IT Security Auditor (ISACA) | IT Security Analyst (ComptIA)
Aktualisiert am 14.03.2025
Profil
Freiberufler / Selbstständiger
Remote-Arbeit
Verfügbar ab: 19.03.2025
Verfügbar zu: 100%
davon vor Ort: 100%
IT-Governance
Vulnerabiliy Management
IT-Security Operations
Incident Management
Audit
Penetrationstest
Active Directory
Awareness Training
BSI C5
ISO 27001
NIST Fisma 800 - 53
NIS2
Dora
German
Muttersprache
English
C1 - C2 (working language)
Russian
C1 - B2 (fluently)

Einsatzorte

Einsatzorte

Vienna (+500km) Munich (+500km) Zurich (+500km)
Deutschland, Schweiz, Österreich
möglich

Projekte

Projekte

1 year
2024-03 - now

IT Audit & Governance

IT Security Specialist (Teamlead)
IT Security Specialist (Teamlead)
  • Project lead for implementation of NIST Fisma 800 - 53 and ISO 27001, 27002 control objectives in preparation for audits by U.S. Department of State; Project management, collecting evidences, configuring network devices, servers, applications and endpoints
  • Developing and maintaining IT governance policies and procedures
  • Risk Management including internal account audits, Active Directory assessments, network security assessments and security assessments of IoT devices
  • Vulnerability management with Rapid7 InsightVM, nmap, Burp Suite, PowerShell; Responsible for maintaining the on-premise solution and distributed scanners; Troubleshooting scan failures, configuring firewalls and host-based IDS for scan engines; Providing monthly statistics to the U.S. Department of State
  • Incident response with Log360, ADManager, ADAudit, ESET on prem, Palo Alto 820; configuring alerts; triage of security incidents; analysis of phishing attempts and malicious payloads
  • Security administration of Windows and Active Directory infrastructure with Endpoint Central, ESET on-prem; Monthly asset and account reviews with PowerShell
  • Threat Intelligence with Rapid7, Shodan, Palo Alto 820 and open sources; monitoring vulnerabilites affecting the local infrastructure
  • Security awareness trainings with KnowBe4; preparing customized training materials for staff members
HIAS RSC
Vienna
1 year
2024-03 - now

Security Operations

IT Security Specialist (Teamlead) PowerShell Bash Python
IT Security Specialist (Teamlead)
  • Responsible for IT security operations in Vienna, Zagreb, Tel-Aviv
  • Vulnerability management & remediation of vulnerabilities
  • Incident response (reviewing and triage of security incidents)
  • Security administration of Windows and Active Directory infrastructure
  • Implementing security configurations and cryptographic requirements
  • Account & Asset Management
  • Threat Intelligence
  • Security awareness trainings
Rapid7 InsightVM Nessus Nmap Burp Suite Metasploit Framework
PowerShell Bash Python
HIAS
Vienna
1 year
2024-03 - 2025-02

Incident Response Management

IT Security Specialist Powershell
IT Security Specialist
Log360 AD Manager Plus Palo Alto Firewall PowerShell
Powershell
HIAS RSC Austria
Vienna
3 months
2024-11 - 2025-01

Devoloped IT Governance policies and procedures according

IT Security Auditor
IT Security Auditor
  • Devoloped IT Governance policies and procedures according to ISO 27001, 27002 for a public entity in Vienna.

Deloitte
Vienna
3 months
2024-11 - 2025-01

Active Directory Assessment

Consultant
Consultant
  • Conducted an assessment of Active Directory security for a mining company in Austria.
Deloitte
2 months
2024-11 - 2024-12

Audited a financial institution according

IT Security Auditor
IT Security Auditor
  • Supported an audit of a financial institution according to ECB criteria
  • audited vulnerability management, logging & monitoring and penetration testing
Deloitte
Vienna
1 month
2024-11 - 2024-11

Conducted Penetration Test

IT Security Specialist
IT Security Specialist
  • Lead a wifi penetration test in an hospital in Vienna
  • setting up test environment and toolset
  • password cracking
  • reporting
Nmap Metasploit Framework Hashcat Aircrack ng
Deloitte
Vienna
1 year 9 months
2023-01 - 2024-09

Audited Microsoft O365 according to BSI C5 criterias

IT Security Auditor
IT Security Auditor
  • Audited Microsoft O365 Organisation on-site at the Microsoft Campus in Redmond, U.S., according to selected C5 criteria
  • audit of live systems for risk, vulnerability, incident and business continuity management
  • reporting and presentation to more than 80 customers from the insurance industry.
DCSO
Berlin, Seattle
3 months
2024-06 - 2024-08

Audited Cloud Service Product

IT Security Auditor
IT Security Auditor
  • Audited a cloud product from Deloitte at Volkswagen in Wolfsburg according to own ISA criteria
Volkswagen
Wolfsburg
3 months
2023-11 - 2024-01

Consulting in the field of information security

Manager (Project lead)
Manager (Project lead)
  • Development of IT security frameworks acc.t. ISO 27001, 27002
  • Performing Active Directory assessments
  • Conducting Penetration Tests
  • Conducting IT security audits
Deloitte Services Wirtschaftsprüfungs GmbH
3 years
2020-11 - 2023-10

Testing security software and solutions

IT Security Professional ISA TISAX SOC2 ...
IT Security Professional
  •  Auditing Cloud Service Providers according to TISAX, SOC2, BSI-C5 criteria on behalf of the automotive and insurance industry; developing test actions, preparing interviews and collecting evidences; examined organizational and technical requirements of cloud products
  • Consulting clients in the field of information security and strategic risk management
  • Testing security software and solutions;
  • Security research and threat intelligence; testing of vulnerabilities, development of exploits, malware analysis
ISA TISAX SOC2 C5 criteria Google Microsoft Atlassian FireEye Dassault Tenable Zscaler AWS
Deutsche Cybersicherheitsorganisation GmbH
5 months
2023-04 - 2023-08

IT Security Assessment

Consultant
Consultant
  • Conducted an IT Security Assessment for a mining company in East Germany according to selected BSI C5 control objectives.
DCSO
4 months
2020-05 - 2020-08

Preparation and advanced training

IT-Cybersecurity-Analyst (with CompTIA certification)
IT-Cybersecurity-Analyst (with CompTIA certification)
Alfatraining
1 year 9 months
2018-08 - 2020-04

Compliance management

IT-Risk Consultant
IT-Risk Consultant
  • Investigations on data and information security violations
  • Threat Intelligence
  • Digital forensics
  • Consulting in the field of information and data security
ILV Advisers e.K.
2 years 7 months
2016-01 - 2018-07

Investigations on data security violations

Risk Consultant
Risk Consultant
  • IT Forensics
  • Investigations on cyber crimes (internet fraud, intellectual property violations, Bank fraud)
  • Risk analyses and country reports
  • Financial forecasts
  • Account Management
Pinkerton Consulting & Investigations, Inc
1 year 10 months
2014-03 - 2015-12

Journalist

Journalist
Journalist



WELTN24, WELT am Sonntag
4 years
2010-03 - 2014-02

Freelance

Spiegel-Online, DER SPIEGEL, NZZ a.o.
2 years
2008-03 - 2010-02

Research and analyses of economical country data

Project manager
Project manager
IHK-Verband zur Förderung der Außenwirtschaft durch das AHK Netz (Delegation of the
German Economy in Ukraine)
  • Public presentations and speeches
  • Collaboration with DEInternational, GIZ, GTAI and others"
IHK-Verband zur Förderung der Außenwirtschaft durch das AHK Netz
2 years
2005-11 - 2007-10

Referendar

Referendar
Referendar

Oberlandesgericht Zweibrücken (Court of Appeal)

Aus- und Weiterbildung

Aus- und Weiterbildung

1 month
2024-12 - 2024-12

Advanced Hacking and Securing Windows Infrastructure

Black Hat
Black Hat
1 year 4 months
2023-01 - 2024-04

Information Systems Auditor (CISA)

ISACA
ISACA
3 years 2 months
2020-07 - 2023-08

Cybersecurity Analyst

CySA +, CompTIA
CySA +
CompTIA
4 years 4 months
2000-10 - 2005-01

First State Examination

University Trier
University Trier

Kompetenzen

Kompetenzen

Top-Skills

IT-Governance Vulnerabiliy Management IT-Security Operations Incident Management Audit Penetrationstest Active Directory Awareness Training BSI C5 ISO 27001 NIST Fisma 800 - 53 NIS2 Dora

Produkte / Standards / Erfahrungen / Methoden

Projects

  • Implemented NIST Fisma 800 - 53 control objectives in preparation for upcoming audit (HIAS)
  • Audited Microsoft O365 Organisation on-site at the Microsoft Campus in Redmond, U.S., according to selected BSI-C5 criteria; reported and presented the results to more than 80 customers from the insurance industry (DCSO)
  • Audited a cloud product from Deloitte at Volkswagen in Wolfsburg according to own ISA criterias (DCSO)
  • Audited Google, Atlassian, FireEye, Dassault, Tenable, Zscaler, AWS and others according to own ISA criteria (DCSO)
  • Audited ISMS and network infrastructure of a mining company in Germany (DCSO)
  • Supported an audit of a financial institution according to ECB criteria; audited vulnerability management, logging & monitoring and penetration testing (Deloitte)
  • Developed IT Governance policies and procedures (HIAS)
  • Devoloped IT Governance policies and procedures according to ISO 27001, 27002 for a public entity in Vienna (Deloitte)
  • Responsible for vulnerability management in an IT infrastructure of about 150 assets, providing monthly statistics to the U.S. Department of State (HIAS)
  • Responsible for incident response management in an IT infrastructure of about 150 assets (HIAS)
  • Assessed Active Directory security for a mining company in Graz (Deloitte)
  • Lead a wifi penetration test in an hospital in Vienna (Deloitte)
  • Conducted a Pentest on Wordpress; asset discovery, enumeration, testing of plugins, testing RESTAPI, reporting (DCSO)
  • Participated in a Pentest of a chemical plant; preparation, asset discovery; testing servers and reverse proxies (DCSO)
  • Wrote a research paper about IT security risks of ChatGPT including examination of the backend technology, database architecture and data privacy measures (DCSO)

Expertises

Information Security Frameworks, IT Governance, Audits

  • IT security regulations and frameworks including NIST Fisma 800 - 53, ISO 27001, 27002, NIS2 and cloud security frameworks, such as BSI-C5, SOC2, FedRAMP, TISAX
  • Development and implementation of IT Governance policies and procedures
  • Auditing technical and organizational requirements of cloud services (e.g. database architecture, session management, authentication, secure software development, cryptography, vulnerability and incident management, ISMS, risk management, identity and access management, business continuity, service supplier management and other domains

Vulnerability management

  • Managing, detecting and remediating vulnerabilities with InsightVM, Nessus, Nmap, Burp Suite, Metasploit Framework and customized tools
  • Deployment, management and troubleshooting of on-premise vulnerability management solutions
  • Configuration of scan engines and firewalls for active and authenticated scanning as well as fixing performance and network issues
  • Remediation of vulnerabilities in web applications, network infrastructure, endpoints and remediation of cryptographic misconfigurations

Offensive security

  • Knowledge of common open source offensive security tools and frameworks under Linux and Windows
  • Knowledge of security assessment and penetration testing processes (e.g. reconnaissance, network penetration testing, testing of servers and web applications)
  • Advanced knowledge of wifi penetration testing including setup of test environment and password cracking
  • Knowledge of web application penetration testing with Burp Suite, Nessus and customized tools
  • Knowledge of Windows and Active Directory security and common attack paths
  • Testing of vulnerabilities and exploits in sandboxed environments
  • Scripting with Powershell, bash, Python

Security operations

  • Monitoring of Windows infrastructure with common SIE
  • Configuring security alerts and triage of security incide
  • Analysis of malware and phishing attempts
  • Security administration of IT infrastructure including W loT devices and endpoints
  • Powershell scripting for administrative tasks

Penetration testing

  • Lead a wifi penetration test in an hospital in Vienna; setting up test environment and toolset; password cracking; reporting (Deloitte)
  • Participated in a pentest of a chemical plant in Germany; preparation, asset discovery; testing servers and reverse proxies (DCSO)
  • Conducted a pentest on Wordpress for a human rights organization in Germany; asset discovery, enumeration, testing of plugins, testing REST-API, reporting (DCSO)
  • Tested IoT devices (CCTV, switches, alarm boxes) within the network infrastructure (HIAS)
  • Performed Active Directory assessments and account audits (HIAS)

Incident response

  • Monitored Windows infrastructure with Log360, ADManager+, AD Audit, PowerShell to detect and triage security incidents (HIAS)
  • Monitored network perimeters with Palo Alto 820 to detect attacks on exposed assets, such as gateways or mail servers, examined and contained maliscious IP addresses (HIAS)
  • Forensic analysis of phishing attempts and potential malware (DCSO, HIAS)

IS Frameworks and Audits

  • Working with NIST Fisma 800 - 53, ISO 27001, 27002, NIS2, Cloud security frameworks and catalogues (C5, SOC2, FedRAMP, TISAX), CIS Benchmarks
  • Development of test actions and required samples
  • Inspecting technical requirements (e.g. database architecture, session management, authentication, secure software development, cryptography, vulnerability and incident management)
  • Inspecting organizational requirements (e.g. ISMS, risk management, identity and access management, business continuity, service supplier management) Notable projects
  • Audited Microsoft O365 Organisation on-site at the Microsoft Campus in Redmond, U.S., according to selected C5 criteria; audit of live systems for risk, vulnerability, incident and business continuity management; reporting and presentation to more than 80 customers from the insurance industry (DCSO)

  • Audited a cloud product from Deloitte at Volkswagen in Wolfsburg according to own ISA criteria (DCSO)
  • Audited ISMS and network infrastructure of a mining company in Germany (DCSO)
  • Audited Amazon Web Services Data Centers in Amsterdam according to selected C5 criteria
  • Project lead for implementation of NIST Fisma 800 - 53 control objectives in preparation for U.S. Department of State Audit Developed and developing IT Governance policies and procedures (HIAS)
  • Supported an audit of a financial institution according to ECB criteria; audited vulnerability management, logging & monitoring and penetration testing (Deloitte)
  • Devoloped IT Governance policies and procedures according to ISO 27001, 27002 for a public entity in Vienna (Deloitte)

Security administration

  • Security administration of IT infrastructure including Windows Server, Firewalls, Switches, CCTV, IoT devices and user endpoints
  • Security administration of Active Directory
  • Asset and account reviews
  • Powershell scripting for administrative tasks

Security Awareness Trainings

  • Consulted Ukrainian IT and cloud service providers how to implement an Information Security Management System (voluntary)
  • Teached ?Data leaks and how to exploit them? (DCSO)
  • Teached ?Web Server Access Control & Potential Vulnerabilities? (DCSO)
  • Awareness trainings, phishing simulations with KnowB4, M365 and other tools (HIAS)

Tools (selection)

  • Rapid7 InsightVM (expert knowledge)
  • Nmap (expert knowledge)
  • Shodan (expert knowledge)
  • Desktop Central, Log360, ADManager (expert knowledge)
  • ESET Protect on-prem (expert knowledge)
  • Palo Alto PA-820 Firewall
  • Common offensive security and network administration tools (e.g. Metasploit Framework, Wireshark, Burp Suite, Aircrack-ng, etc.)
  • PowerShell, bash
  • python (basic)

Soft skills

  • Leadership responsibility
  • Organizational talent
  • Assertiveness
  • Ability to work in a team, intercultural competence
  • Willing to travel

Internship

12/2007 - 02/2008

German Association of Industry and Commerce (DIHK)

Compliance & Sicherheit Finanzwesen

IT Governance
Experte
Vulnerability Management
Experte
Offensive Security
Fortgeschritten
Incident Response
Fortgeschritten
Security Awareness Training
Experte
IT Security Audits
Experte

Branchen

Branchen

  • Insurance
  • Automotive
  • Public Service
  • NGOs

Einsatzorte

Einsatzorte

Vienna (+500km) Munich (+500km) Zurich (+500km)
Deutschland, Schweiz, Österreich
möglich

Projekte

Projekte

1 year
2024-03 - now

IT Audit & Governance

IT Security Specialist (Teamlead)
IT Security Specialist (Teamlead)
  • Project lead for implementation of NIST Fisma 800 - 53 and ISO 27001, 27002 control objectives in preparation for audits by U.S. Department of State; Project management, collecting evidences, configuring network devices, servers, applications and endpoints
  • Developing and maintaining IT governance policies and procedures
  • Risk Management including internal account audits, Active Directory assessments, network security assessments and security assessments of IoT devices
  • Vulnerability management with Rapid7 InsightVM, nmap, Burp Suite, PowerShell; Responsible for maintaining the on-premise solution and distributed scanners; Troubleshooting scan failures, configuring firewalls and host-based IDS for scan engines; Providing monthly statistics to the U.S. Department of State
  • Incident response with Log360, ADManager, ADAudit, ESET on prem, Palo Alto 820; configuring alerts; triage of security incidents; analysis of phishing attempts and malicious payloads
  • Security administration of Windows and Active Directory infrastructure with Endpoint Central, ESET on-prem; Monthly asset and account reviews with PowerShell
  • Threat Intelligence with Rapid7, Shodan, Palo Alto 820 and open sources; monitoring vulnerabilites affecting the local infrastructure
  • Security awareness trainings with KnowBe4; preparing customized training materials for staff members
HIAS RSC
Vienna
1 year
2024-03 - now

Security Operations

IT Security Specialist (Teamlead) PowerShell Bash Python
IT Security Specialist (Teamlead)
  • Responsible for IT security operations in Vienna, Zagreb, Tel-Aviv
  • Vulnerability management & remediation of vulnerabilities
  • Incident response (reviewing and triage of security incidents)
  • Security administration of Windows and Active Directory infrastructure
  • Implementing security configurations and cryptographic requirements
  • Account & Asset Management
  • Threat Intelligence
  • Security awareness trainings
Rapid7 InsightVM Nessus Nmap Burp Suite Metasploit Framework
PowerShell Bash Python
HIAS
Vienna
1 year
2024-03 - 2025-02

Incident Response Management

IT Security Specialist Powershell
IT Security Specialist
Log360 AD Manager Plus Palo Alto Firewall PowerShell
Powershell
HIAS RSC Austria
Vienna
3 months
2024-11 - 2025-01

Devoloped IT Governance policies and procedures according

IT Security Auditor
IT Security Auditor
  • Devoloped IT Governance policies and procedures according to ISO 27001, 27002 for a public entity in Vienna.

Deloitte
Vienna
3 months
2024-11 - 2025-01

Active Directory Assessment

Consultant
Consultant
  • Conducted an assessment of Active Directory security for a mining company in Austria.
Deloitte
2 months
2024-11 - 2024-12

Audited a financial institution according

IT Security Auditor
IT Security Auditor
  • Supported an audit of a financial institution according to ECB criteria
  • audited vulnerability management, logging & monitoring and penetration testing
Deloitte
Vienna
1 month
2024-11 - 2024-11

Conducted Penetration Test

IT Security Specialist
IT Security Specialist
  • Lead a wifi penetration test in an hospital in Vienna
  • setting up test environment and toolset
  • password cracking
  • reporting
Nmap Metasploit Framework Hashcat Aircrack ng
Deloitte
Vienna
1 year 9 months
2023-01 - 2024-09

Audited Microsoft O365 according to BSI C5 criterias

IT Security Auditor
IT Security Auditor
  • Audited Microsoft O365 Organisation on-site at the Microsoft Campus in Redmond, U.S., according to selected C5 criteria
  • audit of live systems for risk, vulnerability, incident and business continuity management
  • reporting and presentation to more than 80 customers from the insurance industry.
DCSO
Berlin, Seattle
3 months
2024-06 - 2024-08

Audited Cloud Service Product

IT Security Auditor
IT Security Auditor
  • Audited a cloud product from Deloitte at Volkswagen in Wolfsburg according to own ISA criteria
Volkswagen
Wolfsburg
3 months
2023-11 - 2024-01

Consulting in the field of information security

Manager (Project lead)
Manager (Project lead)
  • Development of IT security frameworks acc.t. ISO 27001, 27002
  • Performing Active Directory assessments
  • Conducting Penetration Tests
  • Conducting IT security audits
Deloitte Services Wirtschaftsprüfungs GmbH
3 years
2020-11 - 2023-10

Testing security software and solutions

IT Security Professional ISA TISAX SOC2 ...
IT Security Professional
  •  Auditing Cloud Service Providers according to TISAX, SOC2, BSI-C5 criteria on behalf of the automotive and insurance industry; developing test actions, preparing interviews and collecting evidences; examined organizational and technical requirements of cloud products
  • Consulting clients in the field of information security and strategic risk management
  • Testing security software and solutions;
  • Security research and threat intelligence; testing of vulnerabilities, development of exploits, malware analysis
ISA TISAX SOC2 C5 criteria Google Microsoft Atlassian FireEye Dassault Tenable Zscaler AWS
Deutsche Cybersicherheitsorganisation GmbH
5 months
2023-04 - 2023-08

IT Security Assessment

Consultant
Consultant
  • Conducted an IT Security Assessment for a mining company in East Germany according to selected BSI C5 control objectives.
DCSO
4 months
2020-05 - 2020-08

Preparation and advanced training

IT-Cybersecurity-Analyst (with CompTIA certification)
IT-Cybersecurity-Analyst (with CompTIA certification)
Alfatraining
1 year 9 months
2018-08 - 2020-04

Compliance management

IT-Risk Consultant
IT-Risk Consultant
  • Investigations on data and information security violations
  • Threat Intelligence
  • Digital forensics
  • Consulting in the field of information and data security
ILV Advisers e.K.
2 years 7 months
2016-01 - 2018-07

Investigations on data security violations

Risk Consultant
Risk Consultant
  • IT Forensics
  • Investigations on cyber crimes (internet fraud, intellectual property violations, Bank fraud)
  • Risk analyses and country reports
  • Financial forecasts
  • Account Management
Pinkerton Consulting & Investigations, Inc
1 year 10 months
2014-03 - 2015-12

Journalist

Journalist
Journalist



WELTN24, WELT am Sonntag
4 years
2010-03 - 2014-02

Freelance

Spiegel-Online, DER SPIEGEL, NZZ a.o.
2 years
2008-03 - 2010-02

Research and analyses of economical country data

Project manager
Project manager
IHK-Verband zur Förderung der Außenwirtschaft durch das AHK Netz (Delegation of the
German Economy in Ukraine)
  • Public presentations and speeches
  • Collaboration with DEInternational, GIZ, GTAI and others"
IHK-Verband zur Förderung der Außenwirtschaft durch das AHK Netz
2 years
2005-11 - 2007-10

Referendar

Referendar
Referendar

Oberlandesgericht Zweibrücken (Court of Appeal)

Aus- und Weiterbildung

Aus- und Weiterbildung

1 month
2024-12 - 2024-12

Advanced Hacking and Securing Windows Infrastructure

Black Hat
Black Hat
1 year 4 months
2023-01 - 2024-04

Information Systems Auditor (CISA)

ISACA
ISACA
3 years 2 months
2020-07 - 2023-08

Cybersecurity Analyst

CySA +, CompTIA
CySA +
CompTIA
4 years 4 months
2000-10 - 2005-01

First State Examination

University Trier
University Trier

Kompetenzen

Kompetenzen

Top-Skills

IT-Governance Vulnerabiliy Management IT-Security Operations Incident Management Audit Penetrationstest Active Directory Awareness Training BSI C5 ISO 27001 NIST Fisma 800 - 53 NIS2 Dora

Produkte / Standards / Erfahrungen / Methoden

Projects

  • Implemented NIST Fisma 800 - 53 control objectives in preparation for upcoming audit (HIAS)
  • Audited Microsoft O365 Organisation on-site at the Microsoft Campus in Redmond, U.S., according to selected BSI-C5 criteria; reported and presented the results to more than 80 customers from the insurance industry (DCSO)
  • Audited a cloud product from Deloitte at Volkswagen in Wolfsburg according to own ISA criterias (DCSO)
  • Audited Google, Atlassian, FireEye, Dassault, Tenable, Zscaler, AWS and others according to own ISA criteria (DCSO)
  • Audited ISMS and network infrastructure of a mining company in Germany (DCSO)
  • Supported an audit of a financial institution according to ECB criteria; audited vulnerability management, logging & monitoring and penetration testing (Deloitte)
  • Developed IT Governance policies and procedures (HIAS)
  • Devoloped IT Governance policies and procedures according to ISO 27001, 27002 for a public entity in Vienna (Deloitte)
  • Responsible for vulnerability management in an IT infrastructure of about 150 assets, providing monthly statistics to the U.S. Department of State (HIAS)
  • Responsible for incident response management in an IT infrastructure of about 150 assets (HIAS)
  • Assessed Active Directory security for a mining company in Graz (Deloitte)
  • Lead a wifi penetration test in an hospital in Vienna (Deloitte)
  • Conducted a Pentest on Wordpress; asset discovery, enumeration, testing of plugins, testing RESTAPI, reporting (DCSO)
  • Participated in a Pentest of a chemical plant; preparation, asset discovery; testing servers and reverse proxies (DCSO)
  • Wrote a research paper about IT security risks of ChatGPT including examination of the backend technology, database architecture and data privacy measures (DCSO)

Expertises

Information Security Frameworks, IT Governance, Audits

  • IT security regulations and frameworks including NIST Fisma 800 - 53, ISO 27001, 27002, NIS2 and cloud security frameworks, such as BSI-C5, SOC2, FedRAMP, TISAX
  • Development and implementation of IT Governance policies and procedures
  • Auditing technical and organizational requirements of cloud services (e.g. database architecture, session management, authentication, secure software development, cryptography, vulnerability and incident management, ISMS, risk management, identity and access management, business continuity, service supplier management and other domains

Vulnerability management

  • Managing, detecting and remediating vulnerabilities with InsightVM, Nessus, Nmap, Burp Suite, Metasploit Framework and customized tools
  • Deployment, management and troubleshooting of on-premise vulnerability management solutions
  • Configuration of scan engines and firewalls for active and authenticated scanning as well as fixing performance and network issues
  • Remediation of vulnerabilities in web applications, network infrastructure, endpoints and remediation of cryptographic misconfigurations

Offensive security

  • Knowledge of common open source offensive security tools and frameworks under Linux and Windows
  • Knowledge of security assessment and penetration testing processes (e.g. reconnaissance, network penetration testing, testing of servers and web applications)
  • Advanced knowledge of wifi penetration testing including setup of test environment and password cracking
  • Knowledge of web application penetration testing with Burp Suite, Nessus and customized tools
  • Knowledge of Windows and Active Directory security and common attack paths
  • Testing of vulnerabilities and exploits in sandboxed environments
  • Scripting with Powershell, bash, Python

Security operations

  • Monitoring of Windows infrastructure with common SIE
  • Configuring security alerts and triage of security incide
  • Analysis of malware and phishing attempts
  • Security administration of IT infrastructure including W loT devices and endpoints
  • Powershell scripting for administrative tasks

Penetration testing

  • Lead a wifi penetration test in an hospital in Vienna; setting up test environment and toolset; password cracking; reporting (Deloitte)
  • Participated in a pentest of a chemical plant in Germany; preparation, asset discovery; testing servers and reverse proxies (DCSO)
  • Conducted a pentest on Wordpress for a human rights organization in Germany; asset discovery, enumeration, testing of plugins, testing REST-API, reporting (DCSO)
  • Tested IoT devices (CCTV, switches, alarm boxes) within the network infrastructure (HIAS)
  • Performed Active Directory assessments and account audits (HIAS)

