Do you have...
802.1X - Network Access Control
For both wired and wireless networks, I have deployed 802.1X solutions for multiple clients,
ensuring that only verified users and devices can physically access company network.
Technologies I used included Fortinet, Ubiquiti, Microsoft, FreeRADIUS and Mikrotik.
Zero Trust Infrastructure
Security philosophy spanning multiple topics like identity management, network segmentation,
hardening and access control, or multi-factor authentication, I implemented the Zero Trust
model in many infrastructures and used countless technologies when doing so.
Auditing and Monitoring
Providing visibility of what happens in your infrastructure, auditing and monitoring tools are vital
for IT survival. From compromised accounts to filled up storages or failing climate control, my
clients know what happens in their systems. Tools I use include Zabbix, Graylog, Prometheus,
Grafana and multiple vendor-based XDR systems.
Are you ready for…
Due Dilligence and Security Audits
Potential investors, future business partners and customers need to know if your IT security is solid and your data safe.
Most of all, you need to know that. Over the years, my clients have passed
rigorous audits and due dilligence processes (done by large multi-national corporations) with flying colours.
Disaster Recovery and Incident Response
When a security incident happens or a disaster-level outage hits, you need to be ready. What is the next step?
Who is responsible for what? Which people should be contacted?
Robust infrastructure, detailed documentation and well trained people can minimize the impact of
catastrophic scenarios on your business.
Certifications and Government Requirements
With growing business, certifications like ISO 27001 or SoC, and compliance with government
security guidelines like NIS2 become more and more relevant. Access control, data security,
asset management, internal policies and many other aspects of your IT security are expected to
meet certain criteria. I can help you achieve them.
Selective skillset overview
Infrastructure
Networking Fortigate | Sophos | Mikrotik | Ubiquiti |
Hyperconverged Dell VxRail | Microsoft S2D |
Hypervisors VMWare vSphere | Microsoft Hyper-V |
OS-Native Services AD and relates systems | NPS |
Cloud Azure |
NVR Wisenet/Hanwha | Ubiquiti |
Backup Veeam |
Storage Synology |
Security
Vulnerability Tools Ping Castle | OpenVAS |
Monitoring and Auditing Tools Zabbix |
OSINT Maltego | Spiderfoot | Data analysis |
Company-level processes Security Audits | Due Dilligence |
Password Management Bitwarden (Cloud and On-prem) |
Access Management Directory services (AD, OpenLDAP) |
Encryption Storage encryption | Certificates |
Measures Endpoint and Network Hardening |
DevOps, Scripting & Databases
Containers Docker | Kubernetes |
Dev Tools PlasticSCM | TeamCity | YouTrack | Jira |
Databases Postgres |
Scripting Python |
Management
Team Management & Projects Team Leading | Mentoring |
Financial Management Budgeting | Forecasting | Cost Management |
Licensing & Law IT Law - Licensing, Data Privacy, Regulations |
Crisis Management Disaster Recovery and Incident Response |
Highlights
Crisis Management Experience with IT takeovers during acquisition projects Ad-hoc resolution of security threats in unique situations |
Robotics Implementation of first robotic warehouses in Czech Republic Deployment and configuration of multiple types of logistic robots |
Infrastructure (re)building Complete overhauls of infrastructures for mid-sized companies Architecture and deployment of complete infrastructures from scratch |
Clustering Deployment of multiple types of HCI clusters Deployment of (vanilla) Kubernetes clusters |
Private Cloud Deployment of private clouds on multiple platforms Creating financial structure of offered services |
Programming Idea and high-level architecture of three separate softwares Creating proof-of-concept versions of said softwares |