Cybersecurity, IAM, PAM, Netzwerk und Firewall
Aktualisiert am 04.04.2025
Profil
Freiberufler / Selbstständiger
Remote-Arbeit
Verfügbar ab: 02.04.2025
Verfügbar zu: 100%
davon vor Ort: 0%
Netzwerk/Sicherheit
Firewall
IAM
Pam
Englisch
C1
Albanian
Muttersprache

Einsatzorte

Einsatzorte

Deutschland, Schweiz, Österreich
möglich

Projekte

Projekte

2 Monate
2025-02 - heute

Implementation and Integration

BeyondTrust Implementation Engineer BeyondTrust PRA / PS Splunk Windows Server 2022 ...
BeyondTrust Implementation Engineer

Implementation and Integration of BeyondTrust PRA and PS in the Internal Lab. As part of an internal project a PRA and PS environment was established to serve as a lab for training and hands-on practice. The goal of this project was to integrate and configure both BeyondTrust tools for privileged access management and password safe in a controlled, secure test environment. The lab provided a space for testing and refining configurations, ultimately enhancing the skills of the USO team in these key areas. The setup included the configuration of group policies, session policies, and failover (High Availability) to ensure robust access management and uninterrupted service. Additionally, we implemented API use cases, Jump Policies, and workflows to streamline privileged access requests and improve the management of access rights. Integration with the security provider (AD/Entra ID) and the establishment of SSO with Okta ensured a seamless user experience and centralized authentication. Specific to Password Safe (PS), the integration involved connecting PS with existing systems, enabling the automated discovery and onboarding of assets to ensure efficient credential management. We also configured Smart Rules to define dynamic access controls based on defined criteria and set up platforms and JumpHosts for secure access to critical systems. The onboarding process covered operating systems, databases, and applications, ensuring full system integration into the overall security architecture. The lab is now a valuable resource for the USO team, allowing them to practice real-world configurations and gain hands-on experience with privileged access management and password safe security tools, which will contribute to improved implementations and support future security initiatives.

  • Implemented BeyondTrust PRA and PS for privileged access management and password security.
  • Integrated PRA and PS tools to streamline privileged access and password management across various systems.
  • Configured Group Policies to manage user access and security settings.
  • Set up Session Policies to control access based on user roles and security requirements.
  • Configured Failover (High Availability) to ensure continuous service availability.
  • Set up the Integration Client for automating backups.
  • Installed and configured the Middleware Engine to manage communication between integrated tools and systems (SIEM for advanced session monitoring)
  • Configured Endpoint Credential Manager (ECM) to manage and secure credentials across endpoints (Integration with Password Safe).
  • Defined and configured API use cases for streamlined integrations and automation.
  • Established Account Policies to define security controls for user accounts and privileged access.
  • Set up Jump Policies to manage access to systems through JumpHosts for secure remote management.
  • Created and configured Workflows for automating access management processes.
  • Configured Vendor Access through a Self-Registration Page to enable secure third-party access to the network.
  • Integrated Security Provider (AD/Entra ID) for centralized identity and access management and MFA enablement.
  • Implemented Single Sign-On (SSO) with Okta to streamline user authentication across systems.
  • Integrated Password Safe (PS) to securely store and manage privileged credentials.
  • Enabled Automated Discovery and Onboarding functionalities for easy asset and credential management.
  • Configured Smart Rules to define dynamic access controls and improve security posture.
  • Set up Platforms and JumpHosts for secure access to critical systems.
  • Onboarding of operating systems, databases, and applications into the system for comprehensive security coverage.

