ProfilMit Kompetenz, Leidenschaft und Ehrgeiz - Bereit, Ihre Erwartungen zu übertreffen!
- Erfahrender IT-Architekt (Infrastruktur, Applikationen und Schnittstellen) mit Studium der Allgemeinen Informatik. Langjährige Berufserfahrung als Führungskraft, Analyst, Projektleiter und in der Schnittstellenfunkton zwischen Geschäftsleitung, IT, Fachabteilungen und Geschäftspartnern.
IT-Landschaf - Quality, Security und Compliance by Design und als kontinuierlicher Prozess Moderne Ansätze wie Event, Data, Domain oder Model Driven Design
- Strategische Weiterentwicklung IT-Infrastruktur, Private, Public, Hybrid- und Multi-Cloud (IaC)
- Cybersecurity, Compliance, Policy und IT-Governance (ITMS, BSI, ISMS, DSVGO, EU NIS / NIS 2, ITG)
- IT-Sourcing-Strategie, Transition und Transformation, Incident, Life Cycle und Risk Management
- Anforderungs- und Providermanagement (Audit, Verträge, SLA, Lastenheft und Pflichtenheft)
- Digitalisierung & Migrationsprojekte - Ziele, Systeme, Methoden, Daten und Prozesse
- Stakeholder Management, Führung von IT-Team, Projekteams und Steuerung Dienstleister
- Vorantreiben von IT-Initiativen zur Digitalisierung und Transformation (IT, OT/ICS, IoT/SPS)
- Softwareentwickler (.NET) ? Backend, Dashboard und Integration (BDE, MDE, CRM, ERP, DWH, BI)
- Datenbank, Schnittstellen & Migration, Entwicklung ETL-Prozesse, Data Quality & Prozess Mining
Keywords for CV-Parser:IT-Strategy, IT-Management, Project Management, Team Leadership, Budget Management, Infrastructure Management, Network Architecture, IT Security, Cloud Computing, Database Management, Software Development, Change Management, Business Process Optimization, IT Compliance, Vendor Management, IT Risk Management, IT Service Management, ITIL, Stakeholder Management, IT Consulting, Technology Trends, Agile, Scrum, Business Analysis, Process Improvement, IT Architecture, System Design, Solution Architecture, Enterprise Architecture, Technology Architecture, Cloud Architecture, Application Architecture, Infrastructure Architecture, Data Architecture, Integration Architecture, Security Architecture, Scalability, Performance Optimization, Database Design, API Design, Microservices, Service-Oriented Architecture (SOA), TOGAF, Architecture Standards, Technical Roadmaps, Migration Strategies, DevOps Practces, Automation, IT Governance, Full-Stack Development, Web Development, Frontend Development, Backend Development, JavaScript, Python, Java, C#, React, Angular, Vue.js, Node.js, Django, ASP.NET, MySQL, MongoDB, PostgreSQL, RESTful APIs, Version Control Systems, Test Automation, UI/UX Design, Responsive Web Design, AWS, Azure, Continiuous Integration/ Continiuous Deployment (CI/CD), Security and Privacy, Troubleshooting and Debugging, Collaboration, Problem-Solving Skills, Network Administration, Domain Administration, Network Management, Firewall Configuration, Routing and Switching, TCP/IP, DNS, DHCP, WLAN Networks, VPN Connections, Network Monitoring, Network Troubleshooting, Active Directory, User Management, Group Policies, System Administration, Windows Server, Linux Systems, Virtualization, Cloud Infrastructure, Backup and Recovery, Patch Management, Incident Response, PowerShell, Bash, Network Analysis, IT Project Management, Project Planning, Project Control, Project Leadership, Risk Management, Scrum, Agile Methods, Waterfall Method, Change Management, Requirements Management, Communication, Supplier Management, Quality Assurance, Test Management, Process Optimization, Presentation Skills, Confict Management, Business Analysis, ITIL, PMBOK, MS Project, Jira, Computer