Cyber Security, DevOps\DevSecOps, CI\CD, authomation
Aktualisiert am 20.11.2024
Profil
Freiberufler / Selbstständiger
Remote-Arbeit
Verfügbar ab: 20.11.2024
Verfügbar zu: 100%
davon vor Ort: 100%
Analytical Thinking and Problem-Solving:
Communication and Collaboration
Cloud
Technical Proficiency
Security Konzepte
IAM
PAM
Azure
Good Clinical Practice
AWS
DevOps
Azure Devops
Bulgarian
Muttersprache
English
Fluent (C2)
Russian
Working proficiency (C1)
German
Grundkenntnisse
French
Grundkenntnisse
Danish
Elementary Knowledge (A1)

Einsatzorte

Einsatzorte

Deutschland, Schweiz, Österreich
möglich

Projekte

Projekte

6 months
2024-01 - 2024-06

EMA External Consulting SME of DevSecOps Practices

EMA External Consultant SME of DevSecOps Practices
EMA External Consultant SME of DevSecOps Practices

  • Reviewed Client`s DevSecOps Practices of their current IT systems infrastructure and the so-called target architecture solution, covering Microservice, Kubernetes, Atlassian Eco system (Jira, Confluence), SNOW, Zero-trust, Service meshes, PAM, ML\AI (LLM) and CI\CD automation (Azure DevOps)ensuring compliance with GxP and cGxP.
  • Enhance Govern and establish a proper MEASURE and MANAGE Functions for , objective, repeatable, scalable test, evaluation, verification, and validation (TEVV) processes including metrics, methods, and methodologies, ensuring that they are in place, followed, and documented.
  • Recommended and architected improvements on sustainable hybrid cloud architectures with lean, automated, and secure maintenance practices, ensuring high availability, resilience, scalability, and performance. Collaborated with senior stakeholders across Digital, OT, Enterprise Architecture, QA, and IT Security to drive DevOps culture through containerization, Usage of AI(LLM) and associated concept?s introduction.
  • Provided streamlined and structured approach to develop LLM-infused applications. Allow well-defined process and lifecycle to guides the process of building, testing, optimizing, and deploying flows, culminating in the creation of fully functional LLM-infused OPS solutions.
  • Designed and implemented scalable cloud architectures on Azure and Oracle Cloud, supporting business growth while reducing infrastructure costs by 20%.
  • Optimized cloud resource allocation through continuous monitoring and performance tuning, achieving a 15% improvement in system performance.
  • Automated the deployment of cloud infrastructure using Terraform and ARM templates, reducing manual errors and deployment time by 30%.
  • Administered Linux servers and databases (SQL, Oracle, Postgres, MySQL), ensuring high availability, security, and optimal performance.
  • Collaborated with external suppliers to manage support services, ensuring compliance with SLAs and resolving issues promptly.
  • Architected and implemented robust CI/CD pipelines using Azure devOps, Jenkins, Rancher, Docker, and Kubernetes, resulting in a 30% reduction in deployment times.
  • Led a team of DevOps engineers to migrate legacy applications to a microservices architecture, leveraging Kubernetes for orchestration.
  • Designed and deployed automated testing frameworks integrating with CI/CD pipelines, improving code quality and reducing bugs by 25%.
  • Collaborated with development, QA, and operations teams to foster a DevOps culture and streamline the software development lifecycle.
  • Implemented monitoring and logging solutions using ELK stack and Prometheus, enhancing system observability and incident response times.
  • Improved, designed containerized solutions meeting GxP and cGXP requirements, IT security, and reliability standards, while defining cloud standards and frameworks for managing infrastructure lifecycle with DevOps techniques, including:
    • Secure throughout the software development lifecycle to minimize vulnerabilities in software code.
    • Proper function of the DevOps teams, including developers and operations teams.
    • Confirmed shared responsibility for following security best practices.
    • Evaluate efficiency and effectiveness of automated security checks at each stage of software delivery.
    • Recommend improvements on integrated security controls, tools, and processes into the DevOps workflow.
  • Ensured designs complied with IT Security and QA standards through reviews and promoted cloud-native setups for forward-looking architectures and applications, ensuring Traceability, Accountability and Data integrity.
  • Identified and recommended infrastructure improvements for more efficient services, optimizing resource utilization and enhancing overall system performance and cost reduction.
  • Recommend implementation of new methodologies using modern agile approaches, driving continuous improvement and innovation within the organization.
European Medicines Agency (EMA)-
6 months
2023-07 - 2023-12

SAP S/4HANA Cloud (S4C) and AI Initiative pre-project

SAP Security and Access Architect
SAP Security and Access Architect
  • Orchestrated and executed security solutions, encompassing Zero Trust principles, and WAF (AKAMAI) for BASIS Administration, SAP IAS, IPS, MS Azure, S/4, public cloud, BTP, and Fiori applications, ensuring adherence to best practices and compliance standards.
  • Design proper integration patterns of S4C public cloud with HR platform, Salesforce and IAM\PAM solutions Assets on Azure and AWS allowing benefits from AI Automation for Incident (Recognition, Response and Handling).
  • Define:
    • enhanced processes for governing, mapping, measuring, and managing Risks, and clearly documenting outcomes;
    • improved awareness of the relationships and tradeoffs among trustworthiness characteristics, socio-technical approaches, and risks;
    • explicit processes for making go/no-go system commissioning and deployment decisions;
    • establish policies, processes, practices, and procedures for improving organizational accountability efforts related to AI system risks;
    • enhance organizational culture which prioritizes the identification and management of AI system risks and potential impacts to individuals, communities, organizations, and society;
    • better information sharing within and across organizations about risks, decision-making-processes, responsibilities, common pitfalls, Test, Evaluation, Verification, and Validation (TEVV) practices, and approaches for continuous improvement;
    • and create a greater contextual knowledge for increased awareness of downstream risks;
  • Adopt a first principals? approach when testing each input by examining the original expected value and the servers response when the value is modified, determine how data may be being processed by the server and can then dynamically evolve each test to identify vulnerabilities.
  • Contributed to the design and optimization of large-scale distributed systems, ensuring reliability and scalability.
  • Designed and implemented secure and scalable container-based systems using Docker and Kubernetes on AWS & Azure
  • Collaborate with key stakeholders to understand business processes and identify areas for improvement in risk management and compliance
Hilti
1 year
2022-07 - 2023-06

IETV Program

Platform Security Engineer
Platform Security Engineer

  • Spearheaded the transition to a fully automated CI/CD process, integrating Jenkins, GitLab CI, and Ansible, reducing manual intervention by 40%.
  • Developed and maintained infrastructure as code (IaC) using Terraform and AWS CloudFormation, enabling consistent and repeatable infrastructure deployments.
  • Introduced containerization strategies using Docker and Kubernetes, resulting in improved scalability and deployment flexibility.
  • Conducted training sessions and workshops on CI/CD best practices and tools, enhancing team proficiency and collaboration.
  • Worked with SwissRe's Cyber Risk team to ensure SwissRe's security standards are implemented and Documentation of the measures implemented is in place.
  • Cultivates and implements a culture of risk management within organizations designing, developing, deploying, evaluating, and acquiring AI systems;
  • Outlines processes, documents, and organizational schemes that anticipate, identify, and manage the risks a system can pose, including to users and others across society? and procedures to achieve those outcomes;
  • Incorporates processes to assess potential impacts;
  • Provides a structure by which AI risk management functions can align with organizational principles, policies, and strategic priorities;
  • Connects technical aspects of AI system design and development to organizational values and principles, and enables organizational practices and competencies for the individuals involved in acquiring, training, deploying, and monitoring such systems; and
  • Addresses full product lifecycle and associated processes, including legal and other issues concerning use of third-party software or hardware systems and data.
  • Design, build and optimize security controls and automated response solutions in AWS (AWS stack: Control tower, CloudFront, Load Balancers, WAFv2, Security Groups, Security Hub, Inspector, IAM, Kinesis, Guard duty, Cloud Watch, CloudTrail, Lambda etc.) and Azure Cloud (Defender and Sentinel)
  • Vulnerability management, system and network hardening (CIS and AWS benchmarks)
  • Prime liaison with the client, including participation in Crisis Management, Continuous improvements in coordination with the Platform teams, requests coordination with stakeholders and tracking until delivery
  • Participation in the global Saga and Epic planning by providing insight from own experience and state-of-the-art knowledge
  • Security architecture review
  • Perform Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), and Software Composition Analysis (SCA) assessments on applications, systems, and software components to identify security vulnerabilities, weaknesses, and risks.
  • Collaborate with the central security team to introduce and scale industry-leading security testing tools and methodologies to conduct thorough security assessments.
  • Collaborate with development teams to provide guidance and recommendations for secure coding practices and vulnerability remediation.
  • Participate in threat modelling activities to identify potential security risks and develop appropriate mitigation strategies.
  • Stay up-to-date with the latest security trends, vulnerabilities, and attack vectors, and provide proactive recommendations to enhance security measures.
  • Ensure compliance with requirements on Encryption at rest and in transit. Hands-on experience with Microsoft Azure and Azure Security Technologies specifically, Azure KeyVault, Azure Managed HSM or Azure Dedicated HSM, enforcing data encryption standards and solutions.
  • Design, implement and ensure best practices of AuthZ, via token rotation: both for human and non-human
Swiss Re
6 months
2022-08 - 2023-01

Cyber Arc (PAM) advisory

As Technology Partner in FIS Global I am responsible for building and developing the Digital Identity Practice as part of Cyber Security services. The Digital Identity practice consists of PAM (Privileged Access Management), IGA (Identity Governance and Administration) and CIAM (Customer IAM). The current toolset in use for the following topics are as follows: IGA ? SailPoint IIQ, OMADA, MIM 2016, PAM ? CyberArk, CIAM ? ForgeRock and Transmit Security Microsoft Based Security ? On-Premise and Azure Cloud As part of the company leadership team, I am responsible for building, developing and administrating a team of 20+ people across Central and Eastern Europe. Daily, I am taking management and architectural role in various projects covering services such as assessment, design, implementation, and managed service across Europe with the technology stacks mentioned above. I have experience in various industries and expert knowledge in IAM/PAM best practices and compliance standards across widely regulated and non-regulated businesses. In the past 10+ years I have been involved in projects taking various roles from Implementation Engineer to Solution Architect for businesses in any size ? from small to large global companies spanned across the globe. My expertise and understanding of the overall IT Infrastructure and in-depth knowledge in Authorization, Authentication and Security allowed me to successfully deliver all those projects regardless of the project complexity, timeline, location or size. My strongest features are my devotion to work and desire to solve complex challenges with the highest quality, ability to lead teams and coordinate activities, ability to consult and discuss on every level from top management level through enterprise architecture down to in-depth technical discussions and low-level solution specific conversations with developers and engineers. In my current role, my main responsibilities include driving the line of business forward by developing new client relationships and delivering complex projects from Management and Architectural perspective including but not limiting to:

