John Scott work email
- Valid
John Scott personal email
Experienced IT professional versed in Information Security, Operations and Vulnerability Management. Technically proficient and results driven with a passion for aligning policy, process and procedure with industry best practice and corporate objectives. I am looking for opportunities to leverage my diverse skillset to grow and achieve success for my customers providing business value and reducing risk.
-
Security AnalystWpromote Feb 2022 - PresentEl Segundo, Ca, Us -
Director Of Info Security And ComplianceBraintrace Aug 2020 - Apr 2021Salt Lake City, Utah, Us- Worked with clients to assess current security baselines, complete risk assessments and analysis of threat tolerance, risk acceptance and technology strategies.- Evaluated risk and cybersecurity posture for clients based on CIS Top 20 controls and industry specific requirements and regulations.- Consulted with clients to determine improvements of information security posture to support business objectives and meet customer demands.- Performed configuration and implementation reviews of infrastructure and system components against industry best practice security baselines.- Engaged with client technical process owners to identify risk and drive toward completion of IT governance documentation and process improvements to align with business objectives and risk management goals. -
Information Security AnalystAmerica First Credit Union Apr 2019 - Aug 2020Riverdale, Utah, Us- Performed reviews of internal operating processes and procedures and verified effectiveness of implementation and alignment with established policies, NIST Cyber Security Framework guidance and CIS Top 20 controls.- Definition and implementation of security policies, operating procedures, standards andguidelines aligned with NIST 800-53, PCI-DSS and FFIEC guidance.- Performed risk assessments based on NIST 800-30 guidance of third-party service providers to verify compliance with internal data protections and regulatory obligations.- Defined improved oversight processes for third-party service providers to verify ongoing alignment with corporate standards and FFIEC requirements and maintain acceptable levels of risk for the organization. -
Information Security AnalystOc Tanner Company Aug 2015 - Oct 2017- Performed vulnerability assessments and analysis on internal and externally facing networks and systems using commercial and open source applications and toolsets.- Coordinated external penetration testing with independent third-party firm and conducted manual verification of any determined vulnerabilities. Negotiated results for elimination of any false positive findings and generated ASV reports for submission for PCI-DSS attestations of compliance, executive summary reports for customer information security demands and detailed reports for internal consumption.- Determined requirements for remediation through CVE, CWE and NVD resources of any verified findings, prioritized findings based on CVSS and risk and provided guidance for Systems, Network and Development teams for implementation and performed testing to verify issue resolution within established SLA’s.- Documented and provided guidance for implementation of corporate policies, processes, procedures, standards and guidelines to align with industry best practices including NIST 800- 53 and PCI-DSS.- Organized multi-department resources for definition and implementation of policy, process and procedure requirements to achieve compliance with updated PCI-DSS version 3.2 standards for e-commerce, retail POS and card not present transactions.- Member of multi-department committee for ongoing corporate initiative for alignment of policies, processes and procedures to comply with AT101 SOC2 auditing and certification.
-
Information Security ManagerOc Tanner Company Jun 2008 - Aug 2015- Managed team of InfoSec administrators responsible for vulnerability and risk management, external network circuits, bandwidth aggregation, external/internal firewalls, routers and switches, DNS, HTTP/HTTPS load balancers and SSL accelerators, IDS/IPS, Identity Management for SAMLv2 Federation, LDAP, SMTP border systems, Site to Site and client VPN services, ARIN maintenance, registrar domain management, PKI and SSL/TLS certificate implementation and maintenance.- Primary IT escalation contact point for customer RFP/RFI’s and technical audits. Provided technical translation, guidance and red-line services for Legal, Contract and Client Services teams for customer MSA’s and SOW’s.- Architected and integrated HA load balanced environments for HTTP/HTTPS 3-tiered web services using Cisco ACE and ASA fronting Apache/Nginx, JBoss/Tomcat and Oracle DB systems.- Member of IT Architecture Review Board governing new technology implementations and integrations while reducing complexity and risk for existing systems, services and processes.- Lead IT technical resource for corporate PCI-DSS initiative with focus on limiting scope and overcoming technical, functional and procedural implications to allow for achieving compliance with version 2.0 and 3.0 requirements.
-
Information Security AdministratorOc Tanner Company May 2002 - Jun 2008- Implemented corporate wide centrally managed anti-virus system.- Architected and implemented multi-tier SPAM prevention system using postfix, Brightmail, blacklists and content filtering to provide 87% block rate with few false positives.- Acted as corporate technical resource for customer information security audits.- Architected and integrated HA load balanced Apache configurations utilizing Cisco CSS,SCA and PIX to replace legacy Apache/mod_ssl configuration.- Implemented and administered Checkpoint Firewalls on Solaris, Red Hat Linux and IPSO.- Implemented and administered Snort and Symantec IDS systems.- Architected, implemented and supported 50+ node IPSec VPN solution for remote sales offices using Cisco routers on cable, DSL, and ISDN connections.- Consulted with Legal team for policy and process changes to allow achievement of EU/Swiss Safe Harbor compliance.- Architected, integrated and administered FTP, FTPS and SFTP services on Red Hat and SUSE Linux systems with LDAP authentication using secured open source applications to support customer and business secured data transfer requirements.
John Scott Skills
John Scott Education Details
-
University Of UtahPsychology
Frequently Asked Questions about John Scott
What company does John Scott work for?
John Scott works for Wpromote
What is John Scott's role at the current company?
John Scott's current role is Information Security Professional, CISSP/CISA.
What is John Scott's email address?
John Scott's email address is jo****@****ote.com
What schools did John Scott attend?
John Scott attended University Of Utah.
What skills is John Scott known for?
John Scott has skills like Networking, Firewalls, Microsoft Exchange, Information Security, Ids, Security, Linux, Cisco Technologies, Pci Dss, Switches, Cloud Computing, Active Directory.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial