1 Remco Hannink ICT Security Consultancy Holterweg DH Nijverdal Education BSc, Computer engineering, Hogeschool Enschede (graduated 1992) MSc, Computer science, Universiteit Twente (graduated 1995) Courses Alfresco Jumpstart Course CISSP (2007) CCENT (CCNA part 1) Masterclass Infrastructure and Architecture (Cibit) Personal Skils - Company internal Writing of comprehensive documentation Windows NT workstation (MCSE) Windows NT server (MCSE) TCP/IP networking (IBM) Visual Age C++ for Java (IBM) IBM 4758 Crypto course (IBM) Introduction Prince II Projectmanagement Employment Period: August current Company: Self employed at Foursec Job description: ICT Security consultant / owner Period: March August 2008 Company: Be-Value b.v. Job description: Senior ICT consultant Period: August December 2003 Company: Stelvio b.v. Job description: Internet security consultant Period: August August 2001 Company: IBM Professional services N.V. Job description: Architect Project experience Period: November current Organization: Department of Defense NL - JIVC/SATS
2 Job description: Network security architect Designing and accreditation of several gateways between networks with different classifications. Perform a (technical) risk analysis according to VIR E&E methodology. Design and implement a Drivelock endpoint solution on classified networks. Accreditation of a military classified semi-static network. Design and implement security measures to secure a mobile Android platform for military and classified use. Integrate DefCERT within military and classified networks. Period: March November 2013 Organization: Department of Defense NL C2SC project TITAAN Job description: Security architect Design and implement an IDS/IDP. Design and implement a SIEM solution based on Intellitactics software. Design and test a Network Access Control (NAC) sytem based on 802.1X, PKI en RADIUS. Performance measurements en testing of application of different VPN solutions (hardware, software, tunnel mode, transport mode). Design of an Electronic Key Management Systeem for crypto hardware. Designing and implement an accredited gateway between networks with different classifications. Implementation of government security guidelines using the CRAMM analysis method. Design and implementation of security measures in the area of transmission, networks, VoIP and applications for a new semi-static military network (TITAAN). Implementation of a layer 2 crypto in an existing WAN network. Implementation of IP crypto s in an existing WAN network. Design and implementation of a RADIUS authentication system.
3 Design of a SNMPv3 management system. Design and implementation of a VPN solution. Development of a security awareness training. Development of a secure architecture training. Design and implementation of an IDS based on opensource software. Securing an Android tablet/smartphone to proces restricted information. Period: November 2002 March 2004 Organization: Stelvio b.v. Job description: Productmanager Design and implementation of a centralized Spamand Virusfilter. Based on open source products. Period May 2000 March 2004 Organization: nl.tree Job Description: Architect / security specialist Design parts of the new Kennisnet network (cisco) Design and migrate to a new serverfarm for Kennisnet (SUN Solaris en Iplanet) Design and projectmanagement of a provisioning system. Period December 2000 March 2004 Organization: nl.tree Job Description: Security consultant Implementation of security management within nl.tree. Perform an Afhankelijkheden & Kwetsbaarheden (A&K) risk analysis on all parts of Kennisnet. Design of a decentralized firewall service Design of a nationwide VPN service. Design of a nationwide Remote Access service. Design of a SSO (Single Sign On) and Identity Management platform. Period: June 2003 Organization: FOM (stichting Fundamenteel Onderzoek Materie) Job description: Consultant Design a secure remote connection, product selection and review of the implementation by third party.
