International erfahrener, zweifach ISC2 CISSP- und CC-zertifizierter Cybersecurity-Ingenieur, hochqualifiziert im Bereich Cybersecurity pre&post Sales
Aktualisiert am 14.10.2024
Profil
Freiberufler / Selbstständiger
Remote-Arbeit
Verfügbar ab: 14.10.2024
Verfügbar zu: 100%
davon vor Ort: 100%
Communication and Network Security
Security Operations
Customer Success
Security and Risk Management
Asset Security
Security Architecture and Engineering
Identity and Access Management (IAM)
Security Assessment Testing
Software Development Security
customer relations
organisational resilience
execute ICT audits
identify ICT security risks
ICT security standards
analyse ICT system
define security policies
identify ICT system weaknesses
define technical requirements
manage disaster recovery plans
manage IT security compliances
perform risk analysis
information security strategy
cyber attack counter-measures
German
Fluent for technical client presentations, face to face work, meetings and supplier engagement
English
Fluent for technical client presentations, face to face work, meetings and supplier engagement
Italian
A2
French
A2
Romanian
Native

Einsatzorte

Einsatzorte

Munich (+100km) Passau (Deutschland) (+100km)
Deutschland, Schweiz, Österreich
möglich

Projekte

Projekte

2 Jahre
2022-10 - 2024-09

Cyber Security Consulting in Customer Success Management

Cyber Security Consultant in Customer Success Management SIEM UEBA SOAR ...
Cyber Security Consultant in Customer Success Management
Providing cybersecurity solutions protecting the digital core of German and Austrian organizations across all business sectors. Collaborates closely with customers and MSSP/partners translating business and security requirements into actionable analytics in the Logpoint solution. Building strong relationships with partners and customers eploying security analytics solutions.

Key achievements:
  • Collaborate with partners and customers to implement top-of-the-line Logpoint cyber security solutions on medium and large deployments
  • Explore the Logpoint SIEM, SOAR and UEBA solutions to assist customers solving their security challenges with IT and OT Security
  • Pre-sales engineering coverage: RFI/RFP, NPMs, POCs, Sizing
  • Build, share and anchor knowledge in Logpoint, and with partners and customers.
  • Maintain high customer satisfaction and enable MSSPs and their customers to get the full value of the Logpoint solution
  • Grow and maintain Customer Success system and relay important data on customers to internal departments
  • Conduct remote software health checks and software reviews
  • Developed a ?Masterclass? series of presentations highlighting features and benefits of Logpoint software
  • Instigated an open forum Q&A process for clients and partners improving engagement
  • First point of contact for 12 high priority Tier 1 Enterprise accounts
  • Help close the gap between SAP and SIEM with Logpoint BCS for SAP

Operational Responsibilities
  • Design and maintain in house Customer Success system to relay to internal departments important data on customer relationship
  • First point of contact for high priority Tier 1&2 Enterprise accounts, assigning specialist teams to resolve difficulties
  • Evaluate training needs and arrange technical or operational training courses
  • Lead regular meetings with Partner Support Team to co-ordinate support services for clients worldwide
  • Manage the transition from sales to Partner Manager in a way that develops effective a long-term partnerships
  • Take a position of Preferred First Contact with a reputation of consistent and effective action for clients
  • Report operational data, client feedback and results at Director level
  • Develop, streamline, and grow support function capability and confidence, delivering improved client service  
Logpoint SIEM UEBA SOAR
SIEM UEBA SOAR IT-Security SOC
Logpoint GmbH
DACH
1 Jahr 10 Monate
2020-12 - 2022-09

Cyber Security Engineering

Cyber Security PS Engineer (PSE), Customer Success Manager (CSM) Data Security Management Cyber Security IT-Security
Cyber Security PS Engineer (PSE), Customer Success Manager (CSM)
Driving the success of large strategic cyber security and governance programs for enterprise customers. Collaboration with Security Engineers & Architects, IT Admins, Business Leadership, CISOs and C-suite to drive change and deliver solutions on projects value ?5m+ ARR.


