I want to use this page to summarize my experience in the IT field:

2020 – Executive Manager Professional Security Solutions (Geschäftsleitung)

  • 2020-Q3 Implementing RADAR Cybersecurity SIEM Plattform and builing up a Security Operations Center (SOC)
  • 2020-05-24 Successfully completed the udemy course Learn Python & Ethical Hacking From Scratch
  • 2020-Q2 Partnership with Pcysys – Selling, Implementing PenTera an Automated Infrastructure Pentesting Solution.
  • 2020-Q2 Performing implementations in Offline/Airgapped environments
  • 2020-Q1 Participating in Tender procedures for complete IT Security Outsourcing
  • 2020-Q1 Obtaining Tenable Gold Partner Status + Tenable Guardian

2019 – Executive Manager Professional Security Solutions (Geschäftsleitung)

2018 – Team Leader Professional Security Solutions 

2017 – Team Leader Professional Security Solutions

  • 2017-10-14 – Yet another free Metasploit Comunity Workshop @ Micromata Kassel  via IT Security Meetup Kassel – First one held in english language!
  • 2017-09-19 to 09-22 Professional Pentesting-Basics-Workshop with virtual Hands-On Lab in Kassel, Germany – Pentest Workshop Flyer
  • 2017-09 Giving Awareness Talk to IT Coordinators for Customer
  • 2017-09 Holding Pentesting Basics Primer 1-Day Workshop for CISO and giving Awareness Talk to IT Coordinators of Customer
  • 2017-05 – 2017-07 Consulting Customers Through emerging WannaCry and Petya Ransomware attacks to prevent Business Impact.
  • 2017-05-16 to 05-19 Professional Pentesting-Basics-Workshop with virtual Hands-On Lab in Kassel, Germany – Pentest Workshop Flyer
  • 2017-04-03: Talk: Dataleaks 2016 – What has been stolen and how does a secure password look like? – Datenleaks 2016 – Was wurde geklaut und wie sieht ein sicheres Passwort aus? – Link
  • 2017-03-21: WiFi Hacking Hands-On Workshop and Multi-Platform HDD-Encryption-Overview Talk for a Customer Security-Event
  • 2017-03: Coordinating the opening of a company office in Kassel and helping to establish Market Presence for IT-Security Consulting and Solutions in Kassel – Link to office location on Google Maps
  • 2017-02: Built RFID Hacking Demonstration Object for Customer
  • 2017-03-04: Held a Hands-On LINUX Buffer-Overflow Exploit writing Workshop for IT-Security Meetup Kassel/Nordhessen – Slides
  • 2017-02-28: Talk at IT-Gipfel Niedersachens 2017: Startups and IT-Security – Link – Slides
  • 2017-02-24 to 02-25: 2-Day mod IT internal Metasploit Workshop for Colleagues: teaching Security-Basics skills and heighten Security-Awareness.
  • 2017-02-15: 10th IT-Security Meetup Kassel/Nordhessen: Giving Talk about Android APK Reverse Engineering – Slides
  • Planned second round of commerical Pentesting Basics Workshops round for 2017 consisting of 3 additional Workshops – Flyer (PDF)
  • 2017-01-21: Held a Hands-On WINDOWS Buffer-Overflow Exploit writing Workshop for IT-Security Meetup Kassel/Nordhessen – Slides
  • 2017-01-18: 9th IT-Security Meetup Kassel/Nordhessen: Giving Talk about “Social Engineering fundamentals According to Robert Cialdini – Influence” – Picture-to-be-linked – Slides – Picture
  • 2017-01-10 to 01-13 Professional Pentesting-Basics-Workshop with virtual Hands-On Lab in Kassel, Germany – Pentest Workshop Flyer

2016 – New Position: Team Leader Professional Security Solutions

Leading a Security Professionals Team and further developing IT Security Solutions for Costumers: Vulnerability Scans, Vulnerability Management, Incident Response, Physical Pentesting, General Security Consulting