4 Period: May 2003 Organization: Stelvio b.v. Job Description: Consultant Designing, implementing, testing and migrating an Open Source mailserver (Linux, software RAID, Postfix, Cyrus, Mailman en Apache). Period: May 2002 Organization: LSOP (Dutch Police Academy) Job description: Consultant Perform a security scan and penetration test on extranet part of the network. Implement security management in the organization and perform A&K analysis on a part of the network. Period: May 2001 Organization: Hogeschool van Utrecht Job Description: Consultant Advice on measures for restricting internet access by students. Period: June 2000 en June 2001 Organization: PBNA Job description: Trainer Teach 2 PBNA courses on Information security based on the Code voor Informatiebeveiliging guidelines from the Dutch government. Period: September 2000 June 2001 Organization: PON automobielhandel Job description: Project manager Technical projectmanagement for router management for their complete worldwide network. Period: Augustus 2000 December 2000 Organization: DSM Born Job description: Consultant Compose a policy for internet access. Period: May 2000 November 2000 Organization: NIMR (Nederlands Instituut voor metallurgische Research)
5 Job description: Consultant Consult the organization on securing their LAN, Internet Access and Intranet. Period: January 1999 July 1999 Organization: Informatie beheer Groep Job description: Design and System integration of a Student administration application by using Student Chipcard as authentication token. Period: July 1999 January 2000 Organization: Easychip (Interpay) en RAI Datacenter Job description: IT architect: Design, implement and perform system integration of a license plate registration application using Chipknip as an authentication token. Period: July 1999 Organisatie: IBM Nederland N.V. IT architect Design, product selection and installing a PKI system integrated with smartcards. Period: May 1999 June 1999 Organization: CenE bankiers Utrecht Integration of a homebanking application with a smartcard (Java, PC/SC en smartcards). Period: March 1999 Organization: KLM Security scan and penetration test of the KLM office LAN. Period: June 1998 Organization: De Nederlandsche Bank Review of a payment system (PC hardware, Tokenring, SNA en cryptohardware). Period: March 1998
6 Organization: Chipper (Postbank) Design and implement a refund application for the Chipper smartcard. Period: September 1996 December 1997 Organization: Informatie beheer groep Functie Design and system integration of an IBG selfservice terminal for students (OS/2, AS/400 CM/2, ISDN, smartcards en TCP/IP). Design and integration of a smartcard helpdesk station (X25, ISDN, Client Access, 5250 emulatie). Period: September 1995 February 1996 Organization: Studentenchipkaart IT architect Skills Languages : Security : Design and system integration of a smartcard Personalisation Station (OS/2. hardware-integratie, AS/400 koppeling). Dutch, native language. English, fluent in speaking and writing. German, Intermediate in speaking an writing. Designing and implementing of an IDS- IDP solution (Juniper, Niksun, Snort, Cisco ASA, open source solutions and Intellitactics) Performing penetration test on systems and networks Security Reviews on systems and networks Design of secure networks Design of secure systems Hardening of systems Firewalls (checkpoint, Linux, IBM, Cisco and Netscreen) Remote access solutions (Netscreen and Cisco) VPN technieken (Cisco, OpenVPN)
7 Hardware: Code voor informatiebeveiliging (dutch government guidelines) A&K analyse VIR 94 CRAMM NEN/ISO 17799:2005 / BS 7799 Common Criteria Smartcards and other secure tokens Cryptography (cryptohardware and algoritmes) NATO crypto, layer 2 and layer 3 PGP and S/MIME Public Key Infrastructures Workstation Security (port security, hard disk security) Identity management Netwerk equipment, Cisco, Palo Alto and Netscreen (routers, switches, firewalls en VPN concentrators) PC hardware RS/6000 hardware SUN hardware Apple hardware Crypto hardware (Serial and IP) 4th generation firewalls Microcontrollers Arduino Raspberry Pi Operating systems: Windows XP / Vista / Vista / 7 / 8 Windows advanced server 2003 Windows Server 2003 R2 / 2008 R2 / 2012 R2 UNIX (Solaris, AIX en BSD) Linux Ubuntu Redhat, Debian, Fedora en Suse Mac OS X (server) OS/2 Networking : LAN (Ethernet/Tokenring) WAN connections (ISDN, X25, G.703) WLAN ( and the security aspects) TCP/IP, NetBIOS Cisco IOS ((dynamic) routing and switching) Cisco PIX and ASA OS Palo Alto 4th generation firewalls Netwerkrouting
Michael Buth Principal IT Consultant Personal details Name, Surname Address Phone E-Mail Web Year of birth Education Foreign languages Buth, Michael Michael Buth IT Consultant Werner Str. 29 44388 Dortmund
