Brian Stanek, Developer in Indianapolis, IN, United States
Brian is available for hire
Hire Brian

Brian Stanek

Verified Expert  in Engineering

Security Engineer and Developer

Indianapolis, IN, United States

Toptal member since October 18, 2022

Bio

Brian Stanek has been in information technology for over 25 years. He has experience as a full-stack developer, architect, and cybersecurity professional. He holds several cyber certifications and has developed cybersecurity programs and defenses and orchestrated risk assessments and audits. He is currently an information security officer overseeing the cybersecurity teams for a hospital. Brian implements corporate policies and cybersecurity technology and manages all incident responses.

Portfolio

Community Healthcare System
Business Continuity & Disaster Recovery (BCDR), Incident Response...
First to the Finish Kim and Mike Viano Sports Inc
ASP.NET, Windows Development, Architecture, IT Security, Security...
Theory of Me
HIPAA Compliance, Data Privacy, Compliance, Risk Management, GDPR, IT Security...

Experience

Availability

Part-time

Preferred Environment

Windows

The most amazing...

...thing I've created was a cybersecurity program that is HIPAA and PCI certified and has successfully stood up to various threat actors.

Work Experience

Information Security Officer

2022 - PRESENT
Community Healthcare System
  • Supervised the information security team to ensure best practices.
  • Oversaw the cybersecurity program and protected IT assets and digital information.
  • Collaborated and coordinated with Corporate Compliance and all activities related to cybersecurity assessments, projects, and audits.
  • Managed incident response and disaster recovery plans and incident playbooks to ensure resources' availability across the organization and eliminate or minimize business disruption.
  • Coordinated cybersecurity and security incident response training.
Technologies: Business Continuity & Disaster Recovery (BCDR), Incident Response, Cybersecurity, Budgeting Consulting, Information Security, PCI DSS, IT Systems Architecture, Cross-functional Collaboration, Insurance, CISO, HIPAA Compliance, Security Architecture, NIST, Risk Management, Security Audits, Architecture, Security, Risk Assessment, Threat Modeling, DevSecOps, Data Protection, Data-level Security, Compliance, PCI, System Security, Technical Writing, Identity & Access Management (IAM), Cloud Security, Data Security, Privacy, Data Privacy, Application Security, Mobile Security, Intrusion Prevention Systems (IPS), Intrusion Detection Systems (IDS), DDoS, System Administration, SOC 2( Service Organization Control), Certified Information Systems Security Professional, ISO 27001, ISO 27002, SSO Engineering, Rapid7, Antivirus Software, IDS/IPS, Monitoring, Windows Development, Group Policy, Governance, IT Governance, Data Science, Security Engineering, OWASP Top 10, GRC, System Security, Data Integrity Testing, Secure Code Best Practices, Release Management, Endpoint Detection and Response (EDR), Vulnerability Management, Audits, Business Continuity, Disaster Recovery Consulting, Disaster Recovery Plans (DRP), Virtual Coaching, Office 365, Contract Management, IT Project Management, Management, Scope of Work (SOW), Staffing, Project Budget Management, Vendor Management, Project Delivery, Regulations, Best Practices, Data Breach Response, Product Management, Database, Risk Analysis, SecOps, Database, Email

ASP.NET Security Architect

2023 - 2023
First to the Finish Kim and Mike Viano Sports Inc
  • Researched potential sources of intrusion for credit card theft.
  • Performed risk analysis of current code-based, infrastructure, and application integrations.
  • Conducted security code review of existing eCommerce applications for rogue code.
  • Developed NIST risk assessment documentation on applications, infrastructure, and cyber environment security assessment.
Technologies: ASP.NET, Windows Development, Architecture, IT Security, Security, Security Audits, Data Integrity Testing, Secure Code Best Practices, Audits, Best Practices, Code Review, Source Code Review, Risk Analysis, Root Cause Analysis, SecOps, .NET, Email

HIPAA Data Privacy Advisor

2023 - 2023
Theory of Me
  • Researched privacy regulations appropriate for the application, considering local, state, federal, and international regulations.
  • Created presentation on privacy concerns concerning PHI, PII, and student data collected by the application.
  • Developed and presented options for meeting local, state, federal, and international privacy regulations.
Technologies: HIPAA Compliance, Data Privacy, Compliance, Risk Management, GDPR, IT Security, Security, Estimations, Requirements, Roadmaps, Data Flows, Design Consulting, Security Audits, System Security, AWS, Audits, Office 365, Best Practices

