01.06.2025 aktualisiert

**** ******** ****
Premiumkunde
100 % verfügbar

NIS2 Security Experte IT & OT | Security Operation Center SOC SIEM | Schwachstellen Mngt.

Recklinghausen, Deutschland
Weltweit
Recklinghausen, Deutschland
Weltweit

Profilanlagen

DE-EGGERT-Profil-20250102.docx
EN-EGGERT-Profil-20250102.docx

Skills

NIS 2, IEC 62443, Vulnerability management, Cloud, Telecommunication, data protection, Qualys, AZURE, quality assurance, User Management, Firewall, epas DETACK, Nessus, OpenVAS, Metasploit, Active Directory, LDAP, Windows Server, Linux, Oracle, MSSQL, Citrix, MySQL, Microsoft Office, virtual environment, Database, Windows, VMWare, SQL, WAN/LAN, MPLS/VPN connectivity, F5 load balancers, Juniper SSL VPN migration, anti-virus, SaaS, IT Security, Juniper, Cisco, Squid, McAfee, Data privacy, Security/Privacy concepts, network security, cost optimisation, WAN connectivity, MPLS WAN, firewalls, LISP, WAN, Accelerator, Cloud computing, PaaS, IaaS, ITIL, ESX, vCloud, Zimory, Citrix XenApp, BlueCoat Systems, data centre, VLANs, load balancers, routing, firewall environment, IP, F5, MPLS, ATM, SDH, VPN, DMZ, IPSec, BGP, SaaS/PaaS, LAN, PKI, Watchguard firewalls, SSL VPN, IDS, IPS, IPSec VPN, NAT, OTP, two-factor authentication, SAP, router, NAGIOS, Windows Server 2003/2008, Microsoft Project, proxies, JAVA, DNS, DHCP, CoBIT, Office, PowerPoint, Word, Excel, SSL VPN Gateway (SA, MAG, Administration, PenTesting, Vulnerability, Qualysguard, Apache, ISA, Forefront Security, DSI, Director, LAN Access, Debian, Centos, Samba, Cluster, iptables, Postfix, Sendmail, qmail, Scalix, IMAP POP3 SMTP, Shellscript, NFS, Microsoft Windows, Windows Server 2003, 2008, 2012

Sprachen

DeutschMutterspracheEnglischverhandlungssicher

Projekthistorie

Security Auditor OT for NIS 2, IEC 62443

POLIFILM

Industrie und Maschinenbau

250-500 Mitarbeiter

  • Defining the objectives of the audit (e.g., compliance review, risk mitigation).
  • Defining the scope of the audit – e.g., systems, facilities, and technologies to be assessed.
  • Determining stakeholders and identifying responsibilities.
  • Identifying and documenting all relevant OT assets.
  • Surveying the OT architecture, topology, and components (e.g., SCADA systems, PLCs, HMIs).
  • Recording the network configuration and connections to IT networks.
  • Identifying potential threats and vulnerabilities in the OT environment.
  • Assessing risks based on their likelihood and potential impact on operations.
  • Analyzing existing threat vectors and potential attacker profiles.
  • Reviewing existing OT security policies, standards, and protocol for NIS2
  • Analyzing network segmentation and access control policies.
  • Evaluating security configurations, such as firewalls, network access, and user privileges.
  • Testing physical security measures for critical OT components. (NIS 2, IEC 62443). 

Snr. SOC Analyst / Optimization of Darktrace NDR OT & IT

DACOSO

Internet und Informationstechnologie

50-250 Mitarbeiter

  • Analysis of security incidents and support in mitigating vulnerabilities
  • Independent management of security events (IT & OT Network) and incidents, including customer communication
  • Monitoring the current security landscape and deriving actionable recommendations
  • Quality assurance and optimization of use cases, rules, and rule books for the respective security services
  • Optimization of Darktrace NDR (TI implementation, models, etc.) in collaboration with Logpoint, Crowdstrike, Defender, Sentinel, Qualys
  • Fine-tuning of rules for improved optimization of SOC operations

Analysis of Vulnerabilities after a Successful Hacking Attack (Ransomware) as Emergency Manager

Industrie (the customer wishes > 5.000 to remain anonymous)

Industrie und Maschinenbau

1000-5000 Mitarbeiter

Deployment as an Incident Manager following a hacking attack. Investigating vulnerabilities, sources of errors, and potential further attack vectors. Developing an enhanced emergency concept and backup strategy plan to mitigate future attacks. Planning and hardening additional system components with the operations team as technical security lead. Planning of PenTests and vulnerability management with Qualys.

Software Used:
  • SQL
  • Linux and Windows Server
  • Cisco, WatchGuard
  • Active Directory, DNS, DHCP, etc.
  • QUALYS
  • Bitdefender AV

Kontaktanfrage

Einloggen & anfragen.

Das Kontaktformular ist nur für eingeloggte Nutzer verfügbar.

RegistrierenAnmelden