BeyondTrust PRA / PS Splunk Windows Server 2022 SQL Server Postman Active Directory VM Ware Azure Entra ID Okta
BeyondTrust PRA / PS (internal Project and Training)
1 Jahr
2024-03 - 2025-02

developing an IT infrastructure

Senior Cyber Security Architect / Consultant Sailpoint ServiceNow IBM Qradar and Splunk ...
Senior Cyber Security Architect / Consultant

A government-affiliated or security-critical organization faced the challenge of developing an IT infrastructure with multi-level security requirements while ensuring the protection of sensitive data across various classification levels. The project aimed to design and integrate security architecture into existing systems while maintaining compliance with the organization's cybersecurity guidelines. Secure configuration management processes were implemented, and information security, cybersecurity architecture, and system security engineering requirements were documented and monitored throughout the acquisition lifecycle. Critical business functions were prioritized in collaboration with stakeholders to align security measures effectively. Security reviews were conducted to identify gaps, and a comprehensive security risk management plan was developed. New system implementations and interfaces were evaluated for their impact on the existing security posture and documented accordingly. The project also included a comprehensive monitoring and threat-hunting solution, establishing a Security Operations Center (SOC) with multiple monitoring and log analysis levels (Blue Team). Ultimately, the project resulted in a robust security architecture that met regulatory requirements while enabling proactive threat detection and mitigation.

  • Cybersecurity Design & Integration ? Develop and implement security architectures for systems with multi-level security and classified data processing, particularly for government organizations.
  • Security Documentation ? Define and track information security, cybersecurity architecture, and system security engineering requirements throughout the acquisition lifecycle.
  • Secure Configuration Management ? Implement and maintain secure configuration management processes.
  • Architectural Compliance ? Ensure that all acquired or developed systems align with the organization's cybersecurity architecture guidelines.
  • Business Function Prioritization ? Identify and prioritize critical business functions in collaboration with stakeholders.
  • Security Assessments ? Conduct security reviews, identify gaps in security architecture, and develop a risk management plan.
  • Impact Analysis ? Evaluate and document how new systems or interfaces affect the organization's security posture.
  • Security Design Evaluation ? Assess security architectures and designs to ensure they meet the required security standards.
  • Security Control Implementation ? Define and document security controls for information systems and networks.
  • Monitoring & Threat Hunting ? Develop and implement solutions for continuous monitoring, log analysis, and threat hunting, including SOC (Blue Team) operations.

Sailpoint ServiceNow IBM Qradar and Splunk Cisco Nutanix Netwrix
Finance Sector
2 Jahre
2022-04 - 2024-03

strategic and comprehensive information security and IT risk management program

Information Security Manager ServiceNow Manage Engine IBM QRadar ...
Information Security Manager

The company needed a strategic and comprehensive information security and IT risk management program to effectively identify and mitigate security risks. A unified security management framework was developed and implemented, establishing clear guidelines for all technology projects, systems, and services. Risk assessments were conducted in close collaboration with business units, integrating security measures into corporate processes. Additionally, cybersecurity awareness was strengthened through targeted training and awareness campaigns. The security organization was provided with clear leadership structures and a sustainable governance model. As a result, consistent application of security standards was achieved, and strategic IT planning was made future-proof.

  • Develop, implement and monitor a strategic, comprehensive enterprise information security and IT risk management program.
  • Work directly with the business units to facilitate risk assessment and risk management processes.
  • Develop and enhance an information security management framework.
  • Understand and interact with related disciplines through committees to ensure consistency. application of policies and standards across all technology projects, systems, and services.
  • Provide leadership to the enterprise?s information security organization.
  • Partner with business stakeholders across the company to raise awareness of risk management concerns.
  • Assist with the overall business technology planning, providing a current knowledge and future vision of technology and systems. 

ServiceNow Manage Engine IBM QRadar CyberArk SailPoint
Finance Sector
4 Jahre
2018-05 - 2022-04

effective security monitoring and vulnerability management program

Senior Information Security Analyst LogRhythm McAfee Netwrix ...
Senior Information Security Analyst

The company needed an effective security monitoring and vulnerability management program to detect and respond to threats in a timely manner. A centralized security monitoring system was implemented to analyze and process security events from multiple sources. Security policies and standard procedures were reviewed, updated, and documented to ensure a consistent security strategy. Additionally, security solutions such as intrusion detection, log management, and vulnerability scanning were configured and regularly maintained. Vulnerability assessments and audits helped identify, prioritize, and mitigate security gaps. IT teams and end users were trained to recognize and report security incidents more effectively. These measures significantly improved the company's security posture and resilience against cyber threats. 

