Top Talent like Tim are on Pangea

Pangea, a YC company, connects companies with fractional talent. Fractional hiring allows companies to move faster and work with more specialized talent, while giving talent more flexibility and independence. If you are talent open to fractional work, apply here. If you’re a company looking for high-quality fractional talent, learn more here.

Tim Bouma

AI & Machine Learning EngineerProduct ManagerQuality Assurance SpecialistWichita, KS, US
Cybersecurity
Cloud Computing
Project Management
Global Security
Information Systems
Attention To Detail
Available for hire fromNegotiable
Contracts
Full-Time Roles
A family centered professional who loves helping others and solving problems.
Growing up in Clearwater, KS, I always wanted to be a part of something bigger than myself. I found that in the Navy, where I served in a variety of roles to include, security manager, intelligence team lead, and project manager. I love solving problems, helping others, and working with a passionate team. When I'm not working, I enjoy spending time with my family and supporting wildlife conservation. (Currently maintains a TS/SCI security clearance.)

Projects

Bank wide phishing training.

We successfully undertook the takeover and revamping of our company's phishing program, incorporating new technology and strategies to enhance its effectiveness. Our primary goal was to minimize the susceptibility of employees to phishing attempts and enhance overall cybersecurity awareness. Through meticulous planning and execution, we implemented innovative techniques and revamped the existing program. The introduction of advanced technologies and best practices played a significant role in achieving remarkable results. By leveraging cutting-edge solutions and adopting a comprehensive approach, we successfully reduced the click rate from 4.6% to an impressive 2.4%. This project involved a thorough analysis of existing phishing techniques, their vulnerabilities, and the behavioral patterns of our employees. By understanding the unique challenges faced by our organization, we developed tailored solutions to effectively combat phishing threats. The revamped program incorporated state-of-the-art email filters, simulated phishing campaigns, and interactive training modules. These measures equipped our employees with the knowledge and skills necessary to identify and respond appropriately to potential phishing attacks. Regular assessments and continuous improvement ensured the program's ongoing efficacy. In addition to mitigating risk, the project aimed to cultivate a culture of security consciousness within the organization. By emphasizing the importance of vigilance and fostering a proactive mindset, we have bolstered the overall cybersecurity posture of our company. The success of this project underscores our commitment to safeguarding sensitive information and fortifying our defenses against ever-evolving cyber threats. By diligently implementing new technology and methodologies, we have significantly reduced the click rate and elevated our organization's resilience to phishing attacks.See More

Implementing cutting edge technology to enhance intelligence collection.

Leading a team of 10 personnel, spearheaded a pivotal project for the U.S. Navy, focused on testing and implementing advanced software systems to enhance intelligence collection capabilities. Through meticulous evaluation and testing, we selected cutting-edge software solutions designed specifically for this purpose. Working closely with Navy experts, we seamlessly integrated the chosen software into existing infrastructure, ensuring adherence to strict security protocols. This implementation significantly improved intelligence workflows, enabling efficient data gathering, analysis, and dissemination. Comprehensive training programs were developed to familiarize Navy personnel with the new software, maximizing its potential and facilitating smoother adoption. The project's success empowered decision-makers with real-time insights, enhancing operational readiness and strengthening national security. This project showcases our commitment to leveraging innovative technology to meet the evolving intelligence needs of the U.S. Navy, amplifying their capabilities in intelligence collection.See More