  • Roadmap design HLD, LLD and Pilot implementation of Companywide PAM solution as a Service provided from a market leader.
  • Close collaboration with IT teams, design a security architecture framework (guidelines, technology reference models, guidelines, and training material)
  • Assess and transpose embed security requirements into existing or new IT systems (business applications including SAP, IT infrastructure, on-prem and cloud systems including Microsoft office 365).
  • Perform cyber security architecture reviews and documentation of the security requirements in architecture handbooks in close collaboration, partnering and advising IT and business teams to implement a ?secure by design? strategy that provides the following - Regulatory compliance, Security policy enforcement, Support of ?bring your own device? (BYOD), Remote control of device updates, Application control, Automated device registration & Data backup
  • Advise and design security solutions for implementation into complex customer IT environments which carry proprietary real-time life critical data and diagnostic quality images which require reliability and high availability output based on GCP Native services like (Access Transparency, Assured Workloads, Binary Authorization, Cloud Asset Inventory, Cloud Data Loss Prevention, Cloud Key Management, to manage encryption keys on Google Cloud, Confidential Computing, Firewalls, Secret Manager to store API keys, passwords, certificates, and other sensitive data, Security Command Center, Shielded VMs, VPC Service Controls, BeyondCorp Enterprise for Scalable zero trust platform with integrated threat and data protection, Cloud Identity, Identity and Access Management, Identity-Aware Proxy, Policy Intelligence, Titan Security Key for MFA, etc.
    • Employ DevSecOps, AIOps and Safe Code Practices. Ensuring that technical solutions are cohesive across the provisioning sub-teams and complete against business requirements. Allowing rapid:
    • Bootstrapping: create a Cloud Setups with corresponding resource hierarchy, and permissions for the initial CI/CD pipeline to deploy next stages.
    • Baseline the a set of configurations that allows the delivery of the security and compliance monitoring, alerting and as foundational guardrails.
    • Covering Business Specific Requirements: Delivers business specific components and integrations (such as SSO, monitoring etc);
    • Establishment of proper Workload services at Applications level running proper set of Application Infrastructure: Any of the many cloud services that form the business? platform for workloads (Servers, Storage, IAM\PAM, SIEM, SOAR etc). The final goal of the Landing Zone: to deliver value to the business
    • Validate, evaluate and technical sign-off of technical changes in capabilities and solutions proposed by external partners.
    • Oversee and guide deployment of security patches, enhancements and changes to the Windows\Linux IT Landscape (including PoCs, PoVs, Canary and Blue-Green deployments, Gold images, and Transfer-to Operations together with L2/L3 running everything as a code)
Galderma
6 months
2022-07 - 2022-12

Design and develop services and solutions based on cloud security-based practices

FADATA Security Architect SaaS offering on AWS and AZURE
FADATA Security Architect SaaS offering on AWS and AZURE
  • Design and develop services and solutions based on cloud security-based practices - CSA CCM and BSI C5.
  • Perform risk assessment of proposed and existing system architecture for compliance with security best practices, recommending technical, administrative, and physical controls to mitigate identified risks.
  • Developed service security and compliance requirements for SaaS multi-tenant systems.
  • Designed and developed cloud security architectures and perform architecture design reviews.
  • Designed and develop frameworks and solutions to secure cloud applications and infrastructure.
  • Lead and execute end to end compliance initiatives, based on selected industry frameworks and compliance standards.
  • Set up Security Baselining and ensure compliance with State authorities utilizing Modern technology (DevOps, DevSecOps, CI\CD) trends Security
    • Aacted as Security PO directly responsible for:
    • Fadata`s SaaS Security Concept;
    • Identification of the Critical assets - Our in-depth reference architectural model, is based on ISO/IEC 17789 and NIST 500-292
    • Development and optimization of the ISMS (Information Security Management System) according to ISO27001, GDPR and FINMA requirement
    • Appling of Passwordless authentication techniques (MFA, OATH, FIDO2, SSO, Yubikey)
    • Cloud Compute and Workload security protecting Software defined networking, Virtual machines/Instances, containers, Platform-based workloads and Serverless computing;
    • Defining Key risks and controls
    • Centralized Authentication/authorization - utilization of Managed services for authentication and authorization (Okta) together with LDAP DS, and dedicated Oath 2 platforms
    • System integrity, System administration, and Software deployment via Terraform, CloudFormation and Ansible Scrips (DevSecOps).
    • Security patch management via Immutable Workloads Enable Security - Nexus IQ
    • Automatic identification of OSS\TP component and risk modeling in accordance with Risk Appetite.
    • Malware\edge Protection via a combination of managed services (WAFs) ?CloudFlare and edge NGxFW (Palo Alto network)
    • System hardening, performance tuning and patch management;
    • Tenant segregation, multiple VPC
    • RBAC of Technical Users and business users, role definition certification and enforcement.
    • KMS management Private keys, envelope encryption Securing data at rest, and in transit and pseudo-anonymization via tokens.
    • Enforcing Safe code security practice and monitoring of OSS\TP components in use;
    • Attack surface and treat modeling, Static Code Scanning and Free and Open Source Scanning., Appling measures to prevent OWASP 10 vulnerabilities, Code repository security (Nexus IQ) together with Sonar cube
    • Service continuity, disaster recovery
  • Business Continuity Within the Cloud Provider
  • Business Continuity for Loss of the Cloud Provider
  • BC\DR Remediation Actions
    • Propper security monitoring logic (Events & Time Series) via Cloud Watch, Cloudtrail and Panorama
    • Integrating with 3rd party SOC Providers, enablement paging duties
    • Backup orchestration to another cloud vendor;
    • IT Cyber Security Metrics,
  • Implement, maintain, and improve existing industry best practices of operational security controls such as Monitoring, Identity and access management, Encryption and data security, and Self-auditing.
  • Guide Product Management on defining and prioritizing the development of secure SaaS solutions.
  • Drive and lead security processes, tools, methods, and knowledge and security enhancements.
  • Prepare and deliver training and security awareness activities to the Engineering teams.
  • Acquire relevant knowledge, remain up to date, attend security conferences, and be involved in the security community.
Zurich Insurance
2 years 7 months
2019-12 - 2022-06

various Projects

FIS - Technological Partner
FIS - Technological Partner
  • Accompanying the functional split in application management by ensuring bidirectional information exchange and taking over the project results into the running operation (service enabling). Thorough understanding of Azure, GCP &AWS Cloud offerings and their services.
  • Understanding and supporting FIS EMEA partner team focused on driving FIS Partner Business through different RTM (route to markets).
  • Lead FIS`s managed IT services in DACH region offering infrastructure management and software support. FIS`s cloud financial services solution provides an elastic, compliant and always-on environment. We partner with world-leading cloud providers to deliver an integrated managed hosting service. Organizes and shapes an engagement team's strategy to drive success. Leads board level visioning sessions providing thought leadership to client
  • Bringing innovative thinking to support the organization to drive change towards Service and SaaS oriented partners, capable to develop FIS?s focus in Modern Application, EUC, and Multi-Cloud.
  • Control of numerous ongoing and new launching corporate channel initiatives and programs, securing with your field team participation and execution to drive partner pipeline.
  • Act as single point of contact for the EMEA Partner team for execution requests, inquiries, escalations, and feedback requests. Being part of FIS management team and execute on activities decided in team meetings being partners voice in these meetings.
  • Develops and manages relationships across the whole client base, discussing benefits and value at board level.
  • Consults on governance, strategy and transformation not just operations.
  • Leads complex TOM transition initiatives.
  • Consults and shapes development of the client's approach to identifying and managing risks and assumptions and for realising benefits at a department level.
  • Architecture, Implementation of Azure Tenant Configuration, Defender Products (Defender for Endpoint, Defender for Identity, Defender for Office 365, Defender for Cloud), Sentinel Configuration and Automation, Infrastructure as a Service (Firewall, VPN, WAF, Load Balancer, etc.), Logic App Automation in Microsoft Azure Environment, AWS Guard duty, Control Tower, Incident Analysis using Microsoft Security Tools (Microsoft Defender for Cloud, Application Gateway, Azure DDoS Protection, Key Vault, AZURE Information Protection, etc.)
  • Ensures knowledge capture sessions are arranged and executed building the company consultant collateral.


Important Clients

  • SIX ? Group ? TBTF Project and Ransomware(APT) Project, Using AI for Incident response and remediation
  • Galderma - PAMaaS integrated with AWS and Azure, Enabling transition from DevSecOps to ML\AIOps
  • BMW Group, BMW Bank, modernisation of edge security of GCP, Azure and AWS. Implementing MLOps, and AI OT Smart factory
  • Deutsche Bank?Integration of existing IAM platform ? DB Access gate (OneIM) with Wealth Management Platform
  • IBM evaluation of the current setup, of the Hybrid Cloud deployment, HA, Security of network infrastructure, ITGCs of EHRs, i.e. electronic health records (German: Patientenakte, ePA), system development program. EHR`s records are hailed as the key to increasing the quality of care.
various Customers
1 year 4 months
2021-01 - 2022-04

Architecting of APIMv2 heterogenic platform-based SaaS microservices

APIM CTO Lead Architect
APIM CTO Lead Architect
  • Enable Open banking for BMW Bank, allowing access and control of consumer banking and financial accounts through third-party applications.
  • Architecting of APIMv2 heterogenic platform-based SaaS microservices (Kubernetes).
  • Enabling migration from heterogenic (mix of on-prem and SaaS solution) to Cloud first \ Cloud only (AZURE and AWS). Clearing the path for BMW`s IT eco to become API driven and BMW to become a Tech Company.
  • Employing DevSecOps and Safe Code Practices, Running everything as a code
  • Enhancement of IT & Security Risk control mechanism of GCP, AWS and Azure based APIM platform.
  • Responsible for Creation of security standard based on IT and security frameworks (Such as OWASP10, ISO 23167:2020, ISO 23188:2020, ISO 23029:2020, ISO27001/2, NIST 500, NIST 800,GxP, CIS and COBIT);
  • Development of security concept and road map for achievement of desirable future state.
  • Interact with senior stakeholders across departments and will reach and influence a wide range of people across larger teams and communities
  • Research and apply innovative Cloud and Security architecture solutions to new or existing problems
  • Work out subtle Cloud and Security needs and will understand the impact of decisions, balancing requirements and deciding between approaches.
  • Design and plan a cloud solution architecture, produce particular patterns and support quality assurance, and is the point of escalation for architects below them
  • Post bridge assessment and validation of execution for AD and AAD
  • Designing and Implementation of AD Tiering model
  • Migration to tiering model
  • Designing AD Concept for Application and Server administration
  • Designing AD Concept for self-evolution of rights
  • Developing PAM Program
  • Designing CyberArk Core PAS Solution
  • Implementing CyberArk Core PAS
  • Designing Client specific use cases for CyberArk EPM
  • Implementation of CyberArk EPM
  • Manage and provision the cloud solution infrastructure
  • Design for security and compliance
  • Analyse and optimize technical and business processes
  • Manage implementations of cloud architecture
  • Ensure solution and operation reliability
  • Configure access within a cloud solution environment
  • Ensure data protection
  • Manage operations within a cloud solution environment
  • Ensure compliance and reliability
BMW Group\BMW Bank
1 year 2 months
2020-11 - 2021-12

Enhancing Perimeter security of Hilti Cloud

  • Conceptualizing defense in deep approach for HILTI Cloud ? EMEA, APAC, Nord America, and China Mainland.
  • Creation of road map for implementation of layered defence-in-depth strategy. Technology stack including WAF (Web Application firewall),
  • Leading the VRM process selection and setting up of Vendor battles
  • Performing of POCs with shortlisted vendors.
  • Setting up criteria and Perform interoperability, regression, and Unity testing of the selected stack with the existing Hilti eco system
Hilti
4 months
2020-09 - 2020-12

Integration of existing IAM platform

Governance Consultant/Architect
Governance Consultant/Architect

  • DB Access gate (OneIM) with Wealth Management Platform (WME) dedicated to automate user lifecycle (access provisioning and deprovisioning) and to allow usage of hybrid identities of Wealth management Eco system (300+) applications.
  • Architecting (HLD, LLD, API contracts) for fleet of Rest Full APIs, dedicate to overcome One- IM Constrains and limitations. 

