Scott Shackleton

Scott Shackleton Email and Phone Number

Cybersecurity Thought Leader, CISSP, and Certified CISO @ Optiv Inc
Scott Shackleton's Location
San Francisco, California, United States, United States
About Scott Shackleton

Security and Risk Management leader with broad experience in cybersecurity architecture, frameworks, control catalogs, integrated tools, policies, and procedures.

Scott Shackleton's Current Company Details
Optiv Inc

Optiv Inc

View
Cybersecurity Thought Leader, CISSP, and Certified CISO
Scott Shackleton Work Experience Details
  • Optiv Inc
    Senior Client Security Advisor
    Optiv Inc Jun 2020 - Present
    Denver, Colorado, Us
    Advising C-Suite and security leaders in maturing their security programs throughout plan, build, and run phases.● Security Program Strategy● Risk Mitigation Strategy● Zero Trust Strategy● Assist in the identification, procurement, and project management of security tools and services
  • Unison
    Security Architect
    Unison Sep 2018 - Apr 2020
    San Francisco, Ca, Us
    Led Unison's Information Security Program from inception to implementation; focused upon risk identification and mitigation.• Built and led the Security Leadership Team to coordinate cross-functional security projects and promote awareness throughout the organization• Member of the enterprise Change Advisory Board (CAB); reviewed and approved changes from the security team perspective• Developed and gained executive approval of a written information security program (WISP) within three months of joining the company• Vetted, recommended, implemented, and managed the operations for identity and access management (IAM), endpoint detection and response (EDR), managed detection and response (MDR), unified endpoint management (UEM/MDM), Cisco Umbrella, vulnerability management, Splunk, AWS security tools, security awareness training, and a bug bounty program• Created and maintained a risk register to prioritize security projects across the enterprise• Launched software assurance maturity program based upon the OWASP Software Assurance Maturity Model (SAMM)• Launched security incident management team and security incident management program
  • Vidder
    Director, Information Security
    Vidder Nov 2011 - Sep 2018
    Designed, implemented, optimized, managed, and documented a secure computer network architecture to mitigate risk through security controls and by hiring highly competent people to implement Vidder’s Information Security Programo Developed and maintained the Security Program at Vidder having determined control measurements and charted critical controls to technologies and processeso Researched and planned internal security controls based upon the SANS Institute's 20 Critical Security Controls (now CIS Controls)o Planned and executed phased risk assessments, gap analyses, and corrective project plans over a multi-year period and incorporated Vidder's own Software Defined Perimeter (SDP) technology for application access control and attack mitigationo Designed the network environment and implemented Microsoft Active Directory, federated Office 365 using Okta (SAML 2.0), and evaluated, implemented, configured, and optimized various security technologies (specific products confidential)o Based upon my recommendations, Vidder constantly evolved its Information Security controls and processes to ensure maximum threat mitigation, control of our data, and visibility into network traffic and potential risksPKI Operations Lead at Vidder and Vidder’s customerso Multi-year project team member implementing a ground up two-tier PKI project at a Fortune 100 company including HSM key management integration and high availabilityo During this project and following its completion, led a team of the customer’s employees and contractors in its world-wide PKI operations, including strict change control management using the customer’s ServiceNow management platform and managing certificates using Venafi Encryption Director
  • Compu-Call Inc.
    Network Engineer
    Compu-Call Inc. Aug 2007 - Oct 2011
    Chatham, Massachusetts, Us
    Designed and optimized Microsoft Active Directory and Exchange Server solutions for Compu-Call’s clients through VM creation (VMware), Group Policy configuration, VLAN creation, disaster recovery planning, and documentationDaily exposure to WatchGuard System Manager configuring and troubleshooting firewall policies, proxy action definitions, Intrusion Prevention, VPN creation, reporting, and log analysisFocused upon IBM equipment for server, midrange, and storage solutions including Blade Center and SAN configurationPartial role as a sales engineer: identified client pain points, recommended hardware / software, and drafted project plansSome of the projects for which I had been a key player include:1. Staging a disaster recovery center relocating servers, restoring lost data, and keeping client employees connected (email, network storage, and VPN access).2. Evaluating obsolete or aging networks (Windows NT and Windows 2000) and migrating them to more current technologies including Windows 2008 64bit Domain Controllers and Exchange 2007 servers with managed switches (Cisco 2960G and various stacked HP switches). I've been looking into Exchange 2010 but haven't yet had an opportunity to implement an upgrade.3. Migrating email to cloud-based Microsoft Exchange for smaller companies. I've trained end-users on the benefits of Exchange, especially shared calendars, email distribution groups (ask me why it's often better to use a distribution group instead of a generic mailbox such as info@domain.com), and ActiveSync.

Scott Shackleton Skills

Security Networking Windows Server Information Security Computer Security Active Directory Network Security Vpn Disaster Recovery Cloud Computing Network Administration Saas Virtualization Pki Network Architecture Network Design It Operations Tcp/ip Consulting It Strategy Network Engineering Virtual Private Network Microsoft Active Directory Firewall Management Hsm Firewalls Infosec Cissp Group Policy Vmware Software Defined Perimeter Product Management Amazon Web Services Ibm System X Servers Firewall Policy Design Technology Consulting Jira Okta Security Architecture Design Identity And Access Management Cloud Security Nist Cybersecurity Risk Management Risk Assessment Risk Registers Security Policy Development Vulnerability Management Microsoft Exchange Cisco Technologies Windows 7 Microsoft Windows Server 2008 Microsoft Windows 7 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2003 Cisco Systems Products Vmware Vsphere 5 Esxi 5 Watchguard Ossec

Scott Shackleton Education Details

  • Ucla
    Ucla
    Political Science And Government
  • Corona Del Mar High School
    Corona Del Mar High School

Frequently Asked Questions about Scott Shackleton

What company does Scott Shackleton work for?

Scott Shackleton works for Optiv Inc

What is Scott Shackleton's role at the current company?

Scott Shackleton's current role is Cybersecurity Thought Leader, CISSP, and Certified CISO.

What is Scott Shackleton's email address?

Scott Shackleton's email address is sc****@****der.com

What is Scott Shackleton's direct phone number?

Scott Shackleton's direct phone number is +141527*****

What schools did Scott Shackleton attend?

Scott Shackleton attended Ucla, Corona Del Mar High School.

What are some of Scott Shackleton's interests?

Scott Shackleton has interest in Civil Rights And Social Action, Science And Technology, Arts And Culture, Human Rights.

What skills is Scott Shackleton known for?

Scott Shackleton has skills like Security, Networking, Windows Server, Information Security, Computer Security, Active Directory, Network Security, Vpn, Disaster Recovery, Cloud Computing, Network Administration, Saas.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.