top of page
Certified Information Systems Security Professional

"The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks." (From the (ISC)² website)

Certified Secure Software Lifecycle Professional

"The CSSLP certification validates software professionals have the expertise to incorporate security practices – authentication, authorization and auditing – into each phase of the SDLC, from software design and implementation to testing and deployment."(From the (ISC)² website)

ITIL - IT Service Manager Foundation v3

"ITIL Foundation is suitable for individuals who require a basic understanding of the ITIL framework and how it may be used to enhance the quality of IT service management within an organization. The ITIL Foundation Certification also applies to IT professionals who work within an organization that has adopted ITIL and so need to be aware of and contribute to the overall service improvement programme." (From the PeopleCert website)



I enjoy managing and mentoring others in the realm of Information Security. Helping others to be better aware of their own security footprint makes everyone and everywhere more secure as a whole. While I have a long history in software development and architecture, which makes application security an area of particular strength for me, I also enjoy educating individuals in the art of self-defense against social engineering.

  • White LinkedIn Icon
  • White Twitter Icon
  • White Google+ Icon

Joe Darin McIntier

Information Security Evangelist








Homeland Security & Information Assurance

"The program provides select graduate students with an integrated, cross-disciplinary curriculum that is focused on a set of unified educational goals to help them understand and manage the complexities of homeland security in a global environment. Within the degree program and in addition to its common core curriculum, students choose the base program or one of four options: agricultural biosecurity and food defense; geospatial intelligence; public health preparedness; and information security and forensics."(Penn State website)


Penn State University

Master's Degree


Texas A&M University - Commerce

Bachelor's Degree


Computer Science, Physics

"The goal of the undergraduate degree program is to prepare the student for a wide variety of applications found within the diverse computer science field. The graduates will acquire a strong technical foundation normally required for careers involving computer science engineering. The students are also provided with opportunities to interact and learn from eminent scientists and engineers from outside the University. There is a steady stream of seminars given by computer scientists from across the world."(TAMU-Commerce website)


Software Development

Enterprise Architecture


Education & Training

Application Security

Risk Management

Geographically Diverse

Team Management



I led the decrease of the application based security vulnerabilities through the implementation of the Application Security program across four product lines and over 150 developers.

I Increased the initial compliance score of PCI assessments year over year.

I was able to reduce Penetration Testing vulnerability findings as well as the time to remediation for those findings, year over year through leading and managing multi-divisional collaboration within Fiserv.

I Increased security and risk awareness through associate education.  Conducted multiple ‘Lunch-n-Learn’ sessions on security topics to include Penetration Testing, Risk Reviews and Application Security Policies.

I Increased security and risk awareness among associates through the introduction of review boards that held development associates accountable for identification and remediation of vulnerabilities.

I increased the security and risk awareness of clients by authoring White Papers covering technical topics in layman’s terms for dissemination to our clients.

Increased maturity within cybersecurity programs, IT programs, and development lifecycles in order to garner a “design security in” cultural change within the business unit through the institution of Application Security Policies, Procedures and Governance.


Software Development Program Manager


A software development manager with 12+ years experience in enterprise application design & development and project management skills.


Ensured secure enterprise design practices were followed.


Participated in the development of a formal code review process for the entire department.


Managed teams consisting of twelve associates onshore in three locations and eight contract associates offshore.


Architected a redesign of the LAN segments for better segmentation and isolation, supporting over 1,000 hosts.


Architected the redesign of the Change Management and Release.


Management processes in order to enforce separation of duties, provide better control over quality reviews and production deployment preparation.


Coached and mentored teams in the research and resolution of production impacting issues.


Developed and measured teams against key performance indicators for response and resolution times.


Stakeholder member on the Business Unit’s Architectural Review Board.


Online Instructor


Senior Information Security Analyst

Penn State University - World Campus

Online Instructor - Spring 2017 - IST 456 Information Security Management:

Online Instructor for Information Security Management

​Teaching Assistant - Fall 2016 - IST 456 Information Security Management:

Provided assignment grading and subject matter expert feedback to the students on behalf of Dr. Lipton

Teaching Assistant - Summer 2016 - IST 454 Cyber Forensics:

Provided assignment grading and subject matter expert feedback to the students on behalf of Dr. Lipton

bottom of page