Security Program Management

As the lead in restarting the information security program for our command, I successfully spearheaded a comprehensive initiative focused on ensuring compliance with Department of Defense (DoD) regulations. The project encompassed the implementation of robust quarterly and annual audits to maintain the highest standards of information security. With a meticulous approach, we conducted thorough assessments and audits of our systems, networks, and processes. This allowed us to identify vulnerabilities, assess risks, and develop tailored strategies to address them effectively. By aligning our practices with DoD regulations, we fortified our command's information security posture. The project involved designing and implementing a proactive compliance framework, ensuring that all personnel were well-informed and trained on their roles and responsibilities. Regular audits were conducted to monitor adherence to DoD regulations, identify areas for improvement, and implement corrective actions promptly. Through collaboration with key stakeholders, we established a culture of information security consciousness throughout the command. We emphasized the importance of safeguarding sensitive data, promoting best practices, and fostering a continuous improvement mindset. By restarting the information security program and ensuring compliance with DoD regulations, we significantly enhanced our command's ability to protect critical assets from cyber threats and potential breaches. This project enabled us to establish a robust framework that ensures ongoing adherence to regulations and safeguards sensitive information effectively. The success of this initiative demonstrates our commitment to information security excellence and our dedication to upholding DoD compliance standards. By implementing rigorous audits, fostering compliance awareness, and maintaining a proactive security posture, we have bolstered the overall security resilience of our command.See More

Work History

I

IT Security Administrator

INTRUST Bank• Research, analyze, and implement cutting-edge security solutions to enhance overall security architecture and mitigate risks. • Manage and conduct monthly phishing simulation training, improving the organization's security posture and raising awareness among employees. • Responsible for managing access controls across various systems, including SQL, Active Directory, applications, servers, and networks. • Swiftly respond to cyber events, employing incident response protocols to mitigate threats and minimize potential damage. • Actively participate in threat detection activities, leveraging advanced tools and techniques to identify and address security vulnerabilities effectively.
U

Intelligence Analyst/Security Manager

U.S. NavyJan 2020 - Jun 2022 • 2 yrs 6 mos• Directed a team of ten Cryptologists in intelligence collection efforts. • Managed the information security program, conducting quarterly and yearly audits of the organization’s compliance and security practices. • Delivered briefings on emerging threats to executive and operational members within tight deadlines. • Implemented new collection/security solutions and led the training of personnel on advanced software and systems, significantly enhancing collection capabilities and strengthening security architecture.
U

Class Leader - Basic Underwater Demolition School

U.S. NavyOct 2018 - Sep 2019 • 1 yr• Led more than 300 personnel through the execution of high-risk training in an extremely arduous environment. A highly demanding and rewarding role requiring decisive leadership, critical thinking, clear communication, and rapid mastery of complex operations.
N

Signals Intelligence Analyst

National Security Agency/U.S. NavyJul 2013 - Oct 2018 • 5 yrs 4 mos• Worked with cross-functional teams to develop solutions and implement them in a timely manner. • Planned mission requirements, managed timelines, and oversaw the analysis of complex technical data to produce accurate mission reports. • Implemented innovative solutions and products, resulting in a significant increase in intelligence output and operational effectiveness. • Oversaw the information security program, ensuring compliance with current standards and best practices were being followed.

Education

University of Maryland, Global Campus

B.S. Cybersecurity TechnologyMay 2023

How Pangea Works

Effortlessly discover top talent

We’ve distilled the candidate search from endless hours down to just a few minutes. Using Pangea’s AI-powered search tools, you can find top fractional talent able to take on your next project. Our system looks at your company’s niche and your needs to find the perfect match faster than any traditional hiring platform.

Start working with talent today

The top talent on Pangea is ready to get started with you right now. You can message or hire a candidate right from their profile page and start assigning work as soon as they respond. And the best part? Pangea’s fractional contract structure lets you start small and ramp up as your needs change, keeping your costs manageable and your team’s capabliities flexible.

Track work and invoices in one place

Assign tasks, track progress, and complete invoices all on Pangea. We’ve combined every part of the hiring process into one platform to eliminate the miscommunication that’s unavoidable on other freelance platforms. We even send out 1099s to your contractors at the end of the year!

