Scott Hand

Scott Hand Email and Phone Number

Chief Information Security Officer @ Softek International
Panama City, Florida, United States
Scott Hand's Location
Greater Panama City Area, United States, United States
About Scott Hand

Provides expert level technical knowledge to manage, monitor, and administer a customer’s Enterprise Cyber solutions. Has a deep understanding of the customer’s IT/Network environment, product, deployment and organization to optimize administration and operationalize tools and processing in the customer environment.

Scott Hand's Current Company Details
Softek International

Softek International

View
Chief Information Security Officer
Panama City, Florida, United States
Website:
softekintl.com
Employees:
40
Scott Hand Work Experience Details
  • Softek International
    Chief Information Security Officer
    Softek International
    Panama City, Florida, United States
  • Quisitive
    Senior Cyber Security Consultant
    Quisitive Oct 2021 - Sep 2023
    Irving, Texas, Us
    Worked with senior managers, technical managers, and account executives to understand client security and compliance needs. Coached and mentored team members regarding existing client/prospective client interactions and work delivery. Architected and designed solutions to meet functional security requirements in Azure Sentinel and Splunk Security Automation and Response (SOAR). Performed security analyst operations with Microsoft Sentinel that includes incident response, investigation, and remediation of any related damage. Supported virtual environments (servers, endpoints) in VMware ESXi (hypervisor). Executed strategic and complex projects with numerous critical dependencies around security governance and compliance. Engaged directly with customers at the Chief Information Officer (CIO), Chief Technical Officer (CTO), and Chief information Security Officer (CISO) levels while supporting account executives, senior to mid-level briefings and innovative partnerships. Wrote Statements of Work (SOW) proposal contracts and provided detailed inputs into Requests for Proposal (RFP). Developed, updated, and managed PowerShell scripting for automation purposes around Security Operations, Active Directory, and Entra ID (formerly Azure ID), Single Sign-On (SSO). Assessed the security posture of customers from governance to detailed security configurations and provide final security findings along with detailed observations/recommendations to remediate findings. Worked with numerous frameworks and standards including the Risk Management Framework, NIST Cybersecurity Framework, DoD Cybersecurity Maturity Model Certification (CMMC), NIST SP 800-53, NIST SP 800-171, ISO 27001, and others. Assessed the security and compliance posture of organizations and creased roadmaps for remediation and key improvements.
  • Concurrent Technologies Corporation
    Senior Cyber Systems Engineer
    Concurrent Technologies Corporation Feb 2019 - Oct 2021
    Johnstown, Pa, Us
    Risk Management Framework, NIST Security Controls, Internal Cyber Assessments, Process Improvement, Department of Defense Architecture Framework (DoDAF) Enterprise Mission Assurance Support Service (eMASS), Tenable Security Center, REST API development, PowerShell, Bash, Java, .NET, JavaScript, VMware vCenter Server, Red Hat Linus, CentOS, Windows Server 2016 R2, Windows Server 2018, Windows 10, Windows 7, Ubuntu Linux, Cisco, Splunk, IT Integration, Project Management
  • Turnkey Cyber Solutions
    Cyber Systems Engineer
    Turnkey Cyber Solutions Jul 2018 - Dec 2018
    At Turnkey Cyber Solutions our mission is to match our customer's requirements with leading advances in technology, best practices, exceptional services, and sustainment support to meet today's ever changing operational and security challenges.
  • Elead Crm
    Senior Security Engineer
    Elead Crm Jul 2016 - Jul 2018
    Austin, Texas, Us
    • Oversee the design, development, engineering and implementation of solutions to established security requirements• Reviews logs and messages to identify and report possible security events• Participate in security incident response efforts by maintaining an in-depth knowledge of common attack vectors, common security exploits, and countermeasures. Responds to all information security relevant events (hacker intrusions, virus infections, denial of service attacks, etc.)• Research and identify key indicators of malicious activities on the network and end user workstations• Independently follow procedures to contain, analyze, and eradicate malicious activity• Review industry and vendor security alerts for vulnerabilities and security issues. Work with peer teams to create mitigation solutions based on vendor advisories• Initiate escalation procedure to counteract potential threats/vulnerabilities• Play a key role in Architecting an enterprise-wide security posture• Leverage experience in systems administration to assist in hardening the IS infrastructure• Support and fully document various compliance frameworks. Perform internal security audits and assessments.• Design and conduct penetration tests on a routine basis. Provide detailed reports on the results as well as suggest solutions for remediation of any vulnerabilities.• Perform all security monitoring and remediation tasks• Assist with other IT systems as needed (VMware, Microsoft, Cisco, Compellent)
  • United States Air Force
    It Architect/Isso/Issm/Developer/Cyber Security Officer
    United States Air Force Jan 2008 - Apr 2016
    Randolph Afb, Tx, Us
    Architect, manage and lead engineering projects for the 412th Test Engineering group related to flight test, flight safety, and IT networks to include software/systems, database, enterprise development (web and client/server), mobile application development, Cyber Security, network design and data analysis. Primary Information Assurance/Cyber Security officer for all Range Engineering systems. Develop applications using Java, JavaScript, AngularJ, C#.NET and ASP.NET. Develop technical specifications and analyze requirements to create an integrated IT solution. Create policies/procedures to govern the creation, development, and sustainment of complex IT systems. Duties include: IT systems management (configuration/operations), computer network defense/incident response, vulnerability mitigation, project management, senior leadership briefings, NIST/DISA guidance, STIG compliance/inspection, SCAP scans, software development, network administration.
  • Countrywide Financial
    Senior Enterprise Architect
    Countrywide Financial 1996 - 2001
    Charlotte, Nc, Us
  • United States Air Force
    Test Pilot School
    United States Air Force Jan 1990 - Aug 1996
    Randolph Afb, Tx, Us

Scott Hand Education Details

  • Defense Acquisition University
    Defense Acquisition University
    Information Technology And Program Management
  • Us Air Force Technical Training
    Us Air Force Technical Training

Frequently Asked Questions about Scott Hand

What company does Scott Hand work for?

Scott Hand works for Softek International

What is Scott Hand's role at the current company?

Scott Hand's current role is Chief Information Security Officer.

What schools did Scott Hand attend?

Scott Hand attended Defense Acquisition University, Us Air Force Technical Training.

Who are Scott Hand's colleagues?

Scott Hand's colleagues are Khalid K., Clayton Wasilenko, Bharat Panchal, John (Jay) Walker, Katherinne Cano, Yaiza G C, Lee Glidewell.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.