Deutsche Bank
10 months
2019-12 - 2020-09

evaluation of the current setup, of the Hybrid Cloud deployment

Governance Consultant/Architect
Governance Consultant/Architect
External governance consultant responsible for evaluation of the current setup, of the Hybrid Cloud deployment, HA, Security of network infrastructure, ITGCs of EHRs, i.e. electronic health records (German: Patientenakte, ePA), system development program. EHR`s records are hailed as the key to increasing the quality of care. This project is result of the Appointment Service and Supply Act (TSVG), adopted on 14th March 2019, requires the German statutory health insurance funds to provide policyholders with electronic health records from 1st January 2021 onwards. Effectively applying CYBER KILL CHAIN models (MItre ATT&CK framework, SANS Diamond Model For Intrusion Analysis, CEH) Putting all the cybersecurity products to the test in a structured and methodical way and assessing whether or not the security product is fulfilling its duty or not (Vendor Battles). Lead Breach & Attack Simulation and Filling the gaps in security
  • Define the product strategy for the business considering technology constraints
  • Coordinate the technology related efforts to deliver it within the project and with 3rd party subcontractors.
  • Business application ownership and management of book of work for certain front-to-back processes and applications in GRC and Security areas
  • Development and optimization of the ISMS (Information Security Management System) according to ISO27001
  • Business architecture, process and requirements design and definition as product subject matter expert in control definition ? ITGC, compensative and detective controls
  • Product responsibility (IT team to deliver product, deliver manager to oversee and steer direction)
  • Close collaboration with IT as CRC product owner in an agile working framework
  • Provide transparent, timely and accurate information to senior stakeholders and peers
  • Cryptographic knowledge including encryption, key exchange, certificate handling and protocols (x509, PKCS12 etc)
  • Security Control Frameworks e.g. ISO27001 and practical experience in their implementation
  • Security Architecture principles, generic best practices
  • Network security devices
  • Endpoint defense solutions
  • Exposure to malware infection vectors and defence methods
  • Endpoint and Server hardening principles, best practices
  • Web application firewalls, network load balancers, proxy systems
  • Network, Endpoint and Application logging concepts, best practice and monitoring systems including SIEM
  • Active Directory Security including federated solutions using ADFS, SAML etc
  • Exposure to cloud security models including public, private and hybrid concepts
  • Application security including web applications, SaaS services etc
  • Data handling principles, protective marking/tagging and data security knowledge
IBM
2 months
2019-10 - 2019-11

Architecting FCP POC

Cloud Architect
Cloud Architect

  • Creating a Roadmap for migrating of on-prem OpenShift platform to the cloud (AZURE - ARO, CGP - GKE and AWS ? ECS, EKS, Fargate ) aiming utilization of cloud native approach
  • Participates in and contributes thought leadership and strategic direction during ISRM leadership team meetings and executive workshops
  • Prepares strategic updates and vision documents, briefings, and reports, and demonstrates excellent communication skills and executive presence in presentations to TR executives, customers, and partners
  • PaaS DevOps consulting on the migration of existing IT applications to the PaaS solution
  • Analysis of existing IT applications, defining Changes in the software architecture on High and Low Level
  • Architecting Data flow relaying on GCP\AWS\Azure out of the box services and enabling usage of GraphQL as super positioned touch point.
  • Own the security architecture process, enabling the development and implementation identity and security solutions and capabilities enterprise wide, clearly aligned with business, technology and threat drivers. Translating security policies and directives into specific requirements, procedures, standards and guidelines
  • Defining architectural principles, Consulting of project and line organizations regarding the implementation of safety requirements, ensure that company-wide security requirements are correctly implemented
  • Develops hybrid cloud strategy and governance to meet future business requirements, with a focus on containerization and microservice architectures
  • Develops infrastructure identity and security strategy plans, roadmaps and other architecture artifacts based on sound enterprise architecture practices.
  • Participates as a consultant in application and infrastructure projects to provide infrastructure & security-planning advice
  • Determines baseline infrastructure configuration standards for operating systems (e.g., OS hardening), network segmentation, and identity and access management (IAM) platforms and capabilities.
  • Validates IT infrastructure and other reference architectures for security best practices and recommend changes to enhance security and reduce risks, where applicable.
  • Reviews network segmentation strategy (also in a containerized environment) to ensure least privilege for network access, ensures this translates to a new software defined data canter offering.

Generali
Zurich Switzerland
1 year 2 months
2018-08 - 2019-09

Development of identity and security strategy plans

Cloud Security Architect
Cloud Security Architect
  • Own the security architecture process, enabling the development and implementation identity and security solutions and capabilities enterprise wide, clearly aligned with business, technology and threat drivers. Translating security policies and directives into specific requirements, procedures, standards and guidelines
  • Defining architectural principles, Consulting of project and line organizations regarding the implementation of safety requirements, Ensure that company-wide security requirements are correctly implemented
  • Development of identity and security strategy plans and roadmaps ensuring Confidentiality Integrity and Availability of resources based on sound enterprise architecture practices.
  • Development and maintenance of identity and security architecture artifacts (e.g., models, templates, standards and procedures) that can be used to leverage security capabilities in projects and operations.
  • Provides strategic technical and architectural guidance to senior management, business technology project teams and functional organizations
  • Designs and builds security models and capabilities as it relates to network, cloud, endpoint, identity, and data security domains; authors and drives compliance with enterprise security policies and standards
  • Leads technical defense-in-depth reviews of TR?s product portfolio to evaluate the application of security controls and identify opportunities to enhance the product?s security posture
  • Guides teams in defining future state end-to-end architectures, platforms, products, tools and solutions to advance security capabilities in the business
  • Develops and drives the ISRM technology roadmap, defining current and future security platform lifecycles (candidate, POC, deployed, pending decommission) to continuously improve TR?s security controls posture
  • Work closely with internal teams to effectively deliver internal change capability
  • Clearly define programme requirements and ensure clear communication at all times
  • Consulting the automation DevOps lead on network layouts and negotiating with other network teams on integration and segregation topics Performing application vulnerability and security assessments
  • Performing application security risk assessments
  • Performing code review across a variety of programming languages
  • Defining application security controls (ITGCs)
  • Performing application security design activities
  • Performing assessments of SDLC and DevOps processes, Promoting DevSecOps and safe code practices;
  • Developing and delivering application security training and outreach
  • Creating gap analysis and client improvement program recommendations
  • Other security-related projects that may be assigned according to skills
  • Review and evolve customer and internal access management technologies. Create the IAM policies and technical standards. Advise technical teams on the control design and perform risk assessments and define the IAM related security requirements.
  • Translating clients' risk, security, and compliance requirements into specific Cloud security solutions and design patterns
  • Set up Security Baselining and ensure compliance with State authorities
  • Utilizing Modern technology (DevOps, DevSecOps, CI\CD) trends Security
  • Security PO directly responsible for:
  • iptiQ PnC Security Concept;
  • Identification of the Critical assets - Our in-depth reference architectural model, is based on ISO/IEC 17789 and NIST 500-292
  • Development and optimization of the ISMS (Information Security Management System) according to ISO27001, GDPR and FINMA requirement
  • Appling of Passwordless authentication techniques (MFA, OATH, FIDO2, SSO, Yubikey)
  • Cloud Compute and Workload security protecting Software defined networking, Virtual machines/Instances, containers, Platform-based workloads and Serverless computing;
  • Defining Key risks and controls
  • Centralized Authentication/authorization - utilization of Managed services for authentication and authorization (Okta) together with LDAP DS, and dedicated Oath 2 platforms
  • System integrity, System administration, and Software deployment via Terraform, CloudFormation and Ansible Scrips (DevSecOps).
  • Security patch management via Immutable Workloads Enable Security - Nexus IQ
  • Automatic identification of OSS\TP component and risk modeling in accordance with Risk Appetite.
  • Malware\edge Protection via a combination of managed services (WAFs) ?CloudFlare and edge NGxFW (Palo Alto network)
  • System hardening, performance tuning and patch management;
  • Tenant segregation, multiple VPC
  • RBAC of Technical Users and business users, role definition certification and enforcement;
  • KMS management Private keys, envelope encryption Securing data at rest, and in transit and pseudo-anonymization via tokens;
  • Enforcing Safe code security practice and monitoring of OSS\TP components in use;
  • Attack surface and treat modeling, Static Code Scanning and Free and Open Source Scanning., Appling measures to prevent OWASP 10 vulnerabilities, Code repository security (Nexus IQ) together with Sonar cube
  • Service continuity, disaster recovery
    • Business Continuity Within the Cloud Provider
    • Business Continuity for Loss of the Cloud Provider
    • BC\DR Remediation Actions
  • Propper security monitoring logic (Events & Time Series) via Cloud Watch, Cloudtrail and Panorama
  • Integrating with 3rd party SOC Providers, enablement paging deuties
  • Backup orchestration to another cloud vendor;
  • IT Cyber Security Metrics,
  • Implementation of Advanced End Point Protection
iptiQ PnC Swiss Re
Zurich Switzerland

Aus- und Weiterbildung

Aus- und Weiterbildung

BS, IT Science

PU Paisii Hilendarsky


BSc, eng. in Aeronautic

TU Sofia


Certifications

  • ITIL v4
  • ITILv4 Managing Professional (MP)
  • ITILv4 Strategic Leader (SL)
  • LeSS Prcticioner
  • Certified Product Owner (CSPO)


2016

SAFe4


2009

CISA


2015

PMP


2012

TOGAF foundation


ITIL Lifecycle and Capability (ITIL® ATO Accredited Trainings)

  • ITIL Foundation v3
  • ITIL® 2011:
    • Service Strategy
    • Service Design
    • Service Transition
    • Service Operation
    • Continual Service Improvement
    • Operational Support & Analysis
    • Planning, Protection & Optimizations
    • Release, Control and Validation
    • Service Offerings and Agreements
    • Managing Across the Lifecycle

Kompetenzen

Kompetenzen

Top-Skills

Analytical Thinking and Problem-Solving: Communication and Collaboration Cloud Technical Proficiency Security Konzepte IAM PAM Azure Good Clinical Practice AWS DevOps Azure Devops

