Security Architect

€715 / per day

Seller Name:

Widomski Maciej

Industry Expertise:

1662

Industry Expertise Options:

[{"label":"Adobe","value":"Adobe"},{"label":"Amazon Web Services (AWS)","value":"Amazon Web Services (AWS)"},{"label":"Apple","value":"Apple"},{"label":"Archibus","value":"Archibus"},{"label":"Arista Networks","value":"Arista Networks"},{"label":"Atlassian","value":"Atlassian"},{"label":"BMC","value":"BMC"},{"label":"Box","value":"Box"},{"label":"Broadcom","value":"Broadcom"},{"label":"CA","value":"CA"},{"label":"Check Point Software","value":"Check Point Software"},{"label":"Cisco","value":"Cisco"},{"label":"Citrix Systems","value":"Citrix Systems"},{"label":"Dell","value":"Dell"},{"label":"Dell Technologies","value":"Dell Technologies"},{"label":"DocuSign","value":"DocuSign"},{"label":"Dorado","value":"Dorado"},{"label":"Elastic NV","value":"Elastic NV"},{"label":"EMC","value":"EMC"},{"label":"Epic Systems","value":"Epic Systems"},{"label":"F5 Networks","value":"F5 Networks"},{"label":"ForgeRock","value":"ForgeRock"},{"label":"Fortinet","value":"Fortinet"},{"label":"Google","value":"Google"},{"label":"HP","value":"HP"},{"label":"HP (Hewlett-Packard)","value":"HP (Hewlett-Packard)"},{"label":"HubSpot","value":"HubSpot"},{"label":"IBM","value":"IBM"},{"label":"Informatica","value":"Informatica"},{"label":"InfoVista","value":"InfoVista"},{"label":"Intuit","value":"Intuit"},{"label":"Juniper Networks","value":"Juniper Networks"},{"label":"Micro Focus","value":"Micro Focus"},{"label":"Microsoft","value":"Microsoft"},{"label":"MongoDB","value":"MongoDB"},{"label":"MuleSoft","value":"MuleSoft"},{"label":"NetApp","value":"NetApp"},{"label":"New Relic","value":"New Relic"},{"label":"OpenSource","value":"OpenSource"},{"label":"OpenText","value":"OpenText"},{"label":"Oracle","value":"Oracle"},{"label":"Others","value":"Others"},{"label":"Palo Alto Networks","value":"Palo Alto Networks"},{"label":"Planon","value":"Planon"},{"label":"Progress Software","value":"Progress Software"},{"label":"Qualys","value":"Qualys"},{"label":"Red Hat","value":"Red Hat"},{"label":"Salesforce","value":"Salesforce"},{"label":"SAP","value":"SAP"},{"label":"SAS Institute","value":"SAS Institute"},{"label":"Serena","value":"Serena"},{"label":"ServiceNow","value":"ServiceNow"},{"label":"Shopify","value":"Shopify"},{"label":"Snowflake","value":"Snowflake"},{"label":"SolarWinds","value":"SolarWinds"},{"label":"Splunk","value":"Splunk"},{"label":"Square (Block, Inc.)","value":"Square (Block, Inc.)"},{"label":"Symantec","value":"Symantec"},{"label":"Tableau Software","value":"Tableau Software"},{"label":"Teradata","value":"Teradata"},{"label":"Trend Micro","value":"Trend Micro"},{"label":"VMware","value":"VMware"},{"label":"Workday","value":"Workday"},{"label":"Zoom Video Communications","value":"Zoom Video Communications"},{"label":"Zuora","value":"Zuora"}]

Product name:

Security Architect

Country:

1944

Description:

Certified IT Specialist, Cloud/Security Architect

ADVISORY and ADVOCACY around SECURE ACCESS: zero-trust model, Software Defined Perimeter, Identity Governance and Administration (IGA), MFA, SSO

CLOUD DESIGN and EXECUTION: Designing and executing migration of SAP Landscapes to AWS Cloud

BUSINESS SCENARIOS:

  • Business Continuity – High-Availability, Disaster Recovery, Backups, Native IBM TSAMP, SUSE HA-Extension (pacemaker)
  • Infrastructure as a Code – CloudFormation scripts orchestrated by Ansible AWX
  • Identity and Access Management (IAM) for Multi Account strategy
  • Centralized monitoring and logging
  • Data migration to AWS Cloud 

AWS TECHNOLOGY (new capabilities):

  • Landing Zones,
  • Route53 for Hybrid Environment,
  • AWS Resource Access Manager,
  • Transit Gateways,
  • VPC Sharing

PROJECT MANAGEMENT: Designing and driving digital transformation projects for Public Sector: EU Agencies. Writing Statements of Work, project execution and supervision

Security Surveillance: SIEM tools and SOC activities combined with WAF and NGFW solutions

Certified Cloud Security Professional (CCSP) course, Certificate of Cloud Security Knowledge (CCSK) 

Short description:


    

Language Seniority:

[{"language":"English","seniority":"Professional working proficiency"},{"language":"Polish","seniority":"Native or bilingual proficiency"}]

Skill Seniority:

[]

Location:
Contact Info:

Book a Specialist

Certified IT Specialist, Cloud/Security Architect

ADVISORY and ADVOCACY around SECURE ACCESS: zero-trust model, Software Defined Perimeter, Identity Governance and Administration (IGA), MFA, SSO

CLOUD DESIGN and EXECUTION: Designing and executing migration of SAP Landscapes to AWS Cloud

BUSINESS SCENARIOS:

  • Business Continuity – High-Availability, Disaster Recovery, Backups, Native IBM TSAMP, SUSE HA-Extension (pacemaker)
  • Infrastructure as a Code – CloudFormation scripts orchestrated by Ansible AWX
  • Identity and Access Management (IAM) for Multi Account strategy
  • Centralized monitoring and logging
  • Data migration to AWS Cloud 

AWS TECHNOLOGY (new capabilities):

  • Landing Zones,
  • Route53 for Hybrid Environment,
  • AWS Resource Access Manager,
  • Transit Gateways,
  • VPC Sharing

PROJECT MANAGEMENT: Designing and driving digital transformation projects for Public Sector: EU Agencies. Writing Statements of Work, project execution and supervision

Security Surveillance: SIEM tools and SOC activities combined with WAF and NGFW solutions

Certified Cloud Security Professional (CCSP) course, Certificate of Cloud Security Knowledge (CCSK) 

More Information
Country Poland
Vendor Expertise IBM
Language Seniority [{"language":"English","seniority":"Professional working proficiency"},{"language":"Polish","seniority":"Native or bilingual proficiency"}]
Location 1944
Write Your Own Review
You're reviewing:Security Architect