Glen Scott work email
- Valid
Glen Scott personal email
Experienced Cybersecurity Professional. Skilled at Penetration Testing, Technical Vulnerability and Risk Assessment, Application Security, Cybersecurity Consulting.With experience across the industry along with a strong background in Infrastructure Administration, I am highly technically capable in a broad range of IT environments, have led small development projects and managed small technical teams. I am an excellent interpersonal, written and verbal communicator, with experience consulting to outside clients, and am comfortable with information security advisory and governance roles. I am a constant learner, up to date with recent infosec developments, with industry certifications in Information Security (OSCP, GXPN, CISSP) and IT Service Management (ITILv3) alongside university degrees in Computer Science (BSc) and Psychology (BSc Hons). I have professional experience in a wide variety of organisations including Internet Service Provider, Hospital, Software Developer, University, Security Consultancy, Supercomputing Research Centre, and Bank.I am an active member of the community, and have presented at OWASP Perth (Chapter Lead) and SecTalks Perth. I have published several small original open source projects at https://github.com/glens, and maintain a personal technical blog at https://glenscott.netI am self motivated and enjoy the opportunity to manage engagements end to end from scoping through execution and delivery. I am particularly interested in opportunities for remote work within distributed teams. 𝗦𝗸𝗶𝗹𝗹 𝗦𝘂𝗺𝗺𝗮𝗿𝘆:◾️ Penetration Testing, Vulnerability Assessment (Web, Mobile, Infrastructure)◾️ Code Review/AppSec. Infrastructure configuration auditing◾️ Security System and Infrastructure management, including IPS, IDS, Firewalls, SIEM & Health Monitoring◾️ Information Security Consulting, Advisory and Governance
-
Senior Security AnalystCoalition, Inc. Oct 2024 - PresentSan Francisco, California, Us -
Senior Manager, Cyber Security Software AssuranceHbf Health Sep 2021 - Oct 2024Perth, Wa, AuIn my role in Cyber Security Software Assurance at HBF, I was responsible for leading the Penetration Testing and Application Security teams and their functions. As well as providing people leadership along with administrative and logistical support to my team, I interfaced with the business on security assurance priorities and delivered internal consulting as a technical subject matter expert.Responsibilities:• Leadership and development of the Penetration Testing and Application Security practices• Internal cybersecurity consulting and liaison with other business units to enable achievement of required business and assurance outcomes• Penetration test delivery and oversight (Scoping, testing, reporting, QA)𝘋𝘶𝘦 𝘵𝘰 𝘰𝘳𝘨𝘢𝘯𝘪𝘴𝘢𝘵𝘪𝘰𝘯𝘢𝘭 𝘳𝘦𝘴𝘵𝘳𝘶𝘤𝘵𝘶𝘳𝘦𝘴, 𝘵𝘩𝘪𝘴 𝘳𝘰𝘭𝘦 𝘩𝘢𝘴 𝘱𝘳𝘦𝘷𝘪𝘰𝘶𝘴𝘭𝘺 𝘣𝘦𝘦𝘯 𝘵𝘪𝘵𝘭𝘦𝘥 "𝘏𝘦𝘢𝘥 𝘰𝘧 𝘊𝘺𝘣𝘦𝘳 𝘚𝘦𝘤𝘶𝘳𝘪𝘵𝘺 𝘚𝘰𝘧𝘵𝘸𝘢𝘳𝘦 𝘈𝘴𝘴𝘶𝘳𝘢𝘯𝘤𝘦 (2022)" 𝘢𝘯𝘥 "𝘚𝘦𝘤𝘶𝘳𝘪𝘵𝘺 𝘈𝘴𝘴𝘶𝘳𝘢𝘯𝘤𝘦 𝘓𝘦𝘢𝘥 (2021)" -
Senior Penetration TesterHbf Health Jan 2021 - Sep 2021Perth, Wa, AuAs the Senior Penetration Tester at HBF, I drew on my experience in large enterprise teams to provide direct advisory and technical services including pentesting and related security assessment, as well as guiding and enabling the ongoing development of the penetration testing function. -
Senior Cyber Threat ResponderHbf Health Feb 2020 - Jan 2021Perth, Wa, AuAs a member of the CSIRT team at HBF, I participated in both day to day operational activities including incident response, collaborated with the team on uplifting CSIRT processes and functions, and leveraged my technical development skills to implement several bespoke technical solutions to enhance the data loss prevention (DLP) capability. -
Penetration TesterCommonwealth Bank Aug 2015 - Feb 2020Sydney, Nsw, AuAs a member of the Cyber Security Team at CBA, I provided vulnerability assessment, penetration testing, application security assurance and technical security advice for internal and external systems, including infrastructure, web, and mobile applications, along with other hardware and software assets critical to the bank. -
Data Security AdviserPawsey Supercomputing Centre Jun 2014 - Aug 2015Kensington, Western Australia, AuAt Pawsey I provided technical services including setup and administration of security and monitoring systems, monitoring and analysis of security data, auditing and configuration reviews of host and network resources, incident management, and associated internal security advice and consultation.The Pawsey Supercomputing Centre is based at CSIRO in Perth, Western Australia, providing high performance scientific compute resources to a range of national research partners including the Australian Square Kilometer Array Pathfinder (ASKAP) and Murchison Widefield Array (MWA) radio astronomy projects. -
Senior Consultant (Cybersecurity)Bae Systems Applied Intelligence Jun 2013 - Apr 2014Guildford, Surrey, GbMy primary role at BAE Systems AI was technical vulnerability assessment and pentesting of web applications and supporting infrastructure. I was responsible for conducting time boxed engagements with a variety of clients including private corporations and government agencies.I also drew on my infrastructure experience to perform technical system design and configuration reviews from an information security perspective, as well as contribute to information security procedure and policy development. -
Senior Information Security AnalystEdith Cowan University Nov 2012 - May 2013Joondalup, Western Australia, AuIn this role I provided internal information security consultation, technical vulnerability assessment for IT infrastructure, and setup and administration of security systems, including:Enhancement of vulnerability assessment system to analyse existing reports and generate ongoing statistics and charts of current and past levels of vulnerabilities and associated risk for executive level reporting (Prenus).Improved SSL certificate management via creation of a web based (php) application which provided a daily report of deployed certs across internal systems.Refining of incident response processes, specifically related to internal and external requests for information, involving liaison with Human Resources, Student Services, and the legal team as required in order to reduce ambiguity for all parties and to ensure legal, compliance and ethical obligations were met at all times. -