Incident response

  • Monitored Windows infrastructure with Log360, ADManager+, AD Audit, PowerShell to detect and triage security incidents (HIAS)
  • Monitored network perimeters with Palo Alto 820 to detect attacks on exposed assets, such as gateways or mail servers, examined and contained maliscious IP addresses (HIAS)
  • Forensic analysis of phishing attempts and potential malware (DCSO, HIAS)

IS Frameworks and Audits

  • Working with NIST Fisma 800 - 53, ISO 27001, 27002, NIS2, Cloud security frameworks and catalogues (C5, SOC2, FedRAMP, TISAX), CIS Benchmarks
  • Development of test actions and required samples
  • Inspecting technical requirements (e.g. database architecture, session management, authentication, secure software development, cryptography, vulnerability and incident management)
  • Inspecting organizational requirements (e.g. ISMS, risk management, identity and access management, business continuity, service supplier management) Notable projects
  • Audited Microsoft O365 Organisation on-site at the Microsoft Campus in Redmond, U.S., according to selected C5 criteria; audit of live systems for risk, vulnerability, incident and business continuity management; reporting and presentation to more than 80 customers from the insurance industry (DCSO)

  • Audited a cloud product from Deloitte at Volkswagen in Wolfsburg according to own ISA criteria (DCSO)
  • Audited ISMS and network infrastructure of a mining company in Germany (DCSO)
  • Audited Amazon Web Services Data Centers in Amsterdam according to selected C5 criteria
  • Project lead for implementation of NIST Fisma 800 - 53 control objectives in preparation for U.S. Department of State Audit Developed and developing IT Governance policies and procedures (HIAS)
  • Supported an audit of a financial institution according to ECB criteria; audited vulnerability management, logging & monitoring and penetration testing (Deloitte)
  • Devoloped IT Governance policies and procedures according to ISO 27001, 27002 for a public entity in Vienna (Deloitte)

Security administration

  • Security administration of IT infrastructure including Windows Server, Firewalls, Switches, CCTV, IoT devices and user endpoints
  • Security administration of Active Directory
  • Asset and account reviews
  • Powershell scripting for administrative tasks

Security Awareness Trainings

  • Consulted Ukrainian IT and cloud service providers how to implement an Information Security Management System (voluntary)
  • Teached ?Data leaks and how to exploit them? (DCSO)
  • Teached ?Web Server Access Control & Potential Vulnerabilities? (DCSO)
  • Awareness trainings, phishing simulations with KnowB4, M365 and other tools (HIAS)

Tools (selection)

  • Rapid7 InsightVM (expert knowledge)
  • Nmap (expert knowledge)
  • Shodan (expert knowledge)
  • Desktop Central, Log360, ADManager (expert knowledge)
  • ESET Protect on-prem (expert knowledge)
  • Palo Alto PA-820 Firewall
  • Common offensive security and network administration tools (e.g. Metasploit Framework, Wireshark, Burp Suite, Aircrack-ng, etc.)
  • PowerShell, bash
  • python (basic)

Soft skills

  • Leadership responsibility
  • Organizational talent
  • Assertiveness
  • Ability to work in a team, intercultural competence
  • Willing to travel

Internship

12/2007 - 02/2008

German Association of Industry and Commerce (DIHK)

Compliance & Sicherheit Finanzwesen

IT Governance
Experte
Vulnerability Management
Experte
Offensive Security
Fortgeschritten
Incident Response
Fortgeschritten
Security Awareness Training
Experte
IT Security Audits
Experte

Branchen

Branchen

  • Insurance
  • Automotive
  • Public Service
  • NGOs

Vertrauen Sie auf Randstad

Im Bereich Freelancing
Im Bereich Arbeitnehmerüberlassung / Personalvermittlung

Fragen?

Rufen Sie uns an +49 89 500316-300 oder schreiben Sie uns:

Das Freelancer-Portal

Direktester geht's nicht! Ganz einfach Freelancer finden und direkt Kontakt aufnehmen.