30.12.2024 aktualisiert
EG
100 % verfügbar
Enterprise Security Engineer
Hamburg, Deutschland
Deutschland
BACHELOR OF TELECOMMUNICATIONSSkills
AuditsCloud ComputingInformationssicherheitUnternehmensanleihenMobile Device ManagementSCADAGroßrechnerDrahtlose KommunikationInternet Of ThingsNetwork Server
I am an IT security and cyber security consultant with more than 20 years of experience in analyzing, recovering, mitigating, auditing, and safeguarding hundreds of engineering incidents in containers, VMs, endpoints, mobile devices, servers, SCADA, network boundaries, mainframes, wireless, IoTs, embedded, and cloud instances. I look forward to using my years of professional experience in those fields in an IT company specializing in information security and cyber information security.
Sprachen
Deutschgut
Projekthistorie
Leadership skills: Definition of the OT Security Concept with Electrical and Mechanical engineers in some significant industries with different HMI, PLC, and SCADA in the Oil, railways, Metal, Pharma, Energy nuclear plants, and Car industry. Develop a Global Major OT Security Concept, from concept to Policies and Standards, from Policies and Standard Operation Procedures to use cases or workflows in the Security Solutions Catalogue for the OT shopfloor. Working with the Bell-LaPadula, Purdue Model specific to industrial control systems, Zero Trust and Defense in Depth will adopt a combination of these approaches to develop a Sabsa and Togaf ADM tool baselining blueprinting approach. Implemented Ringfencing to isolate critical industrial applications like SCADA, PLC, and HMI, preventing unauthorized interactions to restrict application behavior and ensured that legitimate tools couldn't be weaponized, protecting critical infrastructure systems from cyber threats. Governance & Control: Cenelec TS 50701, IEC 62443, 5012X series, 2702x, Cloud security NIST, CIS, TISAX&TARA. Use primary trust sources like Passive discovery, ITSM, CMDB, surface discovery, DNS audit, and other methodologies to build the proper data protection flows based on discovering shadow IT and OT assets. I built and used the Security Engineering modelling tools and reference models from different vendors and organizations. Technical controls: Cloud Workload Protection Container Security Kubernetes KSM Security. Cloud inventory. Cloud compliance. ✓ APISecurity Gateways: Mulesoft, ✓ Cloud access security broker CASB: Netskope, Zscaler ✓ Cloud Infrastructure Entitlements Management CIEM:Aqua ✓ Cloud-Native Application Protection Platform CNAPP: Prisma PA ✓ Cloud Security Posture Management CSPM: Defender Cloud. ✓ Cloud Workload Protection Platform CWPP: Sysdiag ✓ Network Behaviour Analytics: Darktrace OT,Vectra OT. ✓ Embed Security: Selinux, CyberX, Defender Linux, Nanolock ✓ Vulnerability Management: Nozomi,Armor, Claroty CTE. ✓ Remote Privileged access: Claroty SRA, Cyberarc ✓ Freezing technologies: Faraonics, Solidcore