top of page

Michael J. Schenck

Certified Cybersecurity Expert

Home: Welcome

“It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it.”

― Stephane Nappo

Home: Quote


Upward and Onward

Throughout my career, I’ve had the great fortune to work with remarkable people and in some of the more challenging environments.  I was blessed to break-in to Information Technology service supporting the United States Air Force as a contractor - finally turning both my hobby and passion into a career.  The nature of the industry transformed my work into the niche of Information Assurance and Cyber Security.  After 11 years of work in the Defense and Aerospace industry, I moved into the commercial and private sectors bringing a wealth of expertise in Compliance and a focus on Confidentiality, Integrity, and Availability.  These are the foundations to protect businesses like yours from all the threats that haunt cyberspace.

Home: About
Home: Work

Professional CV

Work Experience

Home: CV

Director of Security Services

July 2018 – June 2020

  • In the first 3 months, I developed and implemented a new security baseline based on NIST CSF and CIS-CSC-20 and met compliance requirements for PCI-DSS, HIPAA, and NYS-DFS, and completed two internal risk assessments.

  • Engineered and oversaw the implementation of an enhanced security for all Cloud Services including Microsoft 365, Azure Active Directory, InTune, Cisco Meraki, Google Cloud Services, G-Suite, and Exchange Online.

  • As a startup division, I created the full suite of solutions and packaged to be offered to clients, including Vender Management reviews and selection of preferred vendor partnerships, focusing on NIST CSF, CIS-CSC 20, and all major GRC requirements.

  • Managed a team with members from every department and division to deliver superior managed security services in collaboration with 3rd party vendors, partnering with client executives and stakeholders to ensure everyone was working towards the same goals.

  • Published several articles, blogs, and whitepapers on current affairs and topics such as IoT, Ransomware, and the unique threats that MSP’s and MSSP’s face.  I was also interviewed and quoted for a Vox Recode article on Ring Doorbell.

Sr. Systems Administrator

March 2014 – June 2018

  • On Day 1, I was put in charge of a rollout of a Virtual Desktop Infrastructure (VDI), working alongside of the vendor to deploy the solution using Citrix, VMware ESX, NetScaler, and Microsoft App-V

  • I volunteered and took charge of the projects both for the division and corporate-wide to meet or exceed compliance with NIST SP 800-171 as revised.  This project included a full map and gap risk assessment, vendor selection and management for SIEM, Endpoint Encryption, and Multi-Factor Authentication, endpoint and network threat hunting solution deployment, templating the written security policy, plans and procedure, and configuring default domain policies.

  • Collaboration with other corporate divisions and chosen vendors improved company synergy and saved 1.5mm over 5 years plus hundreds of man-hours to fully comply with NIST SP 800-171.

  • Overhauled division network infrastructure, managing a competitive bid for wired network, wireless network, and storage network.  This project ensured continued security and resolved numerous concurrent and compounding problems that impacted performance of all employees.

  • Managed and oversaw multiple endpoint and server operating systems upgrade and replacement projects, virtualizing over 40 servers across two locations and saving thousands in hardware expenses.  Also reduced annual operational expenses by reconfiguring the network so that both offices routed through the same security appliance stack.

  • Received Multiple internal “You Make a Difference” commendations for going above and beyond and a “Quality Improvement Award” for making suggestions on operation improvements which lead to action taken by the company.

Computer Systems Security Officer 3/Information Systems Security Manager

August 2009 – February 2014

  • Implemented, Managed, and Maintained Approval to Operate accreditation for over 100 classified computers across a dozen standalone networks, and was authorized to self-approve additional systems with the same specifications.

  • Keynote Presenter for a local defense and aerospace industry group on cyber security matters, with an audience of technical and non-technical security officers.

  • Wrote a script in Visual Basic to perform baseline configuration tasks addressing over 400 security controls as registry settings, reducing configuration time by over 12 hours, then further refined the script by migrating it into a VB.Net compiled program which completed all configurations in less the 15 minutes, saving over 16 hours per computer.

  • Managed and directed an internal investigation of a major physical security breach that included my supervisor with daily reporting to the division security director. Also provided debrief special agents from the FBI, NCIS, Defense Security Service, and an undisclosed agency.

  • Went back to College and finished my Bachelor’s in Business Information Systems, I also received my ISC2 Certified Information Systems Security Professional certification

PC/Network Support Technician III/II

April 2007 – June 2009

  • Developed and assisted in the implementation project to reimage and deploy over 8000 unclassified PCs for the 88th Air Base Wing and the Air Force Material Command Headquarters, directing peers and Air Force Non-Commissioned Officers to complete the initial 6000 new computers in 3 weeks.

  • Utilized Windows Deployment Services to modernize the maintenance and deployment for the endpoint golden image, reducing new system imaging to 30 minutes for fully patched system ready for use, saving 16 hours per batch.  Gold image was then authorized by a Lt General for use base-wide for over 24,000 unclassified PCs.

  • Maintained 98% client satisfaction and was a top 3 performer in tickets closed.

Home: Image
bottom of page