Information security specialist and developer.
I work in the field of information security since 2020 and mainly focus on the following areas:
π Resume
Name | A short summary | Examples |
---|---|---|
ISMS | An Information Security Management System is the collection of policies and procedures used to manage all aspects of an organization's information security processes. | ISO 27001, NIST SP 800-53, BSI IT-Grundschutz |
Incident Response | The process of responding to any kind of security incident in a timely manner to limit or prevent damage. | Data breaches, malware infections, etc. |
Awareness | The process of educating members of an organization regarding the protection of physical or digital information assets. | (Spear-)Phishing, social engineering, etc. |
OSINT | The collection and analysis of information that is gathered from public or open sources. | Shodan, Censys, Google Dorks, Maltego, etc. |
π¨ Projects
You can find a selection of programming related projects I have worked on below:
Name | A short summary | Stars | Technology |
---|---|---|---|
NetScan | Port scanning tool for network analysis and security assessment. | ||
WinVPN | VPN desktop application for Windows that uses the services of VPNBook. | ||
SQLite Viewer | A simple cross-platform desktop app to query and edit SQLite databases. |