03/04/2026 updated


100 % available
Full-Stack Security Experte | Synergie aus InfoSec, GRC & IT-Technik
Bielsko-Biala, Poland M.Sc.
Microsoft WindowsControles de AccesoActive DirectoryApplication Programming Interfaces (APIs)Apache HTTP ServerPenetration TestingArchitectureAuditingMicrosoft AzureBankingBlueprintingBusiness Continuity PlanningUbuntu (Operating System)Change ManagementSoftware as a Service
Information Security, Informationssicherheit, IT Security, IT-Sicherheit, Cyber Security, Cybersecurity, Security Architecture, IT Security Architecture, Enterprise Security Architecture, Solution Architecture, Security Consultant, Senior Security Consultant, CISO, Interim CISO, Information Security Officer, ISB, ITSiBe, vISO, virtual CISO, Security Advisor, Security Lead, ISMS, Information Security Management System, ISO 27001, ISO/IEC 27001, ISO 27001:2022, ISO 27701, ISO 22301, BSI IT-Grundschutz, IT-Grundschutz, NIST, NIST CSF, NIST SP 800-53, Governance Risk Compliance, GRC, GRC Consultant, IT Governance, Security Governance, Compliance Management, Regulatory Compliance, GDPR, DSGVO, EU-DSGVO, Data Protection, Data Privacy, Privacy Consultant, DORA, NIS2, NIS 2, MaRisk, BAIT, MaRisk BAIT, KRITIS, SOX, Risk Management, IT Risk Management, Risk Assessment, Risk Analysis, Risk Mitigation, EC IRM2, Internal Audit, External Audit, Audit Management, Audit Preparation, Gap Analysis, Security Assessment, Control Assessment, Statement of Applicability, SoA, Compliance Audit, Cloud Security, Cloud Architecture, Microsoft Azure, Azure Security, Azure Entra ID, Cloud Governance, Cloud-First, Identity and Access Management, IAM, Identity Governance, Access Control, Privileged Access Management, PAM, Active Directory, AD, Windows Authentication, Kerberos, NTLM, IWA, PKI, Public Key Infrastructure, Certificate Management, AD CS, Active Directory Certificate Services, Certificate Authority, HSM, Hardware Security Module, Cryptography, Encryption, Key Management, MFA, Multi-Factor Authentication, FIDO2, Passwordless Authentication, Conditional Access, Zero Trust, Zero Trust Architecture, ZTNA, Network Security, Network Segmentation, Network Access Control, NAC, Firewall Management, System Hardening, Secure Configuration, Security Blueprints, Security Policies, Security Standards, Windows Security, Windows Server, Linux Security, Ubuntu, Server Security, Web Server Security, IIS, Apache, Nginx, SSL/TLS, API Security, Business Continuity Management, BCM, BCMS, Disaster Recovery, Incident Response, Incident Management, Vulnerability Management, Security Monitoring, SIEM, Logging, IT Asset Management, CMDB, Asset Inventory, Change Management, Configuration Management, Release Management, Requirements Management, Requirements Analysis, Technical Requirements, Regulatory Requirements, Security Testing, Security Tester, Penetration Testing, Proof of Concept, PoC, Vendor Management, Third-Party Risk, Supplier Risk Management, Stakeholder Management, Project Coordination, EU Projects, European Commission, Public Sector, Banking Security, Financial Services, Regulated Environments, Training, Security Awareness, Knowledge Transfer, Trainer, Security Documentation, Technical Writing, Management Reporting, Executive Reporting
Languages
GermanNative speakerEnglishFluentPolishNative speaker
Project history
- Projekt “ISO27001/NIS2 Compliance & Lean ISMS”
- Projekt “Trainer Informationssicherheit / ISMS”
- Projekt “PKI: Microsoft AD Certificate Services”
- Projekt “Azure: Cloud-Authentication & MFA for Legacy”
- Projekt “Asset Management: Strukturanalyse”
- Projekt “ISMS-Audit: IT Asset Management”
Eurofins GSC IT Poland z.o.o., Katowice (PL)
* Governance, Risk and Compliance:
* Authoring of security policy "Access Control and Password Policy"
* In-house project support: PKIaaS, Active Directory, Financial systems
* Support in IT risk assessments
* Security Architecture and Concepts
* 100+ security concepts for OSs (Windows, Linux), devices, appliances,
SaaS services, Cloud (Azure, AWS) PaaS blocks, software applications
* Hardening Guides: Generic IT System, DNS, Web Server, TLS, E-mail
* Other guides: Network Isolation, Secure Data Destruction
* Coaching of junior employees
* Governance, Risk and Compliance:
* Authoring of security policy "Access Control and Password Policy"
* In-house project support: PKIaaS, Active Directory, Financial systems
* Support in IT risk assessments
* Security Architecture and Concepts
* 100+ security concepts for OSs (Windows, Linux), devices, appliances,
SaaS services, Cloud (Azure, AWS) PaaS blocks, software applications
* Hardening Guides: Generic IT System, DNS, Web Server, TLS, E-mail
* Other guides: Network Isolation, Secure Data Destruction
* Coaching of junior employees
DKB Service GmbH, Berlin
* Governance, Risk and Compliance:
* Introduction and optimisation of IT security processes
* In-house IT security consulting
* Internal and external audits / gap analysis
* Information/ IT risk assessments
* Security Architecture and Concepts:
* Demilitarized zone (dmz) with P-A-P architecture
* Cloud-only infrastructure (Cisco Meraki, Microsoft)
* Microsoft M365 SaaS platform
* Network Access Control (NAC) infrastructure (on-premise and cloud)
* Security Operation Center:
* Root cause analysis of security incidents
* Threat intelligence
* Hardening of the e-mail security solution
* Governance, Risk and Compliance:
* Introduction and optimisation of IT security processes
* In-house IT security consulting
* Internal and external audits / gap analysis
* Information/ IT risk assessments
* Security Architecture and Concepts:
* Demilitarized zone (dmz) with P-A-P architecture
* Cloud-only infrastructure (Cisco Meraki, Microsoft)
* Microsoft M365 SaaS platform
* Network Access Control (NAC) infrastructure (on-premise and cloud)
* Security Operation Center:
* Root cause analysis of security incidents
* Threat intelligence
* Hardening of the e-mail security solution