  • Developing new USB and Phishing Awareness services for costumers
  • 2016-01-15: Published Article (PDF)  in Customer Magazine MODUS 1/2016: “The Big 5 Vulnerability Categories”  (Order Modus)
  • 2016-02-28: Third public Metasploit Beginner Workshop @ Micromata Kassel to teach the basics of pentesting and metasploit on a self build lab with various operating systems and vulnerabilities spread over several subnets to simulate a small company (Link to 3rd Kassel Code Meetup – Metasploit Workshop) – Picture
  • 2016-04-14: Held Awarenss Talk about RFID Security at local Entrepeneur event EINabend – Picture1, Picture2, Picture3, Picture4, Picture5
  • 2016-04-28:  Tenable D-A-CH Usergroup in Salzburg: Talk about Vulnerability Management Best Practices
  • 2016-05-04:  Kassel Code Meetup #11 – Talk about RFID Security – Link to 11th Kassel Code Meetup
  • 2016-05-12: Organization of the first IT-Security Meetup Kassel/Nordhessen – Talk about RFID Security –  Link to meetup Event – Picture from Talk
  • 2016-06-01: Published a Boot2Root VM – Hacking Challgene VM for beginner: Milnet @Vulnhub
  • 2016-06-15: Second IT-Security Meetup Kassel / Nordhessen – Powershell Empire Live-Demo – Link to meetup Event
  • 2016-06-22: Article in LANLine 7/2016 about Vulnerability Management “Mehr Pflicht als Kür” – PDF
  • 2016-07-01: Published Blog Article in mod IT GmbH Company Blog: “Sicherheit von RFID Türschließsystemen”
  • 2016-07-08: Published Blog Article in mod IT GmbH Company Blog: “The Untouchables” – Vulnerability scanning of IoT/Embedded devicces
  • 2016-08-13: Kassel Code meetup #12 – Talk about Vulnerability Management – Link to 12th Kassel Code Meetup
  • 2016/08: Organizing two professional Pentesting-Basics-Workshops with virtual Hands-On Lab – Private Company Inhouse Workshops
  • 2016-09-12 to 09-15 Professional Pentesting-Basics-Workshop with virtual Hands-On Lab in Kassel, Germany – Pentest Workshop Flyer
  • 2016-09-20: WiFi Hacking Hands-On Workshop for a Customer Event
  • 2016-09-28: WiFi Hacking – WEP to WPA2 Enterprise at IT Security Meetup Kassel / Nordhessen – Presentation
  • 2016-10-18: IT Cluster Niedersachsen – Talk about Data Breaches in 2016 and how to protect with Vulnerability Management
  • 2016-10-29: 4th public Metasploit Beginner Workshop @ Micromata Kassel to teach the basics of pentesting and metasploit on a self build lab with various operating systems and vulnerabilities spread over several subnets to simulate a small company (Link to 4th Kassel Code Meetup – Metasploit Workshop) – Picture
  • 2016-11-16: 7th IT-Security Meetup Kassel/Nordhessen: Talk about Security Onion including Snort and BRO – Picture
  • 2016-11-17: IT security Talk at RICOH Deutschland Customer Event: “2016 – Das Jahr der Ransomeware Trojaner, Powershell und der 2. Frühling von Office Macros” – (Talk about Ransomware, Office Macros and Powershell
  • 2016-12-06: Giving a Talk about Password Security for Students at bussiness4schools in Göttingen

