Alex Scarpato

Product Manager

Sydney, New South Wales, Australia23 yrs 4 mos experience
Highly Stable

Key Highlights

  • Expert in Cryptography and Data Protection strategies.
  • Proven track record in Security Architecture and Governance.
  • Strong advocate for best practices in IT Security.
Stackforce AI infers this person is a Cybersecurity Architect with extensive experience in cryptography and data protection.

Contact

Skills

Core Skills

CryptographyPkiData Protection

Other Skills

ASAActive DirectoryApplication SecurityBusiness ContinuityCiscoComputer ForensicsComputer SecurityData SecurityDisaster RecoveryEthical HackingFirewallsIDSIPSISO 27001IT Management

About

Professional Skills: • Effective technical and non-technical communication • Enthusiastic and reliable team member • Best practices advocate • Risk identification and mitigation strategies • Enterprise Architecture I.T. Security Knowledge: - Cryptography, Key Management, Tokenization - PKI - Identity Management - Network Security - Risk identification and mitigation strategies - Policy Enforcement

Experience

Cyberark

Solutions Architect

Mar 2025Present · 1 yr · Sydney, New South Wales, Australia · On-site

Appviewx

Senior Solutions Architect | Sales

Apr 2022Feb 2025 · 2 yrs 10 mos · Sydney, New South Wales, Australia

Commonwealth bank

Domain Security Architect - Cryptography

May 2020Apr 2022 · 1 yr 11 mos · Sydney, New South Wales, Australia

Symantec

Crypto Lead

May 2019May 2020 · 1 yr · Sydney, Australia

  • Crypto portfolio development/roadmap
  • Crypto services owner
  • Accountable for Cryptography Standards, Certificate Policy and Certificate Practice Statements
  • PKI implementations
  • Integrations and Divestitures planning and execution for Crypto assets and processes

Commonwealth bank

2 roles

Manager, Cryptographic Services

Promoted

Mar 2016Apr 2019 · 3 yrs 1 mo · Sydney, Australia

  • Cryptography and Data Protection services portfolio development
  • Strategy and roadmap for Cryptography, PKI and Data Protection

Security Design Governance

Mar 2015Feb 2016 · 11 mos · Sydney, Australia

  • Security Executive
  • Approval gate for the Engineering Revision Board
  • Security, privacy and operational risk specialised assessment
  • Policy and Standards advocate

Loop technology

2 roles

Head of Strategy and Technology

Dec 2013Mar 2015 · 1 yr 3 mos · Sydney, Australia

  • Design Managed Services solutions
  • Technology roadmaps
  • Grow existing relationships with core vendors
  • Identify and analyse partnerships

Senior Security Engineer / Pre-Sales Engineer

Nov 2012Mar 2015 · 2 yrs 4 mos · Sydney, Australia

  • Security Architect for RSA, McAfee and Entrust solutions
  • · Identity & Access Management
  • · Governance, Risk and Compliance
  • · Data Protection
  • · SIEM
  • · IDS and IPS
  • · Threat Behaviour Analysis
  • · Vulnerability scanners
  • · Web and Email Gateways
  • · PKI
  • Pre-Sales engagements
  • Project management
  • Proof of Concept
  • Design and architecture for managed services (on-premise and in the cloud)

Rsa the security division of emc

Designated Support Engineer

Aug 2010Sep 2012 · 2 yrs 1 mo · Sydney, Australia

  • Designated Support Engineer and Technical Account Manager for three of RSA's major clients (two of the Big Four banks and one of the biggest insurance companies worldwide)
  • Professional services engagements
  • Software/hardware systems architecture plan
  • Risk-based implementation plan
  • Collaborative sales interaction
  • In-depth (level 3) support for RSA's Authentication and Data Protection products
  • Prepare and conduct product training for customers and internal staff

Repsol-ypf

Security Specialist

Apr 2002May 2010 · 8 yrs 1 mo · Argentina

  • SCADA Networks Security
  • Internal Standard Design for SCADA Networks
  • Edge Security
  • Corporate Policy (based on ISA and Sarbanes-Oxley standards) implementation
  • Internal network appliances auditing
  • ISS Siteprotector IDS and IPS appliances management
  • Symantec Brightmail management
  • Anomaly Detection System appliances management
  • Lectures related to UNE-ISO/IEC 17799 and its application for IT employees (about 400 attendants)
  • ITIL standards implementation (British Standards 150000, ISO/IEC 20000)
  • Vulnerability and Intrusion Prevention
  • Forensics and Log Analysis
  • Ethical Hacking
  • Robust Authentication Procedures
  • Antivirus centralized administration
  • Host firewalls administration

Education

San Antonio

Stackforce found 100+ more professionals with Cryptography & Pki

Explore similar profiles based on matching skills and experience