System Validation, FDA, GxP Compliance, Electronic Records, Validation Documentation, Risk Assessment, Change Control, Audit Trail, Data Integrity, System Qualification, Functional and Performance Testing, SOPs, CFR, Traceability Matrix, Document Control, Data Migration, Verification and Validation, Compliance Documentation, Firewall Configuration, Network Security, Intrusion Detection/ Prevention Systems, SIEM, Threat Intelligence, VPN, Security Audits, Vulinerability Management, Incident Response, Security Policies, Log Analysis, Network Segmentation, Penetration Testing, Security Best Practices, Risk Management, Network Security Policies, Network Documentation, Security Awareness Training, Incident Management, Security Reportng, Threat Analysis, Network Security Solutons, Firewalls, Security Certfications, Security Strategy, Cloud, Azure, Office 365, Microsoft, Infrastructure-as-a-Service, Platform-as-a-Service, Software-as-a-Service, Virtual Machines, Virtual Networks, Load Balancer, Trafc Manager, Storage Accounts, Blob Storage, File Storage, Azure Active Directory, Identity and Access Management, Azure Funcitions, Azure App Service, Containers, Kubernetes, Azure DevOps, CI/CD, Azure SQL Database, Cosmos DB, Azure Monitor, Log Analytics, Azure Security Center, Azure Firewall, SharePoint, Exchange Online, Teams, OneDrive, Power Platform, Power Apps, Power Automate, Power BI, Microsoft 365, SharePoint Online, Outlook, Excel, Word, PowerPoint, Collaboration, Document Management, Email Management, Vertrauliche Unternehmensdaten, IT-Sicherheitsvorfälle, IT Security & Compliance, Information Governance & Security, IT Security & Compliance Manager*in, Planung, Aufbau, Betrieb, Sicherheitsarchitekturen, Erkennung, Abwehr, Cyber-Angriffe, Richtlinien, Vorgaben, IT-Sicherheitsmanagement, IT Security Audits, Assessments, Security Incident Management, Beratung, Umsetzung, IT-Risikomanagement, IT-Projekte, Sicherheitsrelevante Themen, Studium der Informatik, Wirtschaftsinformatik, Berufserfahrung, IT-Sicherheitsarchitekturen, IT-Sicherheitsstandards, IT-Risikomanagement, Projektmanagement, Service Management nach ITIL, Operational Technology (OT) Security, Ergebnisorientierung, Kommunikationsfähigkeiten, Deutsch, Englisch, Schwachstellenanalyse, Penetrationstests, Sicherheitsrichtlinien, Zugriffskontrollen, Verschlüsselung, Firewall, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Security Operations Center (SOC), Security Information and Event Management (SIEM), Identity and Access Management (IAM), Risk Assessment, Incident Response, Bedrohungsanalyse, Phishing, Malware, Zero-Day-Exploits, Sicherheitsbewertung, Compliance-Prüfungen, Sicherheitszertifzierungen, Patch-Management, Sicherheitsaudits, Sicherheitsbewusstseinsschulungen, Notfallwiederherstellungsplanung, Datenschutzgesetze und -verordnungen, Security Governance.
Praktka und Nebentätgkeiten während Studium und Schulzeit2001-04 - 2005-09Kunde: Chemische Fabrik Kreussler & Co. GmbH
Aufgaben:
- IT-Support und Windows-Administration
1988-11 - 2000-04Rolle: Linux, Windows und Netzwerk-Administrator
Kunde: Thyssen Hüller Hille GmbH
1998-07 ? 1998-09Rolle: Praktikant
Kunde: System Rent A. Kreitz KG
Aufgaben:
- Design ERM-Diagramm gemäß Anforderungen
- Programmierung und Erstellung einer Datenbankmodell zur IT-Inventarisierung
1995-06 - 1995-07Kunde: Markant Handels und Service GmbH
Aufgaben:
- IT-Support und Excel, Verbesserung Datenqualität in Excel durch Makros
1992-10 - 1995-04Rolle: Netzwerk-Administrator, PC-Techniker
Kunde: System Rent A. Kreitz KG
1980-01Einreise Deutschland