Summary
Overview
Work History
Education
Skills
Affiliations
Timeline
Generic

Mark John Scott-Paton

Falmouth

Summary

Quality focused, detail-oriented Information Technology professional with over 25 years’ experience in systems design and support. A good team player who is willing to go “that extra mile” when necessary to ensure completion within agreed timescales. Supportive of colleagues, takes full accountability for tasks, meticulous in detail and fully communicative, both written and verbally. Often the main point of reference for problems. I have been designing and implementing Security Network Platforms for several years within multiple organizations and have built up a good reputation for designing highly secure networks. While working for LSEG I undertook the redesign of the new DC's and eDMZ and EPP Platforms to prevent data loss and increase customer experience and reputation. BeyondTrust was able to provide and utilize any number of authentication factors commensurate to the level of risk: Use contextual data (e.g., location, network, device, resource requested) to determine level of risk. Set policy that steps authentication requirements up or down based on context. Provide authenticating users options including mobile device, email, SMS, YubiKey, desktop application (Office365 & Hybrid Skype for business) Quest RMAD because of its cloud architecture Identification as a Service (SaaS) provided: Full AD & Forest Backup & Recovery Quest Enterprise Reporter for AD Health Checks & Reporting Strutctures Quest Change Auditor for its AD change analysis . LSEG have now employed my design across all of their organizations worldwide. A pro-active person, comfortable with taking initiative with a focus on customer care. Has formed good working relationships with external suppliers. Excellent client facing skills having dealt with some of the largest companies across various sectors. Always looking to expand his skills in a fast moving, challenging and rewarding environment whereby employing knowledge and experience whilst aiding supplier relationships and maintaining a strong technical focus. Company: London Stock Exchange Group Position Senior Cyber Security Architect (Network & Security)

