I am an IT security and cyber security consultant with more than 20 years of experience.
Aktualisiert am 26.04.2024
Profil
Freiberufler / Selbstständiger
Remote-Arbeit
Verfügbar ab: 26.04.2024
Verfügbar zu: 100%
davon vor Ort: 100%
cyber security expert
IT-Sicherheitsarchitektur
CISO
OT security
Spanish
Mother Tounge
English
Fluent
German
Good

Einsatzorte

Einsatzorte

Deutschland, Schweiz, Österreich
möglich

Projekte

Projekte

3 years 11 months
2022-01 - now

Definition of the OT Security Concept

Enterprise Security Architect Mulesoft Netskope Zscaler ...
Enterprise Security Architect
Leadership skills:
  • Definition of the OT Security Concept with Electrical and Mechanical engineers in some significant industries with different HMI, PLC, and SCADA in the Oil, railways, Metal, Pharma, Energy nuclear plants, and Car industry.
  • Develop a Global Major OT Security Concept, from concept to Policies and Standards, from Policies and Standard Operation Procedures to use cases or workflows in the Security Solutions Catalogue for the OT shopfloor. 
  • Working with the Bell-LaPadula, Purdue Model specific to industrial control systems, Zero Trust and Defense in Depth will adopt a combination of these approaches to develop a Sabsa and Togaf ADM tool baselining blueprinting approach.


Governance & Control:

  • Cenelec TS 50701, IEC 62443, 5012X series, 2702x, Cloud security NIST, CIS, TISAX&TARA.
  • Use primary trust sources like Passive discovery, ITSM, CMDB, surface discovery, DNS audit, and other methodologies to build the proper data protection flows based on discovering shadow IT and OT assets. 
  • I built and used the Security Architecture modelling tools and reference models from different vendors and organizations.


Technical controls:

  • Cloud Workload Protection Container Security Kubernetes KSM Security. 
  • Cloud inventory. 
  • Cloud compliance.
    • API Security Gateways: Mulesoft
    • Cloud access security broker CASB: Netskope, Zscaler
    • Cloud Infrastructure Entitlements Management CIEM: Aqua
    • Cloud-Native Application Protection Platform CNAPP: Prisma PA
    • Cloud Security Posture Management CSPM: Defender Cloud
    • Cloud Workload Protection Platform CWPP: Sysdiag
    • Network Behaviour Analytics: Darktrace OT, Vectra OT
    • Embed Security: Selinux, CyberX, Defender Linux, Nanolock
    • Vulnerability Management: Nozomi, Armor, Claroty CTE
    • Remote Privileged access: Claroty SRA, Cyberarc
    • Freezing technologies: Faraonics, Solidcore
Mulesoft Netskope Zscaler Aqua Prisma PA Defender Cloud Sysdiag Darktrace OT Vectra OT Selinux CyberX Defender Linux Nanolock Nozomi Armor Claroty CTE Claroty SRA Cyberarc Faraonics Solidcore
Alstom-SBB-Dbahn, Bistronic-Siltronic, IAV-Vitesco, Siemens-RWE, and Arxada- Aramco
9 months
2021-05 - 2022-01

lead Security operations centre

Leadership skills:
  • I train colleagues and share knowledge as the subject matter expert in the security's overall strategic and operative management. 
  • Supervising the management - including daily and ad hoc activities - providing appropriate mentoring, training and retaining cyber talents through profound expertise. 
  • Responsible for the daily management of the security operations team, achieving highly effective technical and strategic objectives for identification, evaluation, quantification, reporting, communication, mitigation measures and supervision to strengthen the threat management, modelling, vectoring, and the development of use cases for security monitoring reports, dashboards &metrics. 
  • Significant collaborations and stakeholder management across the company during restructuring processes and growth. 
  • Oversight of the outsourced suppliers with the required rigour and discipline to ensure services are delivered promptly, limiting impact to the business, including establishing, monitoring, and evaluating service metrics


Strategy:

  • Development of functions to maintain and implement a strategy that aligns with business objectives control frameworks, applied technologies, milestones, critical paths and risks, regulatory bodies, key stakeholders and customers


Governance & Control:

  • Reliable methods in monitoring risk appetite and robust controls by reporting metrics to the 'Office for Governance and Risk Management.


Pursuing Technical Goals:

  • Work within threat intelligence and vulnerability management, detection and response functions. 
  • Automation and orchestration across the threat event landscape monitored and analyzed Microsoft Security Central SIEM alerts to identify security issues for remediation and investigate events and incidents. 
  • Tune rules and thresholds to improve the fidelity of alerts. 
  • Prepared SOC reports of analyses and results of pen-testing security monitoring technologies (e.g. Defender ATP EDR, Palo Alto Networks XDR, Endgame). 
  • Knowledge of MITRE ATTACK frameworks. 
  • Determination of tactics, techniques and procedures (TTPs) against intruders applying AttackIQ simulation solution.

Sonova
Zurich
7 months
2020-11 - 2021-05

Managed and planned the migration process

ZERO TRUST ZTA SASE SECURITY ARCHITECT
ZERO TRUST ZTA SASE SECURITY ARCHITECT
Assisting with the architecture's current and future state, with changes in organizational strategy, customer requirements, and the greenfield IT security client landscape. Help with replacements that must be done to the IT security architecture based on supplier, performance, capacity issues and regulatory requirements that are explicitly predefined by the organization's functional management:
  • Managed and planned the migration process from VPN to SASE FMO solutions.
  • Implementation of split-brain PEP scenario for ZTA policies and corresponding platforms.
  • Integration of all PEP positions into the client's SOAR, considering that the threat intel and all the telemetric and risk signals from different PEPs came via API.
  • Implementation of micro-segmentation and SDP utilizing two solution providers.
  • Executed and maintained IAM, PIAM, PUAM, data governance, APP tracking, cloud and DCS; integrated into the new ZTA use cases and converted access scenarios.
  • Preparing definitions for requirements, SoW, HLD, LLD, Runbooks, lifecycle and operational handbooks for the ZTA use cases and the operating team.
  • Integration of software-defined networks with the ZTA use cases supports and facilitates internal workloads.
Daimler, Mercedes, Benz
1 year 3 months
2019-08 - 2020-10

THREAT ANALYSIS

ADVISOR
ADVISOR
  • Reaction to critical computer security incidents by collecting, analyzing, assembling, coordinating, and preserving digital evidence according to ISO27035, identifying gaps and advising on remedying the risks.
  • Collected forensic proof for disciplinary investigations; reviewed log files and events; correlated data and advice for courses of action.
  • Work on IAM and PAM access, investigation of possible unauthorized access privileges, revocation of access, report of violations and recording of terminals and interactive sessions.
  • Designed, analyzed, monitored, and operated security network applications, which detected important data privacy and legal compliance information.
  • Designation of both - a technical and a non-technical security assessment of the network infrastructure, including a root cause analysis for systemic security problems with written reports; the latter comprises assessment-based results (RCAs)
  • Developed and designed customized tool integrations for investigations, tracing, and research to ensure an automatic deployment and monitoring of cloud infrastructures and applications.
  • Determining attackers' tools, tactics, procedures (TTP) and indicators of compromise (IoCs) that may be applied to current and future investigations.
  • Used Cyber Chain contains APT and established tools against cyber threats.
  • Coordinated threat-tracing activities across the web, leveraging intelligence from multiple internal and external sources and the latest security technologies.
  • Tracing and identifying threat actor groups and their techniques, tools, approaches and identification of breaches in IT infrastructure by imitating attackers' behaviour and responses using Splunk ES.
  • Monitor and analyze network traffic and IDS alerts using RSA Security Operations, Sourcefire, NetScout, Wireshark, HP OpenView, and FireEye.
  • Allocating and producing multiple security precautions according to ISO 27k, Marisk, Bafin, Kritis, and Cis20 for the framework's control process.
  • Implementation of risk analyses and process definitions for ISO controls. Document all activities during assessments while providing status updates on the company's direction during the life cycle of security processes.
  • The assistance of the governance team with implementing the eGRC tool Archer and the Compliance Management Module.
  • Design and run a secure hybrid cloud infrastructure with IaaS and SaaS components
The Bavarian Chamber Pensions VKB
Munich Germany
1 year
2018-08 - 2019-07