Schwerpunkte

  • IAM/PAM Proficiency: Strong experience with IAM tools and technologies (e.g., Azure AD, CyberArk, BeyondTrust), focusing on the management of privileged accounts and access controls.
  • DevSecOps Tools: Proficient in using DevSecOps tools and frameworks such as Azure DevOps, Jenkins, GitHub Actions, Gut Lab, Terraform, Ansible, and security scanning tools (e.g., Snyk, Aqua Security, etc).
  • Shift-Left Security & CI/CD Integration: With a strong focus on embedding security early in the development cycle, I have integrated SAST and DAST tools into CI/CD pipelines using GitLab and ArgoCD to ensure that security vulnerabilities are detected and resolved before code reaches production. I automate security checks, such as SonarQube for code scanning and OWASP Dependency-Check for dependency vulnerabilities, allowing security to be an integral part of the development process.
  • HashiCorp Vault & Secrets Management: I have extensive experience implementing and managing HashiCorp Vault (Enterprise) for centralized secret management in both cloud and on-prem environments. I automate secret distribution and access control policies across cloud platforms like Google Cloud and Azure, leveraging Google Cloud Secret Manager and Azure Key Vault for secure API key storage and management. This ensures the rotection of sensitive data while maintaining compliance with regulatory standards (e.g., PCI-DSS, GDPR).
  • Runtime Security Monitoring & Incident Response: In terms of runtime security, I use tools such as Falco, Sysdig, and Google Cloud Security Command Center for real-time monitoring of cloud and containerized environments. With these tools, I proactively monitor for security incidents, track vulnerabilities, and respond swiftly to mitigate risks. I also leverage Azure Sentinel and Stackdriver to integrate security logs, track threats, and automate incident response workflows.
  • Cloud Security & Infrastructure Automation (Terraform, GCP & Azure): Leveraging Terraform, I automate infrastructure provisioning in both Google Cloud and Azure environments, ensuring secure, consistent, and compliant infrastructure management. I configure security best practices using Google Cloud IAM, Azure AD, and deploy infrastructure with CloudFormation, Pulumi, and Helm charts for Kubernetes deployments.
  • Container Security & Kubernetes: I specialize in securing containerized environments, including Kubernetes clusters using Google Kubernetes Engine (GKE) and Azure Kubernetes Service (AKS). I ensure container images are scanned for vulnerabilities using Clair and Anchore, while enforcing Kubernetes RBAC for strict access control and using Kube-bench for security benchmarks.
  • Secrets & Compliance: I ensure that secrets are securely stored and managed using tools like HashiCorp Vault, Azure Key Vault, and Google Cloud Secret Manager to ensure compliance with industry regulations. This includes enforcing encryption and access policies to protect sensitive data, ensuring compliance with GDPR, PCI-DSS, and other industry standards.
  • CI/CD Automation & GitOps: By automating the deployment pipeline with GitOps principles using GitLab, ArgoCD, and Helm, I ensure a secure, repeatable process for application and infrastructure deployment. This automation ensures consistent application of security policies across all environments, improving the overall security posture of the organization.
  • Collaboration & Security Culture: Working within Agile and SAFe frameworks, I foster a security-first culture, promoting collaboration between development, security, and operations teams. Using tools like Jira and Confluence, I drive cross-functional discussions around security vulnerabilities, ensuring that security is not an afterthought but an integral part of the development lifecycle.
  • Monitoring and Observability: Implementing comprehensive monitoring and logging solutions using ELK stack, Prometheus, and Grafana. Setting up alerting mechanisms to proactively manage and resolve incidents.
  • Performance Optimization: Continuously analyzing and optimizing CI/CD workflows to reduce build and deployment times. Identifying and eliminating bottlenecks to improve overall system performance.
  • Cloud Service Provider Cybersecurity Practices: Align Cloud service provider`s practices with Companie`s Internal Cyber security policy and Standards to implement modern control mechanisms and baseline practices, informed by a rigorous threat model, across their digital identity and credential systems to substantially reduce the risk of system-level compromise.
  • Audit Logging Norms: Help Companies to adopt a minimum standard for default audit logging in cloud services allowing them to enable the detection, prevention, and investigation of intrusions as a baseline and routine service offering without additional charge.
  • Digital Identity Standards and Guidance: Implement emerging digital identity standards (IAM/PAM, SAML, OpenID OAuth2) to secure cloud services against prevailing threat vectors, following recommendations of the relevant standards bodies. Internally refine, update, and incorporate these standards to address digital identity risks commonly exploited in the modern threat landscape.
  • Security Standards and Compliance Frameworks: Update the internal Security Standards, Concepts, Policies and supporting frameworks, and establish a process for conducting discretionary special reviews of the related program?s authorized Cloud Service Offerings following especially high-impact situations; Incorporate feedback about observed threats and incidents related to cloud provider`s security and platform.
  • Security Best Practices: Recognized ability in transforming standard security patterns, changing the way of thinking about treats; Knowledgeable in implementing security best practices to safeguard cloud infrastructure and applications. I conduct regular security audits, establish access controls, and monitor for vulnerabilities to mitigate risks and ensure data integrity and confidentiality. Design, deliver, maintain and deploy security baselines and automation solutions for Azure hybrid cloud identity platform. Stay current on current and future cloud security technology trends, influencing and contributing to the overall IAM cloud security architectural roadmap.

Aufgabenbereiche

  • Cloud Security & Governance: Expertise in securing cloud platforms like Google Cloud and Microsoft Azure, implementing IAM, VPC Security, and DDoS protection with tools like Google Cloud Armor and Azure Security Center.
  • DevSecOps Automation: Extensive experience automating security in CI/CD pipelines using GitLab, ArgoCD, and Terraform, integrating security testing with tools such as SonarQube, OWASP Dependency-Check, and Snyk.
  • Pipeline Design and Implementation: Architecting efficient and reliable CI/CD pipelines tailored to the specific needs of various projects. Utilizing Jenkins for automated build, test, and deployment processes to facilitate rapid and frequent releases.
  • Continuous Integration/Continuous Delivery (CI/CD): Expertise in designing and implementing CI/CD pipelines using tools such as Jenkins, GitLab CI, ArgoCD, Azure DevOpa and CircleCI. Proficient in automating build, test, and deployment processes to enhance software release cycles.
  • Containerization and Orchestration: Extensive experience with Docker for containerization and Kubernetes & OpenShift for orchestration and management of containerized applications. Skilled in deploying and scaling microservices architectures.
  • Cloud Infrastructure Management: Expertise in deploying, configuring, and managing cloud environments on Azure and Oracle Cloud, including resource optimization, automation, and cost management.
  • Secrets Management & Compliance: Hands-on expertise with HashiCorp Vault (Enterprise), Google Cloud Secret Manager, and Azure Key Vault for secure storage, access, and compliance of sensitive information (e.g., passwords, API keys).
  • Configuration Management and Infrastructure as Code (IaC): Proficient in using configuration management tools such as Ansible, Chef, and Puppet. Expertise in IaC tools like Terraform and AWS CloudFormation for consistent and automated infrastructure deployment.
  • Scripting and Automation: Strong scripting skills in Python, Bash, and PowerShell for automating repetitive tasks and enhancing productivity. Expertise in writing scripts to integrate various tools and processes in the CI/CD pipeline.
  • Runtime Security Monitoring: Proficient with Falco, Sysdig, Google Cloud Security Command Center, and Azure Sentinel to monitor runtime environments and detect security incidents in real-time.
  • Container & Kubernetes Security: Skilled in container security best practices with tools such as Clair, Anchore, Kube-bench, and managing Kubernetes security policies using RBAC and Helm charts.
  • Vulnerability Management: Experience with SAST and DAST tools to detect vulnerabilities in code and running applications, ensuring early detection and remediation.
  • Infrastructure as Code (IaC) Security: Expertise in managing infrastructure securely with Terraform, Helm, CloudFormation, and Pulumi, using tools like Checkov and tfsec for IaC security scanning.
  • Agile & Scrum Methodologies: Proven ability to work within Agile frameworks, managing security tasks using Jira and Confluence to track vulnerabilities, security stories, and team collaboration.
  • Performance Optimization: Skilled in optimizing build and deployment processes to reduce time and resource usage.

Produkte / Standards / Erfahrungen / Methoden

Profile
A highly skilled and results-driven DevSecOps Engineer with over 6 years of experience in cloud security, application security, and automation across both on-premises and cloud environments (Google Cloud Platform and Azure). Adept at integrating security into every phase of the SDLC, from development to production, using a shift-left approach and CI/CD pipelines. Proficient in securing containerized applications with Kubernetes, managing secrets with HashiCorp Vault, and automating infrastructure with Terraform. Experienced in monitoring cloud environments with Google Cloud Security Command Center, Azure Sentinel, and implementing runtime security with tools like Falco and Sysdig.
A proactive advocate for best security practices, skilled in driving secure DevOps workflows through GitLab, ArgoCD, and Helm. Expertise in leveraging SAST, DAST, and IaC security tools to detect vulnerabilities early and remediate issues promptly. Proven ability to collaborate effectively in Agile environments, driving secure application delivery within SAFe and Scrum frameworks. Strong communicator, adept at bridging gaps between security, development, and operations teams to foster a security-first culture.
Adept in IT Service Management, with a proven track record of interfacing with external suppliers to manage support services, enforce Service Level Agreements (SLAs), and maintain compliance with company policies and security standards. Skilled in capacity planning, anticipating infrastructure needs, and providing operational support for security management functions.
Strong background in providing IT user support, with a collaborative approach to resolving complex technical issues. Committed to maintaining detailed service and application documentation, fostering knowledge sharing, and ensuring the continuous improvement of IT processes. Known for a proactive, problem-solving mindset and the ability to deliver high-quality results in dynamic, fast-paced environments. Seeking to leverage my technical expertise and strategic vision to contribute to a forward-thinking organization.
Known for a strategic mindset and meticulous attention to detail, they effectively led cross-functional teams to deploy secure systems that enhanced organizational resilience. Career marked by continuous learning and adaptation, as security architect consistently delivered solutions that met and exceeded client expectations. Help leading organizations use technology to drive greater bottom-line impact, increase agility, navigate business change, and transform IT so that it can respond to changing demands, to selects and develops general control activities over technology and to support the achievement of objectives.


Skills

OPERATING SYSTEMS, UTILITIES & VIRTUALIZATION TOOLS

Windows, Linux, OpenShift, VMware ESX SRM, Kubernetes (SUSE CaaSP), RedHat OpenShift , Pivotal PKS, Docker,( AKS, ARO, ECS, EKS, Faregate), Platform Virtualization (Hyper-V & ESX), SDDC, Software defined networks & Service meshes, etc.


NETWORK SYSTEMS & TECHNOLOGIES

Password Vaults, PKIs KMS, HSMs, FIDO, Yubikey, Windows Hallo, Zscaler, VPNs (IPsec) , TCP/IP, SNMP, DNS, Syslog (Time Seriees and Event Driven architecture) , Azure Virtual Network (Virtual Network (VNet), Virtual WAN, ExpressRoute, VPN Gateway, NAT Gateway, Azure DNS, Peering service, Azure Virtual Network Manager, Route Server, and Azure Bastion), Azure - Load Balancer, Private Link, DDoS protection, Firewall, Network Security Groups(NSG), Web Application Firewall, and Virtual Network Endpoints, Private links), Content Delivery Network (CDN), Azure Front Door Service, Traffic Manager, Application Gateway, Internet Analyzer, and Load Balancer. BGP, GRE, OSPF, IS-IS, NSX-V/T etc, and equivalent AWS and GCP service,


DATABASE MANAGEMENT SYSTEMS

Kafka Oracle, PostgreSQL, MySQL, MariaDB, MongoDB, Azure (Cosmos DB, Azure SQL Database), AWS (DynamoDB, Aurora, Elasticash, Timeseries Redis, etc.)


COMMERCIAL SOFTWARE

CyberArc, Beyond Trust, Zscaler, SAP ECC, SAP s4 Hana, Office 365, DLP, Pureview, SAP GRC, Jira, Confluence, MIRO, MS Visio, etc.


METHODOLOGIES & STANDARDS

SANS, MITRE, OWASP10, ISO 23167:2020, ISO 23188:2020, ISO 27799, ISO/IEC 80001, ISO 23029:2020, ISO27001/2, NIST CSF ? SPs, NIST 500, NIST 800, HIPAA/HITECH, GxP , HiTRUST, FedRAMP, RMF DoD, FDA, 21CFR820, CIS, PFMI, TOGAF, SABSA, Octave, EBIOS, CRAMM, and COBIT


Additional IT Experience

10/2019 - 11/2019
Role: Cloud Architect Generali
Customer: Zurich Switzerland From 

08/2018 - 09/2019
Role: Cloud Security Architect iptiQ PnC 
Customer: Swiss Re. Zurich Switzerland 

08/2017 - 10/2017
Role: Enterprise Architect 
Customer: UBS AG, Zurich Switzerland

Tasks:
IAM/PAM Sustainability Program

02/2017 - 11/2018
Role: Senior Program Manager\Lead Architect 
Customer: VMWare 

05/2016 - 02/2017
Customer: SME IAM Maersk Oil&Gas Copenhagen, Denmark 

06/2015 - 04/2016
Role: Infosys Team Lead\SME 
Customer: Deutsche Bank S.A. Frankfurt am Main, Eschborn Germany 

04/2014 - 11/2015
Role: Infrastructure Delivery Manager 
Customer: UniCredit S.A, Frankfurt am Main, Milano

09/2013 - 04/2014
Role: Director Performance &Technology 
Customer: on request

11/2009 - 08/2013
Role: Senior Director, (Technology and Risk Advisory Service lines) 
Customer: on request

04/2007 - 10/2009
Role: Informational Risk Manager (CISO) 
Customer: ProCredit Bank Holding S.A.

Tasks:

  • ProCredit Bank Holding S.A. 21 growing banks operating in transition economies and developing countries in Eastern Europe, Latin America, and Africa.
  • Currently ProCredit Bank Bulgarian bank holds position in top 10 on Bulgarian Market.

05/2006 - 08/2006
Role: IT Administrator 
Customer: Deloitte SSA

03/2003 - 05/2006
Role: LAN Administrator 
Customer: Piraeus Bank 

Programmiersprachen

Power BI
DevOps
Azure DevOps
Github
GitLab
GItOps
Terraform
Ansible
etc.

