Main Page: Difference between revisions

From Ákos Bardóczi
Jump to navigation Jump to search
mNo edit summary
mNo edit summary
Line 8: Line 8:


== Public and notable professional experience ==
== Public and notable professional experience ==
*2021 May – 2022 Apr (full-time) – IBM DSS (Hungary) – Cyber Threat Defense Analyst – I worked as a SOC analyst[1] , , and after working hours, I frequently used the most valuable elearning materials to learn more about IBM and non-IBM security fundamentals and solutions and how possible to link these with each other. 2022. May – I continued learning, deep dived into Cyber Threat Intelligence and Threat Hunting from the most valuable sources, online and print.
*'''2021 May – 2022 Apr''' (full-time) – '''IBM DSS (Hungary) – Cyber Threat Defense Analyst''' – I worked as a [https://w3.ibm.com/w3publisher/akos SOC analyst] , , and after working hours, I frequently used the most valuable elearning materials to learn more about IBM and non-IBM security fundamentals and solutions and how possible to link these with each other. 2022. May – I continued learning, deep dived into Cyber Threat Intelligence and Threat Hunting from the most valuable sources, online and print.
*2018 May – 2019 Jan (contactor) – NetAcademia LLC (Hungary) – content creator, professional writer (Netacademia Elemzés) [2] , senior lecturer[3] (opensource intelligence, advanced search techniques, email services maintaining, IT security hardening fundamentals)
*'''2018 May – 2019 Jan''' (contactor) – '''NetAcademia LLC (Hungary)''' – content creator, professional writer ([https://web.archive.org/web/20190308021452/https:/elemzes.netacademia.hu/ Netacademia Elemzés]) , [https://web.archive.org/web/20181026092442/https:/www.netacademia.hu/kapcsolat/ senior lecturer] (opensource intelligence, advanced search techniques, email services maintaining, IT security hardening fundamentals)
*2016 May - 2018 Apr (contractor) – ISACA Budapest Chapter – professional writer (especially enterprise level IT governance practices), writing articles and summaries to Information Systems Audit and Control Association, these topics needed a deep understanding of privacy and cybersecurity standards, such as ISO27K, etc. [4] [5] [6] [7]
*'''2016 May - 2018 Apr''' (contractor) – '''ISACA Budapest Chapter''' – professional writer (especially enterprise level IT governance practices), writing articles and summaries to Information Systems Audit and Control Association, these topics needed a deep understanding of privacy and cybersecurity standards, such as ISO27K, etc.  
*2008 Sep – 2013 May (part-time) University of Debrecen – Intranet and CMS developer (LAMP). Complete refactoring of the Department of Human Genetics intranet and site, migration from a former system without data loss. TYPO3 CMS hardening. (Debian, Apache, MySQL, PHP) [8]
*'''2008 Sep – 2013 May''' (part-time) '''University of Debrecen''' [http://www.genetics.dote.hu/bardoczi/ Intranet and CMS developer] (LAMP). Complete refactoring of the Department of Human Genetics intranet and site, migration from a former system without data loss. TYPO3 CMS hardening. (Debian, Apache, MySQL, PHP)  
*2010 Sep – 2011 Sep (two European financial institutions, remote) - CMS and solution integrator. My primary role was to connect/integrate the TYPO3 to legacy systems and administrative sub-projects.
*2'''010 Sep – 2011 Sep''' (two European financial institutions, remote) - CMS and solution integrator. My primary role was to connect/integrate the TYPO3 to legacy systems and administrative sub-projects.
== Educational background ==
== Educational background ==
*2005-(2010) – University of Debrecen, Faculty of Science and Technology[9] , molecular biologist, summa sine diploma.
*'''2005-(2010)''' – University of Debrecen, Faculty of Science and Technology, molecular biologist, summa sine diploma.
*2021 - Eötvös Loránd University, Faculty of Law, Juris Doctor [10] (I've customized learning schedule!
*'''2021''' - Eötvös Loránd University, Faculty of Law, [http://akosbardoczi.web.elte.hu/ Juris Doctor] - I've customized learning schedule!
*notable experience (mostly of these '''in top 5%''' according the [https://www.linkedin.com/in/bardoczi/details/skills/ '''LinkedIN skill assessment tests''']): Python, bash shell programming, C++, Word, PowerPoint, Access, Excel, Wordpress CMS
 