Key PSE achievements:

  • Deploy, optimise, and troubleshoot Cybersecurity system implementations.
  • Plan and integrate Varonis Products with Windows File Servers, M. Office365, EMC, NetApp, Hitachi storage, SharePoint, Active Directory, Exchange, SQL Databases, VPN Concentrators, Proxies, Cloud Services
  • Consult on data governance, security policies, standards, and guidelines for customers of various business types
  • Security remediation of File Servers using the Varonis Platform
  • Training customers in using the Varonis Platform, GDPR and other compliance requirements
  • Contact for Customer, selected Partners and Varonis Development team for customizations and PM tasks
  • Supporting sales in the Statement of Work (SoW) preparation


CSM Responsibilities:

  • Map the account & onboard new contacts, map contacts based on Awareness-Visibility-Usage
  • Expand Varonis into new business projects, identify major business milestones and quick-win opportunities
  • Advocate for customers, driving cross-functional teams across Development, Product Management, Professional Services, Sales, Marketing and Customer Support
  • Identify technical challenges and functionality gaps through Support, PS, and Feature Requests
  • Expand Varonis within the customer?s ecosystem and guide them toward Varonis best practices
  • Primary contact - engage internal & customer resources and identify projects where products can be utilized
  • Develop initiatives to build Varonis into the overall security strategy of an organization
  • Support customers transitions to new platforms, keeping Varonis as a core piece of their platform (ex. cloud expansion)
DatAdvantage Automation Engine Data Classification Engine Data Classification Labels Policy Pack DatAnswers Varonis Edge Data Transport Engine DatAdvantage Cloud Data Classification Cloud
Data Security Management Cyber Security IT-Security
Varonis GmbH
DACH
3 Jahre 8 Monate
2017-04 - 2020-11

Linux for IOT ? MTS Technical Support

Premium Support Manager
Premium Support Manager
Leading on all aspects of technical solutions and support for Premium clients with a value of over ?300k. Embedded as key contact, providing a trusted and vital link to Wind River systems and support.


Key achievements:

  • Providing leadership and consultation, advice on future expansion, integration of new systems and support
  • Experience working with Linux Operating Systems, software lifecycle, build tools, architecting, and developing software for scalable, embedded systems
  • Realised a 95% CS rating and NPS of +57.1 by placing the client at the centre of all operational thinking
  • Developed a custom Linux solution for approved ventilators used in ambulances and helicopters for Hamilton
  • Led the development of Linux OS for portable X-Ray flat panel detectors, with key vulnerability and cybersecurity management against very specific application requirements
  • Maintained system software for worldwide Ericsson base radio stations to a complex and challenging brief. Positioned as key client contact with regular update and status calls
  • Positioned as embedded support for MSS 5G operating system including on-site testing and integration with Nokia systems


Operational Responsibilities

  • As a Linux Embedded Software Engineer, understanding the client business challenges and working hard to become a trusted and valued member of their extended team and Subject Matter Expert for our technology
  • Focussed on external client support, addressing technical issues to create solutions quickly and simply
  • Assist with account management, project workflows and ensuring open communication with clients
Wind River. Ismaning. Germany
11 Jahre
2007-01 - 2017-12

Led on Pan-European strategy delivery building partnerships with suppliers and clients

Senior Systems Administrator ? IT Client Systems
Senior Systems Administrator ? IT Client Systems

Wind River. Ismaning. Germany
3 Jahre
2005-01 - 2007-12

UAT, Unitary Tests, script testing

Software Tester, LAN Administrator
Software Tester, LAN Administrator

Comsys, subsequently acquired by Wind River
1 Jahr
2005-01 - 2005-12

Representative for global brands Bosch, DeWalt, Metabo amongst others

Sales Engineer
Sales Engineer

Triton SRL, Constanta, Romania
4 Jahre
2002-01 - 2005-12

Territory Sales ? BML SRL

Team leader of agents responsible for deliveries
Team leader of agents responsible for deliveries

Galati, Romania

Aus- und Weiterbildung

Aus- und Weiterbildung

2009 - today
M.Sc Master of Intelligent Systems
Dunarea de Jos University, Galati

Focus:
Intelligent Systems study at the Computer Science Faculty

2005
M.Eng Master of Engineering in Machine construction Technology
Dunarea de Jos University, Galati, Romania

Certifications
08/2024
ISC2 CISSP Certified Information Systems Security Professional

04/2024
ISC2 CC Certified in Cybersecurity
Aspiration to study: Cybersecurity in conjunction with all aspects of busines

In-Company and external training on the following topics
06/2024
ISC2 CISSP ? Certified Information Systems Security Professional, Jun 2024