Talk with a Talent Expert

Members of our team are available to help you speed through the hiring process.
Available Now
Book a Call
A family centered professional who loves helping others and solving problems.
Growing up in Clearwater, KS, I always wanted to be a part of something bigger than myself. I found that in the Navy, where I served in a variety of roles to include, security manager, intelligence team lead, and project manager. I love solving problems, helping others, and working with a passionate team. When I'm not working, I enjoy spending time with my family and supporting wildlife conservation. (Currently maintains a TS/SCI security clearance.)

Talk with a Talent Expert

Members of our team are available to help you speed through the hiring process.
Available Now
Book a Call

Top Talent like Tim are on Pangea

Pangea, a YC company, connects companies with fractional talent. Fractional hiring allows companies to move faster and work with more specialized talent, while giving talent more flexibility and independence. If you are talent open to fractional work, apply here. If you’re a company looking for high-quality fractional talent, learn more here.

Tim Bouma

AI & Machine Learning EngineerProduct ManagerQuality Assurance SpecialistWichita, KS, US
Cybersecurity
Cloud Computing
Project Management
Global Security
Information Systems
Attention To Detail
Available for hire fromNegotiable
Contracts
Full-Time Roles

Projects

Bank wide phishing training.

We successfully undertook the takeover and revamping of our company's phishing program, incorporating new technology and strategies to enhance its effectiveness. Our primary goal was to minimize the susceptibility of employees to phishing attempts and enhance overall cybersecurity awareness. Through meticulous planning and execution, we implemented innovative techniques and revamped the existing program. The introduction of advanced technologies and best practices played a significant role in achieving remarkable results. By leveraging cutting-edge solutions and adopting a comprehensive approach, we successfully reduced the click rate from 4.6% to an impressive 2.4%. This project involved a thorough analysis of existing phishing techniques, their vulnerabilities, and the behavioral patterns of our employees. By understanding the unique challenges faced by our organization, we developed tailored solutions to effectively combat phishing threats. The revamped program incorporated state-of-the-art email filters, simulated phishing campaigns, and interactive training modules. These measures equipped our employees with the knowledge and skills necessary to identify and respond appropriately to potential phishing attacks. Regular assessments and continuous improvement ensured the program's ongoing efficacy. In addition to mitigating risk, the project aimed to cultivate a culture of security consciousness within the organization. By emphasizing the importance of vigilance and fostering a proactive mindset, we have bolstered the overall cybersecurity posture of our company. The success of this project underscores our commitment to safeguarding sensitive information and fortifying our defenses against ever-evolving cyber threats. By diligently implementing new technology and methodologies, we have significantly reduced the click rate and elevated our organization's resilience to phishing attacks.

Implementing cutting edge technology to enhance intelligence collection.

Leading a team of 10 personnel, spearheaded a pivotal project for the U.S. Navy, focused on testing and implementing advanced software systems to enhance intelligence collection capabilities. Through meticulous evaluation and testing, we selected cutting-edge software solutions designed specifically for this purpose. Working closely with Navy experts, we seamlessly integrated the chosen software into existing infrastructure, ensuring adherence to strict security protocols. This implementation significantly improved intelligence workflows, enabling efficient data gathering, analysis, and dissemination. Comprehensive training programs were developed to familiarize Navy personnel with the new software, maximizing its potential and facilitating smoother adoption. The project's success empowered decision-makers with real-time insights, enhancing operational readiness and strengthening national security. This project showcases our commitment to leveraging innovative technology to meet the evolving intelligence needs of the U.S. Navy, amplifying their capabilities in intelligence collection.

