- Design and implementation of a highly available voice over IP platform based on open source components
- Design and implementation of a solution to automatically detect and block fraudulent calls based on the analysis of the audio stream and machine learning
- Operation and security monitoring
Fachlicher Schwerpunkt dieses Freiberuflers
IT Security, High Availability, Telecommunication, VoIP
Available from
Apr 1, 2020
Availability
50 %
on customer site
40 %
Areas
D4
D5
D8
D9
All others
Contact Settings
I prefer getting offers for these sites. However, you may also contact me for interesting projects in other places.
Position
Comment
- IT Security Consulting
- Penetration Testing / White Hat Hacking
Projects
Industries
IT, Internet, telecommunication / mobile, civil aviation (inflight connectivity + entertainment)
Skills
Programming Languages
AJAX
Bash Scripting
C
C++
Erlang/OTP
Java
JavaScript
JEE
JEE
Perl
PHP
PL/SQL
Python
Unix Shell Scripting
Operating Systems
Kali Linux
Linux
RedHat Enterprise Linux
Scientific Linux
Ubuntu Linux
Databases
Amazon Aurora
Amazon RDS
JDBC
MySQL
MySQL Cluster 5.5
Oracle
PostgreSQL
SQL
Language Skills
English
business fluent, English clients
French
fluent, DALF (C1), 6 months in France
German
native language
Spanish
advanced (> B2), language schools in Spain, Argentina, Chile
Data Communication
Ethernet
IMAP
Internet, Intranet
ISO/OSI
Message Queuing
Router
SMTP
SNMP
TCP/IP
Voice over IP
XMPP
Hardware
ARINC 429
lowlevel programming of aircraft interface
ARINC 485
lowlevel programming of aircraft interface
Inmarsat Swift Broadband Satellite Modem
Products / Standards / Experiences
Amazon EC2
cloud computing
Amazon Route 53
cloud DNS
Amazon S3
cloud storage
Apache
ARINC 429
aircraft interface
ARINC 485
aircraft interface
Asterisk
VoIP server
AWS
cloud services
DOORS
requirements
Eclipse
git
High Availability
HTML
JBoss
JUnit
kamailio
SIP router
kannel
SMS gateway
Maven
Nokia One-NDS
LDAP directory
RPM
Spring
Spring Security
Tomcat
VoIP
Calculation / Simulation / Validation
Classificator
Machine Learning
Activities
Directory Design
IT Security Consulting
Penetration Testing
Requirement Analysis
Software Architecture
Software Design
Software Development



