint IdentityIQ
  • Sun Identity Management Suite
  • CyberArk
  • SAP Security
  • Identity Analytics
  • Azure Active Directory
  • AWS Identity and Access Management (IAM)
  • Google Cloud Platform IAM & Security
  • Multi-Factor Authentication (MFA) technologies
  • Privileged Identity Management (PIM)
  • Privileged Session Management (PSM)/Privileged Password Management (PPM)
  • Role-Based Access Control (RBAC) systems
  • Governance
  • Risk Management, and Compliance (GRC) tools, SIEM solutions, SOAR tools
  • Endpoint Detection and Response (EDR) platforms
  • Secure Code Analysis tools (SAST, DAST, IAST)
  • Data Protection and Governance solutions
  • Cloud Infrastructure Entitlement Management (CIEM) tools
  • API Security and Management platforms
  • Identity Proofing and Verification technologies
  • Privacy and Consent Management tools
  • Access Certification and Management platforms
  • Insider Threat Detection solutions
  • Passwordless Authentication technologies
  • Federation and SSO protocols (SAML, OAuth, OpenID Connect)
  • Behavior Analytics and User Entity Behavior Analytics (UEBA) solutions
  • Enterprise Browsers
  • BIGID
  • VARONIS
  • CONCENTRIC
  • SECURITI
  • LAMINAR
  • EUREKA SECURITY
  • NORMALYZE
  • SYMMETRY SYSTEMS
  • CYERA
  • SENTR

Technical Engagements