04/2024
ISC2 CC ? Certified in Cybersecurity, Apr 2024

10/2023
Ethical Hacking: Enumeration, Linkedin Learning

09/2023
Ethical Hacking: Scanning Networks, LinkedinLearning

2022

  • Certified Logpoint Administrator
  • Certified Logpoint User,

2021
Varonis Certified Core Technical Engineer

2020
  • Customer Success Management Fundamentals
  • AWS Solution Architect

08/2020
Automating and Optimising Web Applications in the Cloud, AWS Learning Series

2019
Wind River Linux LTS - Training course, WR Edu. Services

2018
  • Yocto Project Developer Day, Linux Foundation, ELCE
  • Wind River Linux 9 + WRL 9 CLI Essentials. WR Edu. Serv.

2017
  • Vx Works 7 Board Support Packages & Device Drivers. Wind River Education Services
  • Wind River Linux 8. Wind River Education Services

2013
DOSD. Dell IT Professional Development

2011
IT Infrastructure Admin. Link Group Timisoara

2002
Computer Network Administration Certification, Galati

Position

Position

Cyber Security Consultant,

IT Security Consultant,

Pre Post Sales Engineer,

Customer Success Manager,

Technical Account Manager,

Cyber Security Manager

Kompetenzen

Kompetenzen

Top-Skills

Communication and Network Security Security Operations Customer Success Security and Risk Management Asset Security Security Architecture and Engineering Identity and Access Management (IAM) Security Assessment Testing Software Development Security customer relations organisational resilience execute ICT audits identify ICT security risks ICT security standards analyse ICT system define security policies identify ICT system weaknesses define technical requirements manage disaster recovery plans manage IT security compliances perform risk analysis information security strategy cyber attack counter-measures

Schwerpunkte


Produkte / Standards / Erfahrungen / Methoden

PROFILE

An internationally experienced, 2 times ISC2 CISSP and CC Certified in Cybersecurity, highly qualified pre & post-sales cyber security engineer with extensive business knowledge. Provides direct IT specialist support for enterprise level clients, creating solutions for a wide range of software issues from initial contact to resolution. Works closely with CISOs, security architects, security engineers, and development operations teams alongside established account teams. Brings strong problem-solving skills and bespoke software solutions focused on remote systems, cybersecurity, virtualisation, server technology, infrastructure and client success planning. Confident engagement and understanding across a broad spectrum of business sectors and stakeholders whilst managing all aspects of project roll out. Seeking a role in Pre and Post-sales Cybersecurity Engineering working directly with clients.

KEY SKILLS AND EXPERTISE

  • Managing a ?5m ARR client Cybersecurity portfolio
  • Wide range of technologies for best outcomes
  • Skilled client communication and interaction
  • Structured and methodical working practice
  • Excels in a customer-facing engineer role
  • Fast and accurate adopter of new systems
  • Consultation and advocate of best practice
  • Balanced work with Clients and Business Partners
  • Customer enablement with training and presentations
  • Post-sales relations development with new clients
  • Leading on complex end to end projects
  • Skilled in fast moving and dynamic environments
  • Development of long-term client partnerships
  • Technological realisation of client project vision
  • Blends IT knowledge across business functions
  • Influences at Director level on delivery issues


IT Software Technical Skills Inventory

Technical and Commercial Support: Technical and Commercial Support: hands-on experience building systems for embedded Linux Operating Systems for OT/IOT devices with an external customer focus. Debug failures, pinpoint problems, suggest workarounds, and lead account management to help with project workflow. Comprehensive understanding of all aspects of modern GNU Linux OS, from building, configuring and troubleshooting systems running on a diversity of hardware platforms.


IT Systems Security & Administration:

  • IT Security analysis from client to enterprise level with SIEM tools according to the MITRE ATT&CK framework
  • SIEM use cases, SOAR Playbooks, UEBA learning,
  • Participate in and understand the requirements of IT Security Audits, in accordance to ISO 27001
  • Provide 2nd and 3rd level support covering IT equipment and Enterprise level infrastructure
  • Lead on planning and execution of IT projects e.g. network and wiring infrastructure, data room and cooling
  • Build BCP Business Continuity and DRP Disaster Recovery plans
  • Install and deploy Dell servers, storage units and tape libraries, Cisco switching equipment + Wi-Fi APs, WDS (wireless distribution system), PBX (digital and IP solutions), UPS units, firewalls, proxy servers, terminal servers, KVM switches, surveillance and alarm systems
  • Actively maintain full availability (99.9%) for critical online systems
  • Manage Windows and Linux Servers as Active Directory with multiple roles (DC, DHCP, DNS, Exchange email)
  • Manage Cloud services from Microsoft Azure, Amazon Web Services, Google Cloud.
  • Troubleshoot company intranet connections (ISP, MPLS , copper and fiber, hardware and software VPN)
  • Set up DevOps/ Engineering department: FTP and build servers, version control, VLM (virtual lab management), VMWare
  • Set up backup systems with dedicated servers and tape libraries, Veritas Net backup, create and maintain internal documentation, including user guides
  • Manage RHEL/CentOS Unix servers with NIS domain authentication
  • Manage Database Servers (MS SQL), storage units and LVM (Unix Logical Volume Manager)
  • Manage and troubleshoot end user stations with Windows, Ubuntu, Fedora; virus detection with epos (McAfee) and Malwarebytes
  • Financial control, selection, inventory and asset management of IT equipment
  • Purchase, deploy and troubleshoot ISP, fixed and mobile telephony services
  • Administrator: Google for Business Gsuite, Google Cloud Services
  • Integrate and troubleshoot mobile devices using company email via Blackberry Administration Service, Good Mobile Control, Airwatch (for IOS and Android)
  • Work with industry specific tools: Salesforce, Gainsight, Asana, Oracle, SAP Software, ADUC, Symantec IM manager, GLPI and OCS inventory, Version control (GIT, CVS, SVN), Wireshark, EtherScope, VNC/TeamViewer, VMWare vSphere & ESXI, etc.

Knowledge

  • organisational resilience
  • execute ICT audits
  • identify ICT security risks
  • ICT security standards
  • educate on data confidentiality
  • report test findings
  • analyse ICT system
  • keep task records
  • ICT security legislation
  • define security policies
  • develop information security strategy
  • identify ICT system weaknesses
  • monitor system performance
  • define technical requirements
  • implement ICT risk management
  • manage disaster recovery plans
  • manage IT security compliances
  • verify formal ICT specifications
  • execute software tests
  • provide ICT consulting advice
  • perform risk analysis
  • information security strategy
  • cyber attack counter-measures
  • keep up with the latest information systems solutions
  • Lean project management
  • provide user documentation
  • Process-based management
  • ICT process quality models
  • perform project management
  • ICT project management methodologies
  • lead disaster recovery exercises
  • give live presentation
  • manage ICT change request process
  • internet governance
  • manage changes in ICT system
  • Agile project management
  • copyright legislation
  • Internet of Things
  • ICT encryption
  • track key performance indicators
  • optimise choice of ICT solution
  • organisational resilience
  • execute ICT audits
  • identify ICT security risks
  • ICT security standards
  • educate on data confidentiality
  • report test findings
  • analyse ICT system
  • keep task records
  • ICT security legislation
  • define security policies
  • develop information security strategy
  • identify ICT system weaknesses
  • monitor system performance
  • define technical requirements
  • implement ICT risk management
  • manage disaster recovery plans
  • manage IT security compliances
  • verify formal ICT specifications
  • execute software tests
  • provide ICT consulting advice
  • perform risk analysis
  • information security strategy
  • cyber attack counter-measures
  • keep up with the latest information systems solutions
  • Lean project management
  • provide user documentation
  • Process-based management
  • ICT process quality models
  • perform project management
  • ICT project management methodologies
  • lead disaster recovery exercises
  • give live presentation
  • manage ICT change request process
  • internet governance
  • manage changes in ICT system
  • Agile project management
  • copyright legislation
  • Internet of Things
  • ICT encryption
  • track key performance indicators
  • optimise choice of ICT solution
  • maintain ICT system
  • manage changes in ICT system
  • solve ICT system problems
  • ICT system programming
  • quality assurance methodologies
  • monitor system performance
  • implement ICT recovery system
  • support ICT system users
  • ICT system user requirements
  • ICT infrastructure
  • perform backups
  • integrate system components
  • apply ICT system usage policies
  • software components libraries
  • administer ICT system
  • apply system organisational policies
  • provide technical documentation
  • interpret technical texts
  • manage system security
  • migrate existing data
  • hardware components
  • manage system testing
  • organisational policies
  • systems development life-cycle
  • interfacing techniques
  • engineering processes
  • internet governance
  • implement ICT risk management
  • adjust ICT system capacity
  • ICT recovery techniques
  • acquire system component
  • provide ICT system training
  • information security strategy
  • interact with users to gather requirements
  • use different communication channels
  • ICT accessibility standards
  • ICT system integration
  • install signal repeaters
  • execute integration testing