VP of IT and Security

2007 - 2022
NAMIC Insurance Company, Inc. (NAMICO)
  • Acted as the guiding force behind all IT and information security operations.
  • Established the company's IT department and separated the network infrastructure from the parent company while creating a new cybersecurity program.
  • Served as project manager, lead developer, and data architect, redesigning the proprietary CRM system—for underwriting, quoting, policy administration, and managing claims—data warehouse, and BI metadata models.
  • Designed and managed a compliant cybersecurity program for a multi-state insurance company with key components such as policies, incident response, business continuity, disaster recovery plans, risk assessments, and penetration testing.
  • Functioned as project manager and data architect for the website, supporting dynamic online applications.
  • Developed and managed budgets, overseeing and approving all hardware, technology, and security purchases.
Technologies: Cybersecurity, C#, Web MVC, SQL Server, SAP BusinessObjects (BO), Information Security, PCI DSS, NIST, Web Development, App Development, Penetration Testing, Incident Response, Business Continuity & Disaster Recovery (BCDR), Network Administration, CISO, Database Administration (DBA), Data Architecture, .NET, HIPAA Compliance, Security Architecture, Risk Management, Security Audits, IT Management, Architecture, OFAC, IT Security, Security, LDAP, Dropbox Development, File Systems, Risk Assessment, Threat Modeling, DevOps, Containers, Data Protection, Data-level Security, Compliance, Visual Basic, VB.NET, System Security, Database, System Security, System Security, Technical Writing, Identity & Access Management (IAM), Data Security, System Security, Web Architecture, WordPress Development, JavaScript, Insurance, Privacy, Data Privacy, Application Security, Business Services, Active Directory Programming, Microsoft Exchange, Mobile Security, Intrusion Prevention Systems (IPS), Intrusion Detection Systems (IDS), System Administration, Java, Azure, Azure, SQL, System Security, System Security, Certified Information Systems Security Professional, Cloudflare, ISO 27001, ISO 27002, Python, AWS, SSO Engineering, Linux, MySQL, Apache, Rapid7, Antivirus Software, IDS/IPS, Monitoring, Windows Development, ASP.NET, Group Policy, Governance, IT Governance, Data Science, Security Engineering, OWASP Top 10, Microsoft 365, System Security, Data Integrity Testing, Secure Code Best Practices, Endpoint Detection and Response (EDR), Vulnerability Management, Audits, Business Continuity, Disaster Recovery Consulting, Disaster Recovery Plans (DRP), Virtual Coaching, Office 365, Implementation Project Management, Software Implementation, Technical Design, Contract Management, IT Project Management, Management, Scope of Work (SOW), Staffing, Project Budget Management, Vendor Management, Project Delivery, Client Delivery Management, Regulations, Best Practices, Product Management, Database, DevSecOps, APIs, Code Review, Source Code Review, Risk Analysis, Root Cause Analysis, SecOps, .NET, Database, Email

Solutions Architect

2003 - 2007
Baker Hill (acquired by Riverside Company)
  • Drove the development of cutting-edge B2B banking solutions for national and international companies, including spending two years in Australia as lead solutions architect working with consultants to build several new applications.
  • Contributed heavily to defining product core components, functional requirements, business rules, and the development roadmap.
  • Created a series of enterprise infrastructure assets to enable seamless interfacing between Baker Hill's international solutions and a client's legacy system.
  • Engaged as a key member of the technical sales team, delivering GAP analyses for proposals, which highlighted how company solutions would meet clients' current and future needs.
Technologies: .NET, SQL Server, Data Architecture, Database Administration (DBA), DevOps, Visual Basic, VB.NET, System Security, Database, System Security, Technical Writing, Data Security, System Administration, SQL, Linux, MySQL, Windows Development, ASP.NET, Data Integrity Testing, Secure Code Best Practices, Office 365, Implementation Project Management, Software Implementation, Technical Design, Contract Management, IT Project Management, Management, Scope of Work (SOW), Project Delivery, Client Delivery Management, Regulations, Best Practices, Product Management, Database, APIs, Code Review, Source Code Review, Root Cause Analysis, .NET, Database

Cybersecurity Program

NAMICO became subject to cybersecurity regulations after the NY CCR 500 was passed, establishing new cybersecurity requirements for financial services companies. I performed the initial risk assessment and developed a new secure network infrastructure separate from the parent company's network. At the same time, I implemented a multi-state cybersecurity program that met state and federal regulations.

