25.08.2024 aktualisiert
SU
100 % verfügbar
IT-Sicherheit, PKI, IoT, Linux, Kubernetes, Cloud- und Software-Architektur
Paderborn, Deutschland
Deutschland
M. Sc. Computer ScienceSkills
Docker und KubernetesPKI- und KryptosystemeCloudPKI-BeratungIT-SicherheitOT/IOTISO 27001 und TR-03145 für PKI VerfahrenJava / Kotlin / Spring BootAzure/ AWS/ ThingsBoardIEC 62443as4
Programmiersprachen
Batch (Shell) Scripting & Programmierung
C
C#.NET
Java / Kotlin / XTEND
JavaScript
PHP
Python
TypeScript
Cloud Technologien
Microsoft Cloud & SaaS Produkte
Azure AD, Azure IoT Hub, Azure IoT Central, Azure Key Vault, Azure DPS
Amazon Web Services (AWS) & SaaS Produkte
AWS Greengrass, AWS IoT Core, AWS Sitewise
Google Cloud Services
ThingsBoard
Cumulocity
Unixoide Betriebssysteme
Administration von Linux Distributionen
RedHat/Debian/Ubuntu/CentOS
CLI Administration (Config Files/Man Pages)
LAMP, Samba/LDAP,
Package Management
RPM, YUM, DNF, DEB
Repository Management
Apache Tomcat, httpd, Webserver
Docker und Container Technologien
Bash (Shell) Scripting und Automation
Ansible
CI/CD
GitLab
Datenbanken
MySQL
PostgreSQL
Virtualisierung
LXC, Docker, podman
Kubernetes (OpenShift)
Blob Storage
Backup & Disaster-Recovery Administration
Identity & Access Management
Identity Management Tools (IDM Tools)
Multi Factor Authentification [MFA]
Role Based Access Control [RBAC]
User Management & User Provisioning
Self Service Reset Password (SSRP)
Kerberos
Keycloak
oAuth, Auth0
openSSL (CLI, lib)
IT-Sicherheit
Public Key Infrastructure (PKI)
Vault by Hashicorp
Azure Key Vault
Utimatico PKI
Nexus PKI
Hardwaresicherheit (TPM, Secure Elements)
Risikoanalyse (ISO 27001, IEC 62443)
Security-Architektur
IT-Sicherheitsbeauftragter gemäß ISO 27001 und IT-Grundschutz (TÜV)
IEC 62443, Cyber Resiliance Act, NIS 2 Beratung
Protokolle/ Services/ Netzwerkadministration
MQTT
OPC UA
TCP-IP DNS, DHCP, LAN, WLAN, SNMP
LDAP
FTP, HTTP, HTTPS, SSH, PROXY, IPSec
POP3, IMAP, SMTP, VoIP, SIP
AS4
Arbeits- und Einsatzformen
SCRUM
Confluence & Jira
Geschäftskundenberatung- und Betreuung
Anwenderberatung- und Betreuung
Mitarbeiterführung (Kooperativer Stil)
1st, 2nd Level Support
3rd Level Support
Incident, Change und Problem Management
Anforderungsanalyse & Management
Kommunikationsfähigkeit/Konfliktlösung
IT-Organisation und IT-Koordination
Systemadministration/Betrieb
Systemintegration/Implementierung
Fachkonzepte/Konzepterstellung
Projektplanung und Projektmanagement
Presales/Vertrieb
IT-Datenschutz und -IT-Sicherheit/DSGVO
Lizenz und Vertragsmanagement
Arbeitsvisualisierung
Dokumentation und Qualitätssicherung
Weiterbildungen/Zertifikate/Schulungen
IT-Sicherheitsbeauftragter gemäß ISO 27001 und IT-Grundschutz (TÜV)
Cyber Risiko Check nach DIN SPEC 27076
Batch (Shell) Scripting & Programmierung
C
C#.NET
Java / Kotlin / XTEND
JavaScript
PHP
Python
TypeScript
Cloud Technologien
Microsoft Cloud & SaaS Produkte
Azure AD, Azure IoT Hub, Azure IoT Central, Azure Key Vault, Azure DPS
Amazon Web Services (AWS) & SaaS Produkte
AWS Greengrass, AWS IoT Core, AWS Sitewise
Google Cloud Services
ThingsBoard
Cumulocity
Unixoide Betriebssysteme
Administration von Linux Distributionen
RedHat/Debian/Ubuntu/CentOS
CLI Administration (Config Files/Man Pages)
LAMP, Samba/LDAP,
Package Management
RPM, YUM, DNF, DEB
Repository Management
Apache Tomcat, httpd, Webserver
Docker und Container Technologien
Bash (Shell) Scripting und Automation
Ansible
CI/CD
GitLab
Datenbanken
MySQL
PostgreSQL
Virtualisierung
LXC, Docker, podman
Kubernetes (OpenShift)
Blob Storage
Backup & Disaster-Recovery Administration
Identity & Access Management
Identity Management Tools (IDM Tools)
Multi Factor Authentification [MFA]
Role Based Access Control [RBAC]
User Management & User Provisioning
