CV F5 SECURE WEB GATEWAY SERVICES : Recevez gratuitement les meilleurs profils

Je dépose une mission gratuitement
Je dépose mon CV

Les derniers profils F5 SECURE WEB GATEWAY SERVICES connectés

CV Consultant Cybersécurité
Remy

Consultant Cybersécurité

  • IVRY SUR SEINE
Cybersécurité SECURITE DEVOPS PYTHON SAP F5 SECURE WEB GATEWAY SERVICES
CV Expert technique flux AXWAY (Gateway, Secure Transport, CFT, Sentinel, Flow Manager, CG)
Pierre

Expert technique flux AXWAY (Gateway, Secure Transport, CFT, Sentinel, Flow Manager, CG)

  • LA MADELEINE
F5 SECURE WEB GATEWAY SERVICES SHELL UNIX VTOM VISUAL TOM UNIX AIX TWS Axway Central Governance AXWAY Z/OS
CV Ingénieur réseaux CISCO EMAIL SECURITY
Zied

Ingénieur réseaux CISCO EMAIL SECURITY

  • Nanterre
SECURITE F5 APPLICATION SECURITY MANAGER (ASM) F5 SECURE WEB GATEWAY SERVICES IBM SECURITY APPSCAN CISCO EMAIL SECURITY CISCO SECURITY MANAGER IBM Security Identity Management
CV Chef de projet PROJECT MANAGEMENT OFFICE
Sami

Chef de projet PROJECT MANAGEMENT OFFICE

  • Arcueil
PROJECT MANAGEMENT OFFICE CISCO UNIX SOLARIS IPSEC SECURITE ORACLE F5 SECURE WEB GATEWAY SERVICES ACTIVE DIRECTORY
CV Architecte MICROSOFT LYNC
Mihai

Architecte MICROSOFT LYNC

  • PARIS
MICROSOFT LYNC F5 SECURE WEB GATEWAY SERVICES
CV Administrateur réseaux IDS
Anis

Administrateur réseaux IDS

  • ariana
IDS JUNIPER LINUX CISCO ORACLE SQL VMWARE FORTINET LINUX UBUNTU HYPER-V F5 SECURE WEB GATEWAY SERVICES
Je trouve un CV F5 SECURE WEB GATEWAY SERVICES
Vous êtes freelance ?
Sécurisez votre activité grâce au portage salarial !

Résumé des emplois de Cédric,
freelance F5 SECURE WEB GATEWAY SERVICES résidant dans les Yvelines (78)

  • worked for Numergy as senior security architect,

    Jan 2013 - Jan 2014

    Numergy is a Cloud Com-puting provider (IaaS model). I was responsible of the security architecture of their offer. Despite that a lot of security products exist on the market, we tried to improve IDS, IPS by studying the taxonomy of attacks.
    We have deployed IAM (OpenIAM, Evidian), SSO, PKI (Microsoft, EJBCA), ERP (OpenERP), Ob-ject storage, Encryption of data base, SIEM (RSA)… We have developed under the “agil” method a commercial offer around Open-Stack, the opportunity for me to play as scrum master.
    On the R&D activity we worked on big data project that consist in detecting rare malicious events in a large amount of data. We have mounted collaboration with some universities to work on Bayesian network, machine learning and formal concept analysis.

  • R&D manager

    at GCSS (Abu-Dhabi, U.A.E.)
    Jan 2009 - Jan 2012

    In charge of the activities of the hardware and software laboratories of cryptography (20 persons, up to 50 persons), I managed the activity of the laboratory and gave training and courses in cryptography. The goal of this project was to create a national security agency for the United Arabic Emirates. Among the objectives, we had to transfer the knowledge regarding the construction of IP-VPNs, HSMs, a PKI and a national sym-metric algorithm and more generally a competence regarding the research in this field.
    I was also in charge of establishing collaboration with French company (Thales, EADS…) and Thales has accommodates our trainees for 6 months.
    Among the achievement, we proposed an alternative to PKI by proposing a certificatless system that is more scalable and efficient; several Engineers started a PhD in the cryptography field and several En-gineers found prestigious positions relative to this field.
    I developed tricky tools to generate automatically VHDL codes of block ciphers with counter-measures.
    A national symmetric cipher has been developed there. Few publications showed the success of this enterprise.