Overview

14
14
years of professional experience

Work History

Network Specialist

London Stock Exchange (LSEG)
10.2021 - 04.2023
  • Working on the migration of legacy environments to a NEW Zero Trust environment using NSX-T & Cisco ACI
  • Specifically focusing on two strategic projects
  • Technologies covered:
  • Creation of a new AD Backup and Recovery Environment using Quest RMAD Suite of Products
  • Creation of a new EndPoint Protection Suite and pumped out to over 17k Windows devices
  • Microsoft Azure Cloud build out with Defender and Security Tooling
  • Key Skills for the role were as follows;
  • Inter Connectivity experience between cloud and legacy applications
  • Design, guidance and support of Network topics such Kubernetes and Terraform for automation
  • Experience in network Architecture during Cloud migration scenarios
  • Detailed understanding of Network architecture in the Cloud and its interactions with applications sets, capacity planning
  • Support and configuration of Network devices (Firewalls, DNS, IP-Routing)
  • Azure Cloud Environment
  • Microsoft Defender with connectors for AD, Endpoint, Cloud-Applications
  • DFE, DFCA and the whole Defender suite of products including reporting and analytics that imported their finding in Sentinel for a local Cloud SIEM environment
  • Intercommunication at all levels with good stakeholder skills across technical to board level
  • Design, Configuration and support of Azure Cloud Platform and the interconnection between this and legacy systems in the context of networks
  • My role in LSEG was to design and create a new security tooling environment on the Azure platform that is to become the basis of the new Security Control Plane
  • The new platform created a more secure threat prevention/defense landscape that mitigates the risks of the attack vector and creates a series of steps to automate their recovery/defense using automated security orchestration and processes
  • Part of the role was to define a series of steps:
  • Threat hunting hypothesis facilitates a proactive cyber defense routine
  • One of the many variants of the latter consists of:
  • Predicting adversary behavior
  • Suggesting ways to find a threat
  • Detecting anomalies, intrusions, baseline/threshold hits
  • Studying event correlation
  • Testing samples in sandboxes, honey pots, and emulated environments
  • Documenting results
  • Improving the protection of assets and infrastructure
  • Performing mitigation
  • Informing senior management and/or authorities (if applicable)
  • Threat hunting hypotheses can be operational, like the examples above, or tactical and strategic
  • Seasoned Threat Hunters can formulate broader hypotheses that can nevertheless result in finely targeted tests
  • To do that, they need to include:
  • Domain expertise – having experience, sharing knowledge
  • Situational awareness – knowing internal infrastructure, vulnerabilities, core assets
  • Intelligence – pulling threat intelligence data like IOCs and TTPs
  • Apply any or all of the above to formulate a deeply analytical hypothesis about what systems attackers will target and what they will try to achieve
  • Negative findings will require a risk to be signed off by the business, this identifies the threat, documents the processes/procedures that need to be adhered to
  • Connection of the TAXII threat intelligent feeds directly into Microsoft Sentinel SIEM
  • How to identify additional tooling’s that may or may/not be required for short term (tactical) practices for a more strategic landscape
  • How to work out if they are tactical or strategic the following methodology can be used:
  • Take a risk-based approach
  • During the evaluation of the Security toolsets, It is worth taking the time to create a risk based matrix to define the risk that the company is able to accept
  • It includes the budget for the tool sets and how they deliver the security posture
  • While this is not a rule that is set in stone, it is a good one to review as you start any evaluation
  • Defining requirements
  • Take time to map out the high-level requirements for an optimal solution to meet the defined use cases
  • Classify any “must-have” vs
  • Nice to have” features
  • Also, be sure you align whatever technology you’re evaluating into how it fits within and integrates into your current tech stack, as well as what the current team can support
  • Keep in mind any involvement needed from server teams, network teams, helpdesk, etc not just the security team
  • This exercise can quickly help eliminate non-qualified solutions from any short list
  • And the less time you spend on vendor demos, the faster you can get to actual solution testing
  • Create a test plan
  • Most vendors have POC evaluation criteria that can be leveraged as a starting point, and solution providers like GuidePoint Security can share additional examples
  • As part of this process, you’ll want to follow a consistent methodology so that you can quickly score solutions side by side
  • Limit the scope
  • Defining requirements should help you limit the number of solutions that are tested
  • As a rule of thumb, I generally recommend that we perform a deep dive testing of no more than 2-3 solutions after a detailed requirements review
  • Leverage existing resources
  • Find and use existing comparison documents where possible to speed up this effort
  • Analyst reports can help here, but they aren’t bulletproof
  • Work with current partners and industry peers to see what they have on hand
  • No need to recreate the wheel
  • Also, push vendors to do deep dive demos tailored to stringent use cases rather than unnecessary bland POCs
  • Pilots are better than POCs
  • Where possible, test in controlled, isolated areas of production rather that solely in a lab
  • Lab POC testing is fine, but many times this limits the amount of actual integrations you can test, such as Active Directory Integration, SIEM, architecture integration, etc
  • Again, controlled and isolated is the key phrase when testing in production
  • Don’t take your network down testing a new tool.

Senior Cloud Architect

CARR - California
08.2021 - 10.2021
  • The US CARR system creates a real time update service for travellers across California detailing all blockages, road closures and Caltrans road repairs in real time
  • The data is served from SQL databases using the following architectural overview
  • Overview
  • Azure has many native geospatial capabilities
  • First, you have the data source, or ingestion step, basically a place where the data is stored, transformed, served, published, and finally consumed
  • The Azure architecture flow assumes that the data originates from databases, files or streaming sources and is not stored in a native GIS format
  • Once the data is ingested with Azure Data Factory, or via Event Hubs and Stream Analytics, it could then be stored permanently in warm storage with Azure SQL, Azure SQL Managed Instance, Azure Database for PostgreSQL or Azure Data Lake Storage
  • From there, the data can be transformed and processed in batch with Azure Batch or Synapse Spark Pool, of which both can be automated through the usage of an Azure Data Factory or Synapse pipeline
  • For real-time data, it can be further transformed or processed with Stream Analytics, Azure Maps or brought into context with Azure Digital Twins
  • Once the data is transformed, it can then once again be stored for additional uses in Azure SQL DB or Azure Database for PostgreSQL, Synapse SQL Pool (for abstracted non-geospatial data), Azure Cosmos DB, or Azure Data Explorer
  • Once ready, the data can be queried directly through the data base API, but frequently a publish layer is used
  • Another option was to use Azure Maps in Power BI
  • Lastly, HoloLens and Azure Spatial Anchors can be used to view the data and place it in the real-world for virtual reality (VR) and augmented reality (AR) experiences.

