What I Do
I secure enterprise environments through endpoint policy enforcement, vulnerability remediation, and continuous monitoring. I’m comfortable operating across federal defense and commercial contexts.
Cybersecurity practitioner and U.S. military veteran with 10+ years of IT experience, focused on endpoint protection, STIG compliance, vulnerability management, SIEM tuning, and audit-ready RMF documentation in regulated environments.
I harden systems, validate controls, and improve detection posture—delivering compliance outcomes without sacrificing operational reality.
I secure enterprise environments through endpoint policy enforcement, vulnerability remediation, and continuous monitoring. I’m comfortable operating across federal defense and commercial contexts.
I write audit-ready artifacts, tune tools until signal beats noise, and prioritize controls that measurably reduce risk. My default: calm execution, clean documentation, repeatable outcomes.
Strong cyber hygiene at scale: hardened baselines, validated configurations, defensible RMF packages, and monitoring that catches problems earlier.
A practical stack for regulated environments.
Deploy/maintain enterprise protection & DLP, enforce policy baselines, resolve endpoint issues, and improve cyber hygiene.
SSPs, POA&Ms, control validation, STIG documentation, continuous monitoring artifacts, ATO readiness support.
SIEM detection logic, workflow refinement, triage playbooks, alert quality improvements, incident readiness.
Scan/assess/validate findings, prioritize remediation, close configuration gaps, and track risk with stakeholders.
Organization names removed by design. Impact preserved.
Focused, practical, and deployable.
Degree names kept; institutions omitted to preserve anonymity.
This site intentionally removes personal identifiers and employer names while preserving operational scope and outcomes.
This opens your email client with a prefilled message (no form submission to a server).
Email opens to: zack@nullandv01d.com
Hi, I’d like to connect about cybersecurity support. - Name: - Organization: - Scope / Need: - Timeline: - Environment (Windows/Linux/Cloud): - Compliance (RMF/FISMA/Other): Thanks,
Fill this out and click “Generate Email Draft”. It will open a prefilled mail draft via mailto.