  • Security Monitoring & Incident Response ? Monitor, analyze, and respond to security alerts, incidents, and vulnerability reports from sources such as SIEM, vulnerability scans, and alerts.
  • Documentation & Procedure Management ? Document InfoSec activities and assist with the creation and maintenance of standard operating procedures.
  • Policy Review & Updates ? Review and update information security policies and procedures.
  • System Configuration & Maintenance ? Configure, maintain, and ensure the operational status of information security systems, including log collection, security scanning, intrusion detection, and other related systems.
  • Vulnerability Management ? Review and triage vulnerability alerts, provide analysis, suggest mitigations, track remediation, and manage scheduled scans while identifying gaps and expanding scan coverage.
  • Security Audits & Reviews ? Perform regular audits and reviews of servers, network devices, endpoints, applications, and databases to document gaps in security controls.
  • Incident Diagnosis & Support ? Assist the service desk in diagnosing potential security incidents, troubleshoot issues related to security controls, and help educate IT staff and end users on security best practices and policies.
  • Security Initiative Support ? Support the success of proposed and existing information security initiatives.

LogRhythm McAfee Netwrix Windows Cisco
Finance Sector
4 Jahre 8 Monate
2013-09 - 2018-04

ensuring effective coordination

Team Leader Network Engineer Palo Alto Networking Kemp Technologies Cisco ...
Team Leader Network Engineer

The project aimed to enhance network operations and performance by leading a network team, ensuring effective coordination, and optimizing network infrastructure. A robust network environment was designed and implemented, with clear system configurations and standards documented for consistency and performance. The team focused on troubleshooting network issues, scheduling regular upgrades, and collaborating with network architects to maximize performance and minimize outages. Security measures were established to protect the network system, including defining and monitoring access policies. Additionally, continuous education and participation in professional networks helped maintain an elevated level of expertise within the team. Regular reporting and project management ensured operational status was communicated, and goals were achieved in line with organizational needs.

  • Team Leadership ? Lead the network team, organize their duties, and monitor performance.
  • Network Environment Design ? Establish network environment by designing system configurations, directing system installations, and enforcing system standards.
  • Network Performance Optimization ? Maximize network performance by monitoring performance, troubleshooting network issues, scheduling upgrades, and collaborating with network architects.
  • Network Security ? Secure the network system by establishing and enforcing policies and defining access controls.
  • Continuous Learning ? Update job knowledge through educational opportunities, reading professional publications, maintaining personal networks, and participating in professional organizations.
  • Mission Accomplishment ? Complete related results to fulfill information systems and organizational goals.
  • Reporting & Project Management ? Report on network operational status by gathering and prioritizing information and managing projects. 

Palo Alto Networking Kemp Technologies Cisco LogRhythm Splunk
Finance Sector (internal)
3 Jahre 8 Monate
2009-05 - 2012-12

administration and maintenance of critical IT systems

Network and System Administrator Cisco networking Windows Servers WSUS ...
Network and System Administrator

In this internal role, I was responsible for the administration and maintenance of critical IT systems across the organization. This included managing Active Directory, MS Exchange, VPN connections with Cisco routers, DNS, DHCP, and file servers, as well as configuring DFS for site-to-site replication. I conducted regular system updates through WSUS Server and verified antivirus updates to ensure security. I performed daily, weekly, and monthly backups, ensuring that backup tapes were securely stored. My role also involved diagnosing and troubleshooting hardware and software issues in a network environment, as well as providing end-user support. Additionally, I assisted users in securing the confidentiality of their data and prepared hardware and software specifications based on the IT department?s needs. 

  • System Administration & Maintenance ? Administer and maintain Active Directory, MS Exchange, TMG, VPN connections with Cisco Routers, site replication, DNS, DHCP, File and Print servers, and configure DFS for replication between sites.
  • System Updates & Antivirus ? Ensure system updates are applied via WSUS Server and verify antivirus updates for security.
  • Backup Management ? Perform daily, weekly, and monthly backups, ensuring backup tapes are stored securely.
  • Troubleshooting & Issue Resolution ? Monitor, diagnose, troubleshoot, and resolve hardware and software issues within a network environment.
  • End-User Support ? Provide support to end-users, assisting with technical issues and ensuring smooth operation.
  • Data Security ? Help users secure the confidentiality of their data through best practices and guidance.
  • Hardware & Software Specifications ? Prepare hardware and software specifications based on the IT department?s needs.

