03/03/2026 updated
JK
100 % available
Senior Cyber Security Engineer | Vulnerability Management, SecOps, SIEM
Batumi, Georgia
Worldwide
IT Specialist – System IntegrationAbout me
Senior cyber security engineer with 10+ years in regulated industries (finance/aviation). Hands-on across vulnerability management, SecOps/SIEM, cloud & infrastructure security, plus GRC (ISO 27001, PCI DSS, NIST). Built VM platforms from scratch and drove remediation/security programs end-to-end.
Network EngineeringIEEE 802.1XActive DirectoryAmazon Web ServicesPenetration TestingJIRAMicrosoft AzureBash ShellBusiness Continuity and Disaster RecoveryChange ManagementCloud Computing SecurityConfiguration ManagementRegulatory ComplianceCommon Vulnerability Scoring System (CVSS)Debian Linux
Vulnerability Management
Built and operated vulnerability management platforms from scratch in multiple environments (OpenVAS/Greenbone; two independent deployments). Experience with Rapid7 scan result analysis, finding validation, false positive reduction, CVSS-based prioritization, and Jira-based remediation lifecycle management.
Security Engineering & Security Operations
Hands-on experience with SIEM/logging (Graylog, Splunk, Syslog), IDS/IPS (Snort), NGFWs (Check Point, Cisco ASA, FortiGate), security baselines/hardening, incident response support, and phishing detection/response. Implemented and operated email security incl. SPF, DKIM, DMARC, anti-phishing, and email gateway policy enforcement.
Infrastructure & Cloud Security
AWS, Azure, Microsoft 365 Security, Linux hardening (Debian/Red Hat), Windows Server, IaC (Ansible, Salt, CloudFormation), container security (Kubernetes, Docker), virtualization (VMware, KVM/Ganeti), and secure web/proxy infrastructure (Apache/Nginx, HAProxy, Squid, Sophos WSA).
Governance, Risk & Compliance
Practical experience aligning technical controls and audit-ready evidence with ISO/IEC 27001/27002, PCI DSS, NIST CSF, CIS Controls, SOC 2, BSI IT-Grundschutz/C5, GDPR, and regulated-industry requirements (BAIT, MaRisk, KRITIS). Includes ISMS support and continuous improvement, drafting/reviewing policies, standards, procedures and guidelines, and maintaining control documentation.
Network & Platform Security
NAC / IEEE 802.1X (Cisco ISE, Cisco Prime), network segmentation, firewall management, secure remote operations, Linux administration, AD/LDAP, monitoring (Nagios), and core infrastructure operations.
Tools & Platforms
OpenVAS/Greenbone, Rapid7, Graylog, Splunk, Snort, Jira (Atlassian), Ansible, Salt, AWS CloudFormation, Check Point, Cisco ASA, FortiGate, Cisco ISE, Cisco Prime, Azure, Microsoft 365, VMware, KVM/Ganeti, Apache/Nginx, HAProxy, Squid, Sophos WSA, Python, Bash, PowerShell, Git.
Languages
GermanNative speakerEnglishFluent
Project history
Independent cyber security engineer providing hands-on security engineering and operations support
- Providing hands-on security engineering and operations support across vulnerability management, SIEM/logging, email security, and cloud/infrastructure security.
- Setting up remediation workflows incl. Jira tracking/reporting, prioritization, escalation and closure.
- Implementing and operating email security (SPF, DKIM, DMARC, anti-phishing) and related policy enforcement.
- Providing cloud/infrastructure security across AWS, Azure and Microsoft 365 (incl. IAM and segmentation/firewall improvements).
- Supporting ISMS-aligned controls and audit-readiness evidence preparation where required.
- Operating fully remote (UTC+4) with reliable overlap with European business hours.
2nd-line vulnerability management SME and independent security oversight in a highly regulated financial environment.
- Served as the 2nd-line subject matter expert for vulnerability management, reviewing VM-related documents, controls and policies and conducting assurance activities to ensure control effectiveness.
- Reviewed vulnerability scan results from Rapid7 and other sources, validated findings, and coordinated remediation timelines with ECC SecOps and the Deutsche Boerse SOC using Jira-based workflows, ensuring timely closure aligned with regulatory expectations.
- Assessed and evaluated results from the Symantec Control Compliance Suite (CCS), verifying configuration baselines against CIS benchmarks and tracking deviations to ensure infrastructure hardening aligned with regulatory requirements.
- Performed independent 2nd-line security oversight across infrastructure/cloud controls, additional focus on SIEM and incident response procedures/playbooks (BAIT, MaRisk, KRITIS).
- Reviewed and guided technical security domains: vulnerability management, network segmentation, SIEM, cloud security, security baselines, and IAM.
- Supported the CISO with executive and board-level security reporting, including KPI/KRI-oriented inputs and contributions to supplier security assessments.
- Developed and matured group-wide ISMS and control practices aligned with ISO/IEC 27001/27002, NIST CSF, CSA CCM and CIS Controls, and automated recurring assurance activities with scripts and BI tooling.
Built and operated VM + core security controls in an aviation environment; owned email security controls and enforcement.
- Deployed and operated OpenVAS-based vulnerability scanning infrastructure (built from scratch); coordinated recurring vulnerability assessments and penetration tests, tracked remediation with stakeholders, and ensured operational closure of findings.
- Handled security incidents, led phishing awareness simulations, and performed phishing triage and response.
- Deployed and operated core security controls: SIEM, NGFW, MFA, VPN, IAM, and email/web security.
- Implemented SPF, DKIM, and DMARC; owned email security and gateway policy enforcement.
- Designed and hardened hybrid and cloud environments (Azure, Microsoft 365).
- Implemented and operated proxy and web security controls as part of secure IT operations.
- Collaborated with developers and IT operations to integrate security requirements into change and delivery workflows.
- Initially planned an ISMS aligned with ISO 27001 and BSI IT-Grundschutz; implemented GDPR-related technical and organizational measures (TOMs) and maintained policies and processes.
Certificates
Information Security Lead Auditor
TÜV SÜD2019
Information Security Officer
TÜV SÜD2018
Information Security Foundation
TÜV SÜD2018
ITIL Foundation
EXIN2016
LPIC-2
Linux Professional Institute2014
LPIC-1
Linux Professional Institute2011