Skip to content

Commit

Permalink
Update cv.md
Browse files Browse the repository at this point in the history
  • Loading branch information
schlangens authored Aug 4, 2024
1 parent c9955db commit 7dd3167
Showing 1 changed file with 26 additions and 26 deletions.
52 changes: 26 additions & 26 deletions content/cv.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,16 +5,16 @@
- 🐱 GitHub: [schlangens](https://github.com/schlangens)
- 💼 LinkedIn: [scottschlangen](https://linkedin.com/in/scottschlangen)

_Lifelong learner with a big-picture mindset, exceptional technical management skills, and the capacity to energize a team of professionals by creating a resilient and innovative team culture._
_Lifelong learner with a big-picture mindset, exceptional technical management skills, and the ability to energize a team by fostering a resilient and innovative culture._

## Qualifications Summary

- Visionary professional who can configure and troubleshoot security controls for hosted technologies that are maintained on-premises.
- Collaborative team player with high emotional intelligence and the capacity to assist in developing comprehensive reports that measure security control performance and support designing and delivering system control enhancements.
- Exceptional communicator and change agent with a sharp power of observation, able to simplify sophisticated issues to make them easily comprehensible for a broader audience.
- Ambitious, high-energy self-starter with a proven ability to plan, prioritize, manage, and complete undertakings within fast-paced, deadline-driven situations; skilled in monitoring security measures to protect information resources.
- Dedicated individual with a dynamic growth mindset, strong management and people skills, personal values, integrity, and technical knowledge; able to contribute to designing computer security architectures by helping incorporate cybersecurity into each architecture's design.
- Highly effective strategist who can use creativity to determine the best course of action for the organization through skills that transfer across multiple industries and positions.
- Visionary professional skilled in configuring and troubleshooting security controls for both on-premises and cloud-based technologies, including Azure and AWS
- Team player with high emotional intelligence, capable of developing reports to measure security performance and support system enhancements.
- Exceptional communicator who simplifies complex issues for a broader audience.
- Ambitious self-starter with proven ability to manage tasks in fast-paced, deadline-driven environments, skilled in monitoring security measures.
- Dedicated individual with strong management and people skills, personal integrity, and technical expertise, contributing to cybersecurity in system design.
- Strategic thinker using creativity to find the best solutions for the organization, with skills transferable across industries and positions.

## Career Experience

Expand All @@ -23,51 +23,50 @@ _Lifelong learner with a big-picture mindset, exceptional technical management s
**Cyber Threat Analyst**

- Monitor network traffic and security alerts to identify potential cyber threats.
- Investigate alerts generated by security tools and escalate potential incidents.
- Analyze log files from various sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats to network security.
- Analyze security incidents to enhance the alert catalog further.
- Perform analysis of malicious activity to determine weaknesses exploited, exploitation methods, and effects on system and information.
- Analyze available data sources, security tools, and threat trends and lead security monitoring and analysis techniques to identify attacks against the enterprise.
- Investigate alerts from security tools and escalate potential incidents.
- Analyze log files from various sources (e.g., host logs, network traffic logs, firewall logs, and IDS logs) to identify possible security threats.
- Analyze security incidents to enhance the alert catalog.
- Investigate malicious activity to determine exploited weaknesses, methods of exploitation, and effects on systems and information.
- Analyze data sources, security tools, and threat trends to lead security monitoring and identify attacks against the enterprise.


### MIE Medical Information Engineering

**DevOps Engineer**

- Established a solid foundation for success by managing infrastructure using code (Terraform / Ansible). Demonstrated leadership and communication skills by implementing and enforcing IAM policies; enhanced security by ensuring only authorized users could access critical resources.
- Facilitated a 40% reduction in intervention and significantly decreased the risk of human error in deployment processes by automating routine responsibilities and workflows.
- Generated energy and stability by integrating automated security testing into the development pipeline, enhancing application security, and reducing vulnerabilities in close partnership with security teams.
- Exercised sound judgment and discretion while securely managing secret and sensitive data through HashiCorp Vault; known to ensure compliance and commitment to security best practices.
- Built a strong foundation for success by managing infrastructure with code using Terraform and Ansible. Demonstrated leadership by implementing and enforcing IAM policies, ensuring only authorized users accessed critical resources.
- Enhanced application security and reduced vulnerabilities by integrating automated security testing into the development pipeline, working closely with security teams.
- Ensured compliance and security best practices by managing secret and sensitive data with HashiCorp Vault, exercising sound judgment and discretion.