Senior Cloud Architect (Network & Security)

MediaMarkt Saturn
10.2018 - 08.2021
  • Working on designing a new SDN network and currently supporting the current SDN network deployment to provide a scalable platform for the development of the business needs of the client
  • Technologies covered:
  • Cisco ACI Multi-Tenancy Environment using Cisco 9K and associated leaf switches both in ACI and NS-OX format for the creation of VXLAN for cross DC interconnects
  • With an VMware NSX overlay to provide virtualization/configuration and flexibility at layer 4-7 of the OSI model
  • Cisco UCS & UCS Manager
  • Next Generation Firewalls, using Checkpoint & Palo Alto
  • MS Azure, GCP & AWS Cloud Platforms
  • DMZ & Access networks implementation including Administrator training for client staff for the external Firewalls and for the internal security devices
  • Key Skills for the role were as follows;
  • Inter Connectivity experience between cloud and legacy applications
  • Design, guidance and support of Network topics such Kubernetes and Terraform for automation
  • Experience in network Architecture during Cloud migration scenarios
  • Detailed understanding of Network architecture in the Cloud and its interactions with applications sets, capacity planning
  • Support and configuration of Network devices (Firewalls, DNS, IP-Routing)
  • Intercommunication at all levels with good stakeholder skills across technical to board level
  • Design, Configuration and support of Google Cloud Platform and the interconnection between this and legacy systems in the context of networks.

Senior Solutions Architect

Liberty Global, Virgin Media
04.2018 - 10.2019
  • Working on designing a new SDN network and currently supporting the current SDN network deployment to provide a scalable platform for the development of the business needs of the client
  • Technologies covered:
  • Cisco ACI Multi-Tenancy Environment using Cisco 9K and associated leaf switches both in ACI and NS-OX format for the creation of VXLAN for cross DC interconnects
  • With an VMware NSX overlay to provide virtualization/configuration and flexibility at layer 4-7 of the OSI model
  • Cisco UCS & UCS Manager
  • Next Generation Firewalls, using Checkpoint & Palo Alto
  • MS Azure, GCP & AWS Cloud Platforms
  • DMZ & Access networks implementation including Administrator training for client staff for the external Firewalls and for the internal security devices
  • My role was to design and support a new SDN Data centre project and support the introduction of new platforms by creating a complex migration and implementation plan for a heterogeneous network environment within a multi-tenancy environment and with a focus on end-to-end connectivity and inter-connectivity between disparate systems/platforms
  • The role required experience in Cisco Data Centre equipment, including Cisco Nexus Switches, Cisco Firewalls (ASA), Checkpoint, Palo-Alto, Fortigate Firewalls and, and Cisco Technology such as VXLAN
  • Working in the Finance, Defense and Government sectors.

Senior Solutions Architect

Dimension Data
08.2017 - 11.2017
  • Working on their single largest Government client to design a new SDN network to provide a scalable platform for the development of the business needs of the client
  • Technologies covered:
  • Cisco ACI Multi-Tenancy Environment using Cisco 9K and associated leaf switches both in ACI and NS-OX format for the creation of VXLAN for cross DC interconnects
  • Cisco UCS & UCS Manager
  • Next Generation Firewalls, using Checkpoint & Palo Alto
  • DMZ & Access networks implementation including Administrator training for client staff for the external Firewalls and for the internal security devices.

