Main Page: Difference between revisions
mNo edit summary |
mNo edit summary |
||
Line 33: | Line 33: | ||
*2019 - PMI (Project Management Institute), PMI [https://www.projectmanagement.com/profile/bardoczi Switzerland Chapter] | *2019 - PMI (Project Management Institute), PMI [https://www.projectmanagement.com/profile/bardoczi Switzerland Chapter] | ||
[[File:Cybersecurity Threat Intelligence Intermediate.png|alt=This badge earner has completed the learning activities associated with the Cybersecurity Threat Intelligence course. They have learned about different threat intelligence sources and gained an understanding of data protection risks and explored mobile endpoint protection. They can recognize various scanning technologies, application security vulnerabilities and threat intelligence platforms. They have applied this knowledge in completing labs associated with IBM security products.|center|thumb|[https://www.credly.com/badges/8a0aebe0-8651-41d9-b95c-e38bcea001e1 Cybersecurity Threat Intelligence Intermediate] (IBM)]] | [[File:Cybersecurity Threat Intelligence Intermediate.png|alt=This badge earner has completed the learning activities associated with the Cybersecurity Threat Intelligence course. They have learned about different threat intelligence sources and gained an understanding of data protection risks and explored mobile endpoint protection. They can recognize various scanning technologies, application security vulnerabilities and threat intelligence platforms. They have applied this knowledge in completing labs associated with IBM security products.|center|thumb|[https://www.credly.com/badges/8a0aebe0-8651-41d9-b95c-e38bcea001e1 Cybersecurity Threat Intelligence Intermediate] (IBM)]] | ||
[[File:IBM Guardium Security | [[File:IBM Guardium Security.png|alt=This badge earner has completed the learning activities associated with the Cybersecurity Threat Intelligence course. They have learned about different threat intelligence sources and gained an understanding of data protection risks and explored mobile endpoint protection. They can recognize various scanning technologies, application security vulnerabilities and threat intelligence platforms. They have applied this knowledge in completing labs associated with IBM security products.|border|center|thumb|[https://www.credly.com/badges/e4262087-5f3f-4212-9bd2-120137bcd2ed IBM Guardium Security Intermediate]]] | ||
[[File:Challenging Forensic Science - How Science Should Speak to Court (University of Lausanne | [[File:Challenging Forensic Science - How Science Should Speak to Court (University of Lausanne).jpg|alt=The aim of this course is to promote critical thinking with regard to forensic science. Today, in general, most people are dazzled by the technical possibilities offered by forensic science. They somewhat live in the illusion that forensic evidence is fool proof and brings factual findings with 100% certainty. This course – given by specialists in the field – goes beyond the conventional image that is promoted through TV series such as CSI. It alerts (without alarming) the public on the limits of the techniques in order to promote a sound administration of forensic science in the criminal justice system. It allows participants to understand the importance of probabilistic reasoning in forensic science, because uncertainty is a constitutive part of forensic science. The course is constructed as a series of causes célèbres that could or have led to miscarriages of justice. Some of these cases have been part of case reviews carried out at the School of Criminal Justice of the University of Lausanne.|border|center|thumb|[https://www.coursera.org/verify/JU6KR6EPHYVN Challenging Forensic Science - How Science Should Speak to Court] (University of Lausanne) GA: 87.21%]] | ||
[[File:IBM Growth Behaviors.png|link=link=https://bardoczi.net/wiki/File:IBM_Growth_Behaviors.png|alt=This badge earner understands and practices behaviors that foster a culture of growth, innovation, inclusion, and feedback. The IBM Growth Behaviors are Growth Minded, Trusted, Team Focused, Courageous, Resourceful and Outcome Focused.|center|thumb|[https://www.credly.com/badges/d0e8bf79-65a2-45ba-a6c8-299482283065 IBM Growth Behaviors]]] | [[File:IBM Growth Behaviors.png|link=link=https://bardoczi.net/wiki/File:IBM_Growth_Behaviors.png|alt=This badge earner understands and practices behaviors that foster a culture of growth, innovation, inclusion, and feedback. The IBM Growth Behaviors are Growth Minded, Trusted, Team Focused, Courageous, Resourceful and Outcome Focused.|center|thumb|[https://www.credly.com/badges/d0e8bf79-65a2-45ba-a6c8-299482283065 IBM Growth Behaviors]]] | ||