Senior Systems AdministratorEdith Cowan University Jan 2010 - Nov 2012Joondalup, Western Australia, AuThis was an infrastructure role with a primary focus on technical security systems, including:Investigation of information security incidents, liaison with affected parties, implementation of security procedures and controls, and preservation of evidence in a forensically sound manner.Implementation of a vulnerability assessment system (Nessus) to perform scheduled vulnerability scans of network systems for known issues.Creation of a clearly defined and documented firewall rule change process incorporating technical security controls along with realistic risk assessments.Subject matter expert for PKI/SSL/Certificate related matters including renewal and replacement of SSL Certificates and providing technical assistance as required.Implementation of system health monitoring (Zabbix) providing effective monitoring and alerting across internal hardware and VM based systems. For information security purposes, I tailored a number of monitoring metrics to provide host based intrusion detection (HIDS) and SIEM functionality.Implementation of a centralized logging system (Splunk/syslog-ng) capable of providing fast searching and real time alerting, including relevant authentication and security related activity on university networks.Management of secure archiving, backup and retrieval for security log files. -
Acting Operations Co-OrdinatorEdith Cowan University Jan 2012 - Jun 2012Joondalup, Western Australia, AuThe Operations Co-ordinator role was the management leader for the university data communications and networking team. I took the opportunity to backfill this role for six months, during which time I continued to perform both information security functions as well as representing the data communications team at the management level. -
It ManagerEdith Cowan University Jan 2009 - Jan 2010Joondalup, Western Australia, AuIn this role I led the team of IT support and administration staff for the School of Computer and Security Science (SCSS). The role consisted primarily of liaison with internal management and other departments within the University along with vendors and suppliers, with systems and network support and administration backfill duties as required in the absence of other team members. -
Server AdministratorEdith Cowan University Apr 2008 - Jan 2009Joondalup, Western Australia, AuMy primary responsibilities in this role were administration of Windows and Linux servers to meet the schools academic and infrastructure requirements, along with application and operating system management of the fleet of computer lab and staff workstations and laptops. The latter required developing significant ability in packaging and deployment of a broad variety of application software in a Windows environment, along with associated administration and management of group policy and windows deployment services for Windows Vista, 7 and Server 2003/2008. -
Computer Support EngineerEdith Cowan University Mar 2007 - Apr 2008Joondalup, Western Australia, AuThis was a desktop support role in which I developed my application packaging and Windows server deployment skills, in addition to providing remote and onsite technical support. -
Systems And Network AdministratorIndustrial Software Solutions (Iss Group) Mar 2003 - Mar 2007At ISS I setup and administered a broad variety of systems including Linux and Windows enterprise services, VMWare, and Cisco networking. The organization grew significantly during my tenure with an expansion from a single Perth based office to two locations in Perth and one in Singapore. One of my key achievements in this role was the expansion of the internal company network over three geographically separate locations using Cisco VPN and VOIP links and establishing Active Directory, Exchange and VMWare services at each site for fast local access while maintaining a seamless logical internal network.
-
Information Systems Support OfficerGovernment Of Western Australia, Department Of Health Mar 2002 - Mar 2003Perth, Western Australia, AuIn this role I performed service desk and desktop support duties within a hospital environment. My responsibilities included both local and remote deployment of SOE workstations, user administration on Exchange, NT4 Domain and SCO UNIX systems, and maintenance of tape backups. -
Technical Support Officer / Web DeveloperNetserv Communications Jan 1999 - Mar 2002NetServ was a internet service provider with ADSL & dialup points of presence throughout South Western Australia. My responsibilities included day to day phone and onsite technical support along with web development for clients, including PHP-MySQL driven sites. At NetServ I had the opportunity to become familiar with key internet technologies which would provide the foundation for future technical roles.
Glen Scott Skills
Glen Scott Education Details
-
Edith Cowan UniversityComputer Science -
Edith Cowan UniversityPsychology -
Edith Cowan University Security Research InstituteControl Systems Cyber Security Training
Frequently Asked Questions about Glen Scott
What company does Glen Scott work for?
Glen Scott works for Coalition, Inc.
What is Glen Scott's role at the current company?
Glen Scott's current role is Cyber Security Technical Specialist.
What is Glen Scott's email address?
Glen Scott's email address is g.****@****.edu.au
What schools did Glen Scott attend?
Glen Scott attended Edith Cowan University, Edith Cowan University, Edith Cowan University Security Research Institute.
What are some of Glen Scott's interests?
Glen Scott has interest in Psychology, Learning, Linux, Personal Development, Reading, Retro Games, Infosec.
What skills is Glen Scott known for?
Glen Scott has skills like Information Security, Security, Linux, Computer Security, Vulnerability Assessment, Active Directory, Firewalls, Network Security, Windows Server, Network Administration, Technical Support, Wireless Networking.
Free Chrome Extension
Find emails, phones & company data instantly
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial