Default Avatar
Candidate Name
Security Architect ll
Poland
Summary

As a seasoned Cyber Security professional with 9 years of expertise in Cybersecurity and Vulnerability Management, I specialize in identifying and mitigating security risks to safeguard enterprise networks, applications, and infrastructures. My professional journey spans industries and verticals, delivering robust solutions that align with organizational security policies and global standards like CIS Benchmarks.

Key Expertise:
- Comprehensive Vulnerability Assessment and Penetration Testing of networks, web applications, and infrastructure.
- Real-time Security Audits on network and security devices, ensuring compliance with organizational and industry benchmarks.
- Proficient in leading-edge tools like Qualys, Nessus, Nexpose, Wiz.io, BitSight, PingCastle, and BurpSuite, Wireshark.
- Extensive hands-on experience with Kali Linux, PowerBI, Service Now
- Policy Compliance using Qualys SCA, Nessus, Azure Policy Compliance
- Rigorous False Positive Analysis to enhance accuracy and efficiency of vulnerability scans.

Certifications:
- EC-Council Certified Security Analyst (ECSA)
- Certified Ethical Hacker (CEH)
- AWS Certified Cloud Practitioner
- Qualys Certified

With a proven track record in cybersecurity and a commitment to staying at the forefront of evolving threats, I aim to contribute to organizations seeking advanced solutions in Vulnerability Management, Security Compliance Review, Network Penetration Testing, Risk Services, and Information Security.

Let’s connect to discuss how I can help strengthen your security posture.

Work experience
01/12/2024
Security Architect II
01/12/2022
01/10/2024
Senior Information Security Analyst
01/05/2021
01/12/2022
Senior Associate Project
Education & certifications
01/09/2022
01/06/2024
Master's Degree
Cybersecurity
01/01/2011
01/01/2015
Bachelor's Degree
Information Technology
Open to relocate
Skills
Cybersecurity Information Security Network Security Vulnerability Assessment Risk Management Incident Response Security Awareness Training Cloud Security Google Cloud Security Security Incident Management Penetration Testing DevSecOps Security Compliance Audits Power BI Security Compliance CEH Ethical Hacking Kali Linux Qualys Burp Suite Nessus Wireshark Azure Security Architecture

You need to log in as an employer to view full candidate details.