Senior Solutions Architect

04.2016 - 08.2017
  • I have work for various clients on an ad-hoc consultancy basis and covering staff leave etc
  • I have been able to provide support, consultancy, and engineering expertise across a multitude of platforms and manufacturer
  • Specializing in SDN/NFV technologies (ACI & NSX) for hardware segmentation of physical platforms (Cisco ACI) and then the micros segmentation of the virtualized environments using VMWare NSX suite of products
  • My role was to design and support a Data Centre network and support the platform by creating a complex migration and implementation plan for a heterogeneous network environment
  • The role required experience in Cisco Data Centre equipment, including Cisco Nexus Switches, Cisco Firewalls (ASA), and Cisco Technology such as VXLAN
  • Working in the Finance and Government sectors
  • Technologies covered:
  • Cisco ACI Multi-Tenancy Environment for a Government G-Cloud supplier using Cisco 9K and associated leaf switches both in ACI and NS-OX format for the creation of VXLAN for cross DC interconnects
  • Cisco UCS & UCS Manager for a prominent law firm
  • Security architectures, Cisco ASA, Checkpoint VSX/VSLS using 13500 security devices, for both external and internal users across multiple sites
  • DMZ & Access networks implementation including Administrator training for client staff for the external Firewalls and for the internal security devices
  • Troubleshooting a new voice implementation for a large 3 site Health company.

Senior Solutions Architect

Fujitsu Network & Telecommunications
08.2015 - 04.2016
  • My role consists of providing technical consultancy to various Fujitsu Government clients and end-users to implement and deploy new technologies
  • Technologies covered:
  • Cisco ACI Multi-Tenancy Environment for HMRC/Government G-Cloud using Cisco 9K and associated leaf switches both in ACI and NS-OX format for the creation of VXLAN for cross DC interconnects
  • Cisco UCS & UCS Manager
  • Working with MoD on the DII project as part of the ATLAS consortium
  • Multi-Tenancy Cloud Development for Commercial Customers, using, AWS, vCloud and Cisco’s Intercloud providing SaaS, IaaS for public and private clouds
  • Security architectures, Cisco ASA, Checkpoint VSX/VSLS using 13500 security devices, Bluecoat to create an accredited SEGWAY for both external and internal users across multiple sites
  • EDMZ & Access networks HLD & LLD documentation including Administrator documentation for the external Firewalls and for the internal security devices
  • Role consists of the following:
  • Analysis of networks to identify suitable deployment locations
  • Build, Test and validation of the design and deployment
  • Working with other infrastructure teams to specify requirements and collaboratively design the solution required
  • Completing technical governance / standards processes
  • Deployment of the Gateway devices including the Cisco ASA and Checkpoint devices and performing the initial installation, configuration and created the rule bases for their usage and associated infrastructure physically and logically
  • Knowledge transfer of the entire architecture both written, verbal and in a workshop environment.

Network Architect

Empowered
07.2015 - 08.2015
  • My role consists of providing technical consultancy to various empowered clients and end-users to implement and deploy new technologies
  • Technologies covered:
  • Cisco CUCM for the Gloucestershire Police - 3,400 seats
  • Cisco UCS & UCS Manager
  • Security architectures, Cisco ASA security devices and F5 Remote Access points providing a secure VPN landing point for remote access
  • EDMZ & Access networks HLD & LLD documentation
  • Role consists of the following:
  • Analysis of networks to identify suitable deployment locations
  • Build, Test and validation of the design and deployment
  • Working with other infrastructure teams to specify requirements and collaboratively design the solution required
  • Completing technical governance / standards processes
  • Deployment of the Gateway devices including the Cisco ASA and F5 devices and performing the initial installation, configuration and created the rule bases for their usage and associated infrastructure physically and logically.

Network Security Architect

QinetiQ
06.2015 - 07.2015
  • A role that was cancelled 5 weeks into the contract due to a lack of funding when one of their largest clients (Ministry of Justice) cancelled the contract that funded my role.