[[File:Cybersecurity IT Fundamentals Specialization (IBM).jpg|link=link=https://bardoczi.net/wiki/File:Cybersecurity_IT_Fundamentals_Specialization_(IBM).jpg|alt=There are a growing number of exciting, well-paying jobs in today’s security industry that do not require a traditional college degree. Forbes estimates that there will be as many as 3.5 million unfilled positions in the industry worldwide by 2021! One position with a severe shortage of skills is as a junior cybersecurity analyst. Throughout this specialization, you will learn concepts around cybersecurity tools and processes, system administration, operating system and database vulnerabilities, types of cyber attacks and basics of networking. You will also gain knowledge around important topics such as cryptography and digital forensics. The instructors are architects , Security Operation Center (SOC) analysts, and distinguished engineers who work with cybersecurity in their day to day lives at IBM with a worldwide perspective. They will share their skills which they need to secure IBM and its clients security systems.|center|thumb|[https://www.credly.com/badges/f88f2160-6ccb-4ec1-ac8e-f37c0152c6de Cybersecurity IT Fundamentals Specialization] (IBM)]] | [[File:Cybersecurity IT Fundamentals Specialization (IBM).jpg|link=link=https://bardoczi.net/wiki/File:Cybersecurity_IT_Fundamentals_Specialization_(IBM).jpg|alt=There are a growing number of exciting, well-paying jobs in today’s security industry that do not require a traditional college degree. Forbes estimates that there will be as many as 3.5 million unfilled positions in the industry worldwide by 2021! One position with a severe shortage of skills is as a junior cybersecurity analyst. Throughout this specialization, you will learn concepts around cybersecurity tools and processes, system administration, operating system and database vulnerabilities, types of cyber attacks and basics of networking. You will also gain knowledge around important topics such as cryptography and digital forensics. The instructors are architects , Security Operation Center (SOC) analysts, and distinguished engineers who work with cybersecurity in their day to day lives at IBM with a worldwide perspective. They will share their skills which they need to secure IBM and its clients security systems.|center|thumb|[https://www.credly.com/badges/f88f2160-6ccb-4ec1-ac8e-f37c0152c6de Cybersecurity IT Fundamentals Specialization] (IBM)]] |
Revision as of 13:19, 21 July 2022
Ákos Bardóczi detailed resumé
Main skills - download CV in PDF format
- notable experience (mostly of these in top 5% according the LinkedIN skill assessment tests): Python, bash shell programming, C++, Word, PowerPoint, Access, Excel, Wordpress CMS
- IBM Cybersecurity Analyst Assessment (IBM/Coursera)cover full scope of open-source intelligence (EXPERT)
- Challenging Forensic Science: How Science Should Speak to Court (University of Lausanne/Coursera)
- Google Workplace Security (Google/Coursera)
- Cybersecurity Threat Intelligence (IBM)
- IBM Resilient SOAR (IBM)
- IBM Security Guardium (IBM)
- Jira (ADVANCED), Confluence (ADVANCED), Microsoft Office 365 Enterprise solutions (ADVANCED)
- MS Windows Server versions (INTERMEDIATE), KALI (INTERMEDIATE)
- EU law basics, the legal protection of intellectual property
- cutting edge practices and tools of secure documenting, professional writing, publishing and reporting, research && development supporting (ADVANCED)
- Credly profile here, Coursera profile here, notable exam certs. credentials with verifications links
Public professional experience and volunteering
- 2008. Sept - Self-employed contractor, in keywords: open-source intelligence, user behavior analysis, lecturing, consulting, pro bono (IT emergency cases)
- 2008. Sept - University of Debrecen – intranet and CMS developer (LAMP architecture)
- 2016. May - ISACA Budapest Chapter – professional writer (especially enterprise level IT governance practices, 27K and COBIT5 standards)
- 2018. Apr - NetAcademia LLC – professional writer (Netacademia Elemzés), lecturer (open-source intelligence, advanced search techniques, email services maintaining, IT security hardening, EDNS)
- 2021. May - 2022. May - IBM - Cyber Threat Defense Analyst
Education, professional membership
- 2005-(2010) – University of Debrecen, Faculty of Science and Technology, molecular biologist, summa sine diploma.
