Scott Slutter
Details
SANS Technology Institute
2021 : 2021
SEC511 Continuous Monitoring and Security Operations
SANS Technology Institute
2019 : 2019
Troubleshooting TCP/IP Networks with Wireshark
Global Knowledge
2018 : 2018
SEC501 Advanced Security Essentials – Enterprise Defender
SANS Technology Institute
2017 : 2017
MGT414 Training Program for CISSP Certification
SANS Technology Institute
2016 : 2016
• Run vulnerability management program to continuously identify, evaluate, and report vulnerabilities along with research and recommend remediation's.
• Monitor and support security infrastructure and systems.
• Work with internal business partners, IT Security team and MSP’s to minimize and resolve effects of security incidents and threats.
• Maintain operational knowledge of cyber and informational threats, their potential impact to business operations and integrate into a threat hunting strategy.
• Proactively hunt for threats across infrastructure to advance organizational threat intelligence.
• Evaluate the effectiveness of existing controls and lead the implementation or remedial efforts between internal and external resources.
• Research and evaluate latest in Information Security technologies and liaison to internal business partners.
• Recommend and assist with annual Information Security reviews, vulnerability assessments, penetration tests, and assessment of organizations security posture.
• Remediate identified security weaknesses, assess the risk, and recommend appropriate compensating controls.
• Participate in POC’s, implementations and deployments of new technologies.
• Respond to escalated requests for technical assistance regarding security incidents.
• Provide senior level technical expertise as required.
• Participate in red/blue team exercises.
• Maintain awareness of IT security best practices and update skillset as necessary.
2023 : Present
Victaulic
Lead Cybersecurity Engineer
Ensure Information Security services at a global level, meet or exceed IT security objectives.
• Monitor and support security infrastructure and systems.
• Work with internal business partners, IT Security team and MSP’s to minimize and resolve effects of security incidents and threats.
• Maintain operational knowledge of cyber and informational threats, their potential impact to business operations and integrate into a threat hunting strategy.
• Proactively hunt for threats across infrastructure to advance organizational threat intelligence.
• Evaluate the effectiveness of existing controls and lead the implementation or remedial efforts between internal and external resources.
• Research and evaluate latest in Information Security technologies and liaison to internal business partners.
• Recommend and assist with annual Information Security reviews, vulnerability assessments, penetration tests, and assessment of organizations security posture.
• Remediate identified security weaknesses, assess the risk, and recommend appropriate compensating controls.
• Participate in POC’s, implementations and deployments of new technologies.
• Respond to escalated requests for technical assistance regarding security incidents.
• Provide senior level technical expertise as required.
• Participate in red/blue team exercises.
• Maintain awareness of IT security best practices and update skillset as necessary.
2020 : 2023
Victaulic
Information Security Engineer
Manage global information security system architecture, design, installation, operation, and risk remediation activities for endpoint security, web filtering and IPS environments.
• Plan secure system design and deploy required infrastructure to ensure defense-in-depth appropriate to meet the goals of the overall information security strategy
• Develop, configure and enforce consistent security policies with well-integrated procedures
• Monitor, detect and mitigate emerging security threats across all platforms
• Responsible for ongoing maintenance, support and security updates regarding security systems critical infrastructure
• Assist with incident response and corrective actions to eradicate security incidents as quickly as possible
• Provide assistance and support to end user community and IT staff to ensure protection strategies are properly implemented and working as intended
• Evaluate new technologies and processes that enhance security capabilities
• Provide timely and relevant security reports
• Manage and support of AD management system that provided Help Desk and Systems Support personnel user account administration and reporting
• Configure and deploy enterprise wide security group policies
• Assist with Active Directory, DNS and DHCP administration and secure configurations
• User identity creation, authorization and revocation adhering to POLP
• Granting and removal of share and file permissions in support of the CIA triad
2012 : 2020
Victaulic
Information Security Systems Administrator
Was part of a core group that maintained and helped to grow the corporate enterprise network. Assisted with network equipment and server configurations, end user workstation setup, deployments and support. Also Active Directory, endpoint security and web filtering administration, user identity and access management,.
Additional responsible for software packaging and asset management infrastructure.
2011 : 2012
Victaulic
Software Administrator
Was part of a core group that maintained and helped to grow the corporate enterprise network. Assisted with network equipment and server configurations, end user workstation setup, deployments and support. Also Active Directory, endpoint security and web filtering administration, user identity and access management.
2001 : 2011
Victaulic
IT Systems Engineer
Skills
Active Directory, CISSP, Continuous Improvement, Cross-functional Team Leadership, Domain Name System (DNS), Dynamic Host Configuration Protocol (DHCP), Endpoint Security, Group Policy, Incident analysis and remediation, Information Security, Information Technology, Infrastructure, Internet Protocol Suite (TCP/IP), Intrusion detection and prevention, IPS, IT Security Operations, LAN/WAN protocols and secure systems configurations, Network Administration, Networking, Penetration Testing, Problem Solving, Risk Management, Security, Software Installation, System Administration, System Architecture, Technical Support, Threat & Vulnerability Management, Troubleshooting, Vendor Management, Web proxy and content filtering
About
Information Security professional with broad range of hands on technical skills used to protect sensitive data and systems from infiltration and cyber-attacks.