*IBM Cybersecurity Analyst Assessment ('''[https://www.coursera.org/verify/4ANACY56R7UH IBM/Coursera]''')cover full scope of open-source intelligence <small>(EXPERT)</small>
== Knowledge area, related skills - with at least intermediate level exam ==
*Challenging Forensic Science: How Science Should Speak to Court ([https://www.coursera.org/verify/JU6KR6EPHYVN '''University of Lausanne/Coursera'''])
*Python, bash shell programming, Word, PowerPoint, Access, Excel, Wordpress CMS, linux ([https://www.linkedin.com/in/bardoczi/details/skills/ in the top 5% based on LinkedIN skill assessments])
*Google Workplace Security ([https://www.coursera.org/verify/K89LM5SK95AV '''Google/Coursera'''])
*cover full scope of open-source intelligence and fact-checking
*Cybersecurity Threat Intelligence '''([https://www.credly.com/badges/8a0aebe0-8651-41d9-b95c-e38bcea001e1 IBM]''')
*solid knowledge of TCP/IP and related protocols and services
*IBM Resilient SOAR '''([https://www.credly.com/badges/13fed8a2-03ac-4675-a6b9-8b7d353d15f3 IBM]''')
*[https://www.coursera.org/verify/4ANACY56R7UH IBM Cybersecurity Analyst Assessment] (IBM, COURSERA VERIFIED)
*IBM Security Guardium ([https://www.credly.com/badges/e4262087-5f3f-4212-9bd2-120137bcd2ed '''IBM'''])
*[https://codered.eccouncil.org/certificate/59ee9834-d6aa-4f2c-832d-05d8ea8c2e6d Real-Time Threat Detection with Elastic Stack] (EC Council)
*EC Council CODERED - [https://codered.eccouncil.org/certificate/59ee9834-d6aa-4f2c-832d-05d8ea8c2e6d '''Real-time Threat Detection with Elastic Stack''']  
*[https://www.credly.com/badges/8a0aebe0-8651-41d9-b95c-e38bcea001e1 IBM Cybersecurity Threat Intelligence] (IBM)
*EC Council CODERED - [https://codered.eccouncil.org/certificate/5d9c1c9b-0fa8-43d3-934a-496370a9d616 '''Practical Cyber Threat Intelligence''']
*[https://www.coursera.org/account/accomplishments/specialization/WZ72VP46UN8X Splunk Search Expert Specialization] (Splunk)
*EC Council CODERED - [https://codered.eccouncil.org/certificate/b8361e5e-4d36-435f-b2f2-94cc1dc2f028 '''OSINT for Hackers and Penetration Testers''']
*[https://www.udemy.com/certificate/UC-07fa8bb6-ed37-44d5-8b7b-b980d8b46b3e/ Reverse Engineering & Malware Analysis] - Intermediate Level (Udemy)
*[https://www.udemy.com/certificate/UC-07fa8bb6-ed37-44d5-8b7b-b980d8b46b3e/ '''Reverse Engineering & Malware Analysis''' - Intermediate Level] (Udemy)
*[https://www.coursera.org/account/accomplishments/specialization/YMZJ8HYJYVW8 Python for Cybersecurity Specialization] (Infosec Inst.)
*[https://codered.eccouncil.org/certificate/8000a0ce-6c7b-466d-b5de-6cec854afcbc Blue Team Boot Camp: Defending Against Hackers] (EC Council)
*[https://www.coursera.org/account/accomplishments/verify/X4K3UYW5655K Palo Alto Network Security Operations Fundamentals] (PA Cybersecurity Academy)
*[https://www.credly.com/badges/e4262087-5f3f-4212-9bd2-120137bcd2ed IBM Guardium Security] (IBM)
*[https://codered.eccouncil.org/certificate/b8361e5e-4d36-435f-b2f2-94cc1dc2f028 OSINT for Hackers and Penetration Testers] (EC Council)
*[https://codered.eccouncil.org/certificate/5d9c1c9b-0fa8-43d3-934a-496370a9d616 Practical Cyber Treat Intelligence] (EC Council)
*[https://codered.eccouncil.org/certificate/e8e78853-b070-41a8-9b62-c574aa3ad650 Advanced Open-Source Intelligence and Privacy] (EC Council)
*[https://www.coursera.org/verify/K89LM5SK95AV Google Workplace Security] (GOOGLE, COURSERA VERIFIED)
*[https://codered.eccouncil.org/certificate/49c5a00a-bedf-41bb-95ab-5338dd3a859a Network Automation with Python] (EC Council)
 
== Supplemental courses ==
*[https://www.coursera.org/verify/JU6KR6EPHYVN Challenging Forensic Science: How Science Should Speak to Court] (University of Lausanne/Coursera)
*[https://www.credly.com/badges/13fed8a2-03ac-4675-a6b9-8b7d353d15f3 IBM Resilient SOAR] (IBM)
*Jira (ADVANCED), Confluence (ADVANCED), Microsoft Office 365 Enterprise solutions <small>(ADVANCED)</small>
*Jira (ADVANCED), Confluence (ADVANCED), Microsoft Office 365 Enterprise solutions <small>(ADVANCED)</small>
*MS Windows Server versions <small>(INTERMEDIATE)</small>, KALI <small>(INTERMEDIATE)</small>
*MS Windows Server versions <small>(INTERMEDIATE)</small>, KALI <small>(INTERMEDIATE)</small>
Line 32: Line 44:
*cutting edge practices and tools of secure documenting, professional writing, publishing and reporting, research && development supporting <small>(ADVANCED)</small>
*cutting edge practices and tools of secