Alexander Nagy - Security Expert
Experience
Security Expert
DAK-Gesundheit
- Pentesting of mobile applications
- Code review
- Gematik audit
- Development of secure software development methods
- Creation of security and test concepts
- Penetration testing of software and architecture
- Vulnerability analysis
- Automation and information security
- Use of Confluence and Jira
- Working with databases, J2EE, JavaServer Faces, Liquibase, Apache, Maven, Mercurial, Oracle Financials
- Documentation and creation of security policies
- Management of software systems, SharePoint, PrimeFaces, Git
- Compliance with security regulations and .NET, AWS, API
- Tools: MobSF, Frida, Android Studio, Drozer, Objection, Azure
Security Architect / Penetration Tester
Agentur für Arbeit
- Pentesting of web applications and clients
- Penetration testing of software and architecture
- Vulnerability analysis
- Automation and information security
- Use of Confluence and Jira
- Working with databases, J2EE, JavaServer Faces, Liquibase, Apache, Maven, Mercurial, SharePoint, Oracle Financials
- Documentation and creation of security policies
- Management of software systems, SQL, PrimeFaces, Git
- Compliance with critical infrastructure requirements and security regulations, AWS, API
IT-Security Manager
Investitionsbank Schleswig-Holstein
- Coordination of penetration tests and vulnerability management
- Support for audits of basic security concepts
- SIEM management
- Evaluation and management of security concepts
- Project management
- Penetration testing of software and API architecture
- Vulnerability analysis
- Automation and information security
- Use of Confluence and Jira
- Working with databases, J2EE, JavaServer Faces, Liquibase, Apache, Maven, Mercurial, Oracle Financials
- Documentation and creation of security policies
- Management of software systems, SharePoint, PrimeFaces, Git
- Compliance with security regulations and AWS
Penetration Tester
DHL
- Pentesting of web and mobile applications
- Code review and retesting of findings
- Penetration testing of software and architecture
- Vulnerability analysis
- Automation and information security
- Use of Confluence and Jira
- Working with databases, J2EE, JavaServer Faces, Liquibase, Apache, Maven, Mercurial, Oracle Financials
- Documentation and creation of security policies
- Management of software systems, SQL, PrimeFaces, Git
- Compliance with security regulations and .NET, AWS
- Tools: Burp, SSLyze, Nessus, Wireshark, MobSF, Frida, Android Studio, Drozer, Objection
Penetration Tester and Project Manager
PwC
- Pentesting of mobile applications
- Code review
- Gematik audit
- Development of secure software development methods
- Creation of security and test concepts
- Penetration testing of software and architecture
- Vulnerability analysis
- Automation and information security
- Use of Confluence and Jira
- Working with databases, J2EE, JavaServer Faces, Liquibase, Apache, Maven, Mercurial, Oracle Financials
- Documentation and creation of security policies
- Management of software systems, SharePoint, PrimeFaces, Git
- Compliance with security regulations and .NET, AWS, API
- Tools: MobSF, Frida, Android Studio, Drozer, Objection, Azure
Pentest Coordinator and Security Engineer
DHL
- Penetration testing of web applications
- Code review
- Development of secure software development methods
- Network testing and SIEM
- Creation of security and test concepts
- Penetration testing of software and architecture
- Vulnerability analysis
- Automation and information security
- Use of Confluence and Jira
- Working with databases, J2EE, JavaServer Faces, Liquibase, Apache, Maven, Mercurial, Oracle Financials
- Documentation and development of security policies
- Management of software systems, SQL, PrimeFaces, Git
- Compliance with security regulations, .NET, AWS
- Tech Stack: Spring Boot, Kotlin, Apache, Jira, AngularJS, Linux, Windows, NetApp, Aruba, Barracuda, Azure, API
Security Engineer / Penetration Tester
Federal Ministry of the Interior
- Penetration testing of web applications
- Code review
- SIEM
- Development of secure software development methods
- Creation of security and test concepts
- Vulnerability Management
- Penetration testing of software and architecture
- Vulnerability analysis
- Automation and information security
- Use of Confluence and Jira
- Working with databases, J2EE, JavaServer Faces, Liquibase, Apache, Maven, Mercurial, Oracle Financials
- Documentation and development of security policies
- Management of software systems, SQL, PrimeFaces, Git
- Compliance with security regulations and AWS
- Tech Stack: Spring Boot, Java, Apache, Jira, AngularJS, Linux, Splunk
Penetration Tester and Security Engineer
VHV
- Penetration testing of web and mobile applications
- Web services testing according to OWASP, BSI, MITRE ATT&CK
- SIEM and vulnerability management
- Consulting on fixing security vulnerabilities
- Creation of security and test concepts
- Penetration testing of software and architecture
- Vulnerability analysis
- Automation and information security
- Use of Confluence and Jira
- Working with databases, J2EE, JavaServer Faces, Liquibase, Apache, Maven, Mercurial, Oracle Financials
- Documentation and development of security policies
- Management of software systems, SQL, PrimeFaces, Git
- Compliance with security regulations
- Tech Stack: Tomcat, Angular, Java, Linux, SoapUI, iOS, Android, HP Server
Penetration Tester and Auditor
VHV
- Penetration testing of web and mobile applications
- Code review
- Web services testing according to OWASP, BSI, MITRE ATT&CK
- ISO 27001 audit
- Consulting on fixing security vulnerabilities
- Creation of security and test concepts
- Penetration testing of software and architecture
