Umiejętności
Checkpoint
CISSP
Ustawa o ochronie danych
Zapory
Bezpieczeństwo informacji
Zarządzanie bezpieczeństwem Informacji
Technologia informacyjna
Zarządzanie IT
ITIL
Testy penetracyjne
Audyty bezpieczeństwa
Polityka bezpieczeństwa
Przywództwo w zespole
Języki
polski
ojczysty
angielski
dobry
Doświadczenie zawodowe
Area Security Manager
Oversee a team of security operations specialists providing all aspects of management including hiring and human resources performance monitoring. Maintain current security protocols and response and crisis emergency recovery of systems across multiple locations. Regularly review contracted service scope against business needs.
Key Contributions:
▪ Develop, maintain, and execute training programs concerning cyber security.
▪ Report current security operations posture and major issues to relevant stake holders.
▪ Determine root causes of security incidents and manage sustainable security solutions.
Key Contributions:
▪ Develop, maintain, and execute training programs concerning cyber security.
▪ Report current security operations posture and major issues to relevant stake holders.
▪ Determine root causes of security incidents and manage sustainable security solutions.
Information Security Manager
Developed, implemented, and managed overall enterprise process of security strategy and associated architecture and engineering standards, working closely with corporate executives, managers, auditors, and legal counsel to ensure regulatory compliance. Oversaw monitoring and protection of facilities, personnel, and information systems, evaluated security breaches, and recommended corrective actions.
Key Contributions:
▪ Served as point person for security incident response planning and execution.
▪ Defined and implemented risk assessment program to identified and classify critical assets, assessed threats, and vulnerabilities, and created safeguard recommendations.
▪ Managed the development and implementation of corporate security awareness training program.
Key Contributions:
▪ Served as point person for security incident response planning and execution.
▪ Defined and implemented risk assessment program to identified and classify critical assets, assessed threats, and vulnerabilities, and created safeguard recommendations.
▪ Managed the development and implementation of corporate security awareness training program.
Business Information Security Officer
Managed multiple business segments of $4B company establishing technology and application architectures and component/composite products to accelerate new market introductions, defining and executing information security strategies including mobile, cloud computing migrations, and other business technology implementations. Oversaw global security policy, standards, and procedures.
Key Contributions:
▪ Developed training programs resulting in 20% greater collections effectiveness scores.
▪ Identified and reported software compliance gaps, risks, and financial exposure, developed solutions, and fostered buy-in and consensus from executive team.
▪ Consulted with other executives to prioritize security initiatives and spending based on appropriate risk management methodology.
Key Contributions:
▪ Developed training programs resulting in 20% greater collections effectiveness scores.
▪ Identified and reported software compliance gaps, risks, and financial exposure, developed solutions, and fostered buy-in and consensus from executive team.
▪ Consulted with other executives to prioritize security initiatives and spending based on appropriate risk management methodology.
IT Security Officer
Provided ongoing monitoring of security risks and possible solutions to security concerns. Monitored suspicious activity on company networks, and followed protocol to analyse and remediate security threats. Developed and delivered training to employees regarding company security policy and data protection.
Key Contributions:
▪ Conducted information security audits ensuring technical compliance and security related regulatory requirements.
▪ Developed and implemented company security policies and strategies and implemented DLP and web monitoring program.
Direct report to CIO and CEO.
Key Contributions:
▪ Conducted information security audits ensuring technical compliance and security related regulatory requirements.
▪ Developed and implemented company security policies and strategies and implemented DLP and web monitoring program.
Direct report to CIO and CEO.
ABI/IT Security Manger
Defined security configuration and operations standards for security systems and applications, including policy assessment and compliance tools, network security appliances, and host-based security systems. Reviewed security plans for networks, systems, and services.
Key Contributions:
▪ Developed and implemented regulatory requirements for personal data protection and completed successful audit by Inspector General for Personal Data Protection.
▪ Researched security and compliance changes in the governmental and industry regulations to ensure best practices were applied.