2015 IT Security Engineer 

  • 2015-02-28: Second Metasploit Beginner Workshop to teach the basics of pentesting and metasploit on a self build lab with various operating systems and vulnerabilities spread over several subnets to simulate a small company (Link to 2nd Kassel Code Meetup – Metasploit Workshop)
  • Holding Apprentice Workshops to teach Network and Linux Basics
  • Ongoing consulting of large customer regarding upcoming vulnerabilities and the mitigation of those vulnerabilities
  • Technical PreSale for Customers (Security and Firewalling)
  • Security Audits for customers: Scanning for Vulnerabilities in Customer environments and present the results in Workshops to mitigate found vulnerabilities and give recommendations for immediate resolution and long term security hardening
  • Visited Training: Certified Security Technical Analyst: Penetrationtests and Security Assesments  (CBT Training Munich)
  • 2015-05-09: Metasploit Beginner Workshop @ Micromata Kassel – Metasploit Basics  Training on a self build lab with various operating systems and vulnerabilities spread over several subnets to simulate a small company
  • Held community Workshop: Buffer Overflow Exploit Development Basics at CCC Göttingen (Picture)
  • Provided input for a Vulnerability Assesment and Pentesting Article in Customer Magazine MODUS 2/2015 (Order Modus)
  • 2015-06-13: Metasploit Advanced Workshop @ Micromata Kassel – Metasploit Advanced Workshop including AV Evasion hands on, Basic Pentesting techniques, Powershell exploitation, fileformat exploitation with hands on testing on Lab Machines
  • Visited Training: Incident Response Course – Syss GmbH
  • Teaching Apprentices Network, Linix and IT Security Basics
  • Vulnerability Management for Customer: Continiously monitoring vulnerabilities and deriving measures to reduce vulnerabilities and heighten overall IT Security
  • Worldwide deployment of Microsoft EMET in an environment with 2000+ Clients
  • Published Vulnerability Assesment Blog Articels on Corporate Blog
  • Established a New Vulnerability Assesment Security Solution and performed numerous Vulnerabilitiy Assesments for customers and presented results to IT-Managers
  • Continuously working with Tenable Nessus and Security Center
  • Customer Presentation “Of Hacking Teams and adultery/Von Hacking-Teams und Seitensprüngen” – mod IT GmbH – (Backup) – Picture1Picture2, Picture3,  Picture4, Picture5
  • 2015-11-29: Metasploit Intermediate Workshop @UNIKS / CCCKS (Link to Code Meetup – Metasploit Workshop) – Picture
  • Obtained “Tenable Certified Security Engineer” Certification (TCSE) – Link
  • Publication of Blog Article: “10 Points to consider before performing a Vulnerability Scan / 10-Punkte-Checkliste zum Schwachstellenscan” – Link1 – Link2 – (Backup PDF)
  • Publication of Article “Discover hidden vulnerabilities / Verborgene Schwachstellen Entdecken” in faktor 4/2015Link –  (Backup PDF)

08/2014 – New: Job Change, new employer: position as IT Security Engineer

New responsibilities include designing and working on customer security infrastructure.

  • Held community talk: Buffer Overflow Exploit Development Basics (Link to 3rd Kassel Code Meetup) (Picture)
  • Analyzing Vulnerability Scanning Results (Tenable Security Center, Nessus, OpenVAS) and coordinate mitigation of detected vulnerabilities
  • Setting up and administration of OpenVAS based vulnerability scanning solution
  • Held awareness talk at BCIS Business Breakfast about: Demonstrate Breach of a company network (Flyer)
  • 2014-12-13: Hold a Metasploit Beginner Workshop to teach the bascis of pentesting and metasploit on a self built lab with various operating systems and vulnerabilities spread over several subnets to simulate a small company (Link to Kassel Code Meetup – Metasploit Workshop)
  • Evaluation of SoHo Firewall Appliances (Juniper, PaloAlto, Fortinet) for remote office connections (IPSec VPN)
  • Riverbed WAN Acceleration PoC with Customer

10/2013 Job Change within the company: new position as IT Security Specialist 

New responsibilities include working closely with the IT Security Officer by implementing security measures and IT Security Projects. 

Ongoing Security Projects:

  • Planing to implement a basic Network Security Monitoring (Security Onion, BRO IDS, and more)
  • Leading a Project to implement 802.1x Network Access Control in a global environment (Cisco ISE) in combination with  internal Datacenter Firewalling (10+GB)
  • Parallel to work: Offensive-Security Pentesting with Kali Linux Online Training Link to Offensive Security
  • Obtained “Offensive Security Certified Professional” Certification (OSCP) – Link
  • Advanced yearly Linux and Firewall Basics training with IT Security basics
  • Held community talk: Metasploit Introduction (Link to 2nd Kassel Code Meetup)
  • Administrator Awareness Demonstration at Department Workshop (based on Metasploit Domain escalation)
  • Planned community talk about Exploit Development Basics

