05.05.2025 aktualisiert


verifiziert
Premiumkunde
100 % verfügbarProfessioneller Experte für Konzerne und Cybersecurity
Ingolstadt, Deutschland
Deutschland
universitäre Ausbildung RWTH AachenSkills
ISO 9000ISO 27001GruppenrichtlinienMCSEIT TeamleiterIPAMFirewall TechnologienInterim ManagementTCP/IPVPNFirewallActive DirectoryIT SicherheitITILBackupIT SecurityAzureKRITIS Schutz Kritischer InfrastrukturenIT-SIG § 8a BSIG BSI-KRITIS VBSIIT-GrundschutzManagementberatungMigrationISO 2700kritisISO27001BCMISO9001awsitsigITSMDORA27001NISNIS2KRITISkritische InfrastrukturenISO 27001 & NIS2
- Tätigkeitsfelder
- CTO Chief Information Technology Manager (interim)
- CISO chief information security officer
- ISB ITSibe IT-Sicherheitsbeauftragter
- Projektleitung
- Cybersecurity & Compliance, Cyberressilience
- Interner Auditor
- IT Controller
- Service Level Agreements (SLA)
- Service Level Requirements (SLR)
- Information Security Management Systeme (ISMS)
- Risikomanagement
- Anforderungsanalyse
- IT Prozesse
- Business Impact Analyse (BIA)
- Business Continuity Management (BCM)
- Business Impact Plattform (BIP)
Erfüllung gesetzlicher und normativer Anforderungen
- DIN ISO 27001 Informationssicherheit Management Systeme (ISMS)
- DIN ISO 20000 Service Management
- DIN ISO 9000, Qualitätsmagement
- NIS Richtlinie, NIS2 UmsuCG, KRITIS
- CER Richtlinie, CRA (Cyber Resilience Act), NLF, EU CSA, Certification Scheme for Cloud Services EUCS
- IT Sicherheitsgesetz (ITSig), KRITIS Verordnung, IT-Grundschutz (BSI)
- Branchenspezifische Sicherheitsstandards (B3S) KRITIS
- BSI 200-1, Managementsysteme für Informationssicherheit (ISMS)
- BSI 200-2, IT-Grundschutz Methodik
- BSI 200-3, Risikoanalyse auf Basis von IT-Grundschutz
- BSI 200-4, Business Continuity Management (BCM)
- BSI 100-4, Notfallmanagement (BCM)
- Qualifikationen
Projekleitung
- Agile Projektmanagement
- Klassisches Projektmanagement, IHK
- Agile Scrum Product Owner, Thomas Nahrgang
- Projektleiter (IHK)
Führung:
- Führungskräfte Training 1+2, Martina Grünewald-Ernst
- Persönlichkeit und Führungskompetenz, Martina Grünewald-Ernst
- Persönlich überzeugen, Martina Grünewald-Ernst
- Ausbildung zur Führungskraft im Vertrieb, Dirk Kreuter
- Verkaufstraining 1+2, Dirk Kreuter
- 1 Jahres-Coachingprogramm für Führungskräfte, Bestseller Verlag
- Problemlösungen und Entscheidungsfindung nach Kepner-Tregoe, Deutsche Gesellschaft für Luft- und Raumfahrt, DLR
Organisation
- Führung im Vertrieb, Dirk Kreuter
- Neukunden mit Garantie, Dirk Kreuter
- Optimierung IT-Technikerproduktivität, ACMEO
- Systemhaus Organisation, ACMEO
- Personalgewinnung, ACMEO
- SLA Verträge, ACMEO
- Gehirngerechtes Arbeiten, Dr. Volker Busch
- Immobilien und Steuern, diverse, Gerald Hörhan
- Unternehmensbeteiligungen, Gerald Hörhan
- Krypto Assets & Blockchain, Gerald Hörhan
KI & artifical intelligence
- Open AI und Chat GPT, Brainymotion
- Github, Azure Open AI, Copilot, Brainymotion
- LLM, ChatGPT, OPEN AI, prompt design
IT Security
- IT-Sicherheitsbeauftragter (ITSiBe), Chief Information Officer (CISO) nach ISO/IEC 27001/27002 und BSI Grundschutz
- Certified Chief Information Security Officer (CCISO, CISO), BITCOM
- ISO 9000 Qualitätsmanagement, Auditoren Qualifikation, LRQA
- DIN ISO 27001 Informationssicherheit Management Systeme (ISMS), BITCOM
- DIN ISO 27001 Foundation, TÜV Süd
- BSI-IT Grundschutz Praktiker, BREDEX
- KRITIS Auditor, BITCOM
- Datenschutz, TÜV Nord
Microsoft
- Microsoft Certified System Engineer (MCSE)
- Microsoft Certified Professional (MCP)
- DP-900 Azure Data fundamentals, 2MT
Azure Blob storage, Azure File storage, Azure Table storage, Azure Data services Power BI
- AZ-900 Microsoft Azure AI Fundamentals, 1MT
LLM, ChatGPT, OPEN AI, prompt design
- AZ-500 Microsoft Azure Security Technologies, 4MT
Microsoft Entra identities, Microsoft Entra authentication, Microsoft Entra authorization, Microsoft Entra application access, virtual networks, access to Azure ressources, Secure compute, storage, and databases, Azure Bastion, JIT, Azure Kubernetes Services(AKS), Azure SQL Database and Azure SQL Managed Instance, security operations, Defender for Cloud, security monitoring, automation
- AZ-700 Designing and Implementing Microsoft Azure Networking Solutions, 5MT
Design and implement core networking infrastructure, implement network segmentation and address spaces, irtual network (VNet), Azure Bastion, design and implement Name resolution (DNS), VNet peering, Azure Router Server, NAT, Defender for Cloud Secure Core, site to site VPN, Entra ID, Azure Express Route, Azure Virtual WAN architecture, Azure Load Balancer, Azure traffic manager