Guy Van Sanden Nieuwe baan 55 2430 Laakdal 0489 930 548 email@example.com Personal Information Education Date of birth: 27 april 1977 Place of birth: Turnhout Marital status: Married (3 children) Nationality:
Technical and Skills courses 21/05/2015 22/05/2015 Blue Coat ProxySG Professional Westcon 18/05/2015 20/05/2015 Blue Coat ProxySG Administrator Westcon 1 20/04/2015 23/04/2015 HP Network automation 9.x
1 JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. XX, NO. Y, DEC. 2001 A Secure Web-based Global Management System For Firewall/VPN Devices Mi-Joung Choi and James W. Hong Department of Computer Science and
Special Publication 800-41 Guidelines on Firewalls and Firewall Policy Recommendations of the National Institute of Standards and Technology John Wack, Ken Cutler, Jamie Pole NIST Special Publication 800-41
Profile Diplom Informatiker (FH) Age-group: 1967 City: Frankfurt am Main Hohe Brück 12 60437 Frankfurt am Main Cell +49 17 33 29 47 67 E-Mail firstname.lastname@example.org Technical focus Project and Programm Management
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Introduction to Network Security
LANCOM 7100 Central site VPN gateway for networking up to 200 sites 1 Provides 100 VPN channels, upgradable to 200 remote sites 1 4 x Gigabit Ethernet + ISDN BRI 1 VRRP and load balancing 1 Advanced Routing
Siebel Security Guide Siebel Innovation Pack 2013 Version 8.1/8.2 September 2013 Copyright 2005, 2013 Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided
EDUCATION FOR THE FUTURE www.itt-tech.edu THE MISSION OF THE ITT TECHNICAL INSTITUTE The THE ITT MISSION Technical of ITT Educational Institute is Services, an institution Inc., and ITT of Technical higher
System Requirements and Supported Platforms for Oracle Business Suite Enterprise Edition Version 10.1.3.3, 10.1.3.4, Rev. O February 2012 System Requirements and Supported Platforms for Oracle Business
GmbH White Paper SAP ERP on System z state-of-the-art business resilience with the highest level of security July 2009 Josh Krischer 2009 Josh Krischer & Associates GmbH. All rights reserved. Reproduction
Special Publication 800-41 Revision 1 Guidelines on Firewalls and Firewall Policy Recommendations of the National Institute of Standards and Technology Karen Scarfone Paul Hoffman NIST Special Publication
Committee on National Security Systems CNSS Instruction No. 5000 April 2007 GUIDELINES FOR VOICE OVER INTERNET PROTOCOL (VoIP) COMPUTER TELEPHONY CNSS Secretariat (I922) / National Security Agency 9800
Firewall Strategies June 2003 (Updated May 2009) 1 Table of Content Executive Summary...4 Brief survey of firewall concepts...4 What is the problem?...4 What is a firewall?...4 What skills are necessary
A COALFIRE WHITE PAPER Using s Cloud & Data Center Security Solution to meet PCI DSS 3.0 Compliance Implementing s Deep Security Platform in a Payment Card Environment April 2015 Page 1 Executive Summary...
Invensys is now White Paper Cyber Security Authors: Ernest Rakaczky, Director of Process Control Network Security, Invensys Paul Dacruz, Vice President, Power Industry Solutions What s Inside: 1. Introduction
VMware Horizon 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
Symantec Encryption Management Server Administrator's Guide 3.3 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
Report Number: I332-016R-2005 Security Guidance for Deploying IP Telephony Systems Systems and Network Attack Center (SNAC) Released: 14 February 2006 Version 1.01 SNAC.Guides@nsa.gov ii This Page Intentionally
. Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside
Service Catalog Information Technology Version 5, January 2014 The Service Catalog defines and categorizes the Information Technology services provided to the Oklahoma State University community. A general
Mainframe Application Hosting/Central Processing Unit (CPU) Rate: $1,044.00 per hour (Based on normalization to an IBM 2064-116 model rated at 8,117.7067 SUs per second) The DTS provides software application
F5 BIG-IP DATASHEET What s Inside: 2 Improved User Experience 3 Network Access 5 Application Access Secure Access to Specific Applications 6 Portal Access Proxy-Based Access to Web Applications, Files,
Payment Card Industry (PCI) Data Security Standard (DSS) and Payment Application Data Security Standard (PA-DSS) Glossary of Terms, Abbreviations, and Acronyms Version 3.0 January 2014 AAA Access Control
PCI DSS PCI Prioritized DSS Approach for for PCI DSS.0 The Prioritized Approach to Pursue PCI DSS Compliance The Payment Card Industry Data Security Standard (PCI DSS) provides a detailed, 1 requirements