Cisco networking Windows Servers WSUS Active Directory MS Exchange
Government Body (International Civilian Office)
5 Jahre 8 Monate
2003-09 - 2009-04

managing and maintaining the organization's IT infrastructure

Network and System Administrator Cisco networking Windows Servers Active Directory ...
Network and System Administrator

In this internal role, I was responsible for managing and maintaining the organization's IT infrastructure, ensuring all systems operated efficiently and securely. I administered key systems such as Active Directory, MS Exchange, VPN connections, DNS, DHCP, and file servers, as well as configuring DFS for replication between different sites. Regular system updates were conducted through WSUS Server, while antivirus software was kept up to date to maintain security. I was also in charge of performing regular backups and ensuring the safe storage of backup tapes. Additionally, I monitored and resolved hardware and software issues, provided end-user support, and helped users secure the confidentiality of their data. As part of my duties, I also prepared hardware and software specifications to meet the IT department?s requirements.

  • System Administration & Maintenance ? Managed and maintained Active Directory, MS Exchange, TMG, VPN connections with Cisco Routers, site replication, DNS, DHCP, File and Print servers, and configured DFS for replication between sites.
  • System Updates & Antivirus ? Ensured system updates were applied using WSUS Server and verified antivirus software updates for security.
  • Backup Management ? Conducted daily, weekly, and monthly backups and ensured that backup tapes were securely stored.
  • Troubleshooting & Issue Resolution ? Monitored, diagnosed, troubleshot, and resolved hardware and software issues within the network environment.
  • End-User Support ? Provided ongoing support for end-users, assisting them with technical issues and ensuring smooth operational functionality.
  • Data Security ? Assisted users in securing the confidentiality of their data and advised on best security practices.
  • Hardware & Software Specifications ? Prepared hardware and software specifications tailored to the IT department's needs.

Cisco networking Windows Servers Active Directory MS Exchange
Government Body (Ministry of Public Administration)

Aus- und Weiterbildung

Aus- und Weiterbildung

  • B.Sc. Management Information Security, Illyria University
  • Honors Awards, Outstanding Servant Leader


Certificates

  • BeyondTrust Implementation Engineer Secure Remote Access (PRA & Remote Support; intern LABS and Trainings)
  • BeyondTrust Password Safe (LABS and Trainings on going)
  • Certified IT Professional (MCITP) - Server Administrator on Windows Server 2008
  • ISC2 CC Certified in Cybersecurity
  • Microsoft Certified Solutions Associate
  • Microsoft Certified Systems Administrator - Microsoft Windows Server 2003
  • Nutanix Certified Professional -Multi-Cloud Infrastructure 6

Kompetenzen

Kompetenzen

Top-Skills

Netzwerk/Sicherheit Firewall IAM Pam

Schwerpunkte

IT-Security
Cyber Security
IAM / PAM
Network Security

Produkte / Standards / Erfahrungen / Methoden

Experience

  • 20+ Years IT


Other experiences

  • 3+ Years CEO / Founder
  • Internal and External Consultant


Core Qualifications

  • IT-Security
  • Identity and Access Management
  • Privileged Access Management (BeyondTrust)
  • StrongDM
  • SIEM (Monitoring) 
  • Information Security Policies and Procedures
  • Stress Tolerance
  • Critical Thinking Skills
  • Incident Management
  • Anti-Virus
  • Network Architecture and Administration
  • Firewall
  • Process Analysis
  • Server Administration
  • Process documentation
  • Regulatory Requirements


Tools

  • BeyondTrust
  • Active Directory
  • Entra ID
  • Netwrix
  • ASA-Firewalls
  • Palo Alto Networks
  • Junipers
  • Kemp Technologies
  • SAN
  • LogRhythm
  • McAfee
  • StrongDM 
  • LANs/WAN/WLAN
  • Troubleshooting TCP/IP
  • Routing and Switching
  • IBM Qradar
  • Splunk

