25.08.2024 aktualisiert

SU
100 % verfügbar

IT-Sicherheit, PKI, IoT, Linux, Kubernetes, Cloud- und Software-Architektur

Paderborn, Deutschland
Deutschland
M. Sc. Computer Science
Paderborn, Deutschland
Deutschland
M. Sc. Computer Science

Profilanlagen

CV_Sven_Uthe_240613.pdf

Skills

Programmiersprachen
Batch (Shell) Scripting & Programmierung
C
C#.NET
Java / Kotlin / XTEND
JavaScript
PHP
Python
TypeScript

Cloud Technologien
Microsoft Cloud & SaaS Produkte
Azure AD, Azure IoT Hub, Azure IoT Central, Azure Key Vault, Azure DPS 
Amazon Web Services (AWS) & SaaS Produkte 
AWS Greengrass, AWS IoT Core, AWS Sitewise 
Google Cloud Services
ThingsBoard
Cumulocity

Unixoide Betriebssysteme
Administration von Linux Distributionen
RedHat/Debian/Ubuntu/CentOS
CLI Administration (Config Files/Man Pages)
LAMP, Samba/LDAP,
Package Management
RPM, YUM, DNF, DEB
Repository Management
Apache Tomcat, httpd, Webserver
Docker und Container Technologien
Bash (Shell) Scripting und Automation
Ansible
CI/CD
GitLab

Datenbanken
MySQL
PostgreSQL

Virtualisierung
LXC, Docker, podman
Kubernetes (OpenShift)
Blob Storage
Backup & Disaster-Recovery Administration

Identity & Access Management
Identity Management Tools (IDM Tools)
Multi Factor Authentification [MFA]
Role Based Access Control [RBAC]
User Management & User Provisioning
Self Service Reset Password (SSRP)
Kerberos
Keycloak
oAuth, Auth0
openSSL (CLI, lib)

IT-Sicherheit
Public Key Infrastructure (PKI)
Vault by Hashicorp
Azure Key Vault
Utimatico PKI
Nexus PKI
Hardwaresicherheit (TPM, Secure Elements)
Risikoanalyse (ISO 27001, IEC 62443)
Security-Architektur
IT-Sicherheitsbeauftragter gemäß ISO 27001 und IT-Grundschutz (TÜV)
IEC 62443, Cyber Resiliance Act, NIS 2 Beratung

Protokolle/ Services/ Netzwerkadministration
MQTT
OPC UA
TCP-IP DNS, DHCP, LAN, WLAN, SNMP
LDAP
FTP, HTTP, HTTPS, SSH, PROXY, IPSec
POP3, IMAP, SMTP, VoIP, SIP
AS4

Arbeits- und Einsatzformen
SCRUM
Confluence & Jira
Geschäftskundenberatung- und Betreuung
Anwenderberatung- und Betreuung
Mitarbeiterführung (Kooperativer Stil)
1st, 2nd Level Support
3rd Level Support
Incident, Change und Problem Management
Anforderungsanalyse & Management 
Kommunikationsfähigkeit/Konfliktlösung
IT-Organisation und IT-Koordination
Systemadministration/Betrieb
Systemintegration/Implementierung
Fachkonzepte/Konzepterstellung
Projektplanung und Projektmanagement
Presales/Vertrieb
IT-Datenschutz und -IT-Sicherheit/DSGVO
Lizenz und Vertragsmanagement
Arbeitsvisualisierung
Dokumentation und Qualitätssicherung

Weiterbildungen/Zertifikate/Schulungen
IT-Sicherheitsbeauftragter gemäß ISO 27001 und IT-Grundschutz (TÜV)
Cyber Risiko Check nach DIN SPEC 27076

Sprachen

DeutschMutterspracheEnglischverhandlungssicherFranzösischgutNiederländischGrundkenntnisse

Projekthistorie

Managing Director & CTO

DEVITY GmbH

Internet und Informationstechnologie

Industry-focused consulting on IT-Security (PKI, IAM, IEC 62443) and digitization (ideation, strategy, hardware selection, data migration, data preparation, cloud concept) for sensor manufacturer, edge computing manufacturer, energy provider and industrial production companies. Project based management and development of cloud-based IoT solutions.

Technologies: IT-Security, (I)IoT development, Azure Services (IoT Hub, DPS, AD), AWS, PKI Systems (Hashicorp Vault, Azure key vault), Scrum, K8S, CI/CD, project management, consultancy.

Lead Researcher IoT Security

University of Paderborn

Internet und Informationstechnologie

Technical lead in a research project responsible for the automation of the initial distribution as well as the lifecycle of x509 certificates in (I)IoT use cases. Integrated various IoT platforms with different Key Management Systems while the devices’ identities were managed along the supply chain. The overall system security relies on a hardware bounded client identity which is saved in a HSM (TPM/ATECC 608) on the device. Automated setup of a 3 tier PKI (incl. offline root) for OPC UA and MQTT use cases. Management of a 7 member software developer team. Development and documentation of technical requirements. Master’s thesis Mentoring.

Technologies: IT-Security, Key Management Systems (Hashicorp Vault, Azure key vault), PKI, (I)IoT Deployments, Azure, AWS, Jira, Scrum, K8S, CI/CD, project management

Product Owner, Project Manager IoT

ROBIOTIC GmbH

Internet und Informationstechnologie

Worked as Product Owner of a customized industrial IoT Platform for a customer from the environmental protection and work safety sector. Acquired requirements in close collaboration with the client as the main contact person and formulated technical requirements.Priorized and communicated the requirements to the development team.

Technologies: IoT Deployments, IT-Security, Azure Services (IoT Hub, DPS AD), Auth0, .Net, Angular, Jira, Scrum, project management, consultancy

Zertifikate

Cyber Risiko Check nach DIN SPEC 27076

BSI

2024

IT-Sicherheitsbeauftragter gemäß ISO 27001 und IT-Grundschutz (TÜV)

TÜV

2023


Kontaktanfrage

Einloggen & anfragen.

Das Kontaktformular ist nur für eingeloggte Nutzer verfügbar.

RegistrierenAnmelden