Moderate system inventory privacy control assessments

DATA SECURITY OFFICER
DATA SECURITY OFFICER
  • Moderate system inventory privacy control assessments are reintroduced using NIST 800-53 and NIST 800-122 controls.
  • Review the System of Records Notice (SORNs) and advise on privacy risks, including privacy act statements, disclaimers, and Cooperative Research And Development Agreements (CRADAs).
  • Maintain a range of sharing agreements (MOUs, Memorandum of Understanding, and other data use agreements, rules of behaviour, and warning banners (consent and opt-in language). The leadership of the Privacy Information Map (PIM) initiative determines the location and nature of PI stored in databases.
  • Drafting a privacy handbook for Sensitive Data Management information governance (SDM). Development and administration of activities like data mapping framework between various data items with regulations, such as CCPA, GDPR, PIPA, PDPA, and PIPEDA.
  • Authorisation of policies and procedures for data retention and media sanitation (Storage Limitation Principle). Identify the most suitable operating model for the client and update the RACI matrix to occupy the required roles of GDPR and CCPA.
  • Creating process flows to operational response to subject data requests, Data Protection Impact Assessments (DPIA), and Data Subject Access Requests (DSAR).
  • Worked as a privacy protection officer for the client, conducting DPIA and doing Records of Processing Activities (RPA).
  • Development of data flow maps for crucial business processes and producing RoPA entries, according to article 30 of the client's security questionnaires (Standardised Information Gathering (SIG), CAIQ (Consensus Assessments Initiative Questionnaire).
  • Work with cloud-based data storage architectures and controls that are commonly used to secure those kinds of environments, such as encryption, tokenization, data masking, data lifecycle management, data rights management (DRM) technology, retention, deletion and archiving policies, thus ensuring the suitability of cloud data events.
  • I am auditing the telemetry train system per norms DIN 50600, DIN 820, IEC 62443, and RIL11402.
  • Hardening of the systems: Openscap, Lynix, Tripwire, File Integrity, HIDS, Privilege escalation, and Logging.
  • Providing hardening subject matter expertise utilizing DISA STIGS, SRG'S (Security Readiness Guides), and the DISA SCAP tool.
  • Establishment of Micro Services Container Security & Cloud-Native Security.
  • Introducing a 'Bring Your Device' program compliant with security policies to ensure employees' communication management via smartphones and tablets across the organization
  • Analyses hundreds of security monitoring and appliance logs to investigate and tune each incident's correct remediation actions and escalation paths.
  • Performing DLP (Data Leakage Systems) installation, maintenance and tuning procedures and devices in the Symantec product using DLP.
  • Installing the existing AV replacement solution, including defence and response tools like Carbon Black, Crowd Strike, and open-source tools.
CGC Pharmaceutical
Canada
2 years 5 months
2016-03 - 2018-07

RISK AND MANAGEMENT ISO OFFICE

SENIOR CONSULTANT
SENIOR CONSULTANT
  • Managing to relocate security perimeter devices and integrating with new standards.
  • Implemented security devices' application firewalls and tuned with Tufin, Barracuda, IBM Guardium, and F5 ASM.
  • Creating the Network Matrix. Replacing perimeter security into ASM, including L3 FWs, F5 balancers, and WAF
  • Integrating safeguards for fraud, data leakage, e-commerce fraud, server intrusion, and ISP denial of service by implementing Imperva WAFs (Web application firewalls).
  • Maintainance of cloud security AWS: Docker WAF that integrates the containers; Docker RASP from Wazuh and Ansible automatises part of the Devsecops regarding the micro-services security.
  • Implementing a Twistlock security solution for RASP in AWS containers.
  • Document each release or project (project plan, the weekly report status, meeting schedule, gate review PowerPoint presentations), and ensure all updated documentation repositories.
  • Creating a SOC monitoring team, procedures, workflows, frameworks, controls and SIEM correlation rules.
  • Remediating deep insight into conducting formal tests on web-based applications and networks using deep assessment parameters.
  • Transformation of the adversarial, unproductive relationship between Internal Audit and IT departments into a practical, proactive partnership.
  • Creating a catalogue of harmful or inexistent use cases.
  • Implementing Qradar and Carbon Black.
  • Performing the migration from TMG to Zscaler cloud DLP and CASB proxy firewalls.
  • Provided technical review of report items from various network devices, such as log files, screenshots, configuration files, permissions, etc., to ensure Cloud Service Providers were closing and mitigating open findings with their POA&M.
  • Assisted in interpreting various vulnerability and compliance scanning results from Assured Compliance Assessment Solutions (ACAS), Security Content Automation Protocol (SCAP), and commercial products HP Fortify Cast.
Deutsche Boerse (German Stock Market)
Frankfurt, Germany
6 months
2015-09 - 2016-02

PS PROFESSIONAL SERVICES SECURITY PRE-SALES

  • Implementing AAA and PIM: Cisco ISE + Cyberark for Network Access Control in cabled and wireless devices.
  • Implementing the NAC agent compliance for checking the antivirus and Cisco cloud-based EDR.
  • Reviewing cloud service providers.
  • Assisting clients with transitions to Microsoft O365/EMS cloud services, such as tenant setup and service configuration, focused on cyber risk mitigation.
  • Collaborating with the incident management team to evaluate processes and standard practices.
  • Performing Cloud Governance Compliance and Auditor/Services Functional Owner/CIO. Coordinating carefully with four compliance analysts and 75 cloud vendors to remediate audit findings.
  • Designed, implemented, and managed the VMware virtual infrastructure, testing and improving quality assurance.
  • Creating a series of penetration tests for further testing simplified ten development of strategic tests, Pen testing, Fraud OSINT and humming.
  • Performing industrial security audits, checking telemetry sensors and servers, robustness and vulnerability assessment, CentOS hardening, and auditing.
  • Performing attack simulations on the client's systems and web application firewalls to determine and exploit security flaws (evasion techniques).
  • Executing application and infrastructure penetration tests as well as physical security assessments. Documenting and discussing security findings within the information technology teams.
HCL, INFOSYS
Germany
2 years 2 months
2013-07 - 2015-08

Implementing Zero Trust and micro-segmentation

Security Project Manager
Security Project Manager
  • Managing the centralization of security for all European branch offices.
  • Administering the migration to a new data centre security and centralized model and consolidation costs and technologies offered in a service model.
  • Creating the SOC: recruiting, training, implementing SIEM and runbooks, incident handling procedures, and building a new security Cisco SDN environment.
  • Implementing Zero Trust and micro-segmentation with VMWARE NSX-T and Palo Alto Panorama.
  • Administering provision (device providers), integration, engineering (in-depth security net infrastructure) and support activities. Collaborating within the design development of support workflows.
  • Enhance and monitor security measures to protect the corporate network, systems, data, applications, and corporate image.
  • Creating security correlation rules: content rules in Splunk for new BIA cases.
  • Designed, implemented, and managed the 2nd generation SecureAuth Cloud services infrastructure, including all web, database, directory, and certificate authority services. Furthermore, implementation of the 2nd generation SecureAuth IdP hardware.
  • Developing and enforcing cloud security standards in AWS and Azure, e.g. IAM policies, security groups, S3 bucket policies, encryption, network security, cloud workload and container security, logging, monitoring, etc.
  • Work with IAM Roles, SSH essential public/ private key, KMS
  • Implementation of WAFs and NGFW NVAs in Azure and of a concept with Zero trust and micro-segmentation
  • Introducing a VPN between cloud and premise reengineering.
  • Managing and participating in ongoing Office 365 security and strategy discussions
  • Updating Office 365, including changes updates, roadmap & releases, and third-party solutions, discovering flaws in solutions' security, advice of CASB, preventing data exfiltration and shadow usage of security information.
  • Administration of transforming a middle (commercial) on-premise solution to an MS Azure and AWS cloud-based solutions. Establishment of a security policy program and corresponding security and privacy policies based on NIST and ISO frameworks
Hyundai car Company
Offenbach, Germany
3 years 3 months
2010-04 - 2013-06

Implementing WAF for the Bank in transparent mode and KRP

SECURITY CONSULTANT
SECURITY CONSULTANT
  • Implementing WAF for the Bank in transparent mode and KRP (kernel reverse process).
  • Installing a file firewall for SharePoint (Imperva) is a solution to avoid data exfiltration and orchestrating the approval for document sharing inside large organisations.
  • Assisting with reviewing program-related documentation, such as standard operating procedures, security policies, plan of action and milestones, and other documentation.
  • Collaborating with clients in assessments and audits for compliance to include enhancements beyond baseline requirements, as determined by regulation, risk assessments, and organisational risk appetite.
  • Developing a Risk and Controls Matrix (RCM), listing GAPP controls and risks associated with control failure.
  • Working under the guidance of CISOs, performing SOC2 Type I readiness assessment activities.
  • Participating in the company's auditing, overseeing regular audit activities to complete the SOC2 audit for the selected trust criteria.
  • Fine-tune the SOC monitoring team and manage procedures, workflows, frameworks, controls, and SIEM rules. Migrating IPS from McAfee IntruShield to Cisco Firepower. Meanwhile, leading other security portfolio projects parallels the senior SOC analyst role.
  • Working on improvement for security services and providing feedback and verification about existing security issues.
  • Analysing various vulnerability detection applications, i.e., Nessus, Rapid7/ Nexpose,
  • AppDetective, Cenzic Hailstorm, WebInspect, Metasploit, and Acunetix Web Vulnerability Scanner.
  • Drafting policies and procedures that require advanced verbal and written communication and an appropriate presentation.
  • Developing and revising policies, standards, procedures and guidelines for the general operation ofdata protection. Creation of emergency plans for continuity and contingency regarding network security and disruptions (HA and DDoS).
Deutsche Bank
UK
2 years 11 months
2007-05 - 2010-03

Proposing RFIS and RSIs for data lake applications

CYBERSECURITY AUDITOR
CYBERSECURITY AUDITOR
  • Analysing application logs to find indicators for reporting security flaws, threats and identity management issues related to web app business areas.
  • A founding member of the Information Security Governance, Risk and Compliance Committee, si responsible for translating government statutory and regulatory requirements, industry standards, and contractual requirements into IT Security and Risk Management frameworks, policies, procedures, guidelines, and best practices
  • Accomplished reengineering the network topology and improving the WAF-IDS environment.
  • Performing perimeter analyses for the customer and recommending security improvements, efficiency, supportability, and incident escalation (Firemon).
  • Creating a roadmap for the whole security life cycle technology (Director's security plan with subsequent GAP analysis).
  • Implementing DMS, a document management system based on open source. Implementing more than 20 security projects: OpenDNS, WAF, IDS, SIEM, AV, MDM, IOC scanner; commercial and open-source ones like Qualys, Nessus, Retina, Rapid7, Sofia, Burp suite, Nmap, Joval, and integrating of the results with SIEM to correlate and score the assets SLAs in the IR process.
  • Incorporating security into mobility strategy using the latest network security guidance, i.e. (SRG) Security Readiness Guides, (STIG) Security Technical Implementation Guides, Industry Best Practices guidance, etc.
  • Initiating IT systems for inventory, asset, classification, and labelling projects.
  • Responsible for the vulnerability management program, including periodic scanning, reporting, and tracking remediation of security vulnerabilities.
  • Executing the Information Assurance Vulnerability Management (IAVM) process to ensure dissemination, reporting, and compliance.
  • Implemented a cluster of 200 DAMs (Database activity monitoring) gateways in HA and 100 clusters of WAFs and integrated them with SIEM ArcSight.
  • Assisting SOC manager in creating use cases in the SIEM for WAF.
  • Installing three layers of filtering of SIEM for data retention regulation of the ISP's business.
  • Executing all other IA/CS monitoring and reporting to ensure compliance, including developing and maintaining POA&Ms.
Ericsson
Stockholm, Sweden
3 years 3 months
2004-02 - 2007-04

Creating plans

SENIOR CONSULTANT IN GOVERNANCE
SENIOR CONSULTANT IN GOVERNANCE
  • Ensuring security methodology followed NIST compliance, 800.53, RMF, and POAM methods.
  • Directing security plan implementation, drafting security directives, risk analysis, and impacted business analysis.
  • Creating plans of action and milestones and managing risk remediation across all locations. Managing third-party risk assessments on all new implementations and significant upgrades.
  • Managing Peripheral Component Interconnect.
  • Identifying data anomalies, errors, non-compliance level degradation and increasing users requiring a DSS with a data quality component.
  • Led the project of consolidating the security policies program by drafting a new one and updating existing policies (technical and process), identifying its compliance requirements
  • Cooperating with IT, Finance, and Legal Departments to remediate all existing information security and vendor risk assessment gaps.
  • Generating pre-sales: active involvement in developing proposals, statements of work (SOW), engagement letters, staffing estimates for privacy engagements, reporting project status to C-level executives, and providing SWOT analysis.
  • Reviewing pen testing and vulnerability scanning results and working with the InfoSec team to remediate gaps.
  • Completing the Payment Card Industry Data Security Standard (PCI-DSS)
  • Self-Assessment Questionnaires (SAQ).
  • Assess client security architectures and recommend modifications or adaptions of specific technologies to meet NIST security standards.
  • Executing an evidence audit following all the ISO 27k standards.
  • Detecting abnormal behaviour and categorising user network traffic profiles with ArcSight SIEM and DPIs (Solera); enforcing the authentication for data login and network rights integrated with other perimeter security devices, such as IPS/IDS, NAC, and AV. 
  • Implementing data loss prevention of corporate data with different protocol inspections: IronPort email, McAfee Web-washer, Bluecoat for web and GTB, Net witness RSA, IronPort, and Net-beholders, the rest of the protocols.
Ernst & Young
Barcelona, Spain
1 year 8 months
2002-06 - 2004-01

Managing Security Services (MSS)

CYBERSECURITY INCIDENT HANDLER
CYBERSECURITY INCIDENT HANDLER
Managing Security Services (MSS) for most of the Banks in Spain, including ant phishing and Perimeter.
  • Administering support, Sales, and engineering for MSS services and Verisign Teraguard SIEM System.
  • Maintaining operations support for the corporate network of Andalusia, which has more than 7,000 network points based on ATM cells and MPLS labels. Proactively maintaining, supporting, and provisioning SLAs.
  • Work on transmission, data and wireless radio equipment SDH, PDL, and DWDM with Lucent, Alcatel Cisco, Pirelli, Ericson, Motorola, and Juniper equipment.
  • Supporting Level 2 for the VIP customers' in-network services
S21sec Telefonica
Madrid, Spain

Aus- und Weiterbildung

Aus- und Weiterbildung

1999 - 2003
BACHELOR OF TELECOMMUNICATIONS

UNIVERSITY OF MADRID


PROFESSIONAL CERTIFICATIONS

  • ISO3100 Course
  • Data Protection Course
  • SABSA Architect - Course
  • Information Privacy Manager Course


2016

CISM ISACA


2019

Cloud Security Professional


2018

  • CCSK Cloud Security
  • CISA Information Security Auditor


2017

EC Security Analyst


2009 - 2011

ISO 27001 and ISO20000 Leading auditor


2010

  • EC Certified Ethical Hacker
  • EC Forensic investigator. 2010


2009

CISSP Certified Information Systems Security Professional


2006

GIAC GCFI Forensic analyst


2007

ITIL Basics


PRODUCT CERTIFICATIONS

2019

  • Qualys VAS
  • Zscaler Cloud DLP
  • AWS Certified Security Specialist
  • Twistlock RASP Essentials
  • Carbon Black Protection, Response EDR
  • Alien Vault Security Engineer


2018

  • CrowdStrike EDR
  • Log rhythm Analyst
  • Qradar Administration


2017

  • Cylance NGAV
  • Cybrary Threat Hunting


2016

  • AlgoSec administrator
  • Infoblox
  • Sophos Firewall - administrator


2015

  • Barracuda WAF administrator
  • Paloalto Security Engineer
  • Fireye Administration


