PoRaC 3, an Erasmus Intensive Programme in cooperation with various European institutes, collaboration on different techniques for localisation using radio communication.
VTK, Summer School on Information Security and Protection 2011
AWS Security.
Security as part of Software Architecture for advanced copper and fiber access solutions. Integrating Secure Software Development Life Cycle across RnD activities. Act and contribute as security architect to longer term software architecture roadmap evolutions, envision the required security needs for future products.
Infrastructure security, mainly focussed on the Microsoft eco system, including Windows client and server protection, Active Directory and Certificate services, Azure and Office 365 together with AD-FS. Various parallel projects implementing different SIEM solutions like Varonis, Splunk and Graylog, and anti-virus solutions under which Cylance and Sentinel One. Member of initial Incident Response Team.
IT Infrastructure engineer, mainly focussed on the Microsoft eco system, based on Windows client and server, Active Directory and Certificate services, Exchange and Forefront.
2008, 2009, 2010, 2011 worked at the general servicedesk.
Assisted repairs of Sony tft monitors.
Improving the overall security posture of the embedded linux OS. Including optimization of the available kernel features, enablement of restricted shell for fine grained role based access controls. Establishing a secure by default paradigm across the software stack.
Enabling security from the start of the platform, implementing secure boot, key management (ISO27001 certification), integration of a secure build environment enforcing build signing. Securing physical interfaces, leveraging different SoC vendors BSP, U-boot and overall embedded linux hardening. Supporting evolutions making use of ARM TrustZone Technology, implementing technologies like OP-TEE.
Bringing different security paradigms to an agile development environment, integrating security as non-blocking gatekeeper in different RnD activites.
Starting new projects with threat modelling, whiteboard based with delegates of different teams. Including security requirements in the initial scope definition and project architecture. Making training available to development teams. Optimizing build-time compilation flags, such as enabling stack canaries, link-time protection, enable buffer-length aware replacements, and others offered. Integrating security in the Continuous Integration pipeline using various in-house developed, open source and commercial frameworks and tools like nikto, golismero, owasp zap, nessus, cdrouter, klocwork, openvas, ... Assisting and explaining scenarios to the testing teams to ensure validation occurs before deployment. Introducing various validation gates to ensure quality and security of the configuration. Bringing overall risk awareness by conducing regular updates of security features in the products for different teams. Highlighting applicable risks and need of product security to business owners.
Follow-up on public and private incidents regarding products, ensuring root cause analysis occurs and learn from it. Introduce applicable tests as part of CI to prevent regression. Contributed to ISO27001 certification. Organise internal and external security assessments of products. Intake of public NIST NVE entries.
Security assessments at multiple environments, optimizing security settings in Active Directory, remediation of shared account usage, bad password policy, unknown service accounts, reducing amount of privileged accounts and removal of legacy protocols. Using Security Compliance Manager to verify baseline.
General operations of Active Directory at multiple global organizations. Management, optimization and continuity of service.
Numerous PKI implementations based on ADCS at various organizations. Ranging from single CA set-up's at SMB's to multi-tier architectures leveraging HSM's in global corporations. Several PKI clean-up and optimalization projects.
Many PoC implementations at different organizations.
Involvement in set-up and configuration of Azure environments and Azure services in conjunction with O365.
Since Windows 7, the usage of PowerShell has increased drastically. Ranging from small automation scripts, to small WinForm GUI applications to reporting, auditing, conversion or even larger applications. Also some projects and Proof of concept code in .net/c#/asp.net, php, lua and others. C++ from a previous life. Minimal experience with Java. Python 3.8 ready.
Various ADFS set-up and configuration in multiple architectures
Multiple Splunk set-up's at customers
Different Security Application PoC's at different customers, including Varonis, RightsWATCH, Cynet, Sentinel One, Secret Server, Symantec Data Center Security
Operating System and Application hardening: Windows Client/Server, IIS, SQL and Hyper-V security optimization projects. Implementation and configuration of other Microsoft security tools such as BitLocker (MBAM), AppLocker and EMET.
Learning new technologies, inventing new items, video games, programming - also for fun, photography, exploring new things on the internet, science, food, reverse engineering, …