Betriebssysteme

Linux
Windows

Datenbanken

Microsoft Server
SQL Server

Einsatzorte

Einsatzorte

Deutschland, Schweiz, Österreich
möglich

Projekte

Projekte

2 Monate
2025-02 - heute

Implementation and Integration

BeyondTrust Implementation Engineer BeyondTrust PRA / PS Splunk Windows Server 2022 ...
BeyondTrust Implementation Engineer

Implementation and Integration of BeyondTrust PRA and PS in the Internal Lab. As part of an internal project a PRA and PS environment was established to serve as a lab for training and hands-on practice. The goal of this project was to integrate and configure both BeyondTrust tools for privileged access management and password safe in a controlled, secure test environment. The lab provided a space for testing and refining configurations, ultimately enhancing the skills of the USO team in these key areas. The setup included the configuration of group policies, session policies, and failover (High Availability) to ensure robust access management and uninterrupted service. Additionally, we implemented API use cases, Jump Policies, and workflows to streamline privileged access requests and improve the management of access rights. Integration with the security provider (AD/Entra ID) and the establishment of SSO with Okta ensured a seamless user experience and centralized authentication. Specific to Password Safe (PS), the integration involved connecting PS with existing systems, enabling the automated discovery and onboarding of assets to ensure efficient credential management. We also configured Smart Rules to define dynamic access controls based on defined criteria and set up platforms and JumpHosts for secure access to critical systems. The onboarding process covered operating systems, databases, and applications, ensuring full system integration into the overall security architecture. The lab is now a valuable resource for the USO team, allowing them to practice real-world configurations and gain hands-on experience with privileged access management and password safe security tools, which will contribute to improved implementations and support future security initiatives.

  • Implemented BeyondTrust PRA and PS for privileged access management and password security.
  • Integrated PRA and PS tools to streamline privileged access and password management across various systems.
  • Configured Group Policies to manage user access and security settings.
  • Set up Session Policies to control access based on user roles and security requirements.
  • Configured Failover (High Availability) to ensure continuous service availability.
  • Set up the Integration Client for automating backups.
  • Installed and configured the Middleware Engine to manage communication between integrated tools and systems (SIEM for advanced session monitoring)
  • Configured Endpoint Credential Manager (ECM) to manage and secure credentials across endpoints (Integration with Password Safe).
  • Defined and configured API use cases for streamlined integrations and automation.
  • Established Account Policies to define security controls for user accounts and privileged access.
  • Set up Jump Policies to manage access to systems through JumpHosts for secure remote management.
  • Created and configured Workflows for automating access management processes.
  • Configured Vendor Access through a Self-Registration Page to enable secure third-party access to the network.
  • Integrated Security Provider (AD/Entra ID) for centralized identity and access management and MFA enablement.
  • Implemented Single Sign-On (SSO) with Okta to streamline user authentication across systems.
  • Integrated Password Safe (PS) to securely store and manage privileged credentials.
  • Enabled Automated Discovery and Onboarding functionalities for easy asset and credential management.
  • Configured Smart Rules to define dynamic access controls and improve security posture.
  • Set up Platforms and JumpHosts for secure access to critical systems.
  • Onboarding of operating systems, databases, and applications into the system for comprehensive security coverage.

BeyondTrust PRA / PS Splunk Windows Server 2022 SQL Server Postman Active Directory VM Ware Azure Entra ID Okta
BeyondTrust PRA / PS (internal Project and Training)
1 Jahr
2024-03 - 2025-02

developing an IT infrastructure

Senior Cyber Security Architect / Consultant Sailpoint ServiceNow IBM Qradar and Splunk ...
Senior Cyber Security Architect / Consultant

A government-affiliated or security-critical organization faced the challenge of developing an IT infrastructure with multi-level security requirements while ensuring the protection of sensitive data across various classification levels. The project aimed to design and integrate security architecture into existing systems while maintaining compliance with the organization's cybersecurity guidelines. Secure configuration management processes were implemented, and information security, cybersecurity architecture, and system security engineering requirements were documented and monitored throughout the acquisition lifecycle. Critical business functions were prioritized in collaboration with stakeholders to align security measures effectively. Security reviews were conducted to identify gaps, and a comprehensive security risk management plan was developed. New system implementations and interfaces were evaluated for their impact on the existing security posture and documented accordingly. The project also included a comprehensive monitoring and threat-hunting solution, establishing a Security Operations Center (SOC) with multiple monitoring and log analysis levels (Blue Team). Ultimately, the project resulted in a robust security architecture that met regulatory requirements while enabling proactive threat detection and mitigation.