Betriebssysteme

Linux
Experte
Windows
Experte
IOS
Fortgeschritten


Einsatzorte

Einsatzorte

Munich (+100km) Passau (Deutschland) (+100km)
Deutschland, Schweiz, Österreich
möglich

Projekte

Projekte

2 Jahre
2022-10 - 2024-09

Cyber Security Consulting in Customer Success Management

Cyber Security Consultant in Customer Success Management SIEM UEBA SOAR ...
Cyber Security Consultant in Customer Success Management
Providing cybersecurity solutions protecting the digital core of German and Austrian organizations across all business sectors. Collaborates closely with customers and MSSP/partners translating business and security requirements into actionable analytics in the Logpoint solution. Building strong relationships with partners and customers eploying security analytics solutions.

Key achievements:
  • Collaborate with partners and customers to implement top-of-the-line Logpoint cyber security solutions on medium and large deployments
  • Explore the Logpoint SIEM, SOAR and UEBA solutions to assist customers solving their security challenges with IT and OT Security
  • Pre-sales engineering coverage: RFI/RFP, NPMs, POCs, Sizing
  • Build, share and anchor knowledge in Logpoint, and with partners and customers.
  • Maintain high customer satisfaction and enable MSSPs and their customers to get the full value of the Logpoint solution
  • Grow and maintain Customer Success system and relay important data on customers to internal departments
  • Conduct remote software health checks and software reviews
  • Developed a ?Masterclass? series of presentations highlighting features and benefits of Logpoint software
  • Instigated an open forum Q&A process for clients and partners improving engagement
  • First point of contact for 12 high priority Tier 1 Enterprise accounts
  • Help close the gap between SAP and SIEM with Logpoint BCS for SAP

Operational Responsibilities
  • Design and maintain in house Customer Success system to relay to internal departments important data on customer relationship
  • First point of contact for high priority Tier 1&2 Enterprise accounts, assigning specialist teams to resolve difficulties
  • Evaluate training needs and arrange technical or operational training courses
  • Lead regular meetings with Partner Support Team to co-ordinate support services for clients worldwide
  • Manage the transition from sales to Partner Manager in a way that develops effective a long-term partnerships
  • Take a position of Preferred First Contact with a reputation of consistent and effective action for clients
  • Report operational data, client feedback and results at Director level
  • Develop, streamline, and grow support function capability and confidence, delivering improved client service  
Logpoint SIEM UEBA SOAR
SIEM UEBA SOAR IT-Security SOC
Logpoint GmbH
DACH
1 Jahr 10 Monate
2020-12 - 2022-09

Cyber Security Engineering

Cyber Security PS Engineer (PSE), Customer Success Manager (CSM) Data Security Management Cyber Security IT-Security
Cyber Security PS Engineer (PSE), Customer Success Manager (CSM)
Driving the success of large strategic cyber security and governance programs for enterprise customers. Collaboration with Security Engineers & Architects, IT Admins, Business Leadership, CISOs and C-suite to drive change and deliver solutions on projects value ?5m+ ARR.


Key PSE achievements:

  • Deploy, optimise, and troubleshoot Cybersecurity system implementations.
  • Plan and integrate Varonis Products with Windows File Servers, M. Office365, EMC, NetApp, Hitachi storage, SharePoint, Active Directory, Exchange, SQL Databases, VPN Concentrators, Proxies, Cloud Services
  • Consult on data governance, security policies, standards, and guidelines for customers of various business types
  • Security remediation of File Servers using the Varonis Platform
  • Training customers in using the Varonis Platform, GDPR and other compliance requirements
  • Contact for Customer, selected Partners and Varonis Development team for customizations and PM tasks
  • Supporting sales in the Statement of Work (SoW) preparation


CSM Responsibilities:

  • Map the account & onboard new contacts, map contacts based on Awareness-Visibility-Usage
  • Expand Varonis into new business projects, identify major business milestones and quick-win opportunities
  • Advocate for customers, driving cross-functional teams across Development, Product Management, Professional Services, Sales, Marketing and Customer Support
  • Identify technical challenges and functionality gaps through Support, PS, and Feature Requests
  • Expand Varonis within the customer?s ecosystem and guide them toward Varonis best practices
  • Primary contact - engage internal & customer resources and identify projects where products can be utilized
  • Develop initiatives to build Varonis into the overall security strategy of an organization
  • Support customers transitions to new platforms, keeping Varonis as a core piece of their platform (ex. cloud expansion)
DatAdvantage Automation Engine Data Classification Engine Data Classification Labels Policy Pack DatAnswers Varonis Edge Data Transport Engine DatAdvantage Cloud Data Classification Cloud
Data Security Management Cyber Security IT-Security
Varonis GmbH
DACH
3 Jahre 8 Monate
2017-04 - 2020-11

Linux for IOT ? MTS Technical Support

Premium Support Manager
Premium Support Manager
Leading on all aspects of technical solutions and support for Premium clients with a value of over ?300k. Embedded as key contact, providing a trusted and vital link to Wind River systems and support.


Key achievements:

  • Providing leadership and consultation, advice on future expansion, integration of new systems and support
  • Experience working with Linux Operating Systems, software lifecycle, build tools, architecting, and developing software for scalable, embedded systems
  • Realised a 95% CS rating and NPS of +57.1 by placing the client at the centre of all operational thinking
  • Developed a custom Linux solution for approved ventilators used in ambulances and helicopters for Hamilton
  • Led the development of Linux OS for portable X-Ray flat panel detectors, with key vulnerability and cybersecurity management against very specific application requirements
  • Maintained system software for worldwide Ericsson base radio stations to a complex and challenging brief. Positioned as key client contact with regular update and status calls
  • Positioned as embedded support for MSS 5G operating system including on-site testing and integration with Nokia systems


Operational Responsibilities

  • As a Linux Embedded Software Engineer, understanding the client business challenges and working hard to become a trusted and valued member of their extended team and Subject Matter Expert for our technology
  • Focussed on external client support, addressing technical issues to create solutions quickly and simply
  • Assist with account management, project workflows and ensuring open communication with clients
Wind River. Ismaning. Germany
11 Jahre
2007-01 - 2017-12

Led on Pan-European strategy delivery building partnerships with suppliers and clients

Senior Systems Administrator ? IT Client Systems
Senior Systems Administrator ? IT Client Systems

Wind River. Ismaning. Germany
3 Jahre
2005-01 - 2007-12

UAT, Unitary Tests, script testing

Software Tester, LAN Administrator
Software Tester, LAN Administrator

Comsys, subsequently acquired by Wind River
1 Jahr
2005-01 - 2005-12

Representative for global brands Bosch, DeWalt, Metabo amongst others

Sales Engineer
Sales Engineer

Triton SRL, Constanta, Romania
4 Jahre
2002-01 - 2005-12

Territory Sales ? BML SRL

Team leader of agents responsible for deliveries
Team leader of agents responsible for deliveries

Galati, Romania

Aus- und Weiterbildung

Aus- und Weiterbildung

2009 - today
M.Sc Master of Intelligent Systems
Dunarea de Jos University, Galati

Focus:
Intelligent Systems study at the Computer Science Faculty

2005
M.Eng Master of Engineering in Machine construction Technology
Dunarea de Jos University, Galati, Romania

Certifications
08/2024
ISC2 CISSP Certified Information Systems Security Professional

04/2024
ISC2 CC Certified in Cybersecurity
Aspiration to study: Cybersecurity in conjunction with all aspects of busines

In-Company and external training on the following topics
06/2024
ISC2 CISSP ? Certified Information Systems Security Professional, Jun 2024

04/2024
ISC2 CC ? Certified in Cybersecurity, Apr 2024

10/2023
Ethical Hacking: Enumeration, Linkedin Learning

09/2023
Ethical Hacking: Scanning Networks, LinkedinLearning

2022

  • Certified Logpoint Administrator
  • Certified Logpoint User,

2021
Varonis Certified Core Technical Engineer

2020
  • Customer Success Management Fundamentals
  • AWS Solution Architect

08/2020
Automating and Optimising Web Applications in the Cloud, AWS Learning Series

2019
Wind River Linux LTS - Training course, WR Edu. Services

2018
  • Yocto Project Developer Day, Linux Foundation, ELCE
  • Wind River Linux 9 + WRL 9 CLI Essentials. WR Edu. Serv.