  • Engineer

    for Advanced Studies at Thales Communication
    Jan 2007 - Jan 2008

    in the laboratory ATI. In charge of a development project in Java language in which I had to analyze and to conceive graph algorithms. This topic is related to FCA theory (formal concept analysis), fusion of information and prediction. Applications are military and allows to the hierarchy to get quickly an overview of the situation in the battlefield. This subject can be applied in cyber defense and many other applications as tracking video and decision help material. We have concretely built software that Thales has sold to different customers (project “Stars”).

  • Expert in cryptography

    at CS-Communication & systems (Le Plessis Robin-son, France)
    Jan 2007 - Jan 2009

    (Le Plessis Robin-son, France). I worked for the project “Volvic”, which is military project for which the customer was UAE. I was in charge of the transfer knowledge in cryptography for the UAE. I was in charge of all cryptography designs, mechanisms and protocols for different appliances developed by CS. I worked on the architecture of different version of IP-vpn and HSM. I directed with the Professor Claude Carlet (Paris 8) the thesis of Rafael Fourquet. I also directed Master trainees from UAE.

  • Engineer for Advanced Studies

    at Thales Communication
    Jan 2006 - Jan 2007

    in the laboratory of TAI (Colombes), or I was working on European projects (DISCREET) focused on the safety of Ad-hoc networks, and networks strong constraints. I was responsible for setting up efficient cryptographic
    solutions that do not deteriorate the quality of service. I also worked on, IDS, security policies in in-formation systems. Reviewer IEEE, Discrete Math, and Journal in Computer Virology. Research As-sociate Laboratory of Virology in the military school ESAT Rennes.

  • Engineer in cryptography

    at Thales Communication in the laboratory LCH (cryptography, Colombes), safety assessment of cryptographic
    Jan 2005 - Jan 2006

    algorithms, ensuring compliance with the recommendations DCSSI. Evaluation of the safety of certain software (MINICITA). Study Plan for upstream CELAR, C development, research, design of algorithms, and responsibility for trainees. 08/07/04-18/04/05, Engineer in cryptography and telecommunications ERCOM (Velizy). I did audit of information security, implementation of cryptographic primitives, I solved problem of infor-mation transmission by introduction of error-correcting codes, scientific programming in C language. Electronic warfare (reverse engineering), blind demodulation, reconstruction of convolutive codes, error correcting codes, reconstruction of scramblers.

  • ATER (teacher-researcher)

    in computer science at the University of Créteil.
    Jan 2003 - Jan 2004

  • Military in high school Saint-Cyr as a teacher, and associate researcher at INRIA.
    1999 - 2000

  • Currently, European Expert.

    European commission provides expertise mission in cyber security.
    aujourd'hui

    Currently I work as the R&D manager and architect in cyber security for Assystem and I am the co-ordinator of the H2020 European project SCISSOR. I am in charge of developing a cyber security department for Assystem. I am involved in constructing identity based authentication systems (IBE) and attribute based encryption (ABE). I develop original security architectures for critical systems as SCADA or Smart-Grid. I construct security solution based on open sources software as IDS/IPS, SIEM products and high level and scalable tools to administrate the identities, authorizations, roles, profiles in a SI. Despite that our solution could work for standard SI, we aim to provide a compliancy with the Modbus, Bacnet, DNP3… standards meet in critical infrastructures. In this sense, we have achieved an industrial application firewall with redundancy, IDPS and VPN functionalities (Next-Gen-FW). To complete the standard industrial architectures we have built an adapted physical diode. We use to help companies in obtaining ISO27001 certification, we help them to build an SMSI and we perform the different risk analysis by using EBIOS or MEHARI standards. I belong to the security group dedicated to security of SCADA for integrators at ANSSI and recently, I started to work on Blockchains application for IoT security: I am involved Io4 of IRT-systemx. As integrator we deploy SIEM solutions (OSSIM, Prelude). The next step consists in developing our offer in audit and consultancy. I am involved in the recruitment and I manage now a team of 12 people in cybersecurity.

Voir le profil complet de ce freelance