Security and iCloud Architect

Glu Reply
08.2014 - 07.2015
  • My role for Glue is looking after one of their largest retail clients (Sainsbury’s Supermarkets) and designing new networks based on defined customer requirements and also to create a new strategic roadmap for the adoption of new technologies and architectures
  • I was tasked with creating a secure MFA mechanism for the POS systems within the stores and also for the key risks of phishing, web app attacks and point-of-sale intrusions within their e-commerce environment
  • I was able to identify that the financial motivations dominated the reasons behind security breaches, and also identified that POS intrusions remained a key vector of attack coupled with the use of stolen credentials to access the organisations POS environments was significant
  • As part of the creation of a new SEGWAY eDMZ environment, it was key to protect the credentials and customer data flowing through it and it was with that in mind that I introduced Multi-factor Authentication and PingOne into the retailer
  • This allowed me to design a better defense and an enhanced customer experience whilst not compromising the security and compliance regulations that needed to be enforced
  • Technologies covered:
  • VCE VBlock Systems (VM Environment built on Cisco UCS platforms)
  • Storage architectures
  • EDMZ & Access networks HLD & LLD documentation
  • ACI, CA, CPPM, PingOne, Avamar, Splunk, ADFS3, Cisco Nexus 9k, Bluecoat CAS Proxy, LanCope Netflow Collector, Cisco ASA 5585 (software revision 9.4 and moving to 9.6), Checkpoint 13500 (VSLS), VMware ESXi 5.5 built on Cisco UCS Server platforms, Juniper MAG4610, InfoBlox Grid (DNS/IPAM)
  • Lync Enterprise Voice (Hybrid) Design 12,500 seats.

Multiple – Private, Hewlett Packard
10.2012 - 08.2014
  • I have a number of freelance clients (Government, Financial & Security) who have requested design, consultancy and configuration support across their infrastructures on an ad-hoc basis covering both national and internal sites
  • Client Profiles:
  • MoD (Army, RAF & Navy) Cisco UCS install and configuration
  • Global Aerospace
  • Paratus
  • London City Airport
  • Jaguar / Land Rover Cisco UCS & Manager - Install and configuration
  • WSH Group
  • SNAP
  • SCC
  • Softcat – CUCM installation for numerous County Councils – 8,000 seats in total
  • Roles:
  • Lead troubleshooting efforts with multiple vendors to resolve design issues and bring pre-production certification environment back to a functional state
  • Performed packet captures via Wireshark when needed to provide outside vendors packet level analysis data required to troubleshoot complex data flow related issues
  • Created required network diagram and documentation deliverables to document all physical, Layer2 logical, and Layer3 IP details
  • Various Security device configurations and rule set changes working within change control windows and liaising with multiple client and customer network staff, from financial and retail/commercial environments.