2014

  • ArcSight Solution Engineer
  • Sonicwall Administrator


2013

  • WatchGuard Certification
  • Imperva Secure Sphere WAF, DAM, FIM, SharePoint
  • Barracuda Spam administrator


2012

Fortinet Secure NSE

Position

Position

  • IT security auditor
  • OT ICS security architect
  • SOC CISRT Analyst and Lead
  • IT security engineer
  • Information Security Officer CISO
  • Data protection officer
  • Professional services security solutions

Kompetenzen

Kompetenzen

Top-Skills

cyber security expert IT-Sicherheitsarchitektur CISO OT security

Produkte / Standards / Erfahrungen / Methoden

Profile

  • I have a comprehensive understanding of security management systems and am intimately familiar with auditing procedures and security best practices. 
  • I understand the fact that securing online transactions is a never-ending business with new emerging threats daily. 
  • Good with the design of security systems, defining perimeter access, and continuously reviewing these arrangements. 
  • I developed enterprise security standards including encryption, ISMSs, PAM. 
  • With high profile data breaches lately, it is vital companies can provide safety guarantees to customers. 
  • I take pride in knowing I can help set up and maintain those various security settings, both internally and externally. Through continuous education and research, I am up to date on industry trends and technologies and remain one step ahead of all cyber-attacks. 
  • It is my focus to ensure company information remains safe and in the proper control. 
  • I have responded to several critical threats during my time in the organization. 
  • As an information security professional, I understand the high-security needs of corporate law firms. 
  • With extensive experience handling varying security threats, regulating data access, and am confident I will be an asset to your organization for those very reasons.
  • I am detail-oriented and provide strong layers that are difficult for hackers to penetrate.
  • I can ensure the confidentiality and security of key sensitive data. 
  • As an Information Security Analyst, I am adept at-risk assessment, planning, and mitigation strategies. 
  • Moreover, while my on-the-job experience has afforded me a well-rounded skill set, including first-rate project management and problem-solving abilities:
    • Overseeing hardware infrastructure and incorporating new technologies.
    • Examining systems to uncover vulnerabilities and access attempts.
    • Maintaining and testing corporate response plans.
    • Increasing security awareness throughout the company.
  • I am responsible, honest, and efficient and have a long history of getting things done whilst working under pressure and to deadlines.
  • Possessing superb analytical skills, I can interrogate data to find out if there is any fraud, violation of laws or irregular management policies.
  • Furthermore, I have a comprehensive understanding of complex accounting methods, and experience within an Internal or External audit environment.
  • I am a good team player who can easily interact with peers and counterparts whilst working independently or as part of a team. 
  • I also have well-developed verbal as well as written communication skills and can present information, and compile reports of audit results to senior managers. 
  • I have the temperament for today?s daily "turf wars" and my track record provides the necessary certification for this claim.
  • I have a solid educational foundation and a passion for information security. 
  • Building a strong, focused, and dedicated team has helped me develop a successful career, thus far. 


Summary

I am an IT security and cyber security consultant with more than 20 years of experience in analyzing, recovering, mitigating, auditing, and safeguarding hundreds of architectural incidents in containers, VMs, endpoints, mobile devices, servers, SCADA, network boundaries, mainframes, wireless, IoTs, embed, and cloud instances. I look forward to using my years of professional experience in those fields in an IT company specializing in information security and cyber information security.


Reveal breaking points, Shadow infrastructure

OSINT

  • Spycloud
  • Cycognito
  • SpiderfootHX
  • Insight TI Rapid7 ZeroFOX
  • Security Score Card
  • Maltego
  • BitSight
  • Censys
  • FOCA
  • Faraday Opensource
  • MISP TI Opensource
  • Data and API surface discovery in cloud tenants


Network protections NBAR NBAN NAND:

  • Arbor Peaxflow
  • Allot
  • BroIDS
  • Zeek Darktrace IT and OT
  • Netenforcer
  • Sandvine
  • Suricata
  • Intrushield
  • Proventia Site defender
  • Tipping Point
  • Nozomi OT
  • Guardicore Illumio
  • Vectra O365


EPP XDR EDR AV NGAV:

  • CarbonBlack
  • Wazuh/ELK
  • Crowdstrike
  • Loki/Thor
  • Juniper, Fortigate XDR
  • HIPS FIMs UNIX/WIN
  • Defender ATP
  • Redcloak


SIEM and SOARS:

  • AlienVault
  • ArcSight
  • Elastic Search
  • SentinelOne
  • Siemplify
  • MozDef
  • Swimlane
  • QRadar
  • Splunk
  • Sentinel Azure
  • Logrhythm
  • LogicHub
  • Demisto


Compliance and Governance

  • ISO62443
  • ISO 27001-27018
  • NIST ISMS
  • SoX
  • MArisk
  • KRITIS
  • COBIT
  • DREAD
  • OCTAVE
  • MAGERIT
  • FinSma
  • PCI-DSS
  • ISM3
  • Cloud Security Alliance
  • BaFin
  • COSO
  • CIS20
  • STRIDE
  • MEHARI
  • Pilar tool


Network behaviour analysis

  • CAPSA WIRESHARK
  • Omnipeek
  • Xplico
  • TCPDUMP
  • OpenNAC
  • Netflow
  • Moloch
  • Fiddler
  • SNMP Cacti Nagios
  • Cisco ISE


Penetration tests, Redteaming, ethical hacking:

  • OWASP
  • OSSTM
  • Metasploit rapid7
  • OpenVas
  • Vega
  • Netsparker
  • Burpsuite
  • Nikto and nmap
  • Core Impact
  • ISSAF
  • Qualys
  • Nessus
  • Greenbone
  • Retina
  • Acunetix
  • Blackduck
  • TamperData
  • Greenbone


Network security devices:

  • Palo Alto
  • Pfsense
  • IPS IDP IDS NGIPS
  • Cisco X FW ATA
  • Juniper
  • WatchGuard
  • Alteon Nortel
  • Cisco CCSS
  • Webwasher
  • OpenDNS
  • Fortigate
  • ISA TMG
  • F5 ASM
  • Cortex NDR XDR
  • Checkpoint
  • Arbor
  • Radware
  • L7Filter Ndpi Ntop
  • Websense
  • Bluecoat
  • NXFilter


Digital Forensics:

  • HELIX FTK
  • Radar
  • Autopsy, volatility
  • Topsy
  • SANS SIFT DEFT
  • Ollidbg IDA


Virtualization:

  • Virtual Box
  • VMWARE ESX NSX
  • Qemu Proxmox
  • HyperV
  • XEN server


Dynamic Malware Analysis:

  • Sandboxing
  • Recovery engines or rebuilders
  • Detonation engines


Routing and Switching:

  • DMVPN VPLS MLPS
  • E/iBGP
  • OSPF EIGRP
  • MLS STP RIP


Network Forensics:

  • DAM Database
  • Imperva
  • IBM Guardium
  • OnionSecurity
  • Sink holing
  • RSA envision netwittness
  • GTB DLP
  • DNS behaviour
  • DarkTrace


Wireless Security:

  • Rogue Detection
  • WIPS
  • VoiPW VPLSoW
  • Wcrack
  • 802.11x
  • WIDS


Cloud security CASB CSWP CIEM

  • Data discovery tools Netwrix, Defender Data
  • Data classification tool Classefi, Microsoft DLP
  • Data leakage for endpoints and networks
  • Cloudguard, Cloudone, Aqua, Sysdig, Prisma Paloalto


Ticketing collaboration:

  • Remedy
  • Sirios
  • MSTeams
  • Peoplesoft
  • ServiceNow
  • Jira Confluence
  • Guardicore
  • Verve Industrial
  • Claroty SRA, CTD
  • Macfee Solidcore 
  • Vectra OT 
  • Darktrace OT


OT Security Solutions

  • Armis
  • Palo Alto OT firewall
  • Nozomi
  • Tenable OT
  • Nanolock
  • CyberX Defender IoT

Einsatzorte

Einsatzorte

Deutschland, Schweiz, Österreich
möglich

Projekte

Projekte

3 years 11 months
2022-01 - now

Definition of the OT Security Concept

Enterprise Security Architect Mulesoft Netskope Zscaler ...
Enterprise Security Architect
Leadership skills:
  • Definition of the OT Security Concept with Electrical and Mechanical engineers in some significant industries with different HMI, PLC, and SCADA in the Oil, railways, Metal, Pharma, Energy nuclear plants, and Car industry.
  • Develop a Global Major OT Security Concept, from concept to Policies and Standards, from Policies and Standard Operation Procedures to use cases or workflows in the Security Solutions Catalogue for the OT shopfloor. 
  • Working with the Bell-LaPadula, Purdue Model specific to industrial control systems, Zero Trust and Defense in Depth will adopt a combination of these approaches to develop a Sabsa and Togaf ADM tool baselining blueprinting approach.


Governance & Control:

  • Cenelec TS 50701, IEC 62443, 5012X series, 2702x, Cloud security NIST, CIS, TISAX&TARA.
  • Use primary trust sources like Passive discovery, ITSM, CMDB, surface discovery, DNS audit, and other methodologies to build the proper data protection flows based on discovering shadow IT and OT assets. 
  • I built and used the Security Architecture modelling tools and reference models from different vendors and organizations.


Technical controls:

  • Cloud Workload Protection Container Security Kubernetes KSM Security. 
  • Cloud inventory. 
  • Cloud compliance.
    • API Security Gateways: Mulesoft
    • Cloud access security broker CASB: Netskope, Zscaler
    • Cloud Infrastructure Entitlements Management CIEM: Aqua
    • Cloud-Native Application Protection Platform CNAPP: Prisma PA
    • Cloud Security Posture Management CSPM: Defender Cloud
    • Cloud Workload Protection Platform CWPP: Sysdiag
    • Network Behaviour Analytics: Darktrace OT, Vectra OT
    • Embed Security: Selinux, CyberX, Defender Linux, Nanolock
    • Vulnerability Management: Nozomi, Armor, Claroty CTE
    • Remote Privileged access: Claroty SRA, Cyberarc
    • Freezing technologies: Faraonics, Solidcore
Mulesoft Netskope Zscaler Aqua Prisma PA Defender Cloud Sysdiag Darktrace OT Vectra OT Selinux CyberX Defender Linux Nanolock Nozomi Armor Claroty CTE Claroty SRA Cyberarc Faraonics Solidcore
Alstom-SBB-Dbahn, Bistronic-Siltronic, IAV-Vitesco, Siemens-RWE, and Arxada- Aramco
9 months
2021-05 - 2022-01

lead Security operations centre

Leadership skills:
  • I train colleagues and share knowledge as the subject matter expert in the security's overall strategic and operative management. 
  • Supervising the management - including daily and ad hoc activities - providing appropriate mentoring, training and retaining cyber talents through profound expertise. 
  • Responsible for the daily management of the security operations team, achieving highly effective technical and strategic objectives for identification, evaluation, quantification, reporting, communication, mitigation measures and supervision to strengthen the threat management, modelling, vectoring, and the development of use cases for security monitoring reports, dashboards &metrics. 
  • Significant collaborations and stakeholder management across the company during restructuring processes and growth. 
  • Oversight of the outsourced suppliers with the required rigour and discipline to ensure services are delivered promptly, limiting impact to the business, including establishing, monitoring, and evaluating service metrics


Strategy:

  • Development of functions to maintain and implement a strategy that aligns with business objectives control frameworks, applied technologies, milestones, critical paths and risks, regulatory bodies, key stakeholders and customers


Governance & Control:

  • Reliable methods in monitoring risk appetite and robust controls by reporting metrics to the 'Office for Governance and Risk Management.


Pursuing Technical Goals:

  • Work within threat intelligence and vulnerability management, detection and response functions. 
  • Automation and orchestration across the threat event landscape monitored and analyzed Microsoft Security Central SIEM alerts to identify security issues for remediation and investigate events and incidents. 
  • Tune rules and thresholds to improve the fidelity of alerts. 
  • Prepared SOC reports of analyses and results of pen-testing security monitoring technologies (e.g. Defender ATP EDR, Palo Alto Networks XDR, Endgame). 
  • Knowledge of MITRE ATTACK frameworks. 
  • Determination of tactics, techniques and procedures (TTPs) against intruders applying AttackIQ simulation solution.

Sonova
Zurich
7 months
2020-11 - 2021-05

Managed and planned the migration process

ZERO TRUST ZTA SASE SECURITY ARCHITECT
ZERO TRUST ZTA SASE SECURITY ARCHITECT
Assisting with the architecture's current and future state, with changes in organizational strategy, customer requirements, and the greenfield IT security client landscape. Help with replacements that must be done to the IT security architecture based on supplier, performance, capacity issues and regulatory requirements that are explicitly predefined by the organization's functional management:
  • Managed and planned the migration process from VPN to SASE FMO solutions.
  • Implementation of split-brain PEP scenario for ZTA policies and corresponding platforms.
  • Integration of all PEP positions into the client's SOAR, considering that the threat intel and all the telemetric and risk signals from different PEPs came via API.
  • Implementation of micro-segmentation and SDP utilizing two solution providers.
  • Executed and maintained IAM, PIAM, PUAM, data governance, APP tracking, cloud and DCS; integrated into the new ZTA use cases and converted access scenarios.
  • Preparing definitions for requirements, SoW, HLD, LLD, Runbooks, lifecycle and operational handbooks for the ZTA use cases and the operating team.
  • Integration of software-defined networks with the ZTA use cases supports and facilitates internal workloads.
Daimler, Mercedes, Benz
1 year 3 months
2019-08 - 2020-10

THREAT ANALYSIS

ADVISOR
ADVISOR
  • Reaction to critical computer security incidents by collecting, analyzing, assembling, coordinating, and preserving digital evidence according to ISO27035, identifying gaps and advising on remedying the risks.
  • Collected forensic proof for disciplinary investigations; reviewed log files and events; correlated data and advice for courses of action.
  • Work on IAM and PAM access, investigation of possible unauthorized access privileges, revocation of access, report of violations and recording of terminals and interactive sessions.
  • Designed, analyzed, monitored, and operated security network applications, which detected important data privacy and legal compliance information.
  • Designation of both - a technical and a non-technical security assessment of the network infrastructure, including a root cause analysis for systemic security problems with written reports; the latter comprises assessment-based results (RCAs)
  • Developed and designed customized tool integrations for investigations, tracing, and research to ensure an automatic deployment and monitoring of cloud infrastructures and applications.
  • Determining attackers' tools, tactics, procedures (TTP) and indicators of compromise (IoCs) that may be applied to current and future investigations.
  • Used Cyber Chain contains APT and established tools against cyber threats.
  • Coordinated threat-tracing activities across the web, leveraging intelligence from multiple internal and external sources and the latest security technologies.
  • Tracing and identifying threat actor groups and their techniques, tools, approaches and identification of breaches in IT infrastructure by imitating attackers' behaviour and responses using Splunk ES.
  • Monitor and analyze network traffic and IDS alerts using RSA Security Operations, Sourcefire, NetScout, Wireshark, HP OpenView, and FireEye.
  • Allocating and producing multiple security precautions according to ISO 27k, Marisk, Bafin, Kritis, and Cis20 for the framework's control process.
  • Implementation of risk analyses and process definitions for ISO controls. Document all activities during assessments while providing status updates on the company's direction during the life cycle of security processes.
  • The assistance of the governance team with implementing the eGRC tool Archer and the Compliance Management Module.
  • Design and run a secure hybrid cloud infrastructure with IaaS and SaaS components
The Bavarian Chamber Pensions VKB
Munich Germany
1 year
2018-08 - 2019-07

Moderate system inventory privacy control assessments

DATA SECURITY OFFICER
DATA SECURITY OFFICER
  • Moderate system inventory privacy control assessments are reintroduced using NIST 800-53 and NIST 800-122 controls.
  • Review the System of Records Notice (SORNs) and advise on privacy risks, including privacy act statements, disclaimers, and Cooperative Research And Development Agreements (CRADAs).
  • Maintain a range of sharing agreements (MOUs, Memorandum of Understanding, and other data use agreements, rules of behaviour, and warning banners (consent and opt-in language). The leadership of the Privacy Information Map (PIM) initiative determines the location and nature of PI stored in databases.
  • Drafting a privacy handbook for Sensitive Data Management information governance (SDM). Development and administration of activities like data mapping framework between various data items with regulations, such as CCPA, GDPR, PIPA, PDPA, and PIPEDA.
  • Authorisation of policies and procedures for data retention and media sanitation (Storage Limitation Principle). Identify the most suitable operating model for the client and update the RACI matrix to occupy the required roles of GDPR and CCPA.
  • Creating process flows to operational response to subject data requests, Data Protection Impact Assessments (DPIA), and Data Subject Access Requests (DSAR).
  • Worked as a privacy protection officer for the client, conducting DPIA and doing Records of Processing Activities (RPA).
  • Development of data flow maps for crucial business processes and producing RoPA entries, according to article 30 of the client's security questionnaires (Standardised Information Gathering (SIG), CAIQ (Consensus Assessments Initiative Questionnaire).
  • Work with cloud-based data storage architectures and controls that are commonly used to secure those kinds of environments, such as encryption, tokenization, data masking, data lifecycle management, data rights management (DRM) technology, retention, deletion and archiving policies, thus ensuring the suitability of cloud data events.
  • I am auditing the telemetry train system per norms DIN 50600, DIN 820, IEC 62443, and RIL11402.
  • Hardening of the systems: Openscap, Lynix, Tripwire, File Integrity, HIDS, Privilege escalation, and Logging.
  • Providing hardening subject matter expertise utilizing DISA STIGS, SRG'S (Security Readiness Guides), and the DISA SCAP tool.
  • Establishment of Micro Services Container Security & Cloud-Native Security.
  • Introducing a 'Bring Your Device' program compliant with security policies to ensure employees' communication management via smartphones and tablets across the organization
  • Analyses hundreds of security monitoring and appliance logs to investigate and tune each incident's correct remediation actions and escalation paths.
  • Performing DLP (Data Leakage Systems) installation, maintenance and tuning procedures and devices in the Symantec product using DLP.
  • Installing the existing AV replacement solution, including defence and response tools like Carbon Black, Crowd Strike, and open-source tools.
CGC Pharmaceutical
Canada
2 years 5 months
2016-03 - 2018-07

RISK AND MANAGEMENT ISO OFFICE

SENIOR CONSULTANT
SENIOR CONSULTANT
  • Managing to relocate security perimeter devices and integrating with new standards.
  • Implemented security devices' application firewalls and tuned with Tufin, Barracuda, IBM Guardium, and F5 ASM.
  • Creating the Network Matrix. Replacing perimeter security into ASM, including L3 FWs, F5 balancers, and WAF
  • Integrating safeguards for fraud, data leakage, e-commerce fraud, server intrusion, and ISP denial of service by implementing Imperva WAFs (Web application firewalls).
  • Maintainance of cloud security AWS: Docker WAF that integrates the containers; Docker RASP from Wazuh and Ansible automatises part of the Devsecops regarding the micro-services security.
  • Implementing a Twistlock security solution for RASP in AWS containers.
  • Document each release or project (project plan, the weekly report status, meeting schedule, gate review PowerPoint presentations), and ensure all updated documentation repositories.
  • Creating a SOC monitoring team, procedures, workflows, frameworks, controls and SIEM correlation rules.
  • Remediating deep insight into conducting formal tests on web-based applications and networks using deep assessment parameters.
  • Transformation of the adversarial, unproductive relationship between Internal Audit and IT departments into a practical, proactive partnership.
  • Creating a catalogue of harmful or inexistent use cases.
  • Implementing Qradar and Carbon Black.
  • Performing the migration from TMG to Zscaler cloud DLP and CASB proxy firewalls.
  • Provided technical review of report items from various network devices, such as log files, screenshots, configuration files, permissions, etc., to ensure Cloud Service Providers were closing and mitigating open findings with their POA&M.
  • Assisted in interpreting various vulnerability and compliance scanning results from Assured Compliance Assessment Solutions (ACAS), Security Content Automation Protocol (SCAP), and commercial products HP Fortify Cast.
Deutsche Boerse (German Stock Market)
Frankfurt, Germany
6 months
2015-09 - 2016-02

PS PROFESSIONAL SERVICES SECURITY PRE-SALES

  • Implementing AAA and PIM: Cisco ISE + Cyberark for Network Access Control in cabled and wireless devices.
  • Implementing the NAC agent compliance for checking the antivirus and Cisco cloud-based EDR.
  • Reviewing cloud service providers.
  • Assisting clients with transitions to Microsoft O365/EMS cloud services, such as tenant setup and service configuration, focused on cyber risk mitigation.
  • Collaborating with the incident management team to evaluate processes and standard practices.
  • Performing Cloud Governance Compliance and Auditor/Services Functional Owner/CIO. Coordinating carefully with four compliance analysts and 75 cloud vendors to remediate audit findings.
  • Designed, implemented, and managed the VMware virtual infrastructure, testing and improving quality assurance.
  • Creating a series of penetration tests for further testing simplified ten development of strategic tests, Pen testing, Fraud OSINT and humming.
  • Performing industrial security audits, checking telemetry sensors and servers, robustness and vulnerability assessment, CentOS hardening, and auditing.
  • Performing attack simulations on the client's systems and web application firewalls to determine and exploit security flaws (evasion techniques).
  • Executing application and infrastructure penetration tests as well as physical security assessments. Documenting and discussing security findings within the information technology teams.
HCL, INFOSYS
Germany
2 years 2 months
2013-07 - 2015-08

Implementing Zero Trust and micro-segmentation

Security Project Manager
Security Project Manager
  • Managing the centralization of security for all European branch offices.
  • Administering the migration to a new data centre security and centralized model and consolidation costs and technologies offered in a service model.
  • Creating the SOC: recruiting, training, implementing SIEM and runbooks, incident handling procedures, and building a new security Cisco SDN environment.
  • Implementing Zero Trust and micro-segmentation with VMWARE NSX-T and Palo Alto Panorama.
  • Administering provision (device providers), integration, engineering (in-depth security net infrastructure) and support activities. Collaborating within the design development of support workflows.
  • Enhance and monitor security measures to protect the corporate network, systems, data, applications, and corporate image.
  • Creating security correlation rules: content rules in Splunk for new BIA cases.
  • Designed, implemented, and managed the 2nd generation SecureAuth Cloud services infrastructure, including all web, database, directory, and certificate authority services. Furthermore, implementation of the 2nd generation SecureAuth IdP hardware.
  • Developing and enforcing cloud security standards in AWS and Azure, e.g. IAM policies, security groups, S3 bucket policies, encryption, network security, cloud workload and container security, logging, monitoring, etc.
  • Work with IAM Roles, SSH essential public/ private key, KMS
  • Implementation of WAFs and NGFW NVAs in Azure and of a concept with Zero trust and micro-segmentation
  • Introducing a VPN between cloud and premise reengineering.
  • Managing and participating in ongoing Office 365 security and strategy discussions
  • Updating Office 365, including changes updates, roadmap & releases, and third-party solutions, discovering flaws in solutions' security, advice of CASB, preventing data exfiltration and shadow usage of security information.
  • Administration of transforming a middle (commercial) on-premise solution to an MS Azure and AWS cloud-based solutions. Establishment of a security policy program and corresponding security and privacy policies based on NIST and ISO frameworks
Hyundai car Company
Offenbach, Germany
3 years 3 months
2010-04 - 2013-06