Hardware

Cisco
Juniper
Palo Alto
Checkpoint

Einsatzorte

Einsatzorte

Deutschland, Schweiz, Österreich
möglich

Projekte

Projekte

6 months
2024-01 - 2024-06

EMA External Consulting SME of DevSecOps Practices

EMA External Consultant SME of DevSecOps Practices
EMA External Consultant SME of DevSecOps Practices

  • Reviewed Client`s DevSecOps Practices of their current IT systems infrastructure and the so-called target architecture solution, covering Microservice, Kubernetes, Atlassian Eco system (Jira, Confluence), SNOW, Zero-trust, Service meshes, PAM, ML\AI (LLM) and CI\CD automation (Azure DevOps)ensuring compliance with GxP and cGxP.
  • Enhance Govern and establish a proper MEASURE and MANAGE Functions for , objective, repeatable, scalable test, evaluation, verification, and validation (TEVV) processes including metrics, methods, and methodologies, ensuring that they are in place, followed, and documented.
  • Recommended and architected improvements on sustainable hybrid cloud architectures with lean, automated, and secure maintenance practices, ensuring high availability, resilience, scalability, and performance. Collaborated with senior stakeholders across Digital, OT, Enterprise Architecture, QA, and IT Security to drive DevOps culture through containerization, Usage of AI(LLM) and associated concept?s introduction.
  • Provided streamlined and structured approach to develop LLM-infused applications. Allow well-defined process and lifecycle to guides the process of building, testing, optimizing, and deploying flows, culminating in the creation of fully functional LLM-infused OPS solutions.
  • Designed and implemented scalable cloud architectures on Azure and Oracle Cloud, supporting business growth while reducing infrastructure costs by 20%.
  • Optimized cloud resource allocation through continuous monitoring and performance tuning, achieving a 15% improvement in system performance.
  • Automated the deployment of cloud infrastructure using Terraform and ARM templates, reducing manual errors and deployment time by 30%.
  • Administered Linux servers and databases (SQL, Oracle, Postgres, MySQL), ensuring high availability, security, and optimal performance.
  • Collaborated with external suppliers to manage support services, ensuring compliance with SLAs and resolving issues promptly.
  • Architected and implemented robust CI/CD pipelines using Azure devOps, Jenkins, Rancher, Docker, and Kubernetes, resulting in a 30% reduction in deployment times.
  • Led a team of DevOps engineers to migrate legacy applications to a microservices architecture, leveraging Kubernetes for orchestration.
  • Designed and deployed automated testing frameworks integrating with CI/CD pipelines, improving code quality and reducing bugs by 25%.
  • Collaborated with development, QA, and operations teams to foster a DevOps culture and streamline the software development lifecycle.
  • Implemented monitoring and logging solutions using ELK stack and Prometheus, enhancing system observability and incident response times.
  • Improved, designed containerized solutions meeting GxP and cGXP requirements, IT security, and reliability standards, while defining cloud standards and frameworks for managing infrastructure lifecycle with DevOps techniques, including:
    • Secure throughout the software development lifecycle to minimize vulnerabilities in software code.
    • Proper function of the DevOps teams, including developers and operations teams.
    • Confirmed shared responsibility for following security best practices.
    • Evaluate efficiency and effectiveness of automated security checks at each stage of software delivery.
    • Recommend improvements on integrated security controls, tools, and processes into the DevOps workflow.
  • Ensured designs complied with IT Security and QA standards through reviews and promoted cloud-native setups for forward-looking architectures and applications, ensuring Traceability, Accountability and Data integrity.
  • Identified and recommended infrastructure improvements for more efficient services, optimizing resource utilization and enhancing overall system performance and cost reduction.
  • Recommend implementation of new methodologies using modern agile approaches, driving continuous improvement and innovation within the organization.
European Medicines Agency (EMA)-
6 months
2023-07 - 2023-12

SAP S/4HANA Cloud (S4C) and AI Initiative pre-project

SAP Security and Access Architect
SAP Security and Access Architect
  • Orchestrated and executed security solutions, encompassing Zero Trust principles, and WAF (AKAMAI) for BASIS Administration, SAP IAS, IPS, MS Azure, S/4, public cloud, BTP, and Fiori applications, ensuring adherence to best practices and compliance standards.
  • Design proper integration patterns of S4C public cloud with HR platform, Salesforce and IAM\PAM solutions Assets on Azure and AWS allowing benefits from AI Automation for Incident (Recognition, Response and Handling).
  • Define:
    • enhanced processes for governing, mapping, measuring, and managing Risks, and clearly documenting outcomes;
    • improved awareness of the relationships and tradeoffs among trustworthiness characteristics, socio-technical approaches, and risks;
    • explicit processes for making go/no-go system commissioning and deployment decisions;
    • establish policies, processes, practices, and procedures for improving organizational accountability efforts related to AI system risks;
    • enhance organizational culture which prioritizes the identification and management of AI system risks and potential impacts to individuals, communities, organizations, and society;
    • better information sharing within and across organizations about risks, decision-making-processes, responsibilities, common pitfalls, Test, Evaluation, Verification, and Validation (TEVV) practices, and approaches for continuous improvement;
    • and create a greater contextual knowledge for increased awareness of downstream risks;
  • Adopt a first principals? approach when testing each input by examining the original expected value and the servers response when the value is modified, determine how data may be being processed by the server and can then dynamically evolve each test to identify vulnerabilities.
  • Contributed to the design and optimization of large-scale distributed systems, ensuring reliability and scalability.
  • Designed and implemented secure and scalable container-based systems using Docker and Kubernetes on AWS & Azure
  • Collaborate with key stakeholders to understand business processes and identify areas for improvement in risk management and compliance
Hilti
1 year
2022-07 - 2023-06

IETV Program

Platform Security Engineer
Platform Security Engineer

  • Spearheaded the transition to a fully automated CI/CD process, integrating Jenkins, GitLab CI, and Ansible, reducing manual intervention by 40%.
  • Developed and maintained infrastructure as code (IaC) using Terraform and AWS CloudFormation, enabling consistent and repeatable infrastructure deployments.
  • Introduced containerization strategies using Docker and Kubernetes, resulting in improved scalability and deployment flexibility.
  • Conducted training sessions and workshops on CI/CD best practices and tools, enhancing team proficiency and collaboration.
  • Worked with SwissRe's Cyber Risk team to ensure SwissRe's security standards are implemented and Documentation of the measures implemented is in place.
  • Cultivates and implements a culture of risk management within organizations designing, developing, deploying, evaluating, and acquiring AI systems;
  • Outlines processes, documents, and organizational schemes that anticipate, identify, and manage the risks a system can pose, including to users and others across society? and procedures to achieve those outcomes;
  • Incorporates processes to assess potential impacts;
  • Provides a structure by which AI risk management functions can align with organizational principles, policies, and strategic priorities;
  • Connects technical aspects of AI system design and development to organizational values and principles, and enables organizational practices and competencies for the individuals involved in acquiring, training, deploying, and monitoring such systems; and
  • Addresses full product lifecycle and associated processes, including legal and other issues concerning use of third-party software or hardware systems and data.
  • Design, build and optimize security controls and automated response solutions in AWS (AWS stack: Control tower, CloudFront, Load Balancers, WAFv2, Security Groups, Security Hub, Inspector, IAM, Kinesis, Guard duty, Cloud Watch, CloudTrail, Lambda etc.) and Azure Cloud (Defender and Sentinel)
  • Vulnerability management, system and network hardening (CIS and AWS benchmarks)
  • Prime liaison with the client, including participation in Crisis Management, Continuous improvements in coordination with the Platform teams, requests coordination with stakeholders and tracking until delivery
  • Participation in the global Saga and Epic planning by providing insight from own experience and state-of-the-art knowledge
  • Security architecture review
  • Perform Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), and Software Composition Analysis (SCA) assessments on applications, systems, and software components to identify security vulnerabilities, weaknesses, and risks.
  • Collaborate with the central security team to introduce and scale industry-leading security testing tools and methodologies to conduct thorough security assessments.
  • Collaborate with development teams to provide guidance and recommendations for secure coding practices and vulnerability remediation.
  • Participate in threat modelling activities to identify potential security risks and develop appropriate mitigation strategies.
  • Stay up-to-date with the latest security trends, vulnerabilities, and attack vectors, and provide proactive recommendations to enhance security measures.
  • Ensure compliance with requirements on Encryption at rest and in transit. Hands-on experience with Microsoft Azure and Azure Security Technologies specifically, Azure KeyVault, Azure Managed HSM or Azure Dedicated HSM, enforcing data encryption standards and solutions.
  • Design, implement and ensure best practices of AuthZ, via token rotation: both for human and non-human
Swiss Re
6 months
2022-08 - 2023-01

Cyber Arc (PAM) advisory

As Technology Partner in FIS Global I am responsible for building and developing the Digital Identity Practice as part of Cyber Security services. The Digital Identity practice consists of PAM (Privileged Access Management), IGA (Identity Governance and Administration) and CIAM (Customer IAM). The current toolset in use for the following topics are as follows: IGA ? SailPoint IIQ, OMADA, MIM 2016, PAM ? CyberArk, CIAM ? ForgeRock and Transmit Security Microsoft Based Security ? On-Premise and Azure Cloud As part of the company leadership team, I am responsible for building, developing and administrating a team of 20+ people across Central and Eastern Europe. Daily, I am taking management and architectural role in various projects covering services such as assessment, design, implementation, and managed service across Europe with the technology stacks mentioned above. I have experience in various industries and expert knowledge in IAM/PAM best practices and compliance standards across widely regulated and non-regulated businesses. In the past 10+ years I have been involved in projects taking various roles from Implementation Engineer to Solution Architect for businesses in any size ? from small to large global companies spanned across the globe. My expertise and understanding of the overall IT Infrastructure and in-depth knowledge in Authorization, Authentication and Security allowed me to successfully deliver all those projects regardless of the project complexity, timeline, location or size. My strongest features are my devotion to work and desire to solve complex challenges with the highest quality, ability to lead teams and coordinate activities, ability to consult and discuss on every level from top management level through enterprise architecture down to in-depth technical discussions and low-level solution specific conversations with developers and engineers. In my current role, my main responsibilities include driving the line of business forward by developing new client relationships and delivering complex projects from Management and Architectural perspective including but not limiting to:

  • Roadmap design HLD, LLD and Pilot implementation of Companywide PAM solution as a Service provided from a market leader.
  • Close collaboration with IT teams, design a security architecture framework (guidelines, technology reference models, guidelines, and training material)
  • Assess and transpose embed security requirements into existing or new IT systems (business applications including SAP, IT infrastructure, on-prem and cloud systems including Microsoft office 365).
  • Perform cyber security architecture reviews and documentation of the security requirements in architecture handbooks in close collaboration, partnering and advising IT and business teams to implement a ?secure by design? strategy that provides the following - Regulatory compliance, Security policy enforcement, Support of ?bring your own device? (BYOD), Remote control of device updates, Application control, Automated device registration & Data backup
  • Advise and design security solutions for implementation into complex customer IT environments which carry proprietary real-time life critical data and diagnostic quality images which require reliability and high availability output based on GCP Native services like (Access Transparency, Assured Workloads, Binary Authorization, Cloud Asset Inventory, Cloud Data Loss Prevention, Cloud Key Management, to manage encryption keys on Google Cloud, Confidential Computing, Firewalls, Secret Manager to store API keys, passwords, certificates, and other sensitive data, Security Command Center, Shielded VMs, VPC Service Controls, BeyondCorp Enterprise for Scalable zero trust platform with integrated threat and data protection, Cloud Identity, Identity and Access Management, Identity-Aware Proxy, Policy Intelligence, Titan Security Key for MFA, etc.
    • Employ DevSecOps, AIOps and Safe Code Practices. Ensuring that technical solutions are cohesive across the provisioning sub-teams and complete against business requirements. Allowing rapid:
    • Bootstrapping: create a Cloud Setups with corresponding resource hierarchy, and permissions for the initial CI/CD pipeline to deploy next stages.
    • Baseline the a set of configurations that allows the delivery of the security and compliance monitoring, alerting and as foundational guardrails.
    • Covering Business Specific Requirements: Delivers business specific components and integrations (such as SSO, monitoring etc);
    • Establishment of proper Workload services at Applications level running proper set of Application Infrastructure: Any of the many cloud services that form the business? platform for workloads (Servers, Storage, IAM\PAM, SIEM, SOAR etc). The final goal of the Landing Zone: to deliver value to the business
    • Validate, evaluate and technical sign-off of technical changes in capabilities and solutions proposed by external partners.
    • Oversee and guide deployment of security patches, enhancements and changes to the Windows\Linux IT Landscape (including PoCs, PoVs, Canary and Blue-Green deployments, Gold images, and Transfer-to Operations together with L2/L3 running everything as a code)
Galderma
6 months
2022-07 - 2022-12

