21.09.2025 aktualisiert


100 % verfügbar
Senior Project Manager and Senior Cybersecurity Consultant, Senior Managing Director
Köln, Nordrhein-Westfalen, Deutschland, Deutschland
Weltweit
PhDSkills
C (Programmiersprache)JavaAbrechnungssystemeAdabasAPIsKünstliche IntelligenzAirflowAutomatisierter HandelAmazon Web ServicesAmazon S3Penetration TestingKünstliche Neurale NetzwerkeAuthenticationsAutomobilindustrieBig DataUNIXC++Client-Server-ArchitekturCICS Transaction ServerSaasCloud ComputingCloud-SicherheitClusteranalyseCOBOLInformationssicherheitComputersimulationComputerprogrammierungData GovernanceIBM DB2LinuxDNSDosEclipseJ2EEElektronische SignaturenFortranGrafische BenutzeroberflächeSCADAIbm JclRexxSpssIdentitätsmanagementTrouble-TicketIt-GovernanceNetzwerk-HardwareIntrusion Detection SystemJava BeansPythonNetwork SecurityMachine LearningGroßrechnerMaxdbMetadataMonte-Carlo-SimulationMehrprozessorsystemOs/mvsNetzwerkarchitekturOpen SourceOracle FinancialsOwaspPascalPublic-Key-InfrastrukturQuantum ComputingBlockchainPhishingPli Programming LanguageSoftware SafetySAP ApplicationsSap HanaSasScalaSession-ManagementSiemSoftwareentwicklungSoftware SystemsSQLStreamingSystemarchitekturTCP / IPVirtuelle MaschinenVirtualizationZ/OsWi-Fi-TechnologieDaten- / DatensatzprotokollierungCyberarkSap FinanzenSystemverfügbarkeitLarge Language ModelsApache SparkMitre Att&ckElectronic Medical RecordsGenerative AIFirewallsVBA Programming LanguageProzessleitsystemEthereumApache KafkaBetriebssystemeWeb3.jsBitcoinOs/390 Operating SystemSailPointRisikomanagementDaten-PipelineBenutzerkontenProgramming Languages
Accounting Systems, ADABAS, Airflow, trading systems, S3, AWS, Kafka, Spark, API, AI, Artificial Intelligence, neural networks, big data, big data technologies, Big Data analytics, Bitcoin, Blockchain, C, C++, COBOL, Client/Server, client server, cloud computing, Cloud Computer, Cloud Security, Clustering, programming, Cyber Security, cybersecurity, Information Security, Security Architecture, Computer models, CICS, CyberArk, DOS, Data Governance, logging, data pipelines, streaming, data flow, Data Stream, DNS, Eclipse, EMR, Electronic Signature, Ethereum, firewall, firewalls, FORTRAN, generative AI, graphical interface, DB2, IT Management, IAM, Identity Access Management, Information Technology, Computer Science, IDS, ticket system, Java, JAVA Technologies, JAVA interface, J2EE, JavaBeans, JCL, LLM, Linux Environment, MVS, Machine Learning, Mainframe, SAP DB, metadata, Windows 3, MITRE ATT&CK, Monte-Carlo methods, Monte Carlo simulation, multiprocessing, network infrastructure, Network Security, network device, open source, OWASP, Operating Systems, ORACLE, OS/390, OS390, PASCAL, Phishing, PL1, PL/1, industrial control systems, programming languages, PKI, Python, quantum computing, REXX, SAP, SAP Modules, SAP HANA, SAP S4 HANA, SAS, SPSS, SQL, SailPoint, SAP Finance, Scala, SIEM, Session Management, software industry, patch management, Penetration Testing, Penetration Tests, software systems, SaaS, SCADA, high availability, system architecture, TCP/IP, UNIX, user accounts, Authentication, VBA, Virtual Machine, Virtualization, Web3, Wi-Fi, z/OS, zOS
Sprachen
DeutschverhandlungssicherEnglischverhandlungssicherRussischMutterspracheUkrainischMuttersprache
Projekthistorie
Security Profiles, GenAI Threat Modeling, GenAI Developers Guide. Quality Assurance, ChatGPT, LLM. Consult on Information Security, support in clarifying corporate standards and guidelines, derive security requirements. Tech Stack - AWS, Terraform, IAM, GitHub, SAST, WAF & Firewall, Threat Modelling, DevSecOps, Kubernets, Cloud Security, Kafka, MongoDB, Jira, Atlassian, Forescout and Nozomi. Open AI Services, Strategic AI Solutions, Data & AI Vision. Strong Authentication 2.0 experience.