Kim Withers

Kim Withers

Adjunct Faculty
College Of Business
Department of Computing and Cyber Security
STEM 211

210-373-0899   |kwithers@tamusa.edu


 

Biography

 
Dr. Kim Withers joined Texas A&M San Antonio in Spring 2022 as a part-time faculty member in the field of Information Security/Cybersecurity. She currently serves as a Lead Member of Technical Staff-Cybersecurity in the Chief Security Organization (CSO) at AT&T. She provides development and network support for the threat analytics platform, Storm, to address AT&T’s cybersecurity mission. 
 
A seasoned security professional, She is responsible for the support and development of a complex and diverse Threat Management System (TMS) Platform which serves the entire AT&T corporation. She is also involved with CSO’s YouTube online video program, AT&T ThreatTraq, as a guest contributor addressing industry-specific security threats.
 
In previous roles with formerly SBC DataComm, she served as a Sr. Security Engineer where her duties included network system design activities, network and security deployments, review of design specifications, assessment of security and privacy protection features, and vulnerability assessments. As a Sr. LAN/WAN Engineer for AT&T's Unified Messaging VOIP platform, she designed and managed network connectivity of the Unified Messaging Voice Mail platform to ensure mass market and AT&T Enterprise customers have 100% voice integration.
 
Prior to working for AT&T, she started her career out of college working for Computer Sciences Corporation (CSC), as a government contractor for the National Center for Toxicological Research (NCTR). She would program in Cobol and JCL before, finding her true niche in networking and security. She would soon transfer with CSC to San Antonio and work for the Air Force Information Warfare Center (AFIWC) on the renowned Computer Security Engineering Team (CSET). She was part of teams that conducted security assessments (onsite and remote) of Air Force military bases around the world. IT Security, including penetration testing, vulnerability analysis, creation proof of concept exploits, reverse and social engineering. She served as a Team Lead for penetration testing of Air Force networks using a variety of commercial and non-commercial tools and creating vulnerability assessment reports. Assigned lead for the perimeter security team and Tiger Team engagements. She was also the lead for designing and constructing security assessment labs consisting of a mesh of networking equipment and operating systems.

 

Awards

 
Year Name of the award
2006 Cloud & Parallel Computing
2009 Big Data Analysis and Management
2013 High-performance and Low-Power Real-Time Systems

 

Teaching Summary

 
Year Rank Company/Institute/University
2006-Present Associate Professor Some University
2004-2006 Lecturer Brac University
2003-2004 Senior System Administrator Axle Technologies

 

Classes Observing

 
Course Code Course Name
CSE-121 Structured Programming
CSE-221 Algorithms
CSE-305 Theory of Computation
CSE-405 Network Security
CSE-439 Digital Image Processing

 

Resources

 
Topic Info
How Bubble Sort Works Bubble sort. Bubble sort, sometimes referred to as sinking sort, is a simple sorting algorithm that repeatedly steps through the list to be sorted, compares each pair.
Find out more on: PDF YouTube SlideShare
Greedy Method A greedy algorithm is an algorithmic paradigm that follows the problem solving heuristic of making the locally optimal choice at each stage with the hope of finding a global optimum.
Find out more on: PDF YouTube SlideShare
EDI Security Electronic data interchange (EDI) is a major innovation in the practical use of computing. It is already being used extensively in some segments of the retailing
Find out more on: PDF YouTube SlideShare

 

Publications

 
  • Jane Doe,"Inserting Item to a Sorted List",USTC Teachers Annual (USTA - 2002),8(1),2002
  • Jane Doe, Cross application of Round Robin Scheduling and Shortest Job First Serve in CPU Scheduling to improve preemptive scheduling, Accepted for publication at Kabi Nazrul University Journal - 2011
  • Jane Doe, UB Operator precedence parsing algorithm, Accepted for Computer Science & Engineering R esearch Journal (CSERJ) in Vol. 7 (2011) (ISSN: 1990-4010) of Chittagong University of Engineering and Technology (CUET)

 

Courses Teaching

Subject Number Section Description Term Syllabus
CISA 4324 600 Penetration Testing Fall 2022 Syllabi