- AZ-104 Microsoft Certified Azure Administrator Associate, 4MT
Manage Microsoft Entra, Azure Roles, Azure ressources, storage, Configure Azure Files and Azure Blob Storage, Deploy and manage Azure compute resources, virtual machines (VM), Azure App Services, Implement and manage virtual networking, monitoring, implement backup & recovery
- SC-400T Administring Information Protection and Compliance in Microsoft 365, 4MT
Implement information protection, pureview, compliance, calssifiers, sensitivity labels, mail encryption, Create and configure DLP policies, data loss prevention, Implement and monitor Endpoint DLP, Monitor and manage DLP activities, data lifecycle, retention label, Purview records management, Purview Compliance Manager, Plan and manage eDiscovery and Content search, analyze audit logs and reports, Manage insider and privacy risk, Communication Compliance, Purview Insider Risk Management, Information Barriers (IBs), manage privacy requirements by using Microsoft Priva
- MD-102T Endpoint Administrator, 5MT
Windows client deployment, Windows Autopilot, Manage identity and compliance, Implement compliance policies, Intune, Manage the device lifecycle, Manage device configuration, monitor devices, Manage device updates, Implement endpoint protection,Deploy and update apps and software, Plan and implement app protection and app configuration policies
- SC-100T Microsoft Cybersecurity Architect, 5MT
Design a resiliency strategy for ransomware and other attacks based on Microsoft Security Best Practices, Design solutions that align with the Microsoft Cybersecurity Reference Architectures (MCRA) and Microsoft cloud security benchmark (MCSB), Design solutions that align with the Microsoft Cloud Adoption Framework for Azure and the Microsoft Azure Well-Architected Framework, Design security operations, identity, and compliance
- DP-900 Microsoft Security, Compliance, and Identity Fundamentals, 2MT
- Azure Cloud Dienste administrieren, PPEDV, 1MT
- Office356 bereitstellen und administrieren, Markus Tigges, 1MT
- Gruppenrichtlinie (GPOs) für Windows, Mark Heidbrink, 1MT
Amazon Cloud Dienste (AWS)
- AWS technical essentials, Fast Lane, 3MT
- architecting on AWS, Fast Lane, 4MT
Marketing
- Onlinethinking, Karl Kratz, 3 Monate
- Persona, Christina Jacker-Hundt, 2MT
- Konversion Optimierung, David Odenthal, 1MT
- Konversion Optimierung, Kai Radanitsch, 2MT
- ChatGPT-SEA Seminar, Cindy Ebner, 1MT
- E-Mail Marketing, Nico Zorn, 2MT
- Google Ads, Sebastian Stryj, 2MT
- Growth Hacking, Thomas Herzberger, 2MT
- SEO, Astrid Kramer, 2MT
- Online Kundenbindung, Nico Zorn ,2MT
- UX Design, Marc Lilienthal, 2MT
- Digitale Marketing Strategie, 2MT
- Technologie Kenntnisse
IAM
- Azure Active Directory (Azure AD)
- Entra ID
- Active Directory
- Zero Trust
- 802.1x, Radius, RRAS
- Privileged Access Management (PAM)
- Privileged Access Workstation (PAW)
- Microsoft Enhanced Security Administrative Environment (ESAE)
- CISO ISE
- Beyond Trust
- RSA Token, Safeword, Safenet, gemalto
- Windows Server 2019, 2016, 2012, 2012R2, 2008, 2008R2, 2003, 2000, NT4
- Windows Storage Server
- Windows 11, 10, 8, 8.1, 7, XP, ME, 98, 95, NT4
- Exchange 2020, 2019, 2016, 2012, 2010, 2000, 5.5, 5.0
- Exchange online, Kerio
- Hyper-V, VMWare ESX, XEN
- Cisco ASA, Cisco Firepower, Astaro, Dell Sonicwall, Watchguard, Kerio, Palo Alto
- IPTables, IPcop, PFSense
- IPSec, SSL-VPN
- Zyxel, Lancom, Bintec, Microsoft Routing und Ras, RRAS
- HP, Cisco, Zyxel, ARUBA, Sonicpoint
IPAM (IP-Adressmanagement)
- Microsoft IPAM
- Microsoft
Loadbalancer:
- Kemp
- Cisco, Dell Sonicwall, Astaro, Snort
- Security-Solution:
Sentinell one, Sonicwall Capture Client, Kaspersky, Trendmicro, McAfee
- Mcafee EPO, Kaspersky, Bitdefender, F-Secure, Symantec
- Symantec Backup Exec, VEAM, Acronis
zusätzlich
DNS, BIND, WINS, DHCP, IPAM, DDI, TCP/IP, UDP, ICMP, GRE, Ethernet, Routing, VOIP, VPN, IPSEC, SSL-VPN, Radius, PKI, Zertifikate, Plesk, Cpanel, Active Directory, LDAP, Gruppenrichtlinien – GPO, AD Migration, AD Sites, AD Standorte, POP3, SMTP, IMAP, LAN, WAN, DMZ, WSUS, Images, SSO, Single Sign On, AIM (Access and Identitity Management), Autopilot, Intune, MBAM, SQL, MYsql, PHP
Sprachen
DeutschMutterspracheEnglischgut

exali Berufshaftpflicht-Siegel
Das original exali Berufshaftpflicht-Siegel bestätigt dem Auftraggeber, dass die betreffende Person oder Firma eine aktuell gültige branchenspezifische Berufs- bzw. Betriebshaftpflichtversicherung abgeschlossen hat.
Versichert bis: 01.01.2027