Stefan Maerz

Knoxville, TN · stfnmz@gmail.com

I am a passionate and hardworking SRE with over 10 years of progressive experience as a Site Reliability Engineer, cybersecurity engineer, and cybersecurity architect. Sharply analytical and eager to learn. Recognized as a top performer, I have won awards for leading incident response efforts against a sophisticated and motivated threat actor and for delivering high stakes project milestones. I’ve dedicated my career to securing the world’s fastest bleeding edge supercomputers, securing the United State’s nuclear weapons stockpile, and deploying/maintaining security tooling at internet scale. Broad skill set with deep experience in most cybersecurity domains.

I lead with influence, clear communication, and am able to translate complexity into digestible results.


Experience

Sr. Security Site Reliability Engineer

Fastly

I currently work for Fastly, a globally distributed edge cloud network. In that role I support security operations by building and deploying security services across Fastly’s CDN.

  • Deployment of endpoint security telemetry system (osquery and FleetDM) across 10k hosts
  • Redesigned Kubernetes threat detection tooling with Falco across the Fastly control plane: 12 EKS and GKE clusters, 660 nodes, and 250 production workloads.
  • Drove migration to new observability tooling for system monitoring, alerting, visualization, and response using Splunk, Prometheus, Alert Manager, OpenTelemetry, and Grafana. Redefined response processes resulting in observable behaviors and actionable alerts.
  • Wrote custom Flask API to integrate desparate vulnerability management systems. Instrumented logging and prometheus metrics using the RED method to make service observable
  • Security and operational incident response
  • Redesigned patch management processes for security tooling

April 2022 - Present

Sr. Cybersecurity Architect

Consolidated Nuclear Security

I worked for Consolidated Nuclear Security (CNS), a contractor to the Department of Energy's National Nuclear Security Administration (NNSA). CNS manages The Y12 National Security Complex and Pantex Plant which manufacture nuclear weapon components.

  • Security architect redesigning enterprise IAM/PAM/SSO strategy
  • Develop strategic enterprise gap analysis of existing security capabilities
  • Develop architecture for cloud services
  • Develop Enterprise Zero Trust strategy
  • Design HPC clusters

November 2020 - April 2022

HPC Cybersecurity Engineer

Oak Ridge National Laboratory

I worked at Oak Ridge National Laboratory's National Center for Computational Sciences (NCCS)/Oak Ridge Leadership Computing Facility (OLCF). I was a cyber security engineer supporting Summit, Frontier, and Titan, three of the world’s fastest supercomputers.

https://en.wikipedia.org/wiki/Titan_(supercomputer)
https://en.wikipedia.org/wiki/Summit_(supercomputer)
https://en.wikipedia.org/wiki/Frontier_(supercomputer)

  • Led incident response efforts for 1 APT sponsored campaign and 1 BEC campaign
  • Led federated identity management initiative: including policy, architecture, systems engineering, and software development
  • Build and maintain security services: Splunk, Bro/Zeek, Nessus, osquery
  • Design and deploy 100 Gbps Bro network monitoring cluster
  • Deployed endpoint detection and response tool osquery
  • Development of security policy and architecture/design throughout the entire systems development life cycle of supercomputers
  • Software development of a secure password vault based on smart card public key cryptography
  • Management of services via Puppet and Kubernetes of security services
  • Security architecture and security engineering design

March 2017 - November 2020

Computer Information Security Specialist

Los Alamos National Laboratory

I worked at Los Alamos National Laboratory (LANL), a contractor to The Department of Energy's National Nuclear Security Administration (NNSA). I worked in the Office of the CIO and provided support to LANL's Information Security Program, which provides information security governance to the Lab.

  • Manage System Change Process: work with information security officers to analyze proposed changes, assess risk/vulnerabilities, and develop/recommend alternative architectures
  • Develop and update Security Plans
  • Security testing and evaluation
  • Serve as LANL’s technical evaluator for the NNSA’s deployment of a common Archer deployment. Collaborated with DoE sites including Lawrence Livermore National Laboratory, Sandia National Laboratory, National Security Campus, NNSA HQ, and NNSA's Information Assurance Response Center (IARC)
  • Serve the cyber security technical advisor on the advisory committee for LANL’s nuclear and hazardous waste tracking system

June 2015 - March 2017

Systems Administrator

The Community Partnership

I was the Systems Administrator at The Community Partnership (TCP), a non profit SMB. During that time I had full responsibility for all IT Operations, implemented a variety of enterprise technologies (including an Active Directory domain, email services, file servers, and backup services), and implemented an information security program.

  • Implement, maintain, and support server, desktop, and network infrastructure
  • Led security initiatives
  • Project management
  • End user support
  • IT and information security training
  • Vendor Management
  • Implement and maintain information security program
  • Email migration and Maintenance
  • Website Development and Maintenance
  • Technical Documentation
  • Cut information technology expenses by approximately $10,000 per year by reinventing TCP’s technology support model

May 2013 - June 2015

Education

Georgia Institute of Technology

Masters of Science
Cybersecurity - Information Security Track

Information security track offered by the School of Computer Science in conjunction with the School of Cybersecurity and Privacy.
Completed 12 credit hours

January 2021 - August 2023

Missouri University of Science and Technology

Bachelors of Science
Information Science and Technology

Business and Management Systems Minor

August 2010 - May 2015

Skills

Programming Languages & Tools
  • Python
  • Bash Scripting
  • Basic GoLang
  • Basic C/C++

System engineering
  • Linux (Ubuntu, Redhat)
  • Microsoft Windows
  • Infrastructure as Code
  • Puppet
  • Chef
  • Terraform
  • Automation
  • CI/CD
  • Jenkins
  • GitHub Actions
  • DevOps
  • Site Reliability Engineering
  • Cloud Engineering
  • AWS
  • GCP
  • Kubernetes
  • Helm
  • SQL
  • Networking
Security Skills
  • Threat Modeling
  • NIST 800-53
  • NIST 800-37
  • Risk Analysis
  • Risk Management
  • Cloud Security
  • Mitre ATT&CK
  • Threat Intelligence
  • Applied Cryptography
  • Incident Response
  • Identity and Access Management (IAM)
  • Network Forensics
  • osquery
  • Zeek (Bro)

Interests

Apart from being a Cybersecurity Architect and Engineer, I enjoy my time outdoors. I enjoy skiing in the winter, but have taken up backpacking and hiking having recently completed the 41 mile Timberline Trail around Mount Hood near Portland Oregon.
I am also a huge fan of the St. Louis Cardinals. My wife and I have recently had our first son!

I do like a good Netflix binge, and I spend a large amount of time exploring the latest technology.


Awards & Certifications

  • 1 st place CyberFire2019 -- Department of Energy Capture the Flag Event
  • Outstanding Contributor -- Oak Ridge National Laboratory
  • Spot Award For Supporting Air Force Weather HPC System Standup -- Oak Ridge National Laboratory
  • UT-Batttele Awards Night Award -- Oak Ridge National Laboratory
  • Top 10% Employee Rating -- Los Alamos National Laboratory
  • Academic Scholars List -- Missouri S&T
  • NYU Cyber Fellowship -- New York University
  • Special Recognition Award -- Consolidated Nuclear Security
  • Critical Retention Program -- Consolidated Nuclear Security
  • 5 - Outstanding (Top 10% Employee Rating) -- Fastly