  • Cybersecurity Design & Integration ? Develop and implement security architectures for systems with multi-level security and classified data processing, particularly for government organizations.
  • Security Documentation ? Define and track information security, cybersecurity architecture, and system security engineering requirements throughout the acquisition lifecycle.
  • Secure Configuration Management ? Implement and maintain secure configuration management processes.
  • Architectural Compliance ? Ensure that all acquired or developed systems align with the organization's cybersecurity architecture guidelines.
  • Business Function Prioritization ? Identify and prioritize critical business functions in collaboration with stakeholders.
  • Security Assessments ? Conduct security reviews, identify gaps in security architecture, and develop a risk management plan.
  • Impact Analysis ? Evaluate and document how new systems or interfaces affect the organization's security posture.
  • Security Design Evaluation ? Assess security architectures and designs to ensure they meet the required security standards.
  • Security Control Implementation ? Define and document security controls for information systems and networks.
  • Monitoring & Threat Hunting ? Develop and implement solutions for continuous monitoring, log analysis, and threat hunting, including SOC (Blue Team) operations.

Sailpoint ServiceNow IBM Qradar and Splunk Cisco Nutanix Netwrix
Finance Sector
2 Jahre
2022-04 - 2024-03

strategic and comprehensive information security and IT risk management program

Information Security Manager ServiceNow Manage Engine IBM QRadar ...
Information Security Manager

The company needed a strategic and comprehensive information security and IT risk management program to effectively identify and mitigate security risks. A unified security management framework was developed and implemented, establishing clear guidelines for all technology projects, systems, and services. Risk assessments were conducted in close collaboration with business units, integrating security measures into corporate processes. Additionally, cybersecurity awareness was strengthened through targeted training and awareness campaigns. The security organization was provided with clear leadership structures and a sustainable governance model. As a result, consistent application of security standards was achieved, and strategic IT planning was made future-proof.

  • Develop, implement and monitor a strategic, comprehensive enterprise information security and IT risk management program.
  • Work directly with the business units to facilitate risk assessment and risk management processes.
  • Develop and enhance an information security management framework.
  • Understand and interact with related disciplines through committees to ensure consistency. application of policies and standards across all technology projects, systems, and services.
  • Provide leadership to the enterprise?s information security organization.
  • Partner with business stakeholders across the company to raise awareness of risk management concerns.
  • Assist with the overall business technology planning, providing a current knowledge and future vision of technology and systems. 

ServiceNow Manage Engine IBM QRadar CyberArk SailPoint
Finance Sector
4 Jahre
2018-05 - 2022-04

effective security monitoring and vulnerability management program

Senior Information Security Analyst LogRhythm McAfee Netwrix ...
Senior Information Security Analyst

The company needed an effective security monitoring and vulnerability management program to detect and respond to threats in a timely manner. A centralized security monitoring system was implemented to analyze and process security events from multiple sources. Security policies and standard procedures were reviewed, updated, and documented to ensure a consistent security strategy. Additionally, security solutions such as intrusion detection, log management, and vulnerability scanning were configured and regularly maintained. Vulnerability assessments and audits helped identify, prioritize, and mitigate security gaps. IT teams and end users were trained to recognize and report security incidents more effectively. These measures significantly improved the company's security posture and resilience against cyber threats. 

