Scott Jarkoff Resume
Scott Jarkoff has experienced a wide and varied career, ranging from time in the United States Navy, to co-founding a web startups, to being a US government contractor and civil servant, as well as working for a cyber security vendor. Scott has largely focused on cyber security in his professional life. Although he originally began his career in telecommunications in 1990 while in the US Navy, he gravitated towards network security in the mid-90’s, when introduced to his very first firewall: Gauntlet on HP-UX. Read on to learn about Scott's capabilities and professional experience.
Visionary, multifaceted cyber security and intelligence professional with diverse experience across multiple domains, to include cyber security, threat intelligence, defense-grade security engineering, information assurance, computer network defense, defensive cyberspace operations, certification & accreditation, networking and security solutions, and LAMP based web development. Charismatic, gifted orator capable of delivering engaging and insightful keynote presentations, panel sessions, and direct engagement with customers at all levels, from the C-suite and boardroom, to VP & mid-level management, to the technical subject matter experts. Dynamic, highly motivated leader with proven expertise in decision making and staff management. Technically sophisticated team player with a superior work ethic and the ability to identify, and accurately and efficiently resolve problems. Self-starter, talented security architect capable of managing multiple multi-threaded, non-linear projects across cross-functional teams. Keen technical communications skills with the ability to convey complex issues in non-technical, easily understandable terms. Over 20 years’ experience with cyber security. Over 25 years’ experience working with the U.S. Department of Defense, 20+ years specifically with DoD cyber security. Over 10 years experience working directly with the Government of Japan, with a primary emphasis on the Japanese Ministry of Defense and defense industry
Areas of Expertise
Cyber Defense Consulting
Cyber Defense Technical Capabilities
Feb 2019 – Current
Serve on a global team entrusted with empowering sales of CrowdStrike’s world renowned, best-of-breed, government-grade threat intelligence. Guide customers on operationalizing and integrating threat intelligence within their organizational security strategy, demonstrating the value threat intelligence provides in today threat landscape. Present on a variety of intelligence and security themed topics at various global security conference and events. Conduct interviews with Japanese news media on the global threat landscape, nation state threat actors, geopolitical activity exploiting cyber, and foreign cyber security news. Evangelize the power threat intelligence offers governments, critical infrastructure operators, industry, and more. Primary focus is the Asia-Pacific Japan (APJ) territory. Working towards achieving world domination one threat intelligence report at a time.
May 2014 – Current
Currently serve as the Executive Vice President, and previously served as the President, of AFCEA 東京 TOKYO, a fully volunteer not-for-profit organization, directing the Executive Committee and all facets of chapter operations. Ensure the organization meets stated goals and existing mission requirements, provides necessary STEM educational opportunities to members, grow chapter membership, and presents an enjoyable and valuable experience for all members and attendees. Engage with high-level US and Japanese military, government, industry, and academic personnel to secure speakers to provide monthly seminar. Overall responsible for the coordination of Tokyo TechNet, a yearly conference held at The New Sanno Hotel. Developed the plan and led the team responsible for the most successful Tokyo TechNet event in chapter history in 2015, which saw more than 2000 attendees visit the event throughout the three day conference,
Feb 2013 – Feb 2019
Infuse an enriched hybrid of high-level governmental cyber security policy development, thought leadership, evangelism, and technical savvy for the Intel Security Japan Cyber Strategic Initiative Office. Apply firsthand experience governing U.S. Department of Defense and cross-government information systems, as well as expertise architecting and administering defense-grade security frameworks, to deliver robust cyber security solutions and capabilities centered around the Threat Defense Lifecycle product portfolio. Primarily focus on the Government of Japan, especially the Japanese Ministry of Defense, with additional emphasis on Japanese critical infrastructure, media, telecommunications, and manufacturing industries.
Apr 2008 – Feb 2013
Headquarters United States Forces Japan Chief of Cyber Security, responsible for complete oversight, administration and execution of the Information Assurance program and bilateral Information Assurance relationship. Supervise a staff of two Department of Navy civilians and one senior Air Force personnel. Highly sought after Subject Matter Expert (SME) conducting bilateral operations with U.S. and Japanese IA professionals. Sole USFJ Cyber Security representative on the Bilateral Information Security Consultation (BISC) Cyber Defense Working Group, a high-level U.S. Embassy Tokyo led, bilateral information security effort between the United States Government (USG) and the Government of Japan (GOJ). Developed and implemented the principle policies promulgating Japan-wide cyber security standards for the U.S. military.
Dec 2005 – Apr 2008
Adept, multi-talented, technically savvy Information Assurance Manager with unparalleled vision and leadership. Highly energetic, self-motivated engineer capable of making hard decisions which have allowed United States Forces Japan (USFJ) to remain on the cutting edge of Information Security technology. Support and administer technical and administrative security initiatives for multiple networks utilized by USFJ. Directly responsible for the daily administration of three network perimeter security suites. Installed six (6) newly positioned McAfee Sidewinder firewalls, Blue Coat Web Proxy Server, Sourcefire IDS/IPS, and a myriad of other technical controls designed to prevent the unauthorized access to network resources and protect DoD information. Oversee regulatory policy audits and vulnerability assessments.
Jul 1999 – Dec 2005
Provide dynamic vision, leadership, and decision making to develop, support, and administer security initiatives and systems. Direct planning, implementation, and support of enterprise systems with infrastructure of 100+ Windows 2003/2000/NT servers, Cisco routers and switches, and Marconi ATM switches. Supervised a staff of ten 24/7/365 Security Operations Center analysts responsible for monitoring and administering multiple network perimeter security devices deployed across the entire Far East region. Established the chief written guidance on baseline security and assurance of regional IT systems.
Aug 2000 – Mar 2005
Co-Founded the most successful online art community in internet history. Developed the idea for the site, single-handledly implementing and launching deviantART in August 2000. Created, designed, developed, and architected the initial framework upon which deviantART operated during the first three years of the life of the site. Responsible for all HTML, CSS, PHP, and MySQL code written during the first three years deviantART operated. Steered the deviantART ship in the direction both the business and the community required in order to grow organically, employing various viral marketing techniques.
Aug 2000 – Mar 2005
U.S. Navy Petty Officer First Class Technical Control Radioman. Primarily responsible for all ship-to-shore and ship-to-ship telecommunications, established telecommunications circuits between various ship and/or shore facilities, and management of encryption keys and devices. Additionally, led an effort to establish and install one of the first network security suites protecting NIPRNET and SIPRNET shore-based assets using HP-UX and Gauntlet Firewall. This was part of a pilot program, which was deemed successful and because the basis for all network security suites deployed Navy-wide in the late 1990’s.