Profiles search
Mark Schulz
Information Security Engineer at Peraton
Colorado Springs, CO, United States
Details
Experience:
Promoted to site IA technical lead, responsible for a cybersecurity team of 5
Conducted routine vulnerability scans and made remediation recommendations based on criticality.
Conducted regular system hardening scans, and STIG compliance checks making regular security recommendations to the system owners.
Trained junior cybersecurity team members on how to install/update/scan with ACAS.
Trained junior cybersecurity team members on how to perform system hardening with the SCC tool and current DISA STIG benchmarks and checklists.
Tracked above security compliance across 4 separate networks.
Oversaw the vulnerability scanning and remediation of on-prem and cloud infrastructure.
2020 : Present
Peraton
Information Security Engineer Technical Lead
Conducted routine vulnerability scans and made remediation recommendations based on criticality.
Conducted regular system hardening scans, and STIG compliance checks making regular security recommendations to the system owners.
2018 : 2020
Perspecta
Information Security Engineer
I work as a part of a team that provides Computer Network Defense (CND) services on the Unclassified and Classified networks for a DoD entity. Vulnerability and compliance scanning, unauthorized hardware and software compliance/enforcement, remediation and or enforcement of CTO's and tasking from DISA & CYBER COMMAND.
Tools utilized
ACAS
BlueCoat
HBSS
FireEye
Remedy
2018 : 2018
Aerodyne Industries
Cyber Security Engineer
I work as a part of a team that provides Computer Network Defense (CND) services on the Unclassified and Classified networks. Vulnerability and compliance scanning, unauthorized hardware and software compliance/enforcement, deployment & enforcement of CTO's and tasking from DISA & CYBER COMMAND.
Tools utilized
ACAS
BlueCoat
HBSS
FireEye
Remedy
2015 : 2018
ISYS Technologies
Cyber Security Engineer
I work on a CND team providing said support to the DoD.
2012 : 2015
ISYS Technologies
Network Security Analyst
Conducted routine vulnerability scans and made remediation recommendations based on criticality.
Conducted regular system hardening scans, and STIG compliance checks making regular security recommendations to the system owners.
Trained junior cybersecurity team members on how to install/update/scan with ACAS.
Trained junior cybersecurity team members on how to perform system hardening with the SCC tool and current DISA STIG benchmarks and checklists.
Tracked above security compliance across 4 separate networks.
Oversaw the vulnerability scanning and remediation of on-prem and cloud infrastructure.
2020 : Present
Peraton
Information Security Engineer Technical Lead
Conducted routine vulnerability scans and made remediation recommendations based on criticality.
Conducted regular system hardening scans, and STIG compliance checks making regular security recommendations to the system owners.
2018 : 2020
Perspecta
Information Security Engineer
I work as a part of a team that provides Computer Network Defense (CND) services on the Unclassified and Classified networks for a DoD entity. Vulnerability and compliance scanning, unauthorized hardware and software compliance/enforcement, remediation and or enforcement of CTO's and tasking from DISA & CYBER COMMAND.
Tools utilized
ACAS
BlueCoat
HBSS
FireEye
Remedy
2018 : 2018
Aerodyne Industries
Cyber Security Engineer
I work as a part of a team that provides Computer Network Defense (CND) services on the Unclassified and Classified networks. Vulnerability and compliance scanning, unauthorized hardware and software compliance/enforcement, deployment & enforcement of CTO's and tasking from DISA & CYBER COMMAND.
Tools utilized
ACAS
BlueCoat
HBSS
FireEye
Remedy
2015 : 2018
ISYS Technologies
Cyber Security Engineer
I work on a CND team providing said support to the DoD.
2012 : 2015
ISYS Technologies
Network Security Analyst
Company:
Peraton
About
TS SCI
Certifications: GCIH, Security+, C|EH, AWS-CCP
• ACAS- Vulnerability scans & remediation
•Data spillage recovery and remediation policy and procedures
• Individually responsible for over 5K+ machines, and 16K+ user accounts while deployed to Afghanistan
• IAVA monitoring, and remediation
• SCC scans, STIG compliance, and System hardening
• Software approval policy and procedure