2017
  • Vx Works 7 Board Support Packages & Device Drivers. Wind River Education Services
  • Wind River Linux 8. Wind River Education Services

2013
DOSD. Dell IT Professional Development

2011
IT Infrastructure Admin. Link Group Timisoara

2002
Computer Network Administration Certification, Galati

Position

Position

Cyber Security Consultant,

IT Security Consultant,

Pre Post Sales Engineer,

Customer Success Manager,

Technical Account Manager,

Cyber Security Manager

Kompetenzen

Kompetenzen

Top-Skills

Communication and Network Security Security Operations Customer Success Security and Risk Management Asset Security Security Architecture and Engineering Identity and Access Management (IAM) Security Assessment Testing Software Development Security customer relations organisational resilience execute ICT audits identify ICT security risks ICT security standards analyse ICT system define security policies identify ICT system weaknesses define technical requirements manage disaster recovery plans manage IT security compliances perform risk analysis information security strategy cyber attack counter-measures

Schwerpunkte


Produkte / Standards / Erfahrungen / Methoden

PROFILE

An internationally experienced, 2 times ISC2 CISSP and CC Certified in Cybersecurity, highly qualified pre & post-sales cyber security engineer with extensive business knowledge. Provides direct IT specialist support for enterprise level clients, creating solutions for a wide range of software issues from initial contact to resolution. Works closely with CISOs, security architects, security engineers, and development operations teams alongside established account teams. Brings strong problem-solving skills and bespoke software solutions focused on remote systems, cybersecurity, virtualisation, server technology, infrastructure and client success planning. Confident engagement and understanding across a broad spectrum of business sectors and stakeholders whilst managing all aspects of project roll out. Seeking a role in Pre and Post-sales Cybersecurity Engineering working directly with clients.

KEY SKILLS AND EXPERTISE

  • Managing a ?5m ARR client Cybersecurity portfolio
  • Wide range of technologies for best outcomes
  • Skilled client communication and interaction
  • Structured and methodical working practice
  • Excels in a customer-facing engineer role
  • Fast and accurate adopter of new systems
  • Consultation and advocate of best practice
  • Balanced work with Clients and Business Partners
  • Customer enablement with training and presentations
  • Post-sales relations development with new clients
  • Leading on complex end to end projects
  • Skilled in fast moving and dynamic environments
  • Development of long-term client partnerships
  • Technological realisation of client project vision
  • Blends IT knowledge across business functions
  • Influences at Director level on delivery issues


IT Software Technical Skills Inventory

Technical and Commercial Support: Technical and Commercial Support: hands-on experience building systems for embedded Linux Operating Systems for OT/IOT devices with an external customer focus. Debug failures, pinpoint problems, suggest workarounds, and lead account management to help with project workflow. Comprehensive understanding of all aspects of modern GNU Linux OS, from building, configuring and troubleshooting systems running on a diversity of hardware platforms.


IT Systems Security & Administration:

  • IT Security analysis from client to enterprise level with SIEM tools according to the MITRE ATT&CK framework
  • SIEM use cases, SOAR Playbooks, UEBA learning,
  • Participate in and understand the requirements of IT Security Audits, in accordance to ISO 27001
  • Provide 2nd and 3rd level support covering IT equipment and Enterprise level infrastructure
  • Lead on planning and execution of IT projects e.g. network and wiring infrastructure, data room and cooling
  • Build BCP Business Continuity and DRP Disaster Recovery plans
  • Install and deploy Dell servers, storage units and tape libraries, Cisco switching equipment + Wi-Fi APs, WDS (wireless distribution system), PBX (digital and IP solutions), UPS units, firewalls, proxy servers, terminal servers, KVM switches, surveillance and alarm systems
  • Actively maintain full availability (99.9%) for critical online systems
  • Manage Windows and Linux Servers as Active Directory with multiple roles (DC, DHCP, DNS, Exchange email)
  • Manage Cloud services from Microsoft Azure, Amazon Web Services, Google Cloud.
  • Troubleshoot company intranet connections (ISP, MPLS , copper and fiber, hardware and software VPN)
  • Set up DevOps/ Engineering department: FTP and build servers, version control, VLM (virtual lab management), VMWare
  • Set up backup systems with dedicated servers and tape libraries, Veritas Net backup, create and maintain internal documentation, including user guides
  • Manage RHEL/CentOS Unix servers with NIS domain authentication
  • Manage Database Servers (MS SQL), storage units and LVM (Unix Logical Volume Manager)
  • Manage and troubleshoot end user stations with Windows, Ubuntu, Fedora; virus detection with epos (McAfee) and Malwarebytes
  • Financial control, selection, inventory and asset management of IT equipment
  • Purchase, deploy and troubleshoot ISP, fixed and mobile telephony services
  • Administrator: Google for Business Gsuite, Google Cloud Services
  • Integrate and troubleshoot mobile devices using company email via Blackberry Administration Service, Good Mobile Control, Airwatch (for IOS and Android)
  • Work with industry specific tools: Salesforce, Gainsight, Asana, Oracle, SAP Software, ADUC, Symantec IM manager, GLPI and OCS inventory, Version control (GIT, CVS, SVN), Wireshark, EtherScope, VNC/TeamViewer, VMWare vSphere & ESXI, etc.

Knowledge

  • organisational resilience
  • execute ICT audits
  • identify ICT security risks
  • ICT security standards
  • educate on data confidentiality
  • report test findings
  • analyse ICT system
  • keep task records
  • ICT security legislation
  • define security policies
  • develop information security strategy
  • identify ICT system weaknesses
  • monitor system performance
  • define technical requirements
  • implement ICT risk management
  • manage disaster recovery plans
  • manage IT security compliances
  • verify formal ICT specifications
  • execute software tests
  • provide ICT consulting advice
  • perform risk analysis
  • information security strategy
  • cyber attack counter-measures
  • keep up with the latest information systems solutions
  • Lean project management
  • provide user documentation
  • Process-based management
  • ICT process quality models
  • perform project management
  • ICT project management methodologies
  • lead disaster recovery exercises
  • give live presentation
  • manage ICT change request process
  • internet governance
  • manage changes in ICT system
  • Agile project management
  • copyright legislation
  • Internet of Things
  • ICT encryption
  • track key performance indicators
  • optimise choice of ICT solution
  • organisational resilience
  • execute ICT audits
  • identify ICT security risks
  • ICT security standards
  • educate on data confidentiality
  • report test findings
  • analyse ICT system
  • keep task records
  • ICT security legislation
  • define security policies
  • develop information security strategy
  • identify ICT system weaknesses
  • monitor system performance
  • define technical requirements
  • implement ICT risk management
  • manage disaster recovery plans
  • manage IT security compliances
  • verify formal ICT specifications
  • execute software tests
  • provide ICT consulting advice
  • perform risk analysis
  • information security strategy
  • cyber attack counter-measures
  • keep up with the latest information systems solutions
  • Lean project management
  • provide user documentation
  • Process-based management
  • ICT process quality models
  • perform project management
  • ICT project management methodologies
  • lead disaster recovery exercises
  • give live presentation
  • manage ICT change request process
  • internet governance
  • manage changes in ICT system
  • Agile project management
  • copyright legislation
  • Internet of Things
  • ICT encryption
  • track key performance indicators
  • optimise choice of ICT solution
  • maintain ICT system
  • manage changes in ICT system
  • solve ICT system problems
  • ICT system programming
  • quality assurance methodologies
  • monitor system performance
  • implement ICT recovery system
  • support ICT system users
  • ICT system user requirements
  • ICT infrastructure
  • perform backups
  • integrate system components
  • apply ICT system usage policies
  • software components libraries
  • administer ICT system
  • apply system organisational policies
  • provide technical documentation
  • interpret technical texts
  • manage system security
  • migrate existing data
  • hardware components
  • manage system testing
  • organisational policies
  • systems development life-cycle
  • interfacing techniques
  • engineering processes
  • internet governance
  • implement ICT risk management
  • adjust ICT system capacity
  • ICT recovery techniques
  • acquire system component
  • provide ICT system training
  • information security strategy
  • interact with users to gather requirements
  • use different communication channels
  • ICT accessibility standards
  • ICT system integration
  • install signal repeaters
  • execute integration testing

Betriebssysteme

Linux
Experte
Windows
Experte
IOS
Fortgeschritten


Vertrauen Sie auf Randstad

Im Bereich Freelancing
Im Bereich Arbeitnehmerüberlassung / Personalvermittlung

Fragen?

Rufen Sie uns an +49 89 500316-300 oder schreiben Sie uns:

Das Freelancer-Portal

Direktester geht's nicht! Ganz einfach Freelancer finden und direkt Kontakt aufnehmen.