Security Program Management

As the lead in restarting the information security program for our command, I successfully spearheaded a comprehensive initiative focused on ensuring compliance with Department of Defense (DoD) regulations. The project encompassed the implementation of robust quarterly and annual audits to maintain the highest standards of information security. With a meticulous approach, we conducted thorough assessments and audits of our systems, networks, and processes. This allowed us to identify vulnerabilities, assess risks, and develop tailored strategies to address them effectively. By aligning our practices with DoD regulations, we fortified our command's information security posture. The project involved designing and implementing a proactive compliance framework, ensuring that all personnel were well-informed and trained on their roles and responsibilities. Regular audits were conducted to monitor adherence to DoD regulations, identify areas for improvement, and implement corrective actions promptly. Through collaboration with key stakeholders, we established a culture of information security consciousness throughout the command. We emphasized the importance of safeguarding sensitive data, promoting best practices, and fostering a continuous improvement mindset. By restarting the information security program and ensuring compliance with DoD regulations, we significantly enhanced our command's ability to protect critical assets from cyber threats and potential breaches. This project enabled us to establish a robust framework that ensures ongoing adherence to regulations and safeguards sensitive information effectively. The success of this initiative demonstrates our commitment to information security excellence and our dedication to upholding DoD compliance standards. By implementing rigorous audits, fostering compliance awareness, and maintaining a proactive security posture, we have bolstered the overall security resilience of our command.

Work History

I

IT Security Administrator

INTRUST Bank• Research, analyze, and implement cutting-edge security solutions to enhance overall security architecture and mitigate risks. • Manage and conduct monthly phishing simulation training, improving the organization's security posture and raising awareness among employees. • Responsible for managing access controls across various systems, including SQL, Active Directory, applications, servers, and networks. • Swiftly respond to cyber events, employing incident response protocols to mitigate threats and minimize potential damage. • Actively participate in threat detection activities, leveraging advanced tools and techniques to identify and address security vulnerabilities effectively.
U

Intelligence Analyst/Security Manager

U.S. NavyJan 2020 - Jun 2022 • 2 yrs 6 mos• Directed a team of ten Cryptologists in intelligence collection efforts. • Managed the information security program, conducting quarterly and yearly audits of the organization’s compliance and security practices. • Delivered briefings on emerging threats to executive and operational members within tight deadlines. • Implemented new collection/security solutions and led the training of personnel on advanced software and systems, significantly enhancing collection capabilities and strengthening security architecture.
U

Class Leader - Basic Underwater Demolition School

U.S. NavyOct 2018 - Sep 2019 • 1 yr• Led more than 300 personnel through the execution of high-risk training in an extremely arduous environment. A highly demanding and rewarding role requiring decisive leadership, critical thinking, clear communication, and rapid mastery of complex operations.
N

Signals Intelligence Analyst

National Security Agency/U.S. NavyJul 2013 - Oct 2018 • 5 yrs 4 mos• Worked with cross-functional teams to develop solutions and implement them in a timely manner. • Planned mission requirements, managed timelines, and oversaw the analysis of complex technical data to produce accurate mission reports. • Implemented innovative solutions and products, resulting in a significant increase in intelligence output and operational effectiveness. • Oversaw the information security program, ensuring compliance with current standards and best practices were being followed.

Education

University of Maryland, Global Campus

B.S. Cybersecurity TechnologyMay 2023

How Pangea Works

Effortlessly discover top talent

We’ve distilled the candidate search from endless hours down to just a few minutes. Using Pangea’s AI-powered search tools, you can find top fractional talent able to take on your next project. Our system looks at your company’s niche and your needs to find the perfect match faster than any traditional hiring platform.

Start working with talent today

The top talent on Pangea is ready to get started with you right now. You can message or hire a candidate right from their profile page and start assigning work as soon as they respond. And the best part? Pangea’s fractional contract structure lets you start small and ramp up as your needs change, keeping your costs manageable and your team’s capabliities flexible.

Track work and invoices in one place

Assign tasks, track progress, and complete invoices all on Pangea. We’ve combined every part of the hiring process into one platform to eliminate the miscommunication that’s unavoidable on other freelance platforms. We even send out 1099s to your contractors at the end of the year!

Talk with a Talent Expert

Members of our team are available to help you speed through the hiring process.
Available Now
Book a Call
Pangea empowers fractional work across the world for marketing and design roles.