Self Service Reset Password (SSRP)
Kerberos
Keycloak
oAuth, Auth0
openSSL (CLI, lib)
IT-Sicherheit
Public Key Infrastructure (PKI)
Vault by Hashicorp
Azure Key Vault
Utimatico PKI
Nexus PKI
Hardwaresicherheit (TPM, Secure Elements)
Risikoanalyse (ISO 27001, IEC 62443)
Security-Architektur
IT-Sicherheitsbeauftragter gemäß ISO 27001 und IT-Grundschutz (TÜV)
IEC 62443, Cyber Resiliance Act, NIS 2 Beratung
Protokolle/ Services/ Netzwerkadministration
MQTT
OPC UA
TCP-IP DNS, DHCP, LAN, WLAN, SNMP
LDAP
FTP, HTTP, HTTPS, SSH, PROXY, IPSec
POP3, IMAP, SMTP, VoIP, SIP
AS4
Arbeits- und Einsatzformen
SCRUM
Confluence & Jira
Geschäftskundenberatung- und Betreuung
Anwenderberatung- und Betreuung
Mitarbeiterführung (Kooperativer Stil)
1st, 2nd Level Support
3rd Level Support
Incident, Change und Problem Management
Anforderungsanalyse & Management
Kommunikationsfähigkeit/Konfliktlösung
IT-Organisation und IT-Koordination
Systemadministration/Betrieb
Systemintegration/Implementierung
Fachkonzepte/Konzepterstellung
Projektplanung und Projektmanagement
Presales/Vertrieb
IT-Datenschutz und -IT-Sicherheit/DSGVO
Lizenz und Vertragsmanagement
Arbeitsvisualisierung
Dokumentation und Qualitätssicherung
Weiterbildungen/Zertifikate/Schulungen
IT-Sicherheitsbeauftragter gemäß ISO 27001 und IT-Grundschutz (TÜV)
Cyber Risiko Check nach DIN SPEC 27076
Sprachen
DeutschMutterspracheEnglischverhandlungssicherFranzösischgutNiederländischGrundkenntnisse
Projekthistorie
Industry-focused consulting on IT-Security (PKI, IAM, IEC 62443) and digitization (ideation, strategy, hardware selection, data migration, data preparation, cloud concept) for sensor manufacturer, edge computing manufacturer, energy provider and industrial production companies. Project based management and development of cloud-based IoT solutions.
Technologies: IT-Security, (I)IoT development, Azure Services (IoT Hub, DPS, AD), AWS, PKI Systems (Hashicorp Vault, Azure key vault), Scrum, K8S, CI/CD, project management, consultancy.
Technologies: IT-Security, (I)IoT development, Azure Services (IoT Hub, DPS, AD), AWS, PKI Systems (Hashicorp Vault, Azure key vault), Scrum, K8S, CI/CD, project management, consultancy.
Technical lead in a research project responsible for the automation of the initial distribution as well as the lifecycle of x509 certificates in (I)IoT use cases. Integrated various IoT platforms with different Key Management Systems while the devices’ identities were managed along the supply chain. The overall system security relies on a hardware bounded client identity which is saved in a HSM (TPM/ATECC 608) on the device. Automated setup of a 3 tier PKI (incl. offline root) for OPC UA and MQTT use cases. Management of a 7 member software developer team. Development and documentation of technical requirements. Master’s thesis Mentoring.
Technologies: IT-Security, Key Management Systems (Hashicorp Vault, Azure key vault), PKI, (I)IoT Deployments, Azure, AWS, Jira, Scrum, K8S, CI/CD, project management
Technologies: IT-Security, Key Management Systems (Hashicorp Vault, Azure key vault), PKI, (I)IoT Deployments, Azure, AWS, Jira, Scrum, K8S, CI/CD, project management
Worked as Product Owner of a customized industrial IoT Platform for a customer from the environmental protection and work safety sector. Acquired requirements in close collaboration with the client as the main contact person and formulated technical requirements.Priorized and communicated the requirements to the development team.
Technologies: IoT Deployments, IT-Security, Azure Services (IoT Hub, DPS AD), Auth0, .Net, Angular, Jira, Scrum, project management, consultancy
Technologies: IoT Deployments, IT-Security, Azure Services (IoT Hub, DPS AD), Auth0, .Net, Angular, Jira, Scrum, project management, consultancy