Bernhard Bowitz
Senior Security Architect
Experience
Senior Security Architect
Intermediate Beratung
- Consulting on an ongoing IT security architecture project
- Documenting past progress and planning next steps
- Applying and implementing the BSI IT baseline protection
- Building and maintaining security management systems
- Applying the ISO 27001 standard series
- Integrating ITIL processes into security architectures
- Collaborating with public clients, regulatory authorities and internal and external service providers
Security Consultant / Project Manager
- Securing a large Europe-wide network in a VS-NfD project in the KRITIS sector
- Consulting, planning, review and documentation
- Technical consulting in the network area including migration planning, segmentation and IP harmonization
- Support in the regular operation of the security infrastructure based on BSI C5 and BSI 200-2
- Focus on SIEM and SOC platforms and generating use cases and playbooks
- Identifying, planning and independently implementing projects to improve the security infrastructure
- Technical, hands-on project management and leading internal teams
- Compliance with VS-NfD requirements and VSA classification regulations
Project Manager / Consultant
- Consulting, planning and hands-on project management for a closed on-premises high-security network
- Focus on BSI, VS-NfD, VSA, ITSCM as well as SOC, SIEM and ISMS/KRITIS in OT/IoT
- Technical consulting in the network and data center area
- Support in the regular operation of security infrastructure and LAN/WAN environment
- Development of use cases and playbooks on the Splunk platform
- Implementing security infrastructure projects in the existing data center
- Development and ongoing updates of the GENU VPN architecture
- Architecture and development work in Windows and Linux environments
- Network segmentation as well as testing and extending the LAN/WLAN environment
- Reviewing and updating the HPE/Aruba switching platform and gateway
- Introducing EDR (endpoint security) and DriveLock encryption
- Improving email security with DLP and ProofPoint
- SharePoint project management and reporting to C-level and board of directors
- Leading the IT security department and coordinating vendors and service providers
Project Manager / Consultant
- Consulting on the architecture of an on-premises hospital network
- Renewing the network to the current B3S security standard
- Managing infrastructure services like DNS, DHCP and RDP
- Advising on security regulations in the healthcare sector
- Implementing a SIEM and SOC platform
- Consulting on tendering and implementation for a closed high-security network
Project Manager
- Architecture, design and implementation of a complete rebuild of a third-party connection platform and data gateway
- Supporting several thousand users in the VS-NfD environment at NATO security level
- Integration of Deep Security Enterprise solutions such as Opswat, Infodas and S-Dot
- Documentation and vulnerability analysis in the IoT/OT domain
- Implementing IAM/PAM/LDAP in the government network following BSI KRITIS requirements
- Developing connection solutions like Thin Client, SINA, Terminal Services and ReCoBS
- Requirement analysis for data gateways and SOC platforms with Splunk
- Script development with PowerShell, VBS, Batch and Ansible
- Managing the BCM-GRC HiScout Suite
- Compliance with the Classification Regulations (VSA) as well as EU and NATO requirements
- Conducting training workshops and preparing audited project documentation
Network Architect
- Network architecture based on BSI IT baseline protection for on-premises environments
- Design and rebuild of a SIEM (Splunk, Wazuh) and planning of SOAR/SOC/CDC as well as IAM/PAM
- Development of a cyber security strategy for on-premises and cloud
- Support of the DriveLock implementation from design to production
- Build and design of a geo-redundant data center
- Introduction of Elastic SIEM with Siemplify SOAR
- Container management with Kubernetes
- Analysis of security events and incident response planning
- Introduction of IAM/PAM tools such as CyberArk REST API, Omada and Saviynt
- Configuration of Stormshield and Cisco firewalls in separate private networks
- Rollout of TrendMicro Deep Security servers and agents
Technical Pre-Sales Lead
ERP/ SCM System Singapore Pte
- Preparation of a blockchain-based security platform (PAM/IAM/SIEM/SOC/SOAR)
- Leading the sales team and technical training
- Architecture and customized concepts for new clients
- Creating proposals and technical support during implementation
- Development based on blockchain technology and Wazuh
Development Lead
SecureScrypt Team
- Development of a cloud management platform with a payment gateway for SaaS sales
- Architecture of a private cloud with no connection to AWS or Azure
- Development of the SentosaXchange payment gateway for marketplace transactions
- Implementation of Splunk as a security platform, including SOC use cases and playbooks
- Integration of IAM and PAM services
- Training staff in cloud service administration
Project Manager / Consultant
- Integrator of a complete EPM, IAM, PAM, PSM, and Vault system, onboarding 64 AWS environments in a military environment
- Setup of a system with security gateways, HSM, DDI, and PKI
- Implementation of BSI and BMWi guidelines to NATO level
- Setup of an endpoint security solution with DriveLock
- Migration and implementation from BeyondTrust to CyberArk REST API
- Administration of RHEL OpenShift and integration of the OMADA IAM/PAM Identity Suite
- Script development with PowerShell, VBS, Batch, and Ansible
- Migration of CyberArk environments from version 10.x to 11.x
Security Developer
SecureScrypt Pte. Ltd.
- Development of a blockchain security framework
- Implementation of encryption using QKD (Quantum Key Distribution) over fiber optics between two data centers
- High-security development for financial applications
Lead Project Manager / Consultant
- Cyber security in embedded automotive platforms
- Planning and implementation of CyberArk (EPM, PAM, PSM), IAM, and SIEM/SOC
- Container management with Kubernetes
- Integration of the OMADA (OIS) IAM/PAM Identity Suite
- Conducting penetration tests with Wireshark and Aircrack
- Budget planning and negotiations with vendors
Sub-project Consultant
- Introduction of SOC/SOAR platforms including Siemplify, Splunk, and Wazuh
- Technical consulting, planning, and implementation in the aviation and logistics sectors
- Pre-sales design and vendor management
- Introduction of business continuity processes (ITSCM) and ISMS in critical infrastructure (KRITIS)
- Conducting penetration tests in the Azure cloud environment
- Creating scripts with PowerShell and documentation in an agile environment
Project Manager / Technical Project Manager
- Design and implementation of a Europe-wide security system for the ECB 4CB network
- Integration and customization to BAIT and MaRisk requirements
- Integration of HiScout GRC within the BSI IT baseline protection
- Cloud operation with QRadar, NexPose, and TheHive
- Planning penetration tests with Burp Suite and Metasploit
- Preparation for cloud migration to Azure and AWS
Global Project Manager
- Architecture, planning, and integration of DLP, ATP, EDR, and Anti-DDoS systems
- Implementation of ISMS, SIEM, and SOC
- Preparation for cloud migration with Splunk in an agile environment
- Introduction of the OMADA IAM platform for cloud environments
- Development of a blockchain security infrastructure
- Design and rollout of the Azure cloud migration
- Management of system integrators and vendors
Security Compliance Consultant
Deutsche Bank
- Development of an ISMS concept in compliance with GDPR
- Participation in the development of a global network of approx. 25,000 servers
- Development of a SIEM based on Splunk and HP ArcSight
- Application of patch and update processes in mainframe, Unix, and Linux environments
- Endpoint security management with IBM BigFix and Tanium
- Conducting penetration tests in wireless and cloud networks
- Reorganization of admin rights (AMR4V)
Senior Enterprise Security Architect
- Documentation and implementation of security requirements according to BSI 100 Basic Protection and ISO 27XXX
- Consulting on 3G/5G network security and risk analysis
- Designing a SOC/ISMS and developing a VMware concept (SaaS)
- Using automation tools like Ansible and Terraform
- Creating cryptography solutions for mobile environments and documenting embedded software
Consultant / Trainer
- Developing training concepts for IT security based on BSI Basic Protection and ISO 27001
- Conducting workshops on SOC and SIEM
- Designing defense measures against targeted attacks
- Performing penetration tests and security analyses with Wireshark
- Consulting on securing firewalls and VPN gateways
Consultant / Team Member
- Expanding and securing the GSM-R network and planning the transition to LTE
- Implementing an ISMS under BSI Basic Protection and ITSig
- Building a SOC/SIEM including use-case and playbook frameworks
- Threat analysis according to ISO 27001 and BNA 109
- Risk and change management as well as vendor management
Team Member / Project Manager
- Migrating and expanding the data center and rebuilding the facility
- Connecting to black fiber and system analysis
- Structuring the SOC and expanding the SIEM
- Installing PKI components and working with hardware security modules (SINA, SafeNet)
- Migrating from SSL-SHA1 to SHA-2 and ADS patching
- Risk and residual risk analysis for high-availability networks
Technical Director
Neoi Pte. Ltd.
- Software and hardware development as well as PCB layout
- Developing security concepts for Windows and Unix environments
- Developing modern encryption for military and government sectors
- Developing TV and payment applications for Android and iOS
- Managing an international team of over 100 developers
- Implementing a network security platform with SINA and AVDA
- Securing clouds with PKI-based security
Senior Systems Engineer / Manager
PIC Pte. Ltd.
- Management of 200 technical staff in Hong Kong, China and South America
- Design of new IT security and network solutions
- Design and implementation of IP/VoIP systems for service providers
- IT risk management, analysis and delivery of training
VP IT / Head of Asia Pacific Group
Credit Suisse First Boston
- Global engineering and infrastructure support team leadership
- Analysis of existing networks for security risks
- Development of new risk solutions and migration of systems to Windows
Senior Systems Engineer
- Planning of 5G mobile networks following security standards such as 3GPP
- Installation of terminal server networks for Swiss banking groups
- Experience in packet protocol as a basis for GSM systems
- Development of encrypted mobile devices and satellite phones
SVP
Goldtron Group Singapore Pte. Ltd.
- Head of the Singapore development group and main coordinator of the Hong Kong team
- Design of the MXI platform for combined mobile and VoIP services
- Installation of the first VoIP network in Malaysia
Interim CTO
Lintux Hong Kong Ltd.
- Acquisition of new clients and order coordination with Chinese factories
- Training of technical staff and technology transfer
- Development of IP systems
Senior Consultant
Merrill Lynch International Inc.
- Network migration from Novell to Windows and Transaction Server
- Development of investment applications for stock market monitoring
- Integration of Reuters and Bloomberg live feeds
- Implementation of the first security requirements for banks in the investment area
Contract Engineer
PIC Intl. Hong Kong
- Project implementations in Iraq, Lebanon, Syria and Saudi Arabia
- Installation of complete radio communication networks
- Development of the first encrypted satellite phone
RF Development Engineer
Pathcom Inc.
- Development of CB and UHF radio systems
- Oversight of manufacturing in the USA and Japan
- Development of the first Asia-made radio synthesizer and UHF transceivers
Developer
Taitoma Group
- Design and development of software and hardware for Asian manufacturers
- Implementation of project management methods and strategic leadership
- Development of IT security and risk mitigation solutions
Industry Experience
See where this freelancer has spent most of their professional time.
Experienced in Information Technology, Aerospace and Defense, Banking and Finance, Telecommunication, Transportation, and Professional Services.
Business Area Experience
See which departments and functions this freelancer has contributed to most.
Experienced in Information Technology, Project Management, Product Development, Procurement, Sales, and Audit.
Summary
More than 30 years of experience as a technical IT engineer, project manager and sales analyst—see full CV for details.
For over 15 years I have specialized in digital (cyber) security and bring deep technical and consulting expertise in highly sensitive areas such as VS-NfD, NATO security projects, aviation security (LSÜ2) and government IT security. I am Ü2 certified and have extensive experience with BSI courses and international standards (ISO 27001, NIST, ENISA).
I have designed, proposed, developed and hands-on implemented multiple VSA-compliant security solutions for data processing up to the "SECRET" classification level—in both consulting and technical roles.
Skills
Support Clients In Finding The Right Business And Technology Solutions As A Consultant Designing Cutting-edge Security Architectures.
Expert In Classification Regulations (Vsa), Especially The Four Classification Levels: Vs-nfd, Confidential, Secret, Top Secret.
Core Topics:
- Secure Hardware Development (Layer 2 Network Devices, Mobile Security Solutions)
- Security Architectures Following Vs-nfd Guidelines
- Development And Hardening Of Mobile Platforms (Smartphones, Tablets)
- Vulnerability Analysis And Implementation Of Protections
- More Than 15 Years Of Experience As An Analyst In It, Ot, Etc.
- Ot – Managing Physical Operations
- Iot – Bridging Physical Devices (Ot) To Digital Systems (It)
- Kritis – Critical Infrastructures Including It And Telecom, Finance And Insurance, Energy (Electricity, Gas, Oil, District Heating), Public Sector, Military Environment
- Vsa – Classification Regulations For The Four Classification Levels
Technical Strengths & Technological Expertise – Consulting & Technical Implementation (Selection):
- Many Years Of Experience As A Certified Security Consultant (Bsi 100–200, C5, Vsa Isms, Grc, Bcm, Hiscout Suite)
- Implementing Kritis With An Isms In Risk Management To Ensure The Joint Security Goals Of Availability, Confidentiality And Integrity Of Information And Systems
- Hands-on Project Management And Technical Implementation In Soc, Siem, Soar (Splunk, Ibm Qradar, Exabeam, Thehive, Cortex, Arcsight)
- Use Of Drivelock (Edr, Device & Application Control), Cyberark Epm, Pam, Psm, Beyondtrust, Zscaler, And More
- Consulting On Processing Classified Information Under Vs-nfd Criteria (National & International)
- Architecture And Implementation Of It Security Solutions In Government Environments (Germany, Nato, Eu, Usa, Embassies)
- Kritis – The Critical Infrastructures That Need Special Protection From Cyber Attacks And System Failures To Ensure Stability And Safety Of Society
Iam & Pam Expertise:
- Implementation Of Abac/rbac Solutions In Conjunction With Identity & Access Management (Iam)
- Development Of Secure Access Architectures For Cloud And Devops Environments (E.g. Cyberark Rest Api, Empowerid, Saviynt)
- Planning And Integration Of Pki, Ssl Certificates, Hsm, Ms Ndes, Safenet, And More
Project Experience & Roles (Skill Foci):
- Project Management, Pmo, Agile Coach, Technical Project Manager (Hands-on), Security Consultant
- Development Of Secure Products (Hardware And Software), Including Mobile Border Scanners, Fingerprint Solutions, Sim Card–based Authentication
- Client Focus: Public Sector, Military, Government Agencies, Banks, Insurance, Automotive, Energy And Transport
Industry Know-how & Regulations:
- Finance Sector: Dora, Bait, Vait, Risk And Compliance Management, Incident Response
- Industry & Military: Itscm, Network Security, Vs-nfd, Nato Standards, Bsi Basic Protection
- E-government: E-banking, Secure Digital Identities, Smartcard Authentication
Technology Stack (Selection):
- Security Tools: Splunk, Arcsight, Qradar, Wazuh, Exabeam, Thehive, Cortex, Misp, Nexpose, Zalert
- Penetration Testing: Wireshark, Metasploit, Acunetix, Burp Suite, Aircrack
- Cloud Platforms: Aws, Azure, Strato, Telekom Cloud – Incl. Cloud Security & Migration
- Scripting & Programming: Powershell, Batch, Vbs, Java, C++, Sql, .Net
- Os & Infrastructure: Windows Server (2003–2022), Linux/unix, Rhel/openshift, Oracle
- Protocols & Architecture: Vlan, Ngw, Ddi, Pap Structures, Secure Segmentation
- Blockchain & Quantum Security: Own Platform Developments & Research Since 2020
Soft Skills & Working Style:
- Analytical And Structured Approach
- Strategic Thinking With A Focus On Execution
- Expert-level Technical Understanding
- Team Leadership Up To 80 People, International & Remote
- Excellent Documentation, Training And Presentation Skills
Hardware Competence (25+ Years Experience) – Security Hardware & Biometrics:
- Developed The First Portable Android-based Passport Scanner With Integrated Multi-fingerprint Recognition For Border Control, Police, Bka And Banks
- Developed Patented Biometric Systems Based On Fingerprint Recognition (E.g. Nurugo Technology)
- Integrated Secure Sim And Sd Cards For Passwordless Authentication In Mobile And Stationary Security Applications
Embedded Systems & Cryptography:
- Experience In Designing And Implementing Security-critical Embedded Hardware With Hardware-based Encryption Mechanisms (Aes-256, Diffie-hellman, Quantum Ready)
- Research And Development In Quantum Computing–based Encryption (Since 2020)
Security Components & Interfaces:
- Development And Integration Of Nfc And Smartcard Technology
- High-security Solutions For Transactions (Uaf, Biometric)
- Hardware Security Modules (Hsm) & Key Management Systems (Kms)
- Pap Architectures (Packet Filters, Application Layer Gateway)
Production & Technical Implementation:
- Lead Prototype Development, Production Control And Documentation Of Security-critical Hardware
- Rollout Of Security-certified Devices In Cooperation With Government, Military And Civilian Organizations Worldwide
Software And Technology Competence – Cloud & Infrastructure:
- Planning, Architecture And Migration Of Cloud Environments (Aws, Azure, Strato, Telekom Cloud)
- Building Secure Cloud Platforms With Marketplace Integration For Cloud Services (Xaas, Saas, Iaas)
- Virtualization And Automation Solutions (Vmware Vrealize, Vmware Cloud Foundation, Ansible)
Cybersecurity Solutions:
- Siem/soc/edr: Splunk, Ibm Qradar, Exabeam, Hpe Arcsight, Elk/elastic Siem, Thehive, Cortex, Nexpose, Misp
- Endpoint Security: Fireeye, Sophos, Trendmicro, Drivelock (Device Control, Application Control, Encryption)
- Iam & Pam: Empowerid, Cyberark, Beyondtrust, Saviynt, Psm, Pvwa, Cpm, Abac/rbac Integration, Epm, Pam, Psm
- Pki & Certificate Management: Ms Ndes, Safenet, Ssl/tls, Hsm Integration
Network & Security:
- Network Analysis And Segmentation: Vlan, Ngw, Ddi, Pap Architecture
- Penetration Testing: Metasploit, Burp Suite, Acunetix, Aircrack, Wireshark
- Security Architectures For Classification Levels: Vs-nfd, Vsa, Nato Secret/restricted, Usa/tc Standards
Software Development & Scripting:
- Languages: Java, C++, .Net, Sql, Json
- Scripting: Powershell, Vbs, Batch
- Source Code Analysis, Extensions, Adaptations & Fixes
- Version Control & Devops: Git, Gitlab, Ci/cd Integration
Standards & Regulations:
- Iso/iec 27001, Bsi 200-2, Bsi C5, Nist, Enisa, Gdpr, Dora, Bait, Vait
- Emergency Management According To Bsi 100-4
- Risk Management, Grc, Business Continuity Management (Bcm)
- 5g Security Tools, Palo Alto Networks, Zscaler Zero-trust, Cisco, Fortinet, Proofpoint
Roles & Responsibilities In Projects – Project Leadership & Management:
- Project Manager/pmo For Complex It And Security Projects With Up To 80 Team Members – Local And International (Remote/on-site)
- Responsible For Project Planning, Budget, Schedule, Quality And Risk Control
- Applying Agile Methods (Scrum, Kanban, Safe), Certified In Jira & Atlassian Suite
Consulting & Technical Expertise:
- Enterprise Security Consultant Focusing On High-security Requirements In Government/military And Industrial Environments
- Analysis And Evaluation Of Existing Security Architectures
- Development Of Tailored Security Solutions According To International Standards
- Point Of Contact For Classified Information Processes (Vs-nfd, Nato, Eu, Usa, Embassies)
Security Operations & Incident Response:
- Setup And Operation Of Siem And Soc Environments Including Use Case Development, Playbooks, Escalation Chains
- Consulting And Technical Implementation Of Soar Automation (Splunk, Cortex Etc.)
- Vulnerability Management & Assessment Including Cdc Interface And Incident Documentation
Product Development & Innovation:
- Development Of New Security Products (Hardware & Software) From Concept To Market Launch
- Technical And Commercial Leadership In Pre-sales And Sales Situations
- Supporting Research Teams With Trend Analysis And Market Introductions For Innovative It Security Solutions
Languages
Education
Philipp Reitz Polytechnic
Diploma in Engineering · Frankfurt, Germany
Humanistic Gymnasium Wiesbaden
Wiesbaden, Germany · 1.1
TU Darmstadt
Electrical engineering, electronics, mathematics, physics · Darmstadt, Germany
Certifications & licenses
AISP
BSI 100 / BSI 200 / C5 certification
BSI C5
BSI Basic Protection
CISA
CISM
CISSP
ISO/IEC 27001 & 20001
ISO27001
ITILv3
MCP
Prince2
Ü2 / LSÜ2
Statistics
Experience
Global Experience
Expertise
Qualifications
Profile
Frequently asked questions
Do you have questions? Here you can find further information.
Where is Bernhard based?
What languages does Bernhard speak?
How many years of experience does Bernhard have?
What roles would Bernhard be best suited for?
What is Bernhard's latest experience?
What companies has Bernhard worked for in recent years?
Which industries is Bernhard most experienced in?
Which business areas is Bernhard most experienced in?
Which industries has Bernhard worked in recently?
Which business areas has Bernhard worked in recently?
What is Bernhard's education?
Does Bernhard have any certificates?
What is the availability of Bernhard?
What is the rate of Bernhard?
How to hire Bernhard?
Average rates for similar positions
Rates are based on recent contracts and do not include FRATCH margin.
Similar Freelancers
Discover other experts with similar qualifications and experience
Experts recently working on similar projects
Freelancers with hands-on experience in comparable project as a Senior Security Architect
Nearby freelancers
Professionals working in or nearby Wiesbaden, Germany