Implementing WAF for the Bank in transparent mode and KRP

SECURITY CONSULTANT
SECURITY CONSULTANT
  • Implementing WAF for the Bank in transparent mode and KRP (kernel reverse process).
  • Installing a file firewall for SharePoint (Imperva) is a solution to avoid data exfiltration and orchestrating the approval for document sharing inside large organisations.
  • Assisting with reviewing program-related documentation, such as standard operating procedures, security policies, plan of action and milestones, and other documentation.
  • Collaborating with clients in assessments and audits for compliance to include enhancements beyond baseline requirements, as determined by regulation, risk assessments, and organisational risk appetite.
  • Developing a Risk and Controls Matrix (RCM), listing GAPP controls and risks associated with control failure.
  • Working under the guidance of CISOs, performing SOC2 Type I readiness assessment activities.
  • Participating in the company's auditing, overseeing regular audit activities to complete the SOC2 audit for the selected trust criteria.
  • Fine-tune the SOC monitoring team and manage procedures, workflows, frameworks, controls, and SIEM rules. Migrating IPS from McAfee IntruShield to Cisco Firepower. Meanwhile, leading other security portfolio projects parallels the senior SOC analyst role.
  • Working on improvement for security services and providing feedback and verification about existing security issues.
  • Analysing various vulnerability detection applications, i.e., Nessus, Rapid7/ Nexpose,
  • AppDetective, Cenzic Hailstorm, WebInspect, Metasploit, and Acunetix Web Vulnerability Scanner.
  • Drafting policies and procedures that require advanced verbal and written communication and an appropriate presentation.
  • Developing and revising policies, standards, procedures and guidelines for the general operation ofdata protection. Creation of emergency plans for continuity and contingency regarding network security and disruptions (HA and DDoS).
Deutsche Bank
UK
2 years 11 months
2007-05 - 2010-03

Proposing RFIS and RSIs for data lake applications

CYBERSECURITY AUDITOR
CYBERSECURITY AUDITOR
  • Analysing application logs to find indicators for reporting security flaws, threats and identity management issues related to web app business areas.
  • A founding member of the Information Security Governance, Risk and Compliance Committee, si responsible for translating government statutory and regulatory requirements, industry standards, and contractual requirements into IT Security and Risk Management frameworks, policies, procedures, guidelines, and best practices
  • Accomplished reengineering the network topology and improving the WAF-IDS environment.
  • Performing perimeter analyses for the customer and recommending security improvements, efficiency, supportability, and incident escalation (Firemon).
  • Creating a roadmap for the whole security life cycle technology (Director's security plan with subsequent GAP analysis).
  • Implementing DMS, a document management system based on open source. Implementing more than 20 security projects: OpenDNS, WAF, IDS, SIEM, AV, MDM, IOC scanner; commercial and open-source ones like Qualys, Nessus, Retina, Rapid7, Sofia, Burp suite, Nmap, Joval, and integrating of the results with SIEM to correlate and score the assets SLAs in the IR process.
  • Incorporating security into mobility strategy using the latest network security guidance, i.e. (SRG) Security Readiness Guides, (STIG) Security Technical Implementation Guides, Industry Best Practices guidance, etc.
  • Initiating IT systems for inventory, asset, classification, and labelling projects.
  • Responsible for the vulnerability management program, including periodic scanning, reporting, and tracking remediation of security vulnerabilities.
  • Executing the Information Assurance Vulnerability Management (IAVM) process to ensure dissemination, reporting, and compliance.
  • Implemented a cluster of 200 DAMs (Database activity monitoring) gateways in HA and 100 clusters of WAFs and integrated them with SIEM ArcSight.
  • Assisting SOC manager in creating use cases in the SIEM for WAF.
  • Installing three layers of filtering of SIEM for data retention regulation of the ISP's business.
  • Executing all other IA/CS monitoring and reporting to ensure compliance, including developing and maintaining POA&Ms.
Ericsson
Stockholm, Sweden
3 years 3 months
2004-02 - 2007-04

Creating plans

SENIOR CONSULTANT IN GOVERNANCE
SENIOR CONSULTANT IN GOVERNANCE
  • Ensuring security methodology followed NIST compliance, 800.53, RMF, and POAM methods.
  • Directing security plan implementation, drafting security directives, risk analysis, and impacted business analysis.
  • Creating plans of action and milestones and managing risk remediation across all locations. Managing third-party risk assessments on all new implementations and significant upgrades.
  • Managing Peripheral Component Interconnect.
  • Identifying data anomalies, errors, non-compliance level degradation and increasing users requiring a DSS with a data quality component.
  • Led the project of consolidating the security policies program by drafting a new one and updating existing policies (technical and process), identifying its compliance requirements
  • Cooperating with IT, Finance, and Legal Departments to remediate all existing information security and vendor risk assessment gaps.
  • Generating pre-sales: active involvement in developing proposals, statements of work (SOW), engagement letters, staffing estimates for privacy engagements, reporting project status to C-level executives, and providing SWOT analysis.
  • Reviewing pen testing and vulnerability scanning results and working with the InfoSec team to remediate gaps.
  • Completing the Payment Card Industry Data Security Standard (PCI-DSS)
  • Self-Assessment Questionnaires (SAQ).
  • Assess client security architectures and recommend modifications or adaptions of specific technologies to meet NIST security standards.
  • Executing an evidence audit following all the ISO 27k standards.
  • Detecting abnormal behaviour and categorising user network traffic profiles with ArcSight SIEM and DPIs (Solera); enforcing the authentication for data login and network rights integrated with other perimeter security devices, such as IPS/IDS, NAC, and AV. 
  • Implementing data loss prevention of corporate data with different protocol inspections: IronPort email, McAfee Web-washer, Bluecoat for web and GTB, Net witness RSA, IronPort, and Net-beholders, the rest of the protocols.
Ernst & Young
Barcelona, Spain
1 year 8 months
2002-06 - 2004-01

Managing Security Services (MSS)

CYBERSECURITY INCIDENT HANDLER
CYBERSECURITY INCIDENT HANDLER
Managing Security Services (MSS) for most of the Banks in Spain, including ant phishing and Perimeter.
  • Administering support, Sales, and engineering for MSS services and Verisign Teraguard SIEM System.
  • Maintaining operations support for the corporate network of Andalusia, which has more than 7,000 network points based on ATM cells and MPLS labels. Proactively maintaining, supporting, and provisioning SLAs.
  • Work on transmission, data and wireless radio equipment SDH, PDL, and DWDM with Lucent, Alcatel Cisco, Pirelli, Ericson, Motorola, and Juniper equipment.
  • Supporting Level 2 for the VIP customers' in-network services
S21sec Telefonica
Madrid, Spain

Aus- und Weiterbildung

Aus- und Weiterbildung

1999 - 2003
BACHELOR OF TELECOMMUNICATIONS

UNIVERSITY OF MADRID


PROFESSIONAL CERTIFICATIONS

  • ISO3100 Course
  • Data Protection Course
  • SABSA Architect - Course
  • Information Privacy Manager Course


2016

CISM ISACA


2019

Cloud Security Professional


2018

  • CCSK Cloud Security
  • CISA Information Security Auditor


2017

EC Security Analyst


2009 - 2011

ISO 27001 and ISO20000 Leading auditor


2010

  • EC Certified Ethical Hacker
  • EC Forensic investigator. 2010


2009

CISSP Certified Information Systems Security Professional


2006

GIAC GCFI Forensic analyst


2007

ITIL Basics


PRODUCT CERTIFICATIONS

2019

  • Qualys VAS
  • Zscaler Cloud DLP
  • AWS Certified Security Specialist
  • Twistlock RASP Essentials
  • Carbon Black Protection, Response EDR
  • Alien Vault Security Engineer


2018

  • CrowdStrike EDR
  • Log rhythm Analyst
  • Qradar Administration


2017

  • Cylance NGAV
  • Cybrary Threat Hunting


2016

  • AlgoSec administrator
  • Infoblox
  • Sophos Firewall - administrator


2015

  • Barracuda WAF administrator
  • Paloalto Security Engineer
  • Fireye Administration


2014

  • ArcSight Solution Engineer
  • Sonicwall Administrator


2013

  • WatchGuard Certification
  • Imperva Secure Sphere WAF, DAM, FIM, SharePoint
  • Barracuda Spam administrator