Design and develop services and solutions based on cloud security-based practices

FADATA Security Architect SaaS offering on AWS and AZURE
FADATA Security Architect SaaS offering on AWS and AZURE
  • Design and develop services and solutions based on cloud security-based practices - CSA CCM and BSI C5.
  • Perform risk assessment of proposed and existing system architecture for compliance with security best practices, recommending technical, administrative, and physical controls to mitigate identified risks.
  • Developed service security and compliance requirements for SaaS multi-tenant systems.
  • Designed and developed cloud security architectures and perform architecture design reviews.
  • Designed and develop frameworks and solutions to secure cloud applications and infrastructure.
  • Lead and execute end to end compliance initiatives, based on selected industry frameworks and compliance standards.
  • Set up Security Baselining and ensure compliance with State authorities utilizing Modern technology (DevOps, DevSecOps, CI\CD) trends Security
    • Aacted as Security PO directly responsible for:
    • Fadata`s SaaS Security Concept;
    • Identification of the Critical assets - Our in-depth reference architectural model, is based on ISO/IEC 17789 and NIST 500-292
    • Development and optimization of the ISMS (Information Security Management System) according to ISO27001, GDPR and FINMA requirement
    • Appling of Passwordless authentication techniques (MFA, OATH, FIDO2, SSO, Yubikey)
    • Cloud Compute and Workload security protecting Software defined networking, Virtual machines/Instances, containers, Platform-based workloads and Serverless computing;
    • Defining Key risks and controls
    • Centralized Authentication/authorization - utilization of Managed services for authentication and authorization (Okta) together with LDAP DS, and dedicated Oath 2 platforms
    • System integrity, System administration, and Software deployment via Terraform, CloudFormation and Ansible Scrips (DevSecOps).
    • Security patch management via Immutable Workloads Enable Security - Nexus IQ
    • Automatic identification of OSS\TP component and risk modeling in accordance with Risk Appetite.
    • Malware\edge Protection via a combination of managed services (WAFs) ?CloudFlare and edge NGxFW (Palo Alto network)
    • System hardening, performance tuning and patch management;
    • Tenant segregation, multiple VPC
    • RBAC of Technical Users and business users, role definition certification and enforcement.
    • KMS management Private keys, envelope encryption Securing data at rest, and in transit and pseudo-anonymization via tokens.
    • Enforcing Safe code security practice and monitoring of OSS\TP components in use;
    • Attack surface and treat modeling, Static Code Scanning and Free and Open Source Scanning., Appling measures to prevent OWASP 10 vulnerabilities, Code repository security (Nexus IQ) together with Sonar cube
    • Service continuity, disaster recovery
  • Business Continuity Within the Cloud Provider
  • Business Continuity for Loss of the Cloud Provider
  • BC\DR Remediation Actions
    • Propper security monitoring logic (Events & Time Series) via Cloud Watch, Cloudtrail and Panorama
    • Integrating with 3rd party SOC Providers, enablement paging duties
    • Backup orchestration to another cloud vendor;
    • IT Cyber Security Metrics,
  • Implement, maintain, and improve existing industry best practices of operational security controls such as Monitoring, Identity and access management, Encryption and data security, and Self-auditing.
  • Guide Product Management on defining and prioritizing the development of secure SaaS solutions.
  • Drive and lead security processes, tools, methods, and knowledge and security enhancements.
  • Prepare and deliver training and security awareness activities to the Engineering teams.
  • Acquire relevant knowledge, remain up to date, attend security conferences, and be involved in the security community.
Zurich Insurance
2 years 7 months
2019-12 - 2022-06

various Projects

FIS - Technological Partner
FIS - Technological Partner
  • Accompanying the functional split in application management by ensuring bidirectional information exchange and taking over the project results into the running operation (service enabling). Thorough understanding of Azure, GCP &AWS Cloud offerings and their services.
  • Understanding and supporting FIS EMEA partner team focused on driving FIS Partner Business through different RTM (route to markets).
  • Lead FIS`s managed IT services in DACH region offering infrastructure management and software support. FIS`s cloud financial services solution provides an elastic, compliant and always-on environment. We partner with world-leading cloud providers to deliver an integrated managed hosting service. Organizes and shapes an engagement team's strategy to drive success. Leads board level visioning sessions providing thought leadership to client
  • Bringing innovative thinking to support the organization to drive change towards Service and SaaS oriented partners, capable to develop FIS?s focus in Modern Application, EUC, and Multi-Cloud.
  • Control of numerous ongoing and new launching corporate channel initiatives and programs, securing with your field team participation and execution to drive partner pipeline.
  • Act as single point of contact for the EMEA Partner team for execution requests, inquiries, escalations, and feedback requests. Being part of FIS management team and execute on activities decided in team meetings being partners voice in these meetings.
  • Develops and manages relationships across the whole client base, discussing benefits and value at board level.
  • Consults on governance, strategy and transformation not just operations.
  • Leads complex TOM transition initiatives.
  • Consults and shapes development of the client's approach to identifying and managing risks and assumptions and for realising benefits at a department level.
  • Architecture, Implementation of Azure Tenant Configuration, Defender Products (Defender for Endpoint, Defender for Identity, Defender for Office 365, Defender for Cloud), Sentinel Configuration and Automation, Infrastructure as a Service (Firewall, VPN, WAF, Load Balancer, etc.), Logic App Automation in Microsoft Azure Environment, AWS Guard duty, Control Tower, Incident Analysis using Microsoft Security Tools (Microsoft Defender for Cloud, Application Gateway, Azure DDoS Protection, Key Vault, AZURE Information Protection, etc.)
  • Ensures knowledge capture sessions are arranged and executed building the company consultant collateral.


Important Clients

  • SIX ? Group ? TBTF Project and Ransomware(APT) Project, Using AI for Incident response and remediation
  • Galderma - PAMaaS integrated with AWS and Azure, Enabling transition from DevSecOps to ML\AIOps
  • BMW Group, BMW Bank, modernisation of edge security of GCP, Azure and AWS. Implementing MLOps, and AI OT Smart factory
  • Deutsche Bank?Integration of existing IAM platform ? DB Access gate (OneIM) with Wealth Management Platform
  • IBM evaluation of the current setup, of the Hybrid Cloud deployment, HA, Security of network infrastructure, ITGCs of EHRs, i.e. electronic health records (German: Patientenakte, ePA), system development program. EHR`s records are hailed as the key to increasing the quality of care.
various Customers
1 year 4 months
2021-01 - 2022-04

Architecting of APIMv2 heterogenic platform-based SaaS microservices

APIM CTO Lead Architect
APIM CTO Lead Architect
  • Enable Open banking for BMW Bank, allowing access and control of consumer banking and financial accounts through third-party applications.
  • Architecting of APIMv2 heterogenic platform-based SaaS microservices (Kubernetes).
  • Enabling migration from heterogenic (mix of on-prem and SaaS solution) to Cloud first \ Cloud only (AZURE and AWS). Clearing the path for BMW`s IT eco to become API driven and BMW to become a Tech Company.
  • Employing DevSecOps and Safe Code Practices, Running everything as a code
  • Enhancement of IT & Security Risk control mechanism of GCP, AWS and Azure based APIM platform.
  • Responsible for Creation of security standard based on IT and security frameworks (Such as OWASP10, ISO 23167:2020, ISO 23188:2020, ISO 23029:2020, ISO27001/2, NIST 500, NIST 800,GxP, CIS and COBIT);
  • Development of security concept and road map for achievement of desirable future state.
  • Interact with senior stakeholders across departments and will reach and influence a wide range of people across larger teams and communities
  • Research and apply innovative Cloud and Security architecture solutions to new or existing problems
  • Work out subtle Cloud and Security needs and will understand the impact of decisions, balancing requirements and deciding between approaches.
  • Design and plan a cloud solution architecture, produce particular patterns and support quality assurance, and is the point of escalation for architects below them
  • Post bridge assessment and validation of execution for AD and AAD
  • Designing and Implementation of AD Tiering model
  • Migration to tiering model
  • Designing AD Concept for Application and Server administration
  • Designing AD Concept for self-evolution of rights
  • Developing PAM Program
  • Designing CyberArk Core PAS Solution
  • Implementing CyberArk Core PAS
  • Designing Client specific use cases for CyberArk EPM
  • Implementation of CyberArk EPM
  • Manage and provision the cloud solution infrastructure
  • Design for security and compliance
  • Analyse and optimize technical and business processes
  • Manage implementations of cloud architecture
  • Ensure solution and operation reliability
  • Configure access within a cloud solution environment
  • Ensure data protection
  • Manage operations within a cloud solution environment
  • Ensure compliance and reliability
BMW Group\BMW Bank
1 year 2 months
2020-11 - 2021-12

Enhancing Perimeter security of Hilti Cloud

  • Conceptualizing defense in deep approach for HILTI Cloud ? EMEA, APAC, Nord America, and China Mainland.
  • Creation of road map for implementation of layered defence-in-depth strategy. Technology stack including WAF (Web Application firewall),
  • Leading the VRM process selection and setting up of Vendor battles
  • Performing of POCs with shortlisted vendors.
  • Setting up criteria and Perform interoperability, regression, and Unity testing of the selected stack with the existing Hilti eco system
Hilti
4 months
2020-09 - 2020-12

Integration of existing IAM platform

Governance Consultant/Architect
Governance Consultant/Architect

  • DB Access gate (OneIM) with Wealth Management Platform (WME) dedicated to automate user lifecycle (access provisioning and deprovisioning) and to allow usage of hybrid identities of Wealth management Eco system (300+) applications.
  • Architecting (HLD, LLD, API contracts) for fleet of Rest Full APIs, dedicate to overcome One- IM Constrains and limitations. 