- 2010 – ResearchGate Computer Security and IT Forensics workgroup, founder
- 2014 - IEEE (Institute of Electrical and Electronics Engineers) - associate member
- 2015 - ACM (Association for Computing Machinery) - professional member
- 2016 - IEEE Young Professionals - member
- 2017 - IEEE Consultants Network - member
- 2019 - PMI (Project Management Institute), PMI Hungarian Chapter
- 2019 - PMI (Project Management Institute), PMI Switzerland Chapter
Recommendations
"Working with Ákos is one of the most enlightening and eye opening experience I have ever had. His broad spectrum of knowledge and work ethics is unique. I would recommend him as a colleague or a contractor to anyone working in IT Sec any day." (DevOps professional)
"Ákos worked with my team as an external advisor for about a month and helped us to develop custom techniques suitable for our special needs. He is a highly skilled professional and a great advisor too who has a deep, practical knowledge in various fields of IT security and cybersecurity thanks to his enthusiasm for learning new things day-by-day. His approach to different kinds of problems is often unique compared to others so he can be a valuable member of any business community. He also has the ability to give down to earth advices while his ideas are still fit to the wider theoretical / conceptual framework of the project. I would definitely recommend him. " (PhD candidate)
"Bevallom, első körben nem könnyű felvenni Ákos gondolatmenetének ritmusát. A-ról beszél, de közben már D-n agyal, időbe telik, mire számomra is kikristályosodnak az ötletei, akkor viszont hatalmasat ütnek. Olyan aspektusokból képes vizsgálni sokszor triviálisnak tűnő dolgokat, melyre kevesen gondolnánk, ezáltal mindig tud valami újat, formabontót javasolni. Szívesen dolgoztam és fogok is vele dolgozni a jövőben, ha az OSINT nagymesterét keresed, ne habozz, ő a te embered!" (online marketing expert)
"Gratula: a cikket value proposition szempontból egyedülállónak tartom a magyar piacon: egyrészt szépen kidolgozott alkotás, másrészt merész szakmaisággal támasztja alá a kijelentéseit. Ez multi környezetnen nem szokás, csak a frázisok mennek manapság. Jó volt végigolvasni." (reader, Business Developement Manager)
"Ex rendőrként (10+ év nyomozói tapasztalattal) adnék dupla likeot erre" (reader, Six Sigma),
"Ritkán olvasni ilyen érdekes és tartalmas szakmai írást magyarul. Gratula érte" (reader, Brand and Business Development Manager)
Other public works, articles and presentations in the past few years
2017 - Rediscover hidden facebook semantic search engine, reimagine open-source
intelligence (lightning talk @ Hacktivity 2017) Github: http://bit.ly/facebook_graph_search
- 2014 – univ. course „Internet, társadalom, digitális kultúra” (University of Debrecen)
- 2013 - Hacktivity 2013 - Data mining in the age of social web
- 2012 - Guberálnak [interview in Hungarian, HVG, 2012. September, (http://bit.ly/bardoczi_hvg) you can find the grabbed version here (http://bit.ly/bardoczi_hvg_interju) ]
- 2006 - Kavicsok [„Bolyai-books”], co-author, Gének, bitek, közgondolkodás [p. 157-190] (http://bit.ly/bolyai_tanulmanykotet )
Language proficiency
- native Hungarian
- English (C1)
Jump to the related wiki article [1]
More about my professional presence in Hungarian online (partial)
- Egy gigantikus adatszivárgás tanulságai - Bitport.hu, 2016.05.30. [2]
- Mennyi? 62 ezer. Mi 62 ezer? - Bitport.hu, 2016.04.06. [3]
