Scott Hand Email and Phone Number
Provides expert level technical knowledge to manage, monitor, and administer a customer’s Enterprise Cyber solutions. Has a deep understanding of the customer’s IT/Network environment, product, deployment and organization to optimize administration and operationalize tools and processing in the customer environment.
Softek International
View- Website:
- softekintl.com
- Employees:
- 40
-
Chief Information Security OfficerSoftek InternationalPanama City, Florida, United States -
Senior Cyber Security ConsultantQuisitive Oct 2021 - Sep 2023Irving, Texas, UsWorked with senior managers, technical managers, and account executives to understand client security and compliance needs. Coached and mentored team members regarding existing client/prospective client interactions and work delivery. Architected and designed solutions to meet functional security requirements in Azure Sentinel and Splunk Security Automation and Response (SOAR). Performed security analyst operations with Microsoft Sentinel that includes incident response, investigation, and remediation of any related damage. Supported virtual environments (servers, endpoints) in VMware ESXi (hypervisor). Executed strategic and complex projects with numerous critical dependencies around security governance and compliance. Engaged directly with customers at the Chief Information Officer (CIO), Chief Technical Officer (CTO), and Chief information Security Officer (CISO) levels while supporting account executives, senior to mid-level briefings and innovative partnerships. Wrote Statements of Work (SOW) proposal contracts and provided detailed inputs into Requests for Proposal (RFP). Developed, updated, and managed PowerShell scripting for automation purposes around Security Operations, Active Directory, and Entra ID (formerly Azure ID), Single Sign-On (SSO). Assessed the security posture of customers from governance to detailed security configurations and provide final security findings along with detailed observations/recommendations to remediate findings. Worked with numerous frameworks and standards including the Risk Management Framework, NIST Cybersecurity Framework, DoD Cybersecurity Maturity Model Certification (CMMC), NIST SP 800-53, NIST SP 800-171, ISO 27001, and others. Assessed the security and compliance posture of organizations and creased roadmaps for remediation and key improvements. -
Senior Cyber Systems EngineerConcurrent Technologies Corporation Feb 2019 - Oct 2021Johnstown, Pa, UsRisk Management Framework, NIST Security Controls, Internal Cyber Assessments, Process Improvement, Department of Defense Architecture Framework (DoDAF) Enterprise Mission Assurance Support Service (eMASS), Tenable Security Center, REST API development, PowerShell, Bash, Java, .NET, JavaScript, VMware vCenter Server, Red Hat Linus, CentOS, Windows Server 2016 R2, Windows Server 2018, Windows 10, Windows 7, Ubuntu Linux, Cisco, Splunk, IT Integration, Project Management -
Cyber Systems EngineerTurnkey Cyber Solutions Jul 2018 - Dec 2018At Turnkey Cyber Solutions our mission is to match our customer's requirements with leading advances in technology, best practices, exceptional services, and sustainment support to meet today's ever changing operational and security challenges.
-
Senior Security EngineerElead Crm Jul 2016 - Jul 2018Austin, Texas, Us• Oversee the design, development, engineering and implementation of solutions to established security requirements• Reviews logs and messages to identify and report possible security events• Participate in security incident response efforts by maintaining an in-depth knowledge of common attack vectors, common security exploits, and countermeasures. Responds to all information security relevant events (hacker intrusions, virus infections, denial of service attacks, etc.)• Research and identify key indicators of malicious activities on the network and end user workstations• Independently follow procedures to contain, analyze, and eradicate malicious activity• Review industry and vendor security alerts for vulnerabilities and security issues. Work with peer teams to create mitigation solutions based on vendor advisories• Initiate escalation procedure to counteract potential threats/vulnerabilities• Play a key role in Architecting an enterprise-wide security posture• Leverage experience in systems administration to assist in hardening the IS infrastructure• Support and fully document various compliance frameworks. Perform internal security audits and assessments.• Design and conduct penetration tests on a routine basis. Provide detailed reports on the results as well as suggest solutions for remediation of any vulnerabilities.• Perform all security monitoring and remediation tasks• Assist with other IT systems as needed (VMware, Microsoft, Cisco, Compellent) -
It Architect/Isso/Issm/Developer/Cyber Security OfficerUnited States Air Force Jan 2008 - Apr 2016Randolph Afb, Tx, UsArchitect, manage and lead engineering projects for the 412th Test Engineering group related to flight test, flight safety, and IT networks to include software/systems, database, enterprise development (web and client/server), mobile application development, Cyber Security, network design and data analysis. Primary Information Assurance/Cyber Security officer for all Range Engineering systems. Develop applications using Java, JavaScript, AngularJ, C#.NET and ASP.NET. Develop technical specifications and analyze requirements to create an integrated IT solution. Create policies/procedures to govern the creation, development, and sustainment of complex IT systems. Duties include: IT systems management (configuration/operations), computer network defense/incident response, vulnerability mitigation, project management, senior leadership briefings, NIST/DISA guidance, STIG compliance/inspection, SCAP scans, software development, network administration. -
Senior Enterprise ArchitectCountrywide Financial 1996 - 2001Charlotte, Nc, Us -
Test Pilot SchoolUnited States Air Force Jan 1990 - Aug 1996Randolph Afb, Tx, Us
Scott Hand Education Details
-
Defense Acquisition UniversityInformation Technology And Program Management -
Us Air Force Technical Training
Frequently Asked Questions about Scott Hand
What company does Scott Hand work for?
Scott Hand works for Softek International
What is Scott Hand's role at the current company?
Scott Hand's current role is Chief Information Security Officer.
What schools did Scott Hand attend?
Scott Hand attended Defense Acquisition University, Us Air Force Technical Training.
Who are Scott Hand's colleagues?
Scott Hand's colleagues are Khalid K., Clayton Wasilenko, Bharat Panchal, John (Jay) Walker, Katherinne Cano, Yaiza G C, Lee Glidewell.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial