Scott Jarkoff Resume

Scott Jarkoff has experienced a wide and varied career, ranging from time in the United States Navy, to co-founding a web startups, to being a US government contractor and civil servant, as well as working for a cyber security vendor. Scott has largely focused on cyber security in his professional life. Although he originally began his career in telecommunications in 1990 while in the US Navy, he gravitated towards network security in the mid-90’s, when introduced to his very first firewall: Gauntlet on HP-UX. Read on to learn about Scott's capabilities and professional experience.


Visionary, multifaceted cyber security and intelligence professional with diverse experience across multiple domains, to include cyber security, threat intelligence, defense-grade security engineering, information assurance, computer network defense, defensive cyberspace operations, certification & accreditation, networking and security solutions, and LAMP based web development. Charismatic, gifted orator capable of delivering engaging and insightful keynote presentations, panel sessions, and direct engagement with customers at all levels, from the C-suite and boardroom, to VP & mid-level management, to the technical subject matter experts. Dynamic, highly motivated leader with proven expertise in decision making and staff management. Technically sophisticated team player with a superior work ethic and the ability to identify, and accurately and efficiently resolve problems. Self-starter, talented security architect capable of managing multiple multi-threaded, non-linear projects across cross-functional teams. Keen technical communications skills with the ability to convey complex issues in non-technical, easily understandable terms. Over 20 years’ experience with cyber security. Over 25 years’ experience working with the U.S. Department of Defense, 20+ years specifically with DoD cyber security. Over 10 years experience working directly with the Government of Japan, with a primary emphasis on the Japanese Ministry of Defense and defense industry

Areas of Expertise

Cyber Defense (Strategy) 100%
Cyber Security (Technical) 100%
Security & Intelligence Consulting 100%
Risk Management 90%
Vulnerability Management 85%
Data Center Security Architecture 85%
Threat Intelligence 100%
Defense Grade Cyber Security 100%
Keynote & Speaking Engagements 100%
Threat Hunting 80%
Penetration Testing 75%
Certification & Accreditation 70%

Cyber Defense Consulting

Keynote Presentations 100%
Panel Moderating 100%
Panel Sessions 100%
Cyber Defense Strategy 100%
General Speaking Engagements 100%
C-Level & Senior Executives 100%
Cyber Security Technical SME's 80%
DoD-specific Engagements 100%

Threat Intelligence

Operationalizing Intelligence 100%
Actor & Campaign Tracking 90%
Threat Detection & Hunting 80%
Open Source Intelligence (OSINT) 90%
Signals Intelligence (SIGINT) 80%
Human Intelligence (HUMINT) 80%

Cyber Defense Technical Capabilities

Firewall/NGFW 95%
Sandboxing 70%
Penetration Testing 40%
Endpoint & EDR 95%
Web Proxy 80%
Security Engineering 100%
Vulnerability Assessment 60%

Language Skills

English 100%
Japanese 50%


Senior Threat Intelligence Advisor
CrowdStrike, Tokyo, Japan

Feb 2019 – Current

Serve on a global team entrusted with empowering sales of CrowdStrike’s world renowned, best-of-breed, government-grade threat intelligence. Guide customers on operationalizing and integrating threat intelligence within their organizational security strategy, demonstrating the value threat intelligence provides in today threat landscape. Present on a variety of intelligence and security themed topics at various global security conference and events. Conduct interviews with Japanese news media on the global threat landscape, nation state threat actors, geopolitical activity exploiting cyber, and foreign cyber security news. Evangelize the power threat intelligence offers governments, critical infrastructure operators, industry, and more. Primary focus is the Asia-Pacific Japan (APJ) territory. Working towards achieving world domination one threat intelligence report at a time.

Executive Vice President
AFCEA 東京 TOKYO, Tokyo, Japan

May 2014 – Current

Currently serve as the Executive Vice President, and previously served as the President, of AFCEA 東京 TOKYO, a fully volunteer not-for-profit organization, directing the Executive Committee and all facets of chapter operations. Ensure the organization meets stated goals and existing mission requirements, provides necessary STEM educational opportunities to members, grow chapter membership, and presents an enjoyable and valuable experience for all members and attendees. Engage with high-level US and Japanese military, government, industry, and academic personnel to secure speakers to provide monthly seminar. Overall responsible for the coordination of Tokyo TechNet, a yearly conference held at The New Sanno Hotel. Developed the plan and led the team responsible for the most successful Tokyo TechNet event in chapter history in 2015, which saw more than 2000 attendees visit the event throughout the three day conference,

Senior Security Advisor
McAfee KK, Shibuya, Japan

Feb 2013 – Feb 2019

Infuse an enriched hybrid of high-level governmental cyber security policy development, thought leadership, evangelism, and technical savvy for the Intel Security Japan Cyber Strategic Initiative Office. Apply firsthand experience governing U.S. Department of Defense and cross-government information systems, as well as expertise architecting and administering defense-grade security frameworks, to deliver robust cyber security solutions and capabilities centered around the Threat Defense Lifecycle product portfolio. Primarily focus on the Government of Japan, especially the Japanese Ministry of Defense, with additional emphasis on Japanese critical infrastructure, media, telecommunications, and manufacturing industries.

  • Directed a Sales Engineering team responsible for a US$10m Security Information and Event Manager deal for Japan’s Ministry of Defense, the largest ever SIEM sales deal in McAfee history
  • Regular keynote speaker, panel moderator, and panelist at multiple major Tokyo-based cyber security seminars from 2013-2018, to include Interop, Cyber3, Keio Cyber Security Symposium, focusing primarily on influencing the Government of Japan agencies to adopt stronger, resilient cyber security and threat intelligence capabilities
  • Led a 4-person McAfee team responsible for developing, and delivering recommendations for a Government-mandated cyber security framework for Japanese critical infrastructure, specifically the electric power industry, which was ultimately adopted by the Ministry of Economy, Trade, and Industry (METI)
  • Key member of a 4-person McAfee team responsible for assisting the largest Japanese electric power company increase their cyber security capacity through global research engagements with peer electricity utilities and regulatory agencies, leading to multiple US$2.0m multi-year professional services and consultation contracts

Chief, Cyber Security
Department of the Navy, Fussa, Japan

Apr 2008 – Feb 2013

Headquarters United States Forces Japan Chief of Cyber Security, responsible for complete oversight, administration and execution of the Information Assurance program and bilateral Information Assurance relationship. Supervise a staff of two Department of Navy civilians and one senior Air Force personnel. Highly sought after Subject Matter Expert (SME) conducting bilateral operations with U.S. and Japanese IA professionals. Sole USFJ Cyber Security representative on the Bilateral Information Security Consultation (BISC) Cyber Defense Working Group, a high-level U.S. Embassy Tokyo led, bilateral information security effort between the United States Government (USG) and the Government of Japan (GOJ). Developed and implemented the principle policies promulgating Japan-wide cyber security standards for the U.S. military.

  • U.S. Co-Chair of the DoD-CIO Information Assurance Working Group (IAWG) between U.S. and Japan. Single-handedly reinvigorated a stale bilateral relationship, leading to increased IA information sharing between U.S. Department of Defense and Japanese Ministry of Defense
  • Directed a 4-person network security team responding to a high-visibility incident, providing on-site network analysis, methodically mitigating an imminent threat to DoD network assets & data
  • Developed a comprehensive implementation plan in support of 21 bilateral mid- and long-term cyber security milestones designed to strengthen the GOJ information assurance posture
  • Led the installation of Host-Based Security System (HBSS) on two USFJ networks, deploying the McAfee Agent (MA) on 500+ workstations and 40+ servers and configuring all necessary policies
  • Sole cyber security architect responsible for the engineering, installation and day-to-day administration of six McAfee Enterprise Firewalls, and other network perimeter security devices
  • Single-handedly engineered major network security upgrades using McAfee Enterprise Firewall, Nitro SIEM, and Sourefire IDS’s after being awarded $2.3m from the Chairman, Joint Chiefs of Staff
  • Regularly provide security briefings to USFJ senior leadership and staff, high-ranking U.S. Government and Government of Japan officials, and Japan Ministry of Defense personnel

Senior Information Systems Engineer
MTC Technologies, Fussa, Japan

Dec 2005 – Apr 2008

Adept, multi-talented, technically savvy Information Assurance Manager with unparalleled vision and leadership. Highly energetic, self-motivated engineer capable of making hard decisions which have allowed United States Forces Japan (USFJ) to remain on the cutting edge of Information Security technology. Support and administer technical and administrative security initiatives for multiple networks utilized by USFJ. Directly responsible for the daily administration of three network perimeter security suites. Installed six (6) newly positioned McAfee Sidewinder firewalls, Blue Coat Web Proxy Server, Sourcefire IDS/IPS, and a myriad of other technical controls designed to prevent the unauthorized access to network resources and protect DoD information. Oversee regulatory policy audits and vulnerability assessments.

Supervisor, Security Operations Center
CSC, Yokosuka, Japan

Jul 1999 – Dec 2005

Provide dynamic vision, leadership, and decision making to develop, support, and administer security initiatives and systems. Direct planning, implementation, and support of enterprise systems with infrastructure of 100+ Windows 2003/2000/NT servers, Cisco routers and switches, and Marconi ATM switches. Supervised a staff of ten 24/7/365 Security Operations Center analysts responsible for monitoring and administering multiple network perimeter security devices deployed across the entire Far East region. Established the chief written guidance on baseline security and assurance of regional IT systems.

Co-Founder & President
deviantART, Inc

Aug 2000 – Mar 2005

Co-Founded the most successful online art community in internet history. Developed the idea for the site, single-handledly implementing and launching deviantART in August 2000. Created, designed, developed, and architected the initial framework upon which deviantART operated during the first three years of the life of the site. Responsible for all HTML, CSS, PHP, and MySQL code written during the first three years deviantART operated. Steered the deviantART ship in the direction both the business and the community required in order to grow organically, employing various viral marketing techniques.

U.S. Navy Petty Officer First Class
Yokosuka Naval Base, Yokosuka, Japan

Aug 2000 – Mar 2005

U.S. Navy Petty Officer First Class Technical Control Radioman. Primarily responsible for all ship-to-shore and ship-to-ship telecommunications, established telecommunications circuits between various ship and/or shore facilities, and management of encryption keys and devices. Additionally, led an effort to establish and install one of the first network security suites protecting NIPRNET and SIPRNET shore-based assets using HP-UX and Gauntlet Firewall. This was part of a pilot program, which was deemed successful and because the basis for all network security suites deployed Navy-wide in the late 1990’s.


Certified Information Systems Security Professional #92020

CCNA, Cisco
Cisco Certified Network Associate

Top Secret/SCI Security Clearance
U.S. Department of Defense