### eVideon by Vibe Health

**Systems Engineer**

- Maximized productivity and provided vital structure by building out infrastructure in AWS. Exhibited resourcefulness by assisting in the implementation of ISO-27001. Leveraged experience and functional knowledge to help research and deploy SIEM. Served as an integral member of the Incident Response Team, responsible for containment and remediation efforts.
- Streamlined processes, clarified expectations, and improved consistency by promoting end-user education by implementing Security Awareness Training and Phishing Campaigns.
- Increased personal and professional effectiveness by managing, monitoring, and maintaining on-premises and cloud-based servers.
- Exercised detailed analysis and judgment to review IT systems and applications for large enterprise environments.
- Maximized productivity and provided vital structure by building infrastructure in AWS. Assisted in the implementation of ISO-27001 and helped research and deploy SIEM. Played a key role in the Incident Response Team, handling containment and remediation efforts.
- Streamlined processes and improved consistency by promoting end-user education through Security Awareness Training and Phishing Campaigns.
- Enhanced effectiveness by managing, monitoring, and maintaining on-premises and cloud-based servers.
- Applied detailed analysis and judgment to review IT systems and applications for large enterprise environments.

### 4eos - Netgain Technologies | Fort Wayne IN

**System Administrator**

- Harmonized operations by configuring and administering firewall rules, applications, VPN, and IDS / IPS settings to ensure a secure perimeter defense. Ensured quality execution by analyzing and applying established information security principles and practices. Embraced responsibility for reviewing IT systems and applications for large enterprise environments.
- Oversaw and supported containment and remediation efforts as an integral member of the Incident Response Team.
- Provided insightful vision and guidance by implementing Security Awareness Training and Phishing Campaigns to promote and advance end-user education.
- Employed refined relationship-building skills and a collaborative mindset while supporting, communicating, and assisting organizations in securing and operating business IT.
- Streamlined operations by configuring and managing firewall rules, applications, VPNs, and IDS/IPS settings to ensure secure perimeter defense. Applied established information security principles to ensure quality execution. Reviewed IT systems and applications for large enterprise environments.
- Led containment and remediation efforts as a key member of the Incident Response Team
- Enhanced security awareness by implementing Security Awareness Training and Phishing Campaigns, promoting end-user education
- Utilized strong relationship-building skills and a collaborative mindset to support, communicate, and assist organizations in securing and operating business IT systems.

### Everstream Solutions | Indianapolis, IN

**Network Operations Center Engineer**

- Rapidly excelled within position by administering carrier repair of customers circuit issues from origin to successful closure across assigned operations. Exhibited commitment and determination by monitoring networks; responded to alarms and communicated effectively with customers to determine and ameliorate impact.
- Quickly excelled in the role by managing the repair of customers' circuit issues from start to finish. Demonstrated commitment by monitoring networks, responding to alarms, and effectively communicating with customers to resolve impacts.

_Additional Experience as_ **_NOC Service Desk Technician_**, Indiana University, Purdue University Indianapolis; **_Security_** **_Analyst_**, Rook Security, Indianapolis, IN.

## Education and Certifications

- SentinelOne Incident Responder

- CompTIA Security+
- CompTIA Network+
- CompTIA Project+
Expand All @@ -77,6 +76,7 @@ _Additional Experience as_ **_NOC Service Desk Technician_**, Indiana University
- AWS Cloud Practitioner
- AWS Solutions Architect, Associate
- Azure Fundamentals (AZ-900)
- SentinelOne Incident Responder
- Linux Essentials from LPI
- JNCIA Juniper Networking Associate

Expand Down

0 comments on commit 7dd3167

Please sign in to comment.