C


As a proactive cybersecurity specialist, I am dedicated to protecting businesses from the ever-evolving threats of the digital world. With a lifelong passion for learning, I am always up-to-date on the latest developments in threat detection and mitigation. I take pride in my ability to assist with every stage of cybersecurity management, from preventive measures to disaster mitigation and recovery. I am adept at working with Linux and Microsoft systems, as well as managing cloud environments and integrating and managing SIEM and BAS products. My familiarity with a variety of security standards, frameworks, and regulations allows me to provide comprehensive and effective solutions to complex security challenges. I am skilled in reporting and documentation, system and security product integrations, and creating use cases and correlation rules. I am committed to building strong relationships with customers through proactive maintenance visits, product trainings, and product consulting. Above all, I value the importance of security awareness and take pride in helping others understand the critical role that cybersecurity plays in protecting businesses and individuals alike. .
- Linux System Management
- Microsoft System Management
- Cloud Management
- SIEM Product Integration and Management
- BAS Product Integration and Management
- Firewall Policy and Securty Blade Management
- Endpoint Security Management
- Familiar with Standards, Frameworks and regulations such as Mitre ATT&CK, COBIT, NIST, ISO, CIS, SOX, PCI-DSS, KVKK, 5651, ISO 27001/2
- Experience with SDLC environment, OWASP & Mitre ATT&CK security framework
- Reporting and Documentation
- System and Security Product Integrations
- Customer SIEM systems maintenance visits
- Customer BAS systems maintenance visits
- Customer Firewall Policy and Securty Blade Management
- Use Case Implementation and Correlation Rule Creation
- Machine Learning Techniques Analysis and Implementation
- Log Management of Log Sources
- Product Trainings
- Product Consulting
- Security Awareness
-L2, L3 Switching Vlan configuring(tagging,trunk,802.1Q sim. ,vlan routing)
-Wireless Network Technologies 2.4g ve 5g channel analysis and configuring. Knowledge WLAN security. WLAN Network Configuring. Knowledge WLC and basic WLAN configuring.
- Performing physical assembly and disassembly of server/storage/appliance/FW and similar data center infrastructure equipment - Knowledge of network architectures and components (LAN, WAN, VPN, DHCP, DNS, TCP/IP, Switch, Router etc.)
- Knowledge of Linux and Windows Operating system
- Taking necessary actions for fault detection and resolution in Metro ethernet, XDSL, G.SHDSL, FTTH and VPN access services (Remote Desktop Connection, GPON Modem Installation)
-Datacenter, interfering with the problems of the systems and devices required for the service (KVM, Console Connection, Reboot etc.), physical cabling and patching
- Monitoring the monitoring infrastructure (Generators, Air Conditioning, UPS) in data centers 24/7, managing the existing energy and physical space
- Analysis, tracking and reporting of system and network performance monitoring applications data (Monitoring: Carti, Solarwinds, Prtg, Apm, Daloradius).
Attention to detail
undefinedB
C
JavaScript
CSS
HTML
React
Python