- Provide transversal assistance to Production Security Teams (SOC/SIEM/CSIRT)
- In charge of security service delivery for the cloud transition.
- Russian Project: Adapt security service implementation and delivery for BNP Russia
( impact of the international sanction)
â BodyO Start-up: heath data protection for e-consultaion :
- Gap Analysis, Security roadmap and Go-To-Market strategy
- Feasibility: integration of an innovative system for health data protection
â Personal Research:
- POC implementation : key system , encryption and authentication function (C, Web
Service)
Main point of contact for the Digital Factory Unit for all the Security aspect.
â Collaborate / Interact with IT Disciplines efficiently
â Evaluate the security of suppliers
â Identify security risks and define the measures to be put in place to mitigate them
â Secure architecture : validation and review
â Provide security expertise to IT , R&D teams and business
â Definition of the technical security requirements
â Advise on the choice of technical solutions
â Evaluate the security of suppliers
â Review and evaluate security aspect for internal project (Architecture - Secure by Design -
DevSecOps )
â Define and maintain Information Security Guidelines and standards (Authentication &
Cryptographic)
â Drive security aspect of the Cloud Transition for the Group: Define security process and
tools selection.
Cyber Security Innovation :
â Evaluate EU grant applications by scoring each proposal against the criteria set out in the
Horizon 2020 Work Program
â Provide an independent assessment of project’s progress
_______
â Development of the cyber security unit: Product Line Leader: set-up team, process,
department, infrastructure and security Access.
â European project H2020 SCISSOR: definition of the proposal project (financial and
technical), win the fund with best note in cyber security category (4M euro budget - 8
partners), co coordinator of SCISSOR (********)
â Project Director / Coordinator / Management Board for H2020 SCISSOR:
- Administrative management: legal, financial and administrative organization
⪠Supervision of consortium agreement
⪠Ensure contractual commitments within budget and time plan.
⪠Responsible for corrective action and deviation plan
⪠European commission reporting, review and meeting (activity, management,
financial report)
- Technical management:
⪠Responsible of the work package relative to the development of a key
Management system (30MM).
⪠In charge of the SCISSOR architecture.
⪠Responsible of the coordination and integration of technical partners
contributions.
Set-up Development Team For TRUSTY Line Product:
â Create and manage the development platform (architecture, design, installation and
documentation)
- Manage, specify the software evolutions
- Plan and provide the transfer of knowledge to the local team: on products (dev and run),
platform and software process: DevSecOps
- HSM configuration, PKI and certificate installation.
- Coach and guide the team members (6 people)
â Development of certified products (EL3+) performing security functions as electronic
signature, encryption (TrustySign and TrustyPlatform) and generate certificate (TrustyKey)
â Apply common criteria, specifications, conception, interface design, implementation, unit
test cover, installshield and release.
Functionalities: Signature, Encryption, Verification and Decryption, Generate, revoke, renew, publish,
Software Development : Development of an Asymmetric Cryptographic System
â Project Management ;
- Project charter, objective, budget
- Plan definition and achievement - delivery
- Coordinate the different department’s interaction on the project
- Monitor the follow-up on the work progress
â Cryptography:
- Survey on pairing: computation, curves, and characteristic
- Implementation of cryptography libraries
- Support team members on cryptography implementation (5 people)
â System & Software
- Survey - Architecture - Web Service
Cryptography: Finite Field, Elliptic curves and schemes, Large Integer, Protocol ECDSA, ECIES,
Diffie-Hellman, Identity-Based-Encryption, Pairing and schemes.