- Adatbányászat a közösségi web korában - Antivirus Blog, 2013. 10. 15. [4]
Public educational and research activity (this section is under construction)
- OSINT training space for my trainees: http://osint.atlassian.net/
- Harvard Dataverse - https://dataverse.harvard.edu/dataverse/bardoczi
- ResearcherID/ORCID: https://orcid.org/0000-0003-4239-2308
- Google Scholar - https://scholar.google.nl/citations?hl=en&pli=1&user=VMA6YtUAAAAJ
Recently passed advanced level exam certifications (PMI/NASBA/IIBA) on LinkedIN - with unique cred. identifiers
IT, IT security && development
- Data Science of Economics, Banking, and Finance, with Barton Poulson (AQfnHBrikHZheJivguWe0xOYfZYA)
- Data-Driven Network Security Essentials (AZmGMiEAa-76sM-t5Alvb6Z5lcoW)
- Design Thinking: Data Intelligence (AVz42mWP04sKoxHFGUiH80-gWouP)
- IT Security Foundations: Network Security (Afs4pJfoT-kMD3iE1MHPrf-XekPm)
- IT Security Foundations: Operating System Security (AQgX_h1Uj-WDdTgRvMy5VKK280k1)
- Data-Driven Network Security Essentials (AZYE9VFT6crGSu_HFFdBRdafdT5y)
- Linux: System Information and Directory Structure Tools (AdlET7yH933bU5b7mI2mG3GUP-6x)
- Planning a Microsoft Cloud Solution (ASOGXW1qkH9-q3pfgU2PdP4Vu7fw)
- SharePoint Advanced: Enhancing Functionality with JavaScript (AcbL742BBtpIfMrnY0stNu6NU4AV)
- SharePoint Advanced: Working with PowerPivot (AV857ZHpBUMCnrpOKPjRz1HX70Io)
- Social Media Marketing with Facebook and Twitter (AWPATerZz-j3dSVDU8eq6VmRESAA)
- Symmetric Cryptography Essential Training (ASKC6G5XSlpg3GfobeyonROC3QwV)
- Writing a Business Report (AaxUcDf5k8XsGE2uoeDrSYiQCPaw)
Economics && management sciences
- Advanced Branding (AYuOtQfOjqESIW55lcdzwRDlAjaU)
- Advanced Business Development: Communication and Negotiation (ARk7P85WZ5Aw52oGhll4ZfGL0-SG)
- Business Analysis: Business Benefits Realization (AUhff3ELcphdNnZxqfDGHG_R0ccu)
- Business Analyst and Project Manager Collaboration (AR9xWafLbmoZKgaeco-9Hq-vOiq)
- Business Analytics: Forecasting with Seasonal Baseline Smoothing (AV_WBIpU1PCKG0a01OwG3OzAhE1)
- Business Intelligence for Consultants (AVUosKH5lEKbE9oadqENvxgdxT09)
- CMO Foundations: Creating a Marketing Culture (ASsP5ng6tTsEOKAE-fhz7RfkxBxN)
- Creating a Culture of Service (AVUHerchA3L-w7rLCJ7JLuYgSVi1)
- Crisis Communication (ARrPUyTK-keNibWAi0esd2zprdCD)
- Finance Foundations: Risk Management (AVMJWgfPJIRl-IBnyV-Pb0frWabI)
- Leading Projects (AUVUCUqtZCZxfDkRMd5R4a5X76Ee)
- Project Management: Solving Common Project Problems (Af3FSkp_4Bmyxy55Lve0m9vh7mwW)
- Sales Coaching (Ab_tJazVWi2qYoRmjrBV7IBPvB8l)
Remarks
During my university years and later I gained a higher level of knowledge and experience in the IT, CS, economic sciences, especially management. I would also like to mentor
newcomers and graduates from economics or IT fields. I can help experienced professionals as well in many cases.
§ All clients, contractors and companies must have integrity and follow the standard ethical rules. I take it very seriously!
Contact details
Tel.: +36 70 505 5200 (HU) / +36 1 999 0444 / +41 76 701 5200 (CH) / +49 151 6466 4588 (DE) / Fax.: +36 1 9997 993
FYI: I should previously save your ID to my contacts, some services may filter the messages from senders who have never contacted before, recommended to ping me before. You can send your name/nick and ID anytime with whis link.
Telegram (preferred)
Signal sgnl://message/[12026706006]
WIRE @bardoczi
Email: akos@cerp.ch, akos.bardoczi.ch@ieee.org