The cybersecurity program's key components included cybersecurity policies, incident response, business continuity and disaster recovery plans, cybersecurity risk assessments, penetration testing, and data classification. It complies with the Payment Card Industry Data Security Standard and the National Institute of Standards and Technology and utilizes the CIS SecureSuite standards and best practices.

Policy Administration System

A policy administration, underwriting, quoting, and claims system for a multi-state insurance company.

I was the system architect, business analyst, lead developer, and data architect, developing a proprietary CRM system that supported an insurance agency and company. The system included a custom compliance module supporting the live updates to the rates, endorsements, and policy forms.
MAY 2023 - APRIL 2026

Certified Information Systems Security Professional (CISSP)

(ISC)²

MARCH 2020 - PRESENT

InsightIDR Certified Specialist

Rapid7

OCTOBER 2019 - PRESENT

InsightVM Certified Administrator

Rapid7

JULY 2018 - PRESENT

Certified Ethical Hacker (CEH)

EC-Council

DECEMBER 2017 - PRESENT

Certified Chief Information Security Officer (CCISO)

EC-Council

Tools

Microsoft Exchange, Apache

Languages

C#, .NET, Visual Basic, VB.NET, SQL, JavaScript, Java, Python

Frameworks

ASP.NET, .NET

Paradigms

Penetration Testing, DevSecOps, Secure Code Best Practices, HIPAA Compliance, DevOps, App Development, Web Architecture, DDoS

Platforms

Dropbox Development, Rapid7, Windows Development, WordPress Development, Azure, Linux, AWS

Industry Expertise

Cybersecurity, Insurance, System Security, Virtual Coaching

Storage

SQL Server, Database Administration (DBA), Database, Database, Azure, MySQL

Other

SAP BusinessObjects (BO), Information Security, NIST, Risk Management, Security Audits, Architecture, IT Security, Security, File Systems, Risk Assessment, Compliance, System Security, Data Security, System Security, Privacy, Data Privacy, Application Security, SOC 2( Service Organization Control), System Security, Certified Information Systems Security Professional, ISO 27001, ISO 27002, SSO Engineering, Governance, Data Integrity Testing, Audits, Disaster Recovery Plans (DRP), Software Implementation, IT Project Management, Best Practices, Database, Web MVC, PCI DSS, Web Development, Incident Response, Business Continuity & Disaster Recovery (BCDR), Data Architecture, CISO, Ethical Hacking, SIEM, Vulnerability Assessment, Functional Design, IT Systems Architecture, Security Architecture, IT Management, LDAP, Threat Modeling, Data Protection, Data-level Security, PCI, System Security, System Security, Technical Writing, Identity & Access Management (IAM), Business Services, Mobile Security, Intrusion Prevention Systems (IPS), Intrusion Detection Systems (IDS), System Administration, Antivirus Software, IDS/IPS, Monitoring, Group Policy, IT Governance, Data Science, Security Engineering, OWASP Top 10, Microsoft 365, System Security, CISSP, Endpoint Detection and Response (EDR), Vulnerability Management, Business Continuity, Disaster Recovery Consulting, ISO Compliance, Office 365, Implementation Project Management, Technical Design, Contract Management, Management, Scope of Work (SOW), Staffing, Project Budget Management, Vendor Management, Project Delivery, Client Delivery Management, Regulations, Product Management, Code Review, Source Code Review, Risk Analysis, Root Cause Analysis, SecOps, Email, Network Administration, Budgeting Consulting, Cross-functional Collaboration, OFAC, Containers, Cloud Security, Active Directory Programming, Hacking, Cloudflare, GDPR, Estimations, Requirements, Roadmaps, Data Flows, Design Consulting, GRC, Release Management, Data Breach Response, DevSecOps, APIs, NYDFS

Collaboration That Works

How to Work with Toptal

Toptal matches you directly with global industry experts from our network in hours—not weeks or months.

1

Share your needs

Discuss your requirements and refine your scope in a call with a Toptal domain expert.
2

Choose your talent

Get a short list of expertly matched talent within 24 hours to review, interview, and choose from.
3

Start your risk-free talent trial

Work with your chosen talent on a trial basis for up to two weeks. Pay only if you decide to hire them.

Top talent is in high demand.

Start hiring