30.12.2024 aktualisiert

EG
100 % verfügbar

Enterprise Security Engineer

Hamburg, Deutschland
Deutschland
BACHELOR OF TELECOMMUNICATIONS
Hamburg, Deutschland
Deutschland
BACHELOR OF TELECOMMUNICATIONS

Profilanlagen

Enrike Curriculum Resume Lebenslauf deutsch english spanish November 2024.pdf
Motivation Letter.pdf
certifications ega diploms small.pdf
reputational body zeugnis EGA 2024-july.pdf

Skills

AuditsCloud ComputingInformationssicherheitUnternehmensanleihenMobile Device ManagementSCADAGroßrechnerDrahtlose KommunikationInternet Of ThingsNetwork Server
I am an IT security and cyber security consultant with more than 20 years of experience in analyzing, recovering, mitigating, auditing, and safeguarding hundreds of engineering incidents in containers, VMs, endpoints, mobile devices, servers, SCADA, network boundaries, mainframes, wireless, IoTs, embedded, and cloud instances. I look forward to using my years of professional experience in those fields in an IT company specializing in information security and cyber information security.

Sprachen

Deutschgut

Projekthistorie

Enterprise Security Engineer

Alstom AG

Telekommunikation

50-250 Mitarbeiter

Leadership skills: Definition of the OT Security Concept with Electrical and Mechanical engineers in some significant industries with different HMI, PLC, and SCADA in the Oil, railways, Metal, Pharma, Energy nuclear plants, and Car industry. Develop a Global Major OT Security Concept, from concept to Policies and Standards, from Policies and Standard Operation Procedures to use cases or workflows in the Security Solutions Catalogue for the OT shopfloor. Working with the Bell-LaPadula, Purdue Model specific to industrial control systems, Zero Trust and Defense in Depth will adopt a combination of these approaches to develop a Sabsa and Togaf ADM tool baselining blueprinting approach. Implemented Ringfencing to isolate critical industrial applications like SCADA, PLC, and HMI, preventing unauthorized interactions to restrict application behavior and ensured that legitimate tools couldn't be weaponized, protecting critical infrastructure systems from cyber threats. Governance & Control: Cenelec TS 50701, IEC 62443, 5012X series, 2702x, Cloud security NIST, CIS, TISAX&TARA. Use primary trust sources like Passive discovery, ITSM, CMDB, surface discovery, DNS audit, and other methodologies to build the proper data protection flows based on discovering shadow IT and OT assets. I built and used the Security Engineering modelling tools and reference models from different vendors and organizations. Technical controls: Cloud Workload Protection Container Security Kubernetes KSM Security. Cloud inventory. Cloud compliance. ✓ APISecurity Gateways: Mulesoft, ✓ Cloud access security broker CASB: Netskope, Zscaler ✓ Cloud Infrastructure Entitlements Management CIEM:Aqua ✓ Cloud-Native Application Protection Platform CNAPP: Prisma PA ✓ Cloud Security Posture Management CSPM: Defender Cloud. ✓ Cloud Workload Protection Platform CWPP: Sysdiag ✓ Network Behaviour Analytics: Darktrace OT,Vectra OT. ✓ Embed Security: Selinux, CyberX, Defender Linux, Nanolock ✓ Vulnerability Management: Nozomi,Armor, Claroty CTE. ✓ Remote Privileged access: Claroty SRA, Cyberarc ✓ Freezing technologies: Faraonics, Solidcore

Kontaktanfrage

Einloggen & anfragen.

Das Kontaktformular ist nur für eingeloggte Nutzer verfügbar.

RegistrierenAnmelden