Łukasz Podbielski
Security Engineer, Global Cyber Security & Fraud, First Data Polska
Warszawa,
mazowieckie
Języki
polski
ojczysty
angielski
dobry
Doświadczenie zawodowe
Security Engineering Specialist
Global IT Security, Global Threat & Vulnerability Management
- Managing & maintaining global deployment of bank NIDS and malware protection infrastructure
- Managing of bank SIEM and infrastructure monitoring systems
- Configuration , managing and troubleshooting Vulnerability Assessment software
- Membership in global workgroups
- Security Incident response and packet analyze
- Managing & maintaining global deployment of bank NIDS and malware protection infrastructure
- Managing of bank SIEM and infrastructure monitoring systems
- Configuration , managing and troubleshooting Vulnerability Assessment software
- Membership in global workgroups
- Security Incident response and packet analyze
IT Infrastructure Risk Analyst
Royal Bank of Scotland
Global IT Security
- Assess the vulnerabilities and threats associated with new or operational IT platforms
- Co-ordinate activities and input from multiple sources in order to develop an accurate and business-relevant understanding of risk levels
- Deliver relevant and timely risk assessments in line with approved processes
- Provide consultancy services to assist in the development of remediation plans
- Assess the vulnerabilities and threats associated with new or operational IT platforms
- Co-ordinate activities and input from multiple sources in order to develop an accurate and business-relevant understanding of risk levels
- Deliver relevant and timely risk assessments in line with approved processes
- Provide consultancy services to assist in the development of remediation plans
Senior Project Engineer
Implementation Solution Center Department
Designing, installing and configuring high availability systems, hardening and auditing operating systems and networks, for energy production industry and governmental institutions across Poland, USA, Germany and India
* Main scopes:
- Design and implementation of the IT Security Architecture
- Implementation, configuration and security trustworthy cloud computing systems, secure distributed systems, secure databases
- Performing penetration tests of internally developed applications and company systems
- Responsible for architecture design, security design and security testing
* Appliances/Hardware:
- CISCO: ASA 55xx series, AIP-SSM, CSC-SSM, PIX, Routers, Switches
- FORTINET: FortiGate, FortiAnalyzer
- HP/IBM/DELL/SUN: Servers, Arrays (MSA, EVA family), FC Switches
* Software:
- VMware vSphere, ESX, ESXi
- Oracle VM Server, Oracle VM Manager
- Linux/Solaris/Windows operating systems
- Databases: MySQL, Microsoft SQL, Oracle
Implementation of Information Security Management Systems (ISO27001)
Creating business continuity and disaster recovery procedures
Writing Technical Documentation’s, Procedures, Tech. User Manuals
Responsible for system management, network and firewall design, and various IT projects
Participate with the pre-sales:
- IT Architect on platform and for customer's request
- Visio Diagrams with Flow to Host and Network devices
- Selection of new products, technologies and services
- Matching business needs with technical solutions
- Design and planning of security solutions
- Providing Information Security advisory and consulting
Designing, installing and configuring high availability systems, hardening and auditing operating systems and networks, for energy production industry and governmental institutions across Poland, USA, Germany and India
* Main scopes:
- Design and implementation of the IT Security Architecture
- Implementation, configuration and security trustworthy cloud computing systems, secure distributed systems, secure databases
- Performing penetration tests of internally developed applications and company systems
- Responsible for architecture design, security design and security testing
* Appliances/Hardware:
- CISCO: ASA 55xx series, AIP-SSM, CSC-SSM, PIX, Routers, Switches
- FORTINET: FortiGate, FortiAnalyzer
- HP/IBM/DELL/SUN: Servers, Arrays (MSA, EVA family), FC Switches
* Software:
- VMware vSphere, ESX, ESXi
- Oracle VM Server, Oracle VM Manager
- Linux/Solaris/Windows operating systems
- Databases: MySQL, Microsoft SQL, Oracle