2013 Security Administrator and Service Delivery Manager 

  • Deployment and administration of an distributed Tenable Vulnerability Scanner Solution (Security Center, Nessus)
  • Evaluate different Honeypot technologies (low, medium, high interaction) and plan strategy to deploy those technologies as a simple ids / alerting system
  • Advance WAN monitoring wallboard system (WAN latency histories using RRD and custom PERL scripts)
  • Update Juniper SA SSLVPN Infrastructure to stay in support
  • Advance SSLVPN Solution functionality: Unix Client Support (OSX, Ubuntu), VPN Logon Scripts via Pulse Client
  • Migrate existing 2-factor-authentication OTP Cloud service to SafeNet OTP Cloud service (hardtoken, softoken, grid cards, token self enrollment/self service)
  • Use metasploit to verify latest public threads/vulnerabilities and give demonstrations at awareness trainings

2012 Security Administrator and Service Delivery Manager 

  • Controlling Managed Security Services
  • Technical oversight of managed SSLVPN solution with 100% growth to 2000 users
  • Establishing a managed Web Application Firewall Service on the basis of F5 Big IP
  • Migration of two existing Checkpoint standalone Gateways into virtualized Checkpoint VSX Cluster (R75.40VS)
  • Employer initiated degree at university of applied science as “Service Delivery Manager” (main focus on contract design, service transition, outsourcing process, soft skills)
  • Establishing of a monitoring wallboard for WAN connections, firewalls and VPN solution (on basis of Cacti Graphs and custom PHP, MYSQL)
  • Metasploit Expert Training (Integralis Deutschland GmbH)
  • Introduce yearly Linux and Firewall Basics training for apprentices (based on ubuntu and iptables)

2011 Security Administrator 

  • Supervision of Apprenticeship final project: Upgrade of existing Logserver to SIEM system
  • Active contribution to contract design for outsourcing contract with Security Service Provider
  • Autonomous installation and transition into Managed Service of an Juniper SSLVPN solution
  • Establishing an 2-factor-authentication OTP Cloud service and managed firewall monitoring service
  • Coordinating the migration of existing roughly 1000 VPN users to new Managed Service Solution
  • Defining ITIL processes for rollout and operation of SSLVPN solution
  • Metasploit Basic Training (Integralis Deutschland GmbH)
  • Active contribution to companies security policy (policy for security gateways and network security)
  • Advancement of companies world wide Checkpoint Infrastructure with remote deployment of american and asia based firewall clusters
  • Establishing an multi tier DMZ design and DMZ-Network-Traffic guidelines  to harden Internet facing network security

2010 Security Administrator

  • Supervision of Apprenticeship final project: Deployment of a Logserver on the basis of Q1-Labs Q-Radar
  • Introduce yearly Linux Basics training for Apprentices
  • Supervision of a penetration test of an Web-Portal platform
  • IT-Security correspondence course (CISSP preparation, Distance Learning School:
  • Administration of Checkpoint Firewall Systems: Rulebase administration, Backup Concept implementation, Site-2-Site VPN administration (UTM Edge and 3rd party peers) and troubleshooting

2009 Security Administrator 

  • Supervision of Apprenticeship final project: Creation of a Simulation-Subsidiary for testing purposes with VPN connectivity and VOIP
  • Administration of  Checkpoint Firewall Systems: Rulebase administration, Rulebase Optimization
  • Optimization and Consolidation of Checkpoint Supportcontracts
  • Optimization of Enduser VPN Rollout process

2008 Security Administrator

  • IHK (chamber of commerce and industry) graduation as IT systems electronics specialist.
    Final project: Setup of and VMWare VSphere 3.5 Environment with Virtual Center and 4 ESX Servers as platform for an SAP QA-System
  • On the job training on companies Checkpoint Systems

2006 – 2008 Apprenticeship:

  • End-User Support (Helpdesk Hotline, Windows Client PCs, End-User Software)
  • Work in Datacenters (Cabeling, Mounting Servers and Network Appliances)
  • Administration of some Windows and Linux Servers
  • Deploying and Administration of virtual Servers in VMWare VSphere Environment
  • Installation and Configuration of HP’s System Inside Manager to Monitor and Administrate Server
  • Writing small PHP, VBScript and BASH Scripts to automate administrative Tasks

Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.