01
Security Tool Commissioning
In order to meet today’s threats and regulatory requirements, many organizations have procured SIEM (Security Information and Event Management), FIM (File Integrity Management), IPS (Intrusion Protection Systems), IDS (Intrusion Detection Systems) and DLP (Data Leakage Protection) systems – only to have them operate in an unconfigured default state, sometimes left unmonitored due to the excessive amount of alerts security tools generate out-of-the-box. By bringing in an external resource to address the commissioning of your network and endpoint security tools, your operations team can remain focused on their regular tasks; once tuning and handover training is completed, your team can manage and monitor threats ...
01
Penetration Testing
A penetration test is a method of evaluating the security of a computer system, application, or network by simulating an attack from either insiders or outsiders malicious. The process involves an active analysis of the system for any potential vulnerabilities that could result from poor or improper system configuration, both known and unknown hardware or software flaws, and operational weaknesses in process or technical countermeasures. This analysis is carried out from the position of a potential attacker and usually involves active exploitation of security vulnerabilities. The three main types of penetration testing are: – Wireless penetration testing – Network penetration ...
02
Security Policy Development
Through the development and subsequent maintenance of a documented security ruleset (generally comprised of policies, processes, standards, and procedures), organizations define a framework of how the business is expected to be run. An experienced specialist in policy development can help organizations define necessary security-related implementations and behaviors, and capture them in documents that are aligned with existing methodologies as well as with your corporate culture. Define policies that attain objectives; Adapt existing processes to meet new needs; Align with standard security policy frameworks; Comply with regulatory standards.
02
Vulnerability Assessment
In order to combat the constantly increasing number of threats, organizations must become proactive to identify risks in their network security. The Vulnerability Assessment represents the first level of the Proactive Security services. It is a security test based on the execution of non-invasive, automated and semi-automated scans. The purpose of these scans is to detect the presence of known vulnerabilities within the client’s IT infrastructure. The scan results are then reviewed by our specialists who will provide the most accurate reports and detailed remediation instructions.
03
Security Audit Management
An independent internal auditor can help an organization meet audit objectives, by managing the entire process and tracking progress, minimizing the impact on team members. Ensure adequate documentation; Check compliance levels before audits; Prepare staff and accompany auditors; Assure post-audit remediation.
03
Risk Assessment
Risk assessment is the determination of the quantitative or the qualitative value of risk related to a concrete situation and a recognized threat. Our company utilizes a methodology based on ISO27005 standard in order to identify and evaluate the risks that your company is exposed to. Analysis having been made, we recommend the most suitable measures to be taken in order to mitigate the risks.
Our Team
I am an IT engineer that is deeply passionate about information security.
I have 16 years of experience in IT, with more than 10 years in information security.
I worked in various environments, and I always did my best to improve the security posture of my employers/clients.
I try to stay updated with current technologies, with current attack vectors, and I am following the security trends. I have many certifications in the security field, along with a Master of Engineering in Information Systems Security. I try to cover both sides of security: offensive and defensive, in order to take the most pertinent decisions.
Life offered me different opportunities to expand my knowledge and experience, and I tried to fructify most of them. I am perpetually looking to be challenged, pushed both mentally and physically at work and at play.
Specialties: Vulnerability Management, Security architecture, Penetration testing, Risk Management, IT Security Audit, Forensics, Incident Response, Intrusion Detection.
I have 16 years of experience in IT, with more than 10 years in information security.
I worked in various environments, and I always did my best to improve the security posture of my employers/clients.
I try to stay updated with current technologies, with current attack vectors, and I am following the security trends. I have many certifications in the security field, along with a Master of Engineering in Information Systems Security. I try to cover both sides of security: offensive and defensive, in order to take the most pertinent decisions.
Life offered me different opportunities to expand my knowledge and experience, and I tried to fructify most of them. I am perpetually looking to be challenged, pushed both mentally and physically at work and at play.
Specialties: Vulnerability Management, Security architecture, Penetration testing, Risk Management, IT Security Audit, Forensics, Incident Response, Intrusion Detection.
I am an IT engineer passionate about coding and information security.
I have 18 years of experience in IT, with more than 8 years in information security.
OS:
Windows Desktop and Server
Linux
Computer Programming:
Python, PowerShell, PHP, C/C++ and more
Data Base:
SQL/MySQL
I have 18 years of experience in IT, with more than 8 years in information security.
OS:
Windows Desktop and Server
Linux
Computer Programming:
Python, PowerShell, PHP, C/C++ and more
Data Base:
SQL/MySQL