Języki
polski
ojczysty
angielski
biegły
niemiecki
podstawowy
Doświadczenie zawodowe
Starszy konsultant
▪ CSMP (Cyber Security Master Plan)
▪ Network Security
▪ EndPoint Security
▪ PUM (Privilege User Management)
▪ Access Control
▪ Physical Security
▪ IR (Incident Response) procedures
▪ SIEM
▪ User Awareness Program
▪ 2 FA (2 Factors Authentication)
▪ EndPoint Encryption
▪ Threat Hunting Platforms
▪ Threat Intelligence Service
▪ Supervising of Security Solutions deployment
▪ Contact directly with customer
▪ Identifying customer needs
▪ Analyzing existing solutions
▪ Identifying GAPS in infrastructure
▪ Identifying GAPS in processes and procedures
▪ Threat Intelligence service development
▪ Presenting reports, recommendations, solutions directly to customer leadership
▪ Network Security
▪ EndPoint Security
▪ PUM (Privilege User Management)
▪ Access Control
▪ Physical Security
▪ IR (Incident Response) procedures
▪ SIEM
▪ User Awareness Program
▪ 2 FA (2 Factors Authentication)
▪ EndPoint Encryption
▪ Threat Hunting Platforms
▪ Threat Intelligence Service
▪ Supervising of Security Solutions deployment
▪ Contact directly with customer
▪ Identifying customer needs
▪ Analyzing existing solutions
▪ Identifying GAPS in infrastructure
▪ Identifying GAPS in processes and procedures
▪ Threat Intelligence service development
▪ Presenting reports, recommendations, solutions directly to customer leadership
Information Security Senior Analyst
• Administration of Active Directory
• Administration of RSA
• Monitoring users activities
• Administration of SIEM system
o Forensics searches
o Logs analysis
o Creating devices pattern
• Working with security policy
• Deploying of new security systems
• Administration of Xceedium system
• Administration of Cisco ACS
• Creating and analysis of Firewall reports
• Working directly with customers
• Administration of RSA
• Monitoring users activities
• Administration of SIEM system
o Forensics searches
o Logs analysis
o Creating devices pattern
• Working with security policy
• Deploying of new security systems
• Administration of Xceedium system
• Administration of Cisco ACS
• Creating and analysis of Firewall reports
• Working directly with customers
Threat Hunter
▪ Creating hypothesis for hunts;
▪ Conducting hunts;
▪ Analyzing raw data (DNS, NetFlow);
▪ Creating hunt documentation;
▪ Developing hunt methodology;
▪ Developing hunt life cycle;
▪ Developing of Accenture Cyber Intelligence Platform;
▪ Conducting automation of hunts;
▪ CRITs
- Using CRITs for documenting hunts
- Using CRITs for tracking hunts
- Using CRITs for reporting
- Establishing hunts monitoring process
▪ Elasticsearch
- Logs searching
- Conducting hunts
- Gathering hunt`s evidence
- Creating dashboards
- Creating Visualizations
- API calls
▪ Managing Accenture Cyber Intelligence Platform;
▪ EndGame endpoint solution.
▪ Developing Threat Intelligence Service
▪ Conducting hunts;
▪ Analyzing raw data (DNS, NetFlow);
▪ Creating hunt documentation;
▪ Developing hunt methodology;
▪ Developing hunt life cycle;
▪ Developing of Accenture Cyber Intelligence Platform;
▪ Conducting automation of hunts;
▪ CRITs
- Using CRITs for documenting hunts
- Using CRITs for tracking hunts
- Using CRITs for reporting
- Establishing hunts monitoring process
▪ Elasticsearch
- Logs searching
- Conducting hunts
- Gathering hunt`s evidence
- Creating dashboards
- Creating Visualizations
- API calls
▪ Managing Accenture Cyber Intelligence Platform;
▪ EndGame endpoint solution.
▪ Developing Threat Intelligence Service
System Analyst
▪ Creating business requirements for Security IT projects;
▪ Creating system requirements for Security IT project
▪ Creating functional and non-functional requirements for Security IT projects;
▪ Creating use and test cases for Security IT projects;
▪ Creating technical high-level documentation;
▪ Working directly with Stakeholders;
▪ Explaining IT security requirements to IT Security Engineers
▪ FireEye suite
▪ Gigamon solution
▪ Threat Intelligence Platform
▪ Working directly with leadership (CTO, CISO, CIO)
▪ Creating system requirements for Security IT project
▪ Creating functional and non-functional requirements for Security IT projects;
▪ Creating use and test cases for Security IT projects;
▪ Creating technical high-level documentation;
▪ Working directly with Stakeholders;
▪ Explaining IT security requirements to IT Security Engineers
▪ FireEye suite
▪ Gigamon solution
▪ Threat Intelligence Platform
▪ Working directly with leadership (CTO, CISO, CIO)
Szkolenia i kursy
CompTIA Security+
Cisco CCNA Certificate
TELC B1 - English
Inteligent Networks - Nokia Siemens Networks
Usability Tests - SUN Microsystems
Cisco CCNA Certificate
TELC B1 - English
Inteligent Networks - Nokia Siemens Networks
Usability Tests - SUN Microsystems
Specjalizacje
IT - Rozwój oprogramowania
Architektura
Zainteresowania
IT Security, football, Computer Networks
Inne
Ambitious, self motivated, there is no "NO"
Grupy
NATEK IT
NATEK POLAND jest firmą outsourcingowo-consultingową specjalizującą się w branży IT i Telekomunikacji. Nasza firma jest częścią większej struktury-NATEK Group.
Działamy głównie na rynkach Europy śro