DEFENSIVE OPS
CYBERSECURITY OPERATIONS · RMF · SYSTEM HARDENING

Defensive Cyber Operations Specialist

Cybersecurity practitioner and U.S. military veteran with 10+ years of IT experience, focused on endpoint protection, STIG compliance, vulnerability management, SIEM tuning, and audit-ready RMF documentation in regulated environments.

Endpoint Security STIG / ATO Readiness SIEM Detection Engineering Vulnerability Mgmt
Clearance: Active Secret · Previously held Top Secret

About

I harden systems, validate controls, and improve detection posture—delivering compliance outcomes without sacrificing operational reality.

What I Do

I secure enterprise environments through endpoint policy enforcement, vulnerability remediation, and continuous monitoring. I’m comfortable operating across federal defense and commercial contexts.

How I Work

I write audit-ready artifacts, tune tools until signal beats noise, and prioritize controls that measurably reduce risk. My default: calm execution, clean documentation, repeatable outcomes.

What You Get

Strong cyber hygiene at scale: hardened baselines, validated configurations, defensible RMF packages, and monitoring that catches problems earlier.

Capabilities

A practical stack for regulated environments.

ENDPOINT SECURITY

Deploy/maintain enterprise protection & DLP, enforce policy baselines, resolve endpoint issues, and improve cyber hygiene.

RMF / COMPLIANCE

SSPs, POA&Ms, control validation, STIG documentation, continuous monitoring artifacts, ATO readiness support.

SECURITY MONITORING

SIEM detection logic, workflow refinement, triage playbooks, alert quality improvements, incident readiness.

VULNERABILITY MGMT

Scan/assess/validate findings, prioritize remediation, close configuration gaps, and track risk with stakeholders.

Experience

Organization names removed by design. Impact preserved.

Cybersecurity Analyst · Defense Sector
2023 — Present
  • Oversaw enterprise endpoint security deployment and compliance documentation supporting DoD-aligned programs.
  • Streamlined endpoint policy/patch workflows; maintained 100% STIG compliance targets and reduced remediation time ~30%.
  • Authored and maintained SSPs and POA&Ms supporting ATO renewals with zero critical findings.
  • Administered enterprise endpoint/DLP tools; improved system resilience and reduced recurring issues.
  • Delivered security tool training to end users to reinforce safeguards and policy alignment.
Cybersecurity Analyst · RMF / FISMA Support
2023
  • Conducted vulnerability assessments and compliance checks aligned with RMF and FISMA frameworks.
  • Executed STIG validations on mission-critical systems and supported dynamic risk assessments.
  • Collaborated with ISSO/ISSM stakeholders to reduce findings during annual reviews.
  • Used Nessus/ACAS/NMAP to detect configuration gaps and guide remediation planning.
Security Operations Associate · Enterprise SOC Support
2022 — 2023
  • Designed phishing simulation campaigns and led targeted training, reducing click-through rates ~60%.
  • Maintained SIEM workflows to improve detection/containment of multiple incidents.
  • Supported endpoint protection deployment across 800+ systems; refined alerts and investigative triage.
Engineering / Technical Integration Roles
2019 — 2022
  • Maintained technical records and lifecycle documentation supporting defense programs.
  • Led de-integration and modernization prep tasks; guided junior staff on documentation processes.
  • Produced readiness reports and resolved complex installation/integration issues with engineering teams.
U.S. Military Service
2011 — 2014
  • Safeguarded high-value assets (~$950K) through structured accountability and access control.
  • Responded to 20+ alarm events involving sensitive assets following rapid incident protocols.
  • Oversaw contractor activity during infrastructure upgrades; enforced secure perimeter operations.

Skills & Tooling

Focused, practical, and deployable.

Endpoint Security

  • Trellix ENS
  • McAfee DLP
  • SentinelOne
  • ePO Server

SIEM & Monitoring

  • LogRhythm
  • Splunk
  • Alert Rules
  • Incident Triage

Vuln & Compliance

  • Nessus
  • ACAS
  • NMAP
  • STIG Viewer
  • FISMA
  • RMF
  • SSP
  • POA&M

Platforms

  • Windows / Server
  • Ubuntu
  • Kali
  • CentOS
  • VMware
  • VirtualBox
  • Jira

Networking

  • VLANs
  • TCP/IP
  • Protocol Analysis
  • Firewall Admin

Scripting & Web

  • HTML
  • JavaScript

Education

Degree names kept; institutions omitted to preserve anonymity.

  • B.S. Cybersecurity
  • A.S. Network Systems Management
NOTE

This site intentionally removes personal identifiers and employer names while preserving operational scope and outcomes.

Contact

This opens your email client with a prefilled message (no form submission to a server).

Secure Email

Email opens to: zack@nullandv01d.com

Open Email Draft
prefab_message.txt
Hi,

I’d like to connect about cybersecurity support.

- Name:
- Organization:
- Scope / Need:
- Timeline:
- Environment (Windows/Linux/Cloud):
- Compliance (RMF/FISMA/Other):

Thanks,

Prefill Form (Mailto)

Fill this out and click “Generate Email Draft”. It will open a prefilled mail draft via mailto.

Tip: mailto links can be limited by URL length in some clients. Keep details concise if it fails to open.