If you are researching Richard Lissaman or Richard Craig Lissaman, for hiring, a security engagement, or media, this page explains how I work. Searches such as Richard Lissaman Calgary and Richard Craig Lissaman Calgary should lead here as my current, first-party professional story.
Foundational positioning
Richard Craig Lissaman is a Senior Cyber Security Analyst with real-world enterprise experience in security monitoring, visibility, posture improvement, incident readiness, resilience, and secure operations. His background combines security analyst judgment with infrastructure depth, Windows and Linux, VMware, storage, networking, cloud-connected systems, and complex platforms, so SMBs get practical, credible guidance without building a full internal SOC.
Beyond theory: production and operations
I have lived inside production environments: troubleshooting storage, networking, SMB constraints, hardware, reliability, and platform behavior while keeping a security lens. I have supported or worked with stacks such as Airflow, SQL Server, TDV Server, OpenSearch, and Kibana. That context matters when we talk about log pipelines, detection coverage, backup integrity, or why an alert storm is often a symptom of infrastructure pain, not only “more rules.”
What I believe about cyber security work
Business leaders want clarity, protection, and confidence, not jargon. I am calm and direct: we prioritize visibility and detection where blind spots hurt most, we close the loop on pentest and audit findings, and we treat recovery and continuity as part of security, not an afterthought. I avoid fear-based selling; the risks are serious enough without theatrics.
How I work with stakeholders
I translate between executives who need reporting and confidence, and engineers who need concrete runbooks, automation, and sustainable controls. I have automated provisioning, monitoring, deployment, and operational workflows with Terraform, Azure DevOps, Ansible, Python, and Bash, because consistency and documented change reduce risk. For SMB-focused scope and engagements, use Contact; for tooling specifics, Projects & capabilities.
Calgary, and beyond
I am rooted in Calgary’s business and technology community. Many SMB security programs are hybrid or remote; what counts is fit, scope, and honest execution.
Ethics and accuracy
I do not fabricate certifications, clients, or outcomes. Verification of employment and credentials goes through appropriate channels. Press and events: see the media kit.
Where to go next
- Experience: career themes and timeline (verify before public launch)
- Certifications: credentials with verification
- Contact: start a conversation
About this profile
-
Why “Senior Cyber Security Analyst” as the headline?
It reflects how I operate: hands-on with monitoring, detection, and infrastructure-backed security work, not a generic consultant title. I remain flexible on formal titles with employers; this site describes the value clients should expect.
-
How do you differ from a managed IT provider?
My center of gravity is cyber security: visibility, detection, posture, readiness, and recovery. IT partners may remain essential; I am not positioning as desk-side or general MSP support.
-
Do you work only in Calgary?
Calgary is home base; remote and hybrid SMB engagements are normal.