Direct report to CFO
Key Contributions:
▪ Developed and implemented regulatory requirements for personal data protection and completed successful audit by Inspector General for Personal Data Protection.
▪ Researched security and compliance changes in the governmental and industry regulations to ensure best practices were applied.
Direct report to CFO
IT Security Officer
Created IT security strategy for new bank and developed informational security system for banks’ clients. Reviewed risk assessment, analysed effectiveness of IT control activities, and reported results. Successfully completed information security audits ensuring technical compliance with regulations.
Key Contributions:
▪ Developed training programs resulting in 30% greater effectiveness in security.
▪ Participated in design and implementation of enterprise-wide incident and response and management program.
▪ Successfully implemented encryption standards and PKI program.
Direct report to CIO
Key Contributions:
▪ Developed training programs resulting in 30% greater effectiveness in security.
▪ Participated in design and implementation of enterprise-wide incident and response and management program.
▪ Successfully implemented encryption standards and PKI program.
Direct report to CIO
Coordinator of Security Team
Led a 4-person team and provided IT security strategy and operations in all segments of the Polish telecom market including auditing, software and accessory procurement. Led initiatives to ensure business-wide Sarbanes-Oxley IT compliance, auditing, and certification across financial management systems. Closely worked with IT and development teams to design secure infrastructure solutions and applications, facilitating the implementation of protective and mitigating controls.
Key Contributions:
▪ Created 3-year systems strategy and a 12-month operating plan for information security structure.
▪ Quickly took charge during crisis by assessing operations mechanisms and implemented significant changes in operating rhythm, personal, and consulting structure.
▪ Developed and successfully implemented ISO27001 as a first telecommunication provider in Polish market.
Key Contributions:
▪ Created 3-year systems strategy and a 12-month operating plan for information security structure.
▪ Quickly took charge during crisis by assessing operations mechanisms and implemented significant changes in operating rhythm, personal, and consulting structure.
▪ Developed and successfully implemented ISO27001 as a first telecommunication provider in Polish market.
Software Engineer
Daewoo Dacom Communication
Provided ongoing monitoring of database risks and possible solutions to security concerns. Developed software delivered to internal/external partners.
Key Contributions:
▪ Database administrator - monitoring database systems and applications for customers and staff.
▪ Developed and implemented system for database management.
Key Contributions:
▪ Database administrator - monitoring database systems and applications for customers and staff.
▪ Developed and implemented system for database management.
Specjalizacje
IT - Administracja
Bezpieczeństwo/Audyt
Grupy
ABY POMÓC W 48 GODZIN
Grupa ta ma na celu umożliwienie jej uczestnikom szybkie reagowanie na wzajemne potrzeby, nie tylko w wydaniu biznesowym. W założeniu skierowana do jak najszerszego ogrona osób, gdyż nigdy nie
Allianz Bank Polska S.A.
Grupa zrzeszająca wszystkich związanych z projektem Bankowym Allianz Polska,
Allianz Bank Polska SA
Grupa zrzeszająca wszystkich pracowników i osoby związane z Allianz Bank Polska SA
Banki
pracujesz w banku? chcesz pracować w banku? podziel sie swoimi doswiadczeniami - dowiedz sie wiecej... znajdz swoje miejsce pracy...
Bezpieczeństwo IT -- IHACK.pl
Bezpieczeństwo danych w Internecie spędza sen z powiek specjalistom i przeciętnym użytkownikom. Każdy z nas może niespodziewanie stać się ofiarą ataku hakera.
A tu mamy wielu hakerów wśr&oac
Biznes
"Aby skutecznie prowadzić biznes, człowiek musi mieć wyobraźnię.
Musi mieć wizję tego, do czego chce dojść"
Charles M. Schwab
BS STUDIO HOSTESS
AGENCJA HOSTESS 694558801 511 930 288 BSSTUDIO@WP.PL
USLUGI :
MODELKI
HOSTESSY
TANCERKI
STATYSCI
FIRE SHOW