Deutsche Bank
10 months
2019-12 - 2020-09

evaluation of the current setup, of the Hybrid Cloud deployment

Governance Consultant/Architect
Governance Consultant/Architect
External governance consultant responsible for evaluation of the current setup, of the Hybrid Cloud deployment, HA, Security of network infrastructure, ITGCs of EHRs, i.e. electronic health records (German: Patientenakte, ePA), system development program. EHR`s records are hailed as the key to increasing the quality of care. This project is result of the Appointment Service and Supply Act (TSVG), adopted on 14th March 2019, requires the German statutory health insurance funds to provide policyholders with electronic health records from 1st January 2021 onwards. Effectively applying CYBER KILL CHAIN models (MItre ATT&CK framework, SANS Diamond Model For Intrusion Analysis, CEH) Putting all the cybersecurity products to the test in a structured and methodical way and assessing whether or not the security product is fulfilling its duty or not (Vendor Battles). Lead Breach & Attack Simulation and Filling the gaps in security
  • Define the product strategy for the business considering technology constraints
  • Coordinate the technology related efforts to deliver it within the project and with 3rd party subcontractors.
  • Business application ownership and management of book of work for certain front-to-back processes and applications in GRC and Security areas
  • Development and optimization of the ISMS (Information Security Management System) according to ISO27001
  • Business architecture, process and requirements design and definition as product subject matter expert in control definition ? ITGC, compensative and detective controls
  • Product responsibility (IT team to deliver product, deliver manager to oversee and steer direction)
  • Close collaboration with IT as CRC product owner in an agile working framework
  • Provide transparent, timely and accurate information to senior stakeholders and peers
  • Cryptographic knowledge including encryption, key exchange, certificate handling and protocols (x509, PKCS12 etc)
  • Security Control Frameworks e.g. ISO27001 and practical experience in their implementation
  • Security Architecture principles, generic best practices
  • Network security devices
  • Endpoint defense solutions
  • Exposure to malware infection vectors and defence methods
  • Endpoint and Server hardening principles, best practices
  • Web application firewalls, network load balancers, proxy systems
  • Network, Endpoint and Application logging concepts, best practice and monitoring systems including SIEM
  • Active Directory Security including federated solutions using ADFS, SAML etc
  • Exposure to cloud security models including public, private and hybrid concepts
  • Application security including web applications, SaaS services etc
  • Data handling principles, protective marking/tagging and data security knowledge
IBM
2 months
2019-10 - 2019-11

Architecting FCP POC

Cloud Architect
Cloud Architect

  • Creating a Roadmap for migrating of on-prem OpenShift platform to the cloud (AZURE - ARO, CGP - GKE and AWS ? ECS, EKS, Fargate ) aiming utilization of cloud native approach
  • Participates in and contributes thought leadership and strategic direction during ISRM leadership team meetings and executive workshops
  • Prepares strategic updates and vision documents, briefings, and reports, and demonstrates excellent communication skills and executive presence in presentations to TR executives, customers, and partners
  • PaaS DevOps consulting on the migration of existing IT applications to the PaaS solution
  • Analysis of existing IT applications, defining Changes in the software architecture on High and Low Level
  • Architecting Data flow relaying on GCP\AWS\Azure out of the box services and enabling usage of GraphQL as super positioned touch point.
  • Own the security architecture process, enabling the development and implementation identity and security solutions and capabilities enterprise wide, clearly aligned with business, technology and threat drivers. Translating security policies and directives into specific requirements, procedures, standards and guidelines
  • Defining architectural principles, Consulting of project and line organizations regarding the implementation of safety requirements, ensure that company-wide security requirements are correctly implemented
  • Develops hybrid cloud strategy and governance to meet future business requirements, with a focus on containerization and microservice architectures
  • Develops infrastructure identity and security strategy plans, roadmaps and other architecture artifacts based on sound enterprise architecture practices.
  • Participates as a consultant in application and infrastructure projects to provide infrastructure & security-planning advice
  • Determines baseline infrastructure configuration standards for operating systems (e.g., OS hardening), network segmentation, and identity and access management (IAM) platforms and capabilities.
  • Validates IT infrastructure and other reference architectures for security best practices and recommend changes to enhance security and reduce risks, where applicable.
  • Reviews network segmentation strategy (also in a containerized environment) to ensure least privilege for network access, ensures this translates to a new software defined data canter offering.

Generali
Zurich Switzerland
1 year 2 months
2018-08 - 2019-09

Development of identity and security strategy plans

Cloud Security Architect
Cloud Security Architect
  • Own the security architecture process, enabling the development and implementation identity and security solutions and capabilities enterprise wide, clearly aligned with business, technology and threat drivers. Translating security policies and directives into specific requirements, procedures, standards and guidelines
  • Defining architectural principles, Consulting of project and line organizations regarding the implementation of safety requirements, Ensure that company-wide security requirements are correctly implemented
  • Development of identity and security strategy plans and roadmaps ensuring Confidentiality Integrity and Availability of resources based on sound enterprise architecture practices.
  • Development and maintenance of identity and security architecture artifacts (e.g., models, templates, standards and procedures) that can be used to leverage security capabilities in projects and operations.
  • Provides strategic technical and architectural guidance to senior management, business technology project teams and functional organizations
  • Designs and builds security models and capabilities as it relates to network, cloud, endpoint, identity, and data security domains; authors and drives compliance with enterprise security policies and standards
  • Leads technical defense-in-depth reviews of TR?s product portfolio to evaluate the application of security controls and identify opportunities to enhance the product?s security posture
  • Guides teams in defining future state end-to-end architectures, platforms, products, tools and solutions to advance security capabilities in the business
  • Develops and drives the ISRM technology roadmap, defining current and future security platform lifecycles (candidate, POC, deployed, pending decommission) to continuously improve TR?s security controls posture
  • Work closely with internal teams to effectively deliver internal change capability
  • Clearly define programme requirements and ensure clear communication at all times
  • Consulting the automation DevOps lead on network layouts and negotiating with other network teams on integration and segregation topics Performing application vulnerability and security assessments
  • Performing application security risk assessments
  • Performing code review across a variety of programming languages
  • Defining application security controls (ITGCs)
  • Performing application security design activities
  • Performing assessments of SDLC and DevOps processes, Promoting DevSecOps and safe code practices;
  • Developing and delivering application security training and outreach
  • Creating gap analysis and client improvement program recommendations
  • Other security-related projects that may be assigned according to skills
  • Review and evolve customer and internal access management technologies. Create the IAM policies and technical standards. Advise technical teams on the control design and perform risk assessments and define the IAM related security requirements.
  • Translating clients' risk, security, and compliance requirements into specific Cloud security solutions and design patterns
  • Set up Security Baselining and ensure compliance with State authorities
  • Utilizing Modern technology (DevOps, DevSecOps, CI\CD) trends Security
  • Security PO directly responsible for:
  • iptiQ PnC Security Concept;
  • Identification of the Critical assets - Our in-depth reference architectural model, is based on ISO/IEC 17789 and NIST 500-292
  • Development and optimization of the ISMS (Information Security Management System) according to ISO27001, GDPR and FINMA requirement
  • Appling of Passwordless authentication techniques (MFA, OATH, FIDO2, SSO, Yubikey)
  • Cloud Compute and Workload security protecting Software defined networking, Virtual machines/Instances, containers, Platform-based workloads and Serverless computing;
  • Defining Key risks and controls
  • Centralized Authentication/authorization - utilization of Managed services for authentication and authorization (Okta) together with LDAP DS, and dedicated Oath 2 platforms
  • System integrity, System administration, and Software deployment via Terraform, CloudFormation and Ansible Scrips (DevSecOps).
  • Security patch management via Immutable Workloads Enable Security - Nexus IQ
  • Automatic identification of OSS\TP component and risk modeling in accordance with Risk Appetite.
  • Malware\edge Protection via a combination of managed services (WAFs) ?CloudFlare and edge NGxFW (Palo Alto network)
  • System hardening, performance tuning and patch management;
  • Tenant segregation, multiple VPC
  • RBAC of Technical Users and business users, role definition certification and enforcement;
  • KMS management Private keys, envelope encryption Securing data at rest, and in transit and pseudo-anonymization via tokens;
  • Enforcing Safe code security practice and monitoring of OSS\TP components in use;
  • Attack surface and treat modeling, Static Code Scanning and Free and Open Source Scanning., Appling measures to prevent OWASP 10 vulnerabilities, Code repository security (Nexus IQ) together with Sonar cube
  • Service continuity, disaster recovery
    • Business Continuity Within the Cloud Provider
    • Business Continuity for Loss of the Cloud Provider
    • BC\DR Remediation Actions
  • Propper security monitoring logic (Events & Time Series) via Cloud Watch, Cloudtrail and Panorama
  • Integrating with 3rd party SOC Providers, enablement paging deuties
  • Backup orchestration to another cloud vendor;
  • IT Cyber Security Metrics,
  • Implementation of Advanced End Point Protection
iptiQ PnC Swiss Re
Zurich Switzerland

Aus- und Weiterbildung

Aus- und Weiterbildung

BS, IT Science

PU Paisii Hilendarsky


BSc, eng. in Aeronautic

TU Sofia


Certifications

  • ITIL v4
  • ITILv4 Managing Professional (MP)
  • ITILv4 Strategic Leader (SL)
  • LeSS Prcticioner
  • Certified Product Owner (CSPO)


2016

SAFe4


2009

CISA


2015

PMP


2012

TOGAF foundation


ITIL Lifecycle and Capability (ITIL® ATO Accredited Trainings)

  • ITIL Foundation v3
  • ITIL® 2011:
    • Service Strategy
    • Service Design
    • Service Transition
    • Service Operation
    • Continual Service Improvement
    • Operational Support & Analysis
    • Planning, Protection & Optimizations
    • Release, Control and Validation
    • Service Offerings and Agreements
    • Managing Across the Lifecycle

Kompetenzen

Kompetenzen

Top-Skills

Analytical Thinking and Problem-Solving: Communication and Collaboration Cloud Technical Proficiency Security Konzepte IAM PAM Azure Good Clinical Practice AWS DevOps Azure Devops

Schwerpunkte

  • IAM/PAM Proficiency: Strong experience with IAM tools and technologies (e.g., Azure AD, CyberArk, BeyondTrust), focusing on the management of privileged accounts and access controls.
  • DevSecOps Tools: Proficient in using DevSecOps tools and frameworks such as Azure DevOps, Jenkins, GitHub Actions, Gut Lab, Terraform, Ansible, and security scanning tools (e.g., Snyk, Aqua Security, etc).
  • Shift-Left Security & CI/CD Integration: With a strong focus on embedding security early in the development cycle, I have integrated SAST and DAST tools into CI/CD pipelines using GitLab and ArgoCD to ensure that security vulnerabilities are detected and resolved before code reaches production. I automate security checks, such as SonarQube for code scanning and OWASP Dependency-Check for dependency vulnerabilities, allowing security to be an integral part of the development process.
  • HashiCorp Vault & Secrets Management: I have extensive experience implementing and managing HashiCorp Vault (Enterprise) for centralized secret management in both cloud and on-prem environments. I automate secret distribution and access control policies across cloud platforms like Google Cloud and Azure, leveraging Google Cloud Secret Manager and Azure Key Vault for secure API key storage and management. This ensures the rotection of sensitive data while maintaining compliance with regulatory standards (e.g., PCI-DSS, GDPR).
  • Runtime Security Monitoring & Incident Response: In terms of runtime security, I use tools such as Falco, Sysdig, and Google Cloud Security Command Center for real-time monitoring of cloud and containerized environments. With these tools, I proactively monitor for security incidents, track vulnerabilities, and respond swiftly to mitigate risks. I also leverage Azure Sentinel and Stackdriver to integrate security logs, track threats, and automate incident response workflows.
  • Cloud Security & Infrastructure Automation (Terraform, GCP & Azure): Leveraging Terraform, I automate infrastructure provisioning in both Google Cloud and Azure environments, ensuring secure, consistent, and compliant infrastructure management. I configure security best practices using Google Cloud IAM, Azure AD, and deploy infrastructure with CloudFormation, Pulumi, and Helm charts for Kubernetes deployments.
  • Container Security & Kubernetes: I specialize in securing containerized environments, including Kubernetes clusters using Google Kubernetes Engine (GKE) and Azure Kubernetes Service (AKS). I ensure container images are scanned for vulnerabilities using Clair and Anchore, while enforcing Kubernetes RBAC for strict access control and using Kube-bench for security benchmarks.
  • Secrets & Compliance: I ensure that secrets are securely stored and managed using tools like HashiCorp Vault, Azure Key Vault, and Google Cloud Secret Manager to ensure compliance with industry regulations. This includes enforcing encryption and access policies to protect sensitive data, ensuring compliance with GDPR, PCI-DSS, and other industry standards.
  • CI/CD Automation & GitOps: By automating the deployment pipeline with GitOps principles using GitLab, ArgoCD, and Helm, I ensure a secure, repeatable process for application and infrastructure deployment. This automation ensures consistent application of security policies across all environments, improving the overall security posture of the organization.
  • Collaboration & Security Culture: Working within Agile and SAFe frameworks, I foster a security-first culture, promoting collaboration between development, security, and operations teams. Using tools like Jira and Confluence, I drive cross-functional discussions around security vulnerabilities, ensuring that security is not an afterthought but an integral part of the development lifecycle.
  • Monitoring and Observability: Implementing comprehensive monitoring and logging solutions using ELK stack, Prometheus, and Grafana. Setting up alerting mechanisms to proactively manage and resolve incidents.
  • Performance Optimization: Continuously analyzing and optimizing CI/CD workflows to reduce build and deployment times. Identifying and eliminating bottlenecks to improve overall system performance.
  • Cloud Service Provider Cybersecurity Practices: Align Cloud service provider`s practices with Companie`s Internal Cyber security policy and Standards to implement modern control mechanisms and baseline practices, informed by a rigorous threat model, across their digital identity and credential systems to substantially reduce the risk of system-level compromise.
  • Audit Logging Norms: Help Companies to adopt a minimum standard for default audit logging in cloud services allowing them to enable the detection, prevention, and investigation of intrusions as a baseline and routine service offering without additional charge.
  • Digital Identity Standards and Guidance: Implement emerging digital identity standards (IAM/PAM, SAML, OpenID OAuth2) to secure cloud services against prevailing threat vectors, following recommendations of the relevant standards bodies. Internally refine, update, and incorporate these standards to address digital identity risks commonly exploited in the modern threat landscape.
  • Security Standards and Compliance Frameworks: Update the internal Security Standards, Concepts, Policies and supporting frameworks, and establish a process for conducting discretionary special reviews of the related program?s authorized Cloud Service Offerings following especially high-impact situations; Incorporate feedback about observed threats and incidents related to cloud provider`s security and platform.
  • Security Best Practices: Recognized ability in transforming standard security patterns, changing the way of thinking about treats; Knowledgeable in implementing security best practices to safeguard cloud infrastructure and applications. I conduct regular security audits, establish access controls, and monitor for vulnerabilities to mitigate risks and ensure data integrity and confidentiality. Design, deliver, maintain and deploy security baselines and automation solutions for Azure hybrid cloud identity platform. Stay current on current and future cloud security technology trends, influencing and contributing to the overall IAM cloud security architectural roadmap.

