Executive Summary
- I am a highly skilled and experienced professional who specializes in various aspects of security assessments, including containerized architecture, endpoint security, vulnerability management, identity management, risk management, and general security trainings.
- With a proven track record, I have successfully led and managed diverse security projects, optimized processes, and implemented proactive security measures.
- My expertise extends to core systems, software development, and large-scale systems modelling. I am committed to delivering exceptional results by providing effective team guidance, meticulous project planning, and impactful management presentations.
Other Professional Projects
- Review and Optimization of SBC Key Management Procedures
- Analysed vendor proposals and benchmarked them against the current status
- Conducted extensive research and optimized process steps
- Introduced standardized documentation templates for efficient key management
Introducing Proactive Security Measures as IDS/WAF
- Led the project for the deployment of operational procedures for IDS/WAF, self-learning FW stresses processes established
- Managed security incident management processes and optimized workflow tools, implement iterative learning procedures
- Conducted trainings and workflow optimizations for enhanced security measures
Web Architecture Optimisation using Event-bus Kafka
- Architecture Analysis, Weaknesses and Strengths, particular reasons for data corruption
- Proposed Event-bus based on publish / subscribe pattern for implementing micro-services
- Developed trainings for evolved architecture options
GIS-Framework Optimization for System and Network Simulation
- Optimized frameworks to enhance system efficiency and productivity
- Implemented best practices and streamlined processes for better outcomes
Large-Scale Systems Modelling with Matlab/Simulink
- Modelled and optimized complex systems as mobile radio networks using Matlab/Simulink
- Achieved efficient system performance and improved overall functionality
General Software Development
- Utilized C++, Python, R, and Linux-like systems for the development of various software applications
- Ensured seamless integration and optimal performance
Security Toolings and Forensic Analytics
- Utilized Nmap, Metasploit, Burp, Openscap, Bastill, Lynis for validation and evidence provisioning
- Filtered and analysed and false positives, graded issues and risks, organized defect sessions and triggered improvements