Implementation of Information Security Management Systems (ISO27001)
Creating business continuity and disaster recovery procedures
Writing Technical Documentation’s, Procedures, Tech. User Manuals
Responsible for system management, network and firewall design, and various IT projects
Participate with the pre-sales:
- IT Architect on platform and for customer's request
- Visio Diagrams with Flow to Host and Network devices
- Selection of new products, technologies and services
- Matching business needs with technical solutions
- Design and planning of security solutions
- Providing Information Security advisory and consulting
Szkolenia i kursy
- CISSP
- VMware vSphere: Design Workshop
- VMware vSphere: What's New [V4]
- VMware vSphere: Install, Configure, Manage
- Certified Ethical Hacker v.7
- Oracle Exadata Technical Boot Camp
- Oracle OVM Implementation Boot Camp
- CISCO Academy: CCNA (ITU-ITC Warsaw University of Technology)
- CISCO Academy: CCNA Security (ITU-ITC Warsaw University of Technology)
- CISCO BSCI
- Oracle Database 10g: Administration Workshop I
- Oracle Database 10g: Administration Workshop II
- Implementing a Microsoft Windows Server 2003 Network Infrastructure: Network Hosts
- Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services
- VMware vSphere: Design Workshop
- VMware vSphere: What's New [V4]
- VMware vSphere: Install, Configure, Manage
- Certified Ethical Hacker v.7
- Oracle Exadata Technical Boot Camp
- Oracle OVM Implementation Boot Camp
- CISCO Academy: CCNA (ITU-ITC Warsaw University of Technology)
- CISCO Academy: CCNA Security (ITU-ITC Warsaw University of Technology)
- CISCO BSCI
- Oracle Database 10g: Administration Workshop I
- Oracle Database 10g: Administration Workshop II
- Implementing a Microsoft Windows Server 2003 Network Infrastructure: Network Hosts
- Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services
Edukacja
Specjalizacje
IT - Rozwój oprogramowania
Programista C++
Zainteresowania
Freediving
System and Network security
Ethical Hacking
System and Network security
Ethical Hacking
Inne
Good knowledge of SCADA/DCS/OPC systems (Telwin SCADA, Ovation, PCS7)
System administration, penetration testing, system and network security analysis
Operating systems: MS Windows, UNIX/Linux, Solaris
Good knowledge of: C/C++, Java, Bash scripts
Good knowledge of Microsoft Active Directory
Good knowledge of Symatec Netbackup 7
Security Clearance (Confidential and Restricted Level), issued by Internal Security Agency (ABW)
Driver’s license B
IANTD (International Association of Nitrox and Technical Divers): AOWD Nitrox Diver
System administration, penetration testing, system and network security analysis
Operating systems: MS Windows, UNIX/Linux, Solaris
Good knowledge of: C/C++, Java, Bash scripts
Good knowledge of Microsoft Active Directory
Good knowledge of Symatec Netbackup 7
Security Clearance (Confidential and Restricted Level), issued by Internal Security Agency (ABW)
Driver’s license B
IANTD (International Association of Nitrox and Technical Divers): AOWD Nitrox Diver
Grupy
Politechnika Warszawska
Politechnika Warszawska jest najstarszą polską uczelnią techniczną. Od ponad 180 lat kształci kolejne pokolenia inżynierów, wnosząc istotny wkład w rozwój nauk technicznych.
Polsko-Japońska Akademia Technik Komputerowych
Najlepsza niepubliczna uczelnia techniczna w kraju, według rankingu Perspektyw i Rzeczpospolitej. Uczelnia zwraca szczególną uwagę na dostosowywanie programów kształcenia do wymogó
ABY ZYSKAĆ W 48 GODZIN
Bezpłatne, Gratisy, Rabaty, Zniżki, Promocje, Bonusy, Wyprzedaże, Vouchery, Wejściówki. Zakupy grupowe ze zniżką. Zyskaj klientów w 48 godzin.
Bezpieczeństwo IT -- IHACK.pl
Bezpieczeństwo danych w Internecie spędza sen z powiek specjalistom i przeciętnym użytkownikom. Każdy z nas może niespodziewanie stać się ofiarą ataku hakera.
A tu mamy wielu hakerów wśr&oac
CSO . Szkolenia . Realizacje . Wymiana wiedzy i doświadczeń . Grupa MERYTORYCZNA
Bezpieczeństwo biznesu, ochrona informacji, tajemnica firmy oraz zagadnienia powiązane.
Niebezpiecznik
http://niebezpiecznik.pl :: Grupa dla specjalitów ds. bezpieczeństwa i osób hobbystycznie zainteresowanych tematyką IT Security.
Teoria Bezpieczeństwa
Bezpieczeństwo Informacji, bezpieczeństwo IT...
bezpieczeństwo..
i inne abstrakcyjne twory.