  • Security Monitoring & Incident Response ? Monitor, analyze, and respond to security alerts, incidents, and vulnerability reports from sources such as SIEM, vulnerability scans, and alerts.
  • Documentation & Procedure Management ? Document InfoSec activities and assist with the creation and maintenance of standard operating procedures.
  • Policy Review & Updates ? Review and update information security policies and procedures.
  • System Configuration & Maintenance ? Configure, maintain, and ensure the operational status of information security systems, including log collection, security scanning, intrusion detection, and other related systems.
  • Vulnerability Management ? Review and triage vulnerability alerts, provide analysis, suggest mitigations, track remediation, and manage scheduled scans while identifying gaps and expanding scan coverage.
  • Security Audits & Reviews ? Perform regular audits and reviews of servers, network devices, endpoints, applications, and databases to document gaps in security controls.
  • Incident Diagnosis & Support ? Assist the service desk in diagnosing potential security incidents, troubleshoot issues related to security controls, and help educate IT staff and end users on security best practices and policies.
  • Security Initiative Support ? Support the success of proposed and existing information security initiatives.

LogRhythm McAfee Netwrix Windows Cisco
Finance Sector
4 Jahre 8 Monate
2013-09 - 2018-04

ensuring effective coordination

Team Leader Network Engineer Palo Alto Networking Kemp Technologies Cisco ...
Team Leader Network Engineer

The project aimed to enhance network operations and performance by leading a network team, ensuring effective coordination, and optimizing network infrastructure. A robust network environment was designed and implemented, with clear system configurations and standards documented for consistency and performance. The team focused on troubleshooting network issues, scheduling regular upgrades, and collaborating with network architects to maximize performance and minimize outages. Security measures were established to protect the network system, including defining and monitoring access policies. Additionally, continuous education and participation in professional networks helped maintain an elevated level of expertise within the team. Regular reporting and project management ensured operational status was communicated, and goals were achieved in line with organizational needs.

  • Team Leadership ? Lead the network team, organize their duties, and monitor performance.
  • Network Environment Design ? Establish network environment by designing system configurations, directing system installations, and enforcing system standards.
  • Network Performance Optimization ? Maximize network performance by monitoring performance, troubleshooting network issues, scheduling upgrades, and collaborating with network architects.
  • Network Security ? Secure the network system by establishing and enforcing policies and defining access controls.
  • Continuous Learning ? Update job knowledge through educational opportunities, reading professional publications, maintaining personal networks, and participating in professional organizations.
  • Mission Accomplishment ? Complete related results to fulfill information systems and organizational goals.
  • Reporting & Project Management ? Report on network operational status by gathering and prioritizing information and managing projects. 

Palo Alto Networking Kemp Technologies Cisco LogRhythm Splunk
Finance Sector (internal)
3 Jahre 8 Monate
2009-05 - 2012-12

administration and maintenance of critical IT systems

Network and System Administrator Cisco networking Windows Servers WSUS ...
Network and System Administrator

In this internal role, I was responsible for the administration and maintenance of critical IT systems across the organization. This included managing Active Directory, MS Exchange, VPN connections with Cisco routers, DNS, DHCP, and file servers, as well as configuring DFS for site-to-site replication. I conducted regular system updates through WSUS Server and verified antivirus updates to ensure security. I performed daily, weekly, and monthly backups, ensuring that backup tapes were securely stored. My role also involved diagnosing and troubleshooting hardware and software issues in a network environment, as well as providing end-user support. Additionally, I assisted users in securing the confidentiality of their data and prepared hardware and software specifications based on the IT department?s needs. 

  • System Administration & Maintenance ? Administer and maintain Active Directory, MS Exchange, TMG, VPN connections with Cisco Routers, site replication, DNS, DHCP, File and Print servers, and configure DFS for replication between sites.
  • System Updates & Antivirus ? Ensure system updates are applied via WSUS Server and verify antivirus updates for security.
  • Backup Management ? Perform daily, weekly, and monthly backups, ensuring backup tapes are stored securely.
  • Troubleshooting & Issue Resolution ? Monitor, diagnose, troubleshoot, and resolve hardware and software issues within a network environment.
  • End-User Support ? Provide support to end-users, assisting with technical issues and ensuring smooth operation.
  • Data Security ? Help users secure the confidentiality of their data through best practices and guidance.
  • Hardware & Software Specifications ? Prepare hardware and software specifications based on the IT department?s needs.