Enterprise Architectural Consultant

Thrupoint
07.2009 - 02.2012
  • My role within Thrupoint is to look after and manage one of their largest carrier customers providing a wide range of access mediums including Ethernet access, Fixed Broadband Access, MPLS transport networks, I managed a team of 6 engineers and interface with the customer to backfill the data configuration team with the migration from their legacy MPLS network onto the new MSP (Alcatel 7750 & 5620 SAM routing platforms, 7450 ESS 7 & 12 slot chassis switching platforms) or fixed broadband networks within the Cisco based BRAS powered Thus DSL network segments (with over 60,000 subscribers) using Cisco DSL routers for the fixed broadband offering within their client markets place
  • Working and coordinating both day and night work programs to ensure efficient usage of the engineering team and to remove the problems of downtime when migrating circuits and clients from MPLS to MSP platforms
  • The 4GLTE standard is the System Architecture Evolution (SAE), using Cisco 7500, Nexus 7k, 5k and 2k’s switches, Alcatel 7750/7450 ESS7 & 12 switch/router working with both Alcatel, Ericsson and Samsung integrating the new technology into the existing network architecture involving OSFP/BGP and RIP – Which is a flat IP-based network architecture designed to replace the GPRS Core Network and ensure support for, and mobility between, some legacy or non-3GPP systems
  • Such as GSM, cdmaOne, UMTS, and CDMA2000
  • The design of all back-haul systems using SDH/SONET and MANs (Microwave & Fixed cable) for the transport of all customer data to and from the cell sites
  • My role included the creation of the configurations used within the Lab and Production network environment prior to their roll out in the production environments
  • As part of my role I was tasked with migrating from existing estate to the new environment and working with the ctel, Cisco and hosen vendor to provide migration plans and schedules
  • Functioned as Technical Lead for Network Vision (4G LTE) migration project leading a team of twenty engineers at any one time
  • Special Projects Lead; responsible for project execution from initial design and deployment efforts to certification environment implementation
  • Responsible for management of outage resolution, firewall requests, and execution of NPL (Network Planning Letter) requests
  • Primary point of contact for network modernization projects requiring coordination and workflow management with multiple vendors selected for the project as well as Sprint internal project management
  • Implement MPLS Layer 3 VPN configurations for vendor lab environments including MP-BGP integration across the VPNs as required
  • Lead troubleshooting efforts with multiple vendors to resolve design issues and bring pre-production certification environment back to a functional state
  • Primary point of contact for creation and validation of firewall policies required for traffic flows related to Airave FemtoCell Phase II and Network Vision projects
  • Responsible for IP transport design, implementation, and troubleshooting required for Airave FemtoCell Phase II and LTE vendor selection projects
  • Created required network diagram and documentation deliverables to document all physical, Layer2 logical, and Layer3 IP details
  • Managed Cisco TAC and Juniper JTAC cases related to both troubleshooting and RMA processing needs
  • Performed packet captures via Wireshark when needed to provide outside vendors packet level analysis data required to troubleshoot complex data flow related issues
  • Assisted as needed with VPN connectivity establishment and troubleshooting
  • Manage troubleshooting of packet flows across MPLS backbone
  • Work with Data Network Design team as needed to ensure vendor transport requirements are adequately met in the published design specification document and advise on proper design for any connectivity requirements that have not been properly addressed
  • GE Asset Management was the creation of a new dual data center environment using the Cisco Nexus 7010, 5k and 2k devices utilizing Cisco OTV for the distribution of a citrix farm between the two data centers for the support of their critical application sets
  • My role consisted of the design and project management of the migration from the existing estate to the new estate; the planning and distribution of all SAN architectures/server clusters and application servers across the new environments
  • Each of the technologies from the legacy estate was tech refreshed using fit for purpose criteria and as such I was involved in all BoM’s and hardware/software used within the new design
  • I was employed as a Cisco (Red badged) consultant and was given an agnostic design brief to create the right network environment for the GE Asset management business model
  • Technology covered is Cisco, Juniper and Alcatel range of switches including the Cisco’s Nexus 7k, 5k, 2k and 1k range of switches, CRS, ASR, XR series routers and Juniper’s M, J, E, JCS and T series of routers
  • Cisco Intelligent Contact Manager (ICM), Cisco CallManager (CCM), Cisco IP-Interactive Voice Response (IP-IVR), Cisco Voice over IP gateways and Mitel IP phones, Mitel Commander, Avaya, Lucent, Nortel range of Routers/Muxes and ADVA product range, NERA Wireless systems
  • Juniper and Cisco Firewalls, BigIP, Aruba, BT trading systems, Sun and HP blade servers and NettApp SAN and EMC storage devices
  • In addition to the migration and stability of BAU, we provide design guidance and trouble shooting resources for network work across the estate acting a ring-fenced resource (a centre of technical excellence)
  • The data centre hosting and security teams work closely with ThruPoint network design/configuration to ensure end-to-end flow of traffic and consistency of standards
  • The infrastructure should be designed as a highly reliable and flexible utility to accommodate disaster recovery, upgrades and modifications
  • We design manageability that starts with a strategic, unified cable management that keeps cabling and connections properly stored and organized, easy to locate and access, and simple to reconfigure
  • Technology covered is Cisco, Nortel and Alcatel range of switches & routers.

Education

Master of Science - Electromechanical Engineering

Edinburgh University
Edinburgh, Scotland
07.1983

Cisco UCS, vCentre/VMWare, Cisco ACI, F5 LTM/GTM, Cisco Unified Call Manager, Nexus Switches, Alcatel MSP platforms - undefined