Aufgabenbereiche

  • Cloud Security & Governance: Expertise in securing cloud platforms like Google Cloud and Microsoft Azure, implementing IAM, VPC Security, and DDoS protection with tools like Google Cloud Armor and Azure Security Center.
  • DevSecOps Automation: Extensive experience automating security in CI/CD pipelines using GitLab, ArgoCD, and Terraform, integrating security testing with tools such as SonarQube, OWASP Dependency-Check, and Snyk.
  • Pipeline Design and Implementation: Architecting efficient and reliable CI/CD pipelines tailored to the specific needs of various projects. Utilizing Jenkins for automated build, test, and deployment processes to facilitate rapid and frequent releases.
  • Continuous Integration/Continuous Delivery (CI/CD): Expertise in designing and implementing CI/CD pipelines using tools such as Jenkins, GitLab CI, ArgoCD, Azure DevOpa and CircleCI. Proficient in automating build, test, and deployment processes to enhance software release cycles.
  • Containerization and Orchestration: Extensive experience with Docker for containerization and Kubernetes & OpenShift for orchestration and management of containerized applications. Skilled in deploying and scaling microservices architectures.
  • Cloud Infrastructure Management: Expertise in deploying, configuring, and managing cloud environments on Azure and Oracle Cloud, including resource optimization, automation, and cost management.
  • Secrets Management & Compliance: Hands-on expertise with HashiCorp Vault (Enterprise), Google Cloud Secret Manager, and Azure Key Vault for secure storage, access, and compliance of sensitive information (e.g., passwords, API keys).
  • Configuration Management and Infrastructure as Code (IaC): Proficient in using configuration management tools such as Ansible, Chef, and Puppet. Expertise in IaC tools like Terraform and AWS CloudFormation for consistent and automated infrastructure deployment.
  • Scripting and Automation: Strong scripting skills in Python, Bash, and PowerShell for automating repetitive tasks and enhancing productivity. Expertise in writing scripts to integrate various tools and processes in the CI/CD pipeline.
  • Runtime Security Monitoring: Proficient with Falco, Sysdig, Google Cloud Security Command Center, and Azure Sentinel to monitor runtime environments and detect security incidents in real-time.
  • Container & Kubernetes Security: Skilled in container security best practices with tools such as Clair, Anchore, Kube-bench, and managing Kubernetes security policies using RBAC and Helm charts.
  • Vulnerability Management: Experience with SAST and DAST tools to detect vulnerabilities in code and running applications, ensuring early detection and remediation.
  • Infrastructure as Code (IaC) Security: Expertise in managing infrastructure securely with Terraform, Helm, CloudFormation, and Pulumi, using tools like Checkov and tfsec for IaC security scanning.
  • Agile & Scrum Methodologies: Proven ability to work within Agile frameworks, managing security tasks using Jira and Confluence to track vulnerabilities, security stories, and team collaboration.
  • Performance Optimization: Skilled in optimizing build and deployment processes to reduce time and resource usage.

Produkte / Standards / Erfahrungen / Methoden

Profile
A highly skilled and results-driven DevSecOps Engineer with over 6 years of experience in cloud security, application security, and automation across both on-premises and cloud environments (Google Cloud Platform and Azure). Adept at integrating security into every phase of the SDLC, from development to production, using a shift-left approach and CI/CD pipelines. Proficient in securing containerized applications with Kubernetes, managing secrets with HashiCorp Vault, and automating infrastructure with Terraform. Experienced in monitoring cloud environments with Google Cloud Security Command Center, Azure Sentinel, and implementing runtime security with tools like Falco and Sysdig.
A proactive advocate for best security practices, skilled in driving secure DevOps workflows through GitLab, ArgoCD, and Helm. Expertise in leveraging SAST, DAST, and IaC security tools to detect vulnerabilities early and remediate issues promptly. Proven ability to collaborate effectively in Agile environments, driving secure application delivery within SAFe and Scrum frameworks. Strong communicator, adept at bridging gaps between security, development, and operations teams to foster a security-first culture.
Adept in IT Service Management, with a proven track record of interfacing with external suppliers to manage support services, enforce Service Level Agreements (SLAs), and maintain compliance with company policies and security standards. Skilled in capacity planning, anticipating infrastructure needs, and providing operational support for security management functions.
Strong background in providing IT user support, with a collaborative approach to resolving complex technical issues. Committed to maintaining detailed service and application documentation, fostering knowledge sharing, and ensuring the continuous improvement of IT processes. Known for a proactive, problem-solving mindset and the ability to deliver high-quality results in dynamic, fast-paced environments. Seeking to leverage my technical expertise and strategic vision to contribute to a forward-thinking organization.
Known for a strategic mindset and meticulous attention to detail, they effectively led cross-functional teams to deploy secure systems that enhanced organizational resilience. Career marked by continuous learning and adaptation, as security architect consistently delivered solutions that met and exceeded client expectations. Help leading organizations use technology to drive greater bottom-line impact, increase agility, navigate business change, and transform IT so that it can respond to changing demands, to selects and develops general control activities over technology and to support the achievement of objectives.


Skills

OPERATING SYSTEMS, UTILITIES & VIRTUALIZATION TOOLS

Windows, Linux, OpenShift, VMware ESX SRM, Kubernetes (SUSE CaaSP), RedHat OpenShift , Pivotal PKS, Docker,( AKS, ARO, ECS, EKS, Faregate), Platform Virtualization (Hyper-V & ESX), SDDC, Software defined networks & Service meshes, etc.


NETWORK SYSTEMS & TECHNOLOGIES

Password Vaults, PKIs KMS, HSMs, FIDO, Yubikey, Windows Hallo, Zscaler, VPNs (IPsec) , TCP/IP, SNMP, DNS, Syslog (Time Seriees and Event Driven architecture) , Azure Virtual Network (Virtual Network (VNet), Virtual WAN, ExpressRoute, VPN Gateway, NAT Gateway, Azure DNS, Peering service, Azure Virtual Network Manager, Route Server, and Azure Bastion), Azure - Load Balancer, Private Link, DDoS protection, Firewall, Network Security Groups(NSG), Web Application Firewall, and Virtual Network Endpoints, Private links), Content Delivery Network (CDN), Azure Front Door Service, Traffic Manager, Application Gateway, Internet Analyzer, and Load Balancer. BGP, GRE, OSPF, IS-IS, NSX-V/T etc, and equivalent AWS and GCP service,


DATABASE MANAGEMENT SYSTEMS

Kafka Oracle, PostgreSQL, MySQL, MariaDB, MongoDB, Azure (Cosmos DB, Azure SQL Database), AWS (DynamoDB, Aurora, Elasticash, Timeseries Redis, etc.)


COMMERCIAL SOFTWARE

CyberArc, Beyond Trust, Zscaler, SAP ECC, SAP s4 Hana, Office 365, DLP, Pureview, SAP GRC, Jira, Confluence, MIRO, MS Visio, etc.


METHODOLOGIES & STANDARDS

SANS, MITRE, OWASP10, ISO 23167:2020, ISO 23188:2020, ISO 27799, ISO/IEC 80001, ISO 23029:2020, ISO27001/2, NIST CSF ? SPs, NIST 500, NIST 800, HIPAA/HITECH, GxP , HiTRUST, FedRAMP, RMF DoD, FDA, 21CFR820, CIS, PFMI, TOGAF, SABSA, Octave, EBIOS, CRAMM, and COBIT


Additional IT Experience

10/2019 - 11/2019
Role: Cloud Architect Generali
Customer: Zurich Switzerland From 

08/2018 - 09/2019
Role: Cloud Security Architect iptiQ PnC 
Customer: Swiss Re. Zurich Switzerland 

08/2017 - 10/2017
Role: Enterprise Architect 
Customer: UBS AG, Zurich Switzerland

Tasks:
IAM/PAM Sustainability Program

02/2017 - 11/2018
Role: Senior Program Manager\Lead Architect 
Customer: VMWare 

05/2016 - 02/2017
Customer: SME IAM Maersk Oil&Gas Copenhagen, Denmark 

06/2015 - 04/2016
Role: Infosys Team Lead\SME 
Customer: Deutsche Bank S.A. Frankfurt am Main, Eschborn Germany 

04/2014 - 11/2015
Role: Infrastructure Delivery Manager 
Customer: UniCredit S.A, Frankfurt am Main, Milano

09/2013 - 04/2014
Role: Director Performance &Technology 
Customer: on request

11/2009 - 08/2013
Role: Senior Director, (Technology and Risk Advisory Service lines) 
Customer: on request

04/2007 - 10/2009
Role: Informational Risk Manager (CISO) 
Customer: ProCredit Bank Holding S.A.

Tasks:

  • ProCredit Bank Holding S.A. 21 growing banks operating in transition economies and developing countries in Eastern Europe, Latin America, and Africa.
  • Currently ProCredit Bank Bulgarian bank holds position in top 10 on Bulgarian Market.

05/2006 - 08/2006
Role: IT Administrator 
Customer: Deloitte SSA

03/2003 - 05/2006
Role: LAN Administrator 
Customer: Piraeus Bank 

Programmiersprachen

Power BI
DevOps
Azure DevOps
Github
GitLab
GItOps
Terraform
Ansible
etc.

Hardware

Cisco
Juniper
Palo Alto
Checkpoint

Vertrauen Sie auf Randstad

Im Bereich Freelancing
Im Bereich Arbeitnehmerüberlassung / Personalvermittlung

Fragen?

Rufen Sie uns an +49 89 500316-300 oder schreiben Sie uns:

Das Freelancer-Portal

Direktester geht's nicht! Ganz einfach Freelancer finden und direkt Kontakt aufnehmen.