- Vulnerability analysis
- Automation and information security
- Use of Confluence and Jira
- Working with databases, J2EE, JavaServer Faces, Liquibase, Apache, Maven, Mercurial, Oracle Financials
- Documentation and development of security policies
- Management of software systems, SQL, PrimeFaces, Git
- Compliance with security regulations
- Tech Stack: Angular, Java, Apache, Linux and Windows Server, iOS
Penetration Tester and Auditor
Anonymous
- Penetration testing of web and mobile applications, web services, and networks according to OWASP, BSI, MITRE ATT&CK
- ISO 27001 audit
- Consulting on fixing security vulnerabilities
- Development of secure software development methods
- Creation of security and test concepts
- Penetration testing of software and architecture
- Vulnerability analysis
- Automation and information security
- Use of Confluence and Jira
- Working with databases, J2EE, JavaServer Faces, Liquibase, Apache, Maven, Mercurial, Oracle Financials
- Documentation and development of security policies
- Management of software systems, SQL, PrimeFaces, Git
- Compliance with security regulations
- Tech Stack: Angular, Java, Apache, Linux and Windows Server, Cisco Switch, Fortinet
Penetration Tester
Anonym
- Pentesting according to OWASP, BSI, MITRE ATT&CK Framework
- Code Review
- Consulting on fixing security vulnerabilities
- Developing secure software development methods
- Tech Stack: Angular, React, Java, Linux, AWS, iOS, Android
Penetration Tester and IT Security Consultant, Auditor
Anonym
- Pentesting of web and mobile applications
- Web services testing according to OWASP, BSI, MITRE ATT&CK
- Managed IT projects as Project Security Officer
- ISO 27001 Audit
- Consulting on fixing security vulnerabilities
- Developing secure software development methods
- Creating security and test concepts
- Tech Stack: Angular, React, Java, Linux, AWS, iOS, Android
IT Security Consultant and Auditor
Anonym
- Threat Modeling
- Vulnerability assessment according to OWASP, BSI, MITRE ATT&CK
- Managed Bug Bounty Program
- Security awareness assessment, SIEM, ISO 27001 audit
- System hardening for Industry 4.0 (IT/OT mixed environment)
- Consulting on fixing security vulnerabilities
- Supporting the project as Project Security Officer
- Tech Stack: .NET, CentOS, Windows Server, AWS, Sophos Firewall, Jira, Citrix Netscaler, NetApp, VMware
Penetration Tester
Anonym
- Infrastructure penetration testing
- Web application and web service penetration testing
- Wireless network testing
- Consulting on fixing security vulnerabilities
- Tech Stack: Windows Server, Windows and macOS clients, React, Sophos Firewall, Cisco Router
Penetration Tester
Anonym
- Infrastructure penetration testing
- Web application and web service penetration testing according to OWASP, BSI, MITRE ATT&CK
- Consulting on fixing security vulnerabilities
- Tech Stack: MEAN Stack, Linux, F5 Firewall, NetApp
Penetration Tester
Anonym
- Vulnerability assessment and threat modeling for web applications and e-commerce
- Advising on fixing security vulnerabilities
- Tech stack: Magento, Salesforce, Windows Server, Sophos Firewall, Jira
Security Engineer (Penetration Tester) and Web Developer
Vesper Development Ltd.
- Creating websites and web presences
- Customer support
- Automated security analysis and pentesting
- System hardening
IT Support and Administration
Niké Ltd.
- Supporting the setup and operation of data centers
Industry Experience
See where this freelancer has spent most of their professional time.
Experienced in Information Technology, Banking and Finance, Government and Administration, Insurance, Transportation, and Professional Services.
Business Area Experience
See which departments and functions this freelancer has contributed to most.
Experienced in Information Technology, Operations, Quality Assurance, Project Management, and Audit.
Skills
.Net
Java
Python
Sql
Linux
Centos
Windows Server (2008, 2012, 2016)
Aws
F5
Sophos Firewall
Azure
Jira
F5 Load Balancer
Citrix Netscaler
Netapp
Weblogic
Fortinet
Salesforce
Barracuda
Sso
Saml
Openid
Oauth
Ios
Android
Aruba
Datadog
Burp Suite Pro
Nessus
Openvas
Nmap
Wireshark
Sslyze
Dirbuster
Nikto
Metasploit
Sqlmap
Netsparker
Splunk
Remedy
Fortify
Owasp (Top 10)
Mitre Attack
Osstmm
Nist
Gematik
Iso 27001
Bsi
Languages
Education
Middlesex University
MBA · United Kingdom
Diploma · IT and Cyber Security · United Kingdom
Certifications & licenses
Financial Modeling And Valuation Analyst
Google Project Manager Professional
Offensive Security Certified Professional (OSCP)
Certified Ethical Hacker (CEH)
Statistics
Experience
Global Experience
Expertise
Qualifications
Profile
Frequently asked questions
Do you have questions? Here you can find further information.
Where is Alexander based?
What languages does Alexander speak?
How many years of experience does Alexander have?
What roles would Alexander be best suited for?
What is Alexander's latest experience?
What companies has Alexander worked for in recent years?
Which industries is Alexander most experienced in?
Which business areas is Alexander most experienced in?
Which industries has Alexander worked in recently?
Which business areas has Alexander worked in recently?
What is Alexander's education?
Does Alexander have any certificates?
What is the availability of Alexander?
What is the rate of Alexander?
How to hire Alexander?
Average rates for similar positions
Rates are based on recent contracts and do not include FRATCH margin.
Similar Freelancers
Discover other experts with similar qualifications and experience
Experts recently working on similar projects
Freelancers with hands-on experience in comparable project as a Security Expert
Nearby freelancers
Professionals working in or nearby Munich, Germany