Schlagwörter
Skills
• TECHNICAL SKILLS
- Identity & Access Management Engineering and Architecture; RBAC and ABAC modelling;
- Privileged Access Management solutions; designing temporary access procedures;
- Meta-Directory solutions (SQL, AAD, AD, LDS, LDAP); Automation Engineering;
- MS AAD, AD best practices (designing, implementation, security audit, maintenance);
- .Net, C# (S.DS.P, S.DS, S.DS.AM), VB.NET, TSQL, Java, PowerShell, SVN, Git;
- WebService integration and development (RESTful, SOAP) for IAM customers; Graph;
- .Net, TSQL code debugging; .Net code reverse-engineering;
- Agile scrum methodology; SDL; UML charts modelling for project documentation;
- OPSEC; End-to-end secure processes modelling;
- Red Hat; Solaris; Darwin (Apple macOS);
• ACADEMIC SKILLS
- Cryptography; Security Audit & Compliance; Risk Management; Information Security Management; Security Policies Management; Host-based digital forensics; Network-based digital forensics; Network security, including secure tunnels; Wireless/Mobile security;
• OTHER SKILLS
- Team-work; Brainstorming; Creating and reviewing technical documentations and IT procedures; UML modelling;
- Identity & Access Management Engineering and Architecture; RBAC and ABAC modelling;
- Privileged Access Management solutions; designing temporary access procedures;
- Meta-Directory solutions (SQL, AAD, AD, LDS, LDAP); Automation Engineering;
- MS AAD, AD best practices (designing, implementation, security audit, maintenance);
- .Net, C# (S.DS.P, S.DS, S.DS.AM), VB.NET, TSQL, Java, PowerShell, SVN, Git;
- WebService integration and development (RESTful, SOAP) for IAM customers; Graph;
- .Net, TSQL code debugging; .Net code reverse-engineering;
- Agile scrum methodology; SDL; UML charts modelling for project documentation;
- OPSEC; End-to-end secure processes modelling;
- Red Hat; Solaris; Darwin (Apple macOS);
• ACADEMIC SKILLS
- Cryptography; Security Audit & Compliance; Risk Management; Information Security Management; Security Policies Management; Host-based digital forensics; Network-based digital forensics; Network security, including secure tunnels; Wireless/Mobile security;
• OTHER SKILLS
- Team-work; Brainstorming; Creating and reviewing technical documentations and IT procedures; UML modelling;
Projekthistorie
I had the pleasure to work together with Greg for the last 6 month on an AD Consolidation and IAM Project at Schindler. He heavily supported us in improving the IAM solution as also creating other tools, scripts and applications that helped us in the migration phase. His deep understanding of IT in general, AD and SQL in special as also programming led to a very rapid development of the before mentioned and to a recognizable improvement of the qualityand supportability in the IAM tool. Although working with helpdesk tickets to solve simple customer problems was not his favorite, he was always giving his best and kept up the high quality we expect to deliver in our department.I would always want to have someone like him in the team for a similar project or permanent position.
Reisebereitschaft
Verfügbar in den Ländern
Schweiz
Youtube - Video
PhD Research Student - Cryptography and IRM