2012

Fortinet Secure NSE

Position

Position

  • IT security auditor
  • OT ICS security architect
  • SOC CISRT Analyst and Lead
  • IT security engineer
  • Information Security Officer CISO
  • Data protection officer
  • Professional services security solutions

Kompetenzen

Kompetenzen

Top-Skills

cyber security expert IT-Sicherheitsarchitektur CISO OT security

Produkte / Standards / Erfahrungen / Methoden

Profile

  • I have a comprehensive understanding of security management systems and am intimately familiar with auditing procedures and security best practices. 
  • I understand the fact that securing online transactions is a never-ending business with new emerging threats daily. 
  • Good with the design of security systems, defining perimeter access, and continuously reviewing these arrangements. 
  • I developed enterprise security standards including encryption, ISMSs, PAM. 
  • With high profile data breaches lately, it is vital companies can provide safety guarantees to customers. 
  • I take pride in knowing I can help set up and maintain those various security settings, both internally and externally. Through continuous education and research, I am up to date on industry trends and technologies and remain one step ahead of all cyber-attacks. 
  • It is my focus to ensure company information remains safe and in the proper control. 
  • I have responded to several critical threats during my time in the organization. 
  • As an information security professional, I understand the high-security needs of corporate law firms. 
  • With extensive experience handling varying security threats, regulating data access, and am confident I will be an asset to your organization for those very reasons.
  • I am detail-oriented and provide strong layers that are difficult for hackers to penetrate.
  • I can ensure the confidentiality and security of key sensitive data. 
  • As an Information Security Analyst, I am adept at-risk assessment, planning, and mitigation strategies. 
  • Moreover, while my on-the-job experience has afforded me a well-rounded skill set, including first-rate project management and problem-solving abilities:
    • Overseeing hardware infrastructure and incorporating new technologies.
    • Examining systems to uncover vulnerabilities and access attempts.
    • Maintaining and testing corporate response plans.
    • Increasing security awareness throughout the company.
  • I am responsible, honest, and efficient and have a long history of getting things done whilst working under pressure and to deadlines.
  • Possessing superb analytical skills, I can interrogate data to find out if there is any fraud, violation of laws or irregular management policies.
  • Furthermore, I have a comprehensive understanding of complex accounting methods, and experience within an Internal or External audit environment.
  • I am a good team player who can easily interact with peers and counterparts whilst working independently or as part of a team. 
  • I also have well-developed verbal as well as written communication skills and can present information, and compile reports of audit results to senior managers. 
  • I have the temperament for today?s daily "turf wars" and my track record provides the necessary certification for this claim.
  • I have a solid educational foundation and a passion for information security. 
  • Building a strong, focused, and dedicated team has helped me develop a successful career, thus far. 


Summary

I am an IT security and cyber security consultant with more than 20 years of experience in analyzing, recovering, mitigating, auditing, and safeguarding hundreds of architectural incidents in containers, VMs, endpoints, mobile devices, servers, SCADA, network boundaries, mainframes, wireless, IoTs, embed, and cloud instances. I look forward to using my years of professional experience in those fields in an IT company specializing in information security and cyber information security.


Reveal breaking points, Shadow infrastructure

OSINT

  • Spycloud
  • Cycognito
  • SpiderfootHX
  • Insight TI Rapid7 ZeroFOX
  • Security Score Card
  • Maltego
  • BitSight
  • Censys
  • FOCA
  • Faraday Opensource
  • MISP TI Opensource
  • Data and API surface discovery in cloud tenants


Network protections NBAR NBAN NAND:

  • Arbor Peaxflow
  • Allot
  • BroIDS
  • Zeek Darktrace IT and OT
  • Netenforcer
  • Sandvine
  • Suricata
  • Intrushield
  • Proventia Site defender
  • Tipping Point
  • Nozomi OT
  • Guardicore Illumio
  • Vectra O365


EPP XDR EDR AV NGAV:

  • CarbonBlack
  • Wazuh/ELK
  • Crowdstrike
  • Loki/Thor
  • Juniper, Fortigate XDR
  • HIPS FIMs UNIX/WIN
  • Defender ATP
  • Redcloak


SIEM and SOARS:

  • AlienVault
  • ArcSight
  • Elastic Search
  • SentinelOne
  • Siemplify
  • MozDef
  • Swimlane
  • QRadar
  • Splunk
  • Sentinel Azure
  • Logrhythm
  • LogicHub
  • Demisto


Compliance and Governance

  • ISO62443
  • ISO 27001-27018
  • NIST ISMS
  • SoX
  • MArisk
  • KRITIS
  • COBIT
  • DREAD
  • OCTAVE
  • MAGERIT
  • FinSma
  • PCI-DSS
  • ISM3
  • Cloud Security Alliance
  • BaFin
  • COSO
  • CIS20
  • STRIDE
  • MEHARI
  • Pilar tool


Network behaviour analysis

  • CAPSA WIRESHARK
  • Omnipeek
  • Xplico
  • TCPDUMP
  • OpenNAC
  • Netflow
  • Moloch
  • Fiddler
  • SNMP Cacti Nagios
  • Cisco ISE


Penetration tests, Redteaming, ethical hacking:

  • OWASP
  • OSSTM
  • Metasploit rapid7
  • OpenVas
  • Vega
  • Netsparker
  • Burpsuite
  • Nikto and nmap
  • Core Impact
  • ISSAF
  • Qualys
  • Nessus
  • Greenbone
  • Retina
  • Acunetix
  • Blackduck
  • TamperData
  • Greenbone


Network security devices:

  • Palo Alto
  • Pfsense
  • IPS IDP IDS NGIPS
  • Cisco X FW ATA
  • Juniper
  • WatchGuard
  • Alteon Nortel
  • Cisco CCSS
  • Webwasher
  • OpenDNS
  • Fortigate
  • ISA TMG
  • F5 ASM
  • Cortex NDR XDR
  • Checkpoint
  • Arbor
  • Radware
  • L7Filter Ndpi Ntop
  • Websense
  • Bluecoat
  • NXFilter


Digital Forensics:

  • HELIX FTK
  • Radar
  • Autopsy, volatility
  • Topsy
  • SANS SIFT DEFT
  • Ollidbg IDA


Virtualization:

  • Virtual Box
  • VMWARE ESX NSX
  • Qemu Proxmox
  • HyperV
  • XEN server


Dynamic Malware Analysis:

  • Sandboxing
  • Recovery engines or rebuilders
  • Detonation engines


Routing and Switching:

  • DMVPN VPLS MLPS
  • E/iBGP
  • OSPF EIGRP
  • MLS STP RIP


Network Forensics:

  • DAM Database
  • Imperva
  • IBM Guardium
  • OnionSecurity
  • Sink holing
  • RSA envision netwittness
  • GTB DLP
  • DNS behaviour
  • DarkTrace


Wireless Security:

  • Rogue Detection
  • WIPS
  • VoiPW VPLSoW
  • Wcrack
  • 802.11x
  • WIDS


Cloud security CASB CSWP CIEM

  • Data discovery tools Netwrix, Defender Data
  • Data classification tool Classefi, Microsoft DLP
  • Data leakage for endpoints and networks
  • Cloudguard, Cloudone, Aqua, Sysdig, Prisma Paloalto


Ticketing collaboration:

  • Remedy
  • Sirios
  • MSTeams
  • Peoplesoft
  • ServiceNow
  • Jira Confluence
  • Guardicore
  • Verve Industrial
  • Claroty SRA, CTD
  • Macfee Solidcore 
  • Vectra OT 
  • Darktrace OT


OT Security Solutions

  • Armis
  • Palo Alto OT firewall
  • Nozomi
  • Tenable OT
  • Nanolock
  • CyberX Defender IoT

Vertrauen Sie auf Randstad

Im Bereich Freelancing
Im Bereich Arbeitnehmerüberlassung / Personalvermittlung

Fragen?

Rufen Sie uns an +49 89 500316-300 oder schreiben Sie uns:

Das Freelancer-Portal

Direktester geht's nicht! Ganz einfach Freelancer finden und direkt Kontakt aufnehmen.