Hi, my name is

Zach.

I am a Cybersecurity Network Engineer

I am a cybersecurity network engineer with a strong focus on network perimeter and manufacturing operational technology. After achieving major accomplishments in managing and securing a global enterprise network, I have gained a wealth of experience in network architecture and security. Currently, I am a Operational Technology (OT) Security Specialist at Eaton.

Please reach out to discuss anything networking or security related!

About Me

I am a cybersecurity expert who specializes in both Networking and Operational Technology (OT). I have years of both professional experiences and personal study relating to network infrastructure and cyber security. My goal is to always strive and complete my best work to ensure security and quality. A significant portion of my free time is spent researching new vulnerabilities in the wild to always ensure I am one step ahead of threat actors. I also utilize enterprise architecture and security within my own life to test new solution and reinforce best practices.

My most recent accomplishment was architectonic and implementing the network infrastructure for Eaton.com

Here are a few technologies I've been working with recently:
  • Python
  • Checkpoint
  • F5 Networks
  • Dragos
  • Modbus

Experience

Operational Technology Security Specialist - Eaton
July 2021 - present

I am currently working for Eaton to secure their manufacturing Operational Technology (OT) environment.

Specialist - Operational Technology (OT) Security | June 2024 - Present

  • Implement OT monitoring and alarming for over 220 unique manufacturing plants.
  • Define the OT and IT boundaries at manufacturing plants.
  • Segment OT in production on flat unsegmented networks into the Perdue OT Model
  • Research emerging OT threats to implement proactive solution to mitigate threats and ensure uninterrupted operation.

Lead Analyst – Infrastructure Security Engineering | July 2022 – June 2024

  • Support and engineer new security solutions for the enterprise network infrastructure.
  • Subject matter expert (SME) for F5 load balancers responsible for external web presence and product applications.
  • Manage internal and external Bind DNS servers for all domains owned by Eaton.
  • Deploy Checkpoint firewalls for manufacturing sites and operation technology micro segmentation.
  • Analyze unsegmented production OT traffic with packet captures and network analysis tools to determine legitimate business traffic.
  • Create automation tools using Python and Ansible to streamline mass analysis and deployment of new segmented networks.
  • Segment and secure Eaton’s public cloud resources and facilitate secure access for users and customers.

Cyber Security Incident Response Analyst (Leadership Development Program) | July 2021 – July 2022

  • Respond to alarms reported by security operations center and remediate cyber security incidents.
  • Identify vulnerabilities and collaborate with application owners to patch or secure vulnerability applications.
  • Reverse egineer malware using sandox execution and decomplication to identify threat actors and intended targets.
  • Research threat actors and report known cyber-attack campaigns to business leaders.
Network Support Engineer - Cisco Meraki
May 2020 - Aug 2020

Internship with Cisco Meraki before my senior year of college. This took place fully remotely during the height of covid. In spite of being remote, this internship provided me with one of the best working experiences I have had to date.

  • Communicate with customers to troubleshoot and provide support for Meraki’s products and solutions.
  • Work with Meraki’s core products including MX firewalls, MS switches, MR wireless access points, and MV smart cameras.
  • Analyze packet captures to determine network traffic flow and identify problematic network behavior.
  • Narrow complex network problems and isolate the issue to certain domains or segments of the network.
  • Review customer network topologies to make the best proactive recommendations for customers to mitigate network failures, downtime, and security compromise
Lead Business Technician - Mikes Computer Rescue
Aug 2019 - July 2021

Local computer repair shop I worked at while in college. I started with years of prior experience repairing computers and other electronics in my free time. During my employment, I utilized my networking and system administration skills to eventually manage all small business MSP contracts.

  • Troubleshoot computers and electronics brought into the storefront and perform the necessary repairs to restore desired functionality.
  • Translate intricate technical issues into accessible and easily understandable concepts for customers.
  • Create automated troubleshooting tools and processes to increase repair throughput.
  • Manage business customer with MSP contracts.
  • Install structured cabling, networking infrastructure, workstations, and printers on-site.

Education

2016 - 2021
Bachelor of Science in Computer Information Systems – Cyber Security
The University of Akron
GPA: 3.8 out of 4.0

Areas of Study

  • Cyber Crime
  • Computer Forensic
  • Advance Unix/Linux System Administration
  • Router and Routing
  • Switching and Wireless
  • Firewall and Network Security
  • Scripting and Coding for Cybersecurity
  • Cryptology

Projects

Home Lab
Networking Selfhosted
Home Lab
An enterprise grade networking running in my home used for learning and implementing new technologies. Currently selfhosting file sharing and media services utilized by friends and myself.
Portfolio Website
Cloud AWS Selfhosted
Portfolio Website
This website that is hosted in an AWS S3 bucket and served through Cloudfront. Built using Hugo static website engine and managed through a git repository. I am by no means a UI/UX designer, but I take pride in managing and hosting publicly accessible applications securely.
Checkpoint Gateway Configuration Automation
Checkpoint Firewalls Python
Checkpoint Gateway Configuration Automation
A python script developed to streamline and programmatically make changes to over 500+ Checkpoint security gateways in an constantly changing enterprise environment. The script utilizes the Checkpoint Management API to query all gateways in the environment. The script will then use the data pulled form the API to make programmatic changes for new standards and technologies being deployed in the enterprise.

Get in Touch

I’m always happy to meet new people. Please reach out!