01.06.2025 aktualisiert


Premiumkunde
100 % verfügbarNIS2 Security Experte IT & OT | Security Operation Center SOC SIEM | Schwachstellen Mngt.
Recklinghausen, Deutschland
Weltweit
Skills
NIS 2, IEC 62443, Vulnerability management, Cloud, Telecommunication, data protection, Qualys, AZURE, quality assurance, User Management, Firewall, epas DETACK, Nessus, OpenVAS, Metasploit, Active Directory, LDAP, Windows Server, Linux, Oracle, MSSQL, Citrix, MySQL, Microsoft Office, virtual environment, Database, Windows, VMWare, SQL, WAN/LAN, MPLS/VPN connectivity, F5 load balancers, Juniper SSL VPN migration, anti-virus, SaaS, IT Security, Juniper, Cisco, Squid, McAfee, Data privacy, Security/Privacy concepts, network security, cost optimisation, WAN connectivity, MPLS WAN, firewalls, LISP, WAN, Accelerator, Cloud computing, PaaS, IaaS, ITIL, ESX, vCloud, Zimory, Citrix XenApp, BlueCoat Systems, data centre, VLANs, load balancers, routing, firewall environment, IP, F5, MPLS, ATM, SDH, VPN, DMZ, IPSec, BGP, SaaS/PaaS, LAN, PKI, Watchguard firewalls, SSL VPN, IDS, IPS, IPSec VPN, NAT, OTP, two-factor authentication, SAP, router, NAGIOS, Windows Server 2003/2008, Microsoft Project, proxies, JAVA, DNS, DHCP, CoBIT, Office, PowerPoint, Word, Excel, SSL VPN Gateway (SA, MAG, Administration, PenTesting, Vulnerability, Qualysguard, Apache, ISA, Forefront Security, DSI, Director, LAN Access, Debian, Centos, Samba, Cluster, iptables, Postfix, Sendmail, qmail, Scalix, IMAP POP3 SMTP, Shellscript, NFS, Microsoft Windows, Windows Server 2003, 2008, 2012
Sprachen
DeutschMutterspracheEnglischverhandlungssicher
Projekthistorie
- Defining the objectives of the audit (e.g., compliance review, risk mitigation).
- Defining the scope of the audit – e.g., systems, facilities, and technologies to be assessed.
- Determining stakeholders and identifying responsibilities.
- Identifying and documenting all relevant OT assets.
- Surveying the OT architecture, topology, and components (e.g., SCADA systems, PLCs, HMIs).
- Recording the network configuration and connections to IT networks.
- Identifying potential threats and vulnerabilities in the OT environment.
- Assessing risks based on their likelihood and potential impact on operations.
- Analyzing existing threat vectors and potential attacker profiles.
- Reviewing existing OT security policies, standards, and protocol for NIS2
- Analyzing network segmentation and access control policies.
- Evaluating security configurations, such as firewalls, network access, and user privileges.
- Testing physical security measures for critical OT components. (NIS 2, IEC 62443).
- Analysis of security incidents and support in mitigating vulnerabilities
- Independent management of security events (IT & OT Network) and incidents, including customer communication
- Monitoring the current security landscape and deriving actionable recommendations
- Quality assurance and optimization of use cases, rules, and rule books for the respective security services
- Optimization of Darktrace NDR (TI implementation, models, etc.) in collaboration with Logpoint, Crowdstrike, Defender, Sentinel, Qualys
- Fine-tuning of rules for improved optimization of SOC operations
Deployment as an Incident Manager following a hacking attack. Investigating vulnerabilities, sources of errors, and potential further attack vectors. Developing an enhanced emergency concept and backup strategy plan to mitigate future attacks. Planning and hardening additional system components with the operations team as technical security lead. Planning of PenTests and vulnerability management with Qualys.
Software Used:
Software Used:
- SQL
- Linux and Windows Server
- Cisco, WatchGuard
- Active Directory, DNS, DHCP, etc.
- QUALYS
- Bitdefender AV