Cisco networking Windows Servers WSUS Active Directory MS Exchange
Government Body (International Civilian Office)
5 Jahre 8 Monate
2003-09 - 2009-04

managing and maintaining the organization's IT infrastructure

Network and System Administrator Cisco networking Windows Servers Active Directory ...
Network and System Administrator

In this internal role, I was responsible for managing and maintaining the organization's IT infrastructure, ensuring all systems operated efficiently and securely. I administered key systems such as Active Directory, MS Exchange, VPN connections, DNS, DHCP, and file servers, as well as configuring DFS for replication between different sites. Regular system updates were conducted through WSUS Server, while antivirus software was kept up to date to maintain security. I was also in charge of performing regular backups and ensuring the safe storage of backup tapes. Additionally, I monitored and resolved hardware and software issues, provided end-user support, and helped users secure the confidentiality of their data. As part of my duties, I also prepared hardware and software specifications to meet the IT department?s requirements.

  • System Administration & Maintenance ? Managed and maintained Active Directory, MS Exchange, TMG, VPN connections with Cisco Routers, site replication, DNS, DHCP, File and Print servers, and configured DFS for replication between sites.
  • System Updates & Antivirus ? Ensured system updates were applied using WSUS Server and verified antivirus software updates for security.
  • Backup Management ? Conducted daily, weekly, and monthly backups and ensured that backup tapes were securely stored.
  • Troubleshooting & Issue Resolution ? Monitored, diagnosed, troubleshot, and resolved hardware and software issues within the network environment.
  • End-User Support ? Provided ongoing support for end-users, assisting them with technical issues and ensuring smooth operational functionality.
  • Data Security ? Assisted users in securing the confidentiality of their data and advised on best security practices.
  • Hardware & Software Specifications ? Prepared hardware and software specifications tailored to the IT department's needs.

Cisco networking Windows Servers Active Directory MS Exchange
Government Body (Ministry of Public Administration)

Aus- und Weiterbildung

Aus- und Weiterbildung

  • B.Sc. Management Information Security, Illyria University
  • Honors Awards, Outstanding Servant Leader


Certificates

  • BeyondTrust Implementation Engineer Secure Remote Access (PRA & Remote Support; intern LABS and Trainings)
  • BeyondTrust Password Safe (LABS and Trainings on going)
  • Certified IT Professional (MCITP) - Server Administrator on Windows Server 2008
  • ISC2 CC Certified in Cybersecurity
  • Microsoft Certified Solutions Associate
  • Microsoft Certified Systems Administrator - Microsoft Windows Server 2003
  • Nutanix Certified Professional -Multi-Cloud Infrastructure 6

Kompetenzen

Kompetenzen

Top-Skills

Netzwerk/Sicherheit Firewall IAM Pam

Schwerpunkte

IT-Security
Cyber Security
IAM / PAM
Network Security

Produkte / Standards / Erfahrungen / Methoden

Experience

  • 20+ Years IT


Other experiences

  • 3+ Years CEO / Founder
  • Internal and External Consultant


Core Qualifications

  • IT-Security
  • Identity and Access Management
  • Privileged Access Management (BeyondTrust)
  • StrongDM
  • SIEM (Monitoring) 
  • Information Security Policies and Procedures
  • Stress Tolerance
  • Critical Thinking Skills
  • Incident Management
  • Anti-Virus
  • Network Architecture and Administration
  • Firewall
  • Process Analysis
  • Server Administration
  • Process documentation
  • Regulatory Requirements


Tools

  • BeyondTrust
  • Active Directory
  • Entra ID
  • Netwrix
  • ASA-Firewalls
  • Palo Alto Networks
  • Junipers
  • Kemp Technologies
  • SAN
  • LogRhythm
  • McAfee
  • StrongDM 
  • LANs/WAN/WLAN
  • Troubleshooting TCP/IP
  • Routing and Switching
  • IBM Qradar
  • Splunk

Betriebssysteme

Linux
Windows

Datenbanken

Microsoft Server
SQL Server

Vertrauen Sie auf Randstad

Im Bereich Freelancing
Im Bereich Arbeitnehmerüberlassung / Personalvermittlung

Fragen?

Rufen Sie uns an +49 89 500316-300 oder schreiben Sie uns:

Das Freelancer-Portal

Direktester geht's nicht! Ganz einfach Freelancer finden und direkt Kontakt aufnehmen.