5620 SAM platforms), Ericsson IP routers and Microwave Technologies, Extreme Networks Portfolio, Cisco and Avaya VoIP, ICT & CTI, IVR, Mitel PABX voice switches, Checkpoint Firewall-1 and Nokia NSS (featuring Firewall-1), Wireless networks from Cisco and Aruba, RADIUS & AAA authentication servers, Avocent Terminal Servers (6ooo series), HP OpenView NNM, RADWARE (various technologies), Crossbeam Systems, Netscreen Firewalls, Radius, Numerous MIS & OSS stacks, Image based systems and Fixed & Mobile Broadband technologies, video streaming, Content systems and server technologies from Compaq/HP and DELL, Arista Networks (7000 series) Mobile Packet Based Networks, MPLS based VPNs, VoIP, Nortel Complete portfolio, Bay Products, OSPF, BGP, EIGRP, layer 2 & 3 Switching. ATM / Frame Relay Disciplines, IP X.25 & ISDN Structured Cabling Systems and too many others to mention. Alcatel 7302 (DSLAMs) and Associated Service Routers (7750-SR), Redback BRAS, Fujitsu DSLAMs, Cisco BRAS and Service Routers (uBR10012), Cisco CRS-1 and 7206 VXR. Cisco ACI - undefined

Skills

  • CISCO
  • Cyber Security
  • IT Security Policies
  • OSPF Routing
  • LAN and WAN Expertise, Network Intelligence (AI)
  • Virtualization Security
  • Network Infrastructure Support
  • Cloud Computing
  • Data Visualization
  • Cisco ACI, VMWare NSX (V & T), Data Centre Technologies
  • Quest RMAD
  • SEIM

Affiliations

  • Association of Information Technology Professionals
  • NIST
  • CISO Society
  • The Cloud Security Alliance (CSA)
  • UK Cybersecurity Association
  • CSIA (Cyber, Space, and Intelligence Association)

Timeline

Network Specialist

London Stock Exchange (LSEG)
10.2021 - 04.2023

Senior Cloud Architect

CARR - California
08.2021 - 10.2021

Senior Cloud Architect (Network & Security)

MediaMarkt Saturn
10.2018 - 08.2021

Senior Solutions Architect

Liberty Global, Virgin Media
04.2018 - 10.2019

Senior Solutions Architect

Dimension Data
08.2017 - 11.2017

Senior Solutions Architect

04.2016 - 08.2017

Senior Solutions Architect

Fujitsu Network & Telecommunications
08.2015 - 04.2016

Network Architect

Empowered
07.2015 - 08.2015

Network Security Architect

QinetiQ
06.2015 - 07.2015

Security and iCloud Architect

Glu Reply
08.2014 - 07.2015

Multiple – Private, Hewlett Packard
10.2012 - 08.2014

Enterprise Architectural Consultant

Thrupoint
07.2009 - 02.2012

Master of Science - Electromechanical Engineering

Edinburgh University

Cisco UCS, vCentre/VMWare, Cisco ACI, F5 LTM/GTM, Cisco Unified Call Manager, Nexus Switches, Alcatel MSP platforms - undefined

5620 SAM platforms), Ericsson IP routers and Microwave Technologies, Extreme Networks Portfolio, Cisco and Avaya VoIP, ICT & CTI, IVR, Mitel PABX voice switches, Checkpoint Firewall-1 and Nokia NSS (featuring Firewall-1), Wireless networks from Cisco and Aruba, RADIUS & AAA authentication servers, Avocent Terminal Servers (6ooo series), HP OpenView NNM, RADWARE (various technologies), Crossbeam Systems, Netscreen Firewalls, Radius, Numerous MIS & OSS stacks, Image based systems and Fixed & Mobile Broadband technologies, video streaming, Content systems and server technologies from Compaq/HP and DELL, Arista Networks (7000 series) Mobile Packet Based Networks, MPLS based VPNs, VoIP, Nortel Complete portfolio, Bay Products, OSPF, BGP, EIGRP, layer 2 & 3 Switching. ATM / Frame Relay Disciplines, IP X.25 & ISDN Structured Cabling Systems and too many others to mention. Alcatel 7302 (DSLAMs) and Associated Service Routers (7750-SR), Redback BRAS, Fujitsu DSLAMs, Cisco BRAS and Service Routers (uBR10012), Cisco CRS-1 and 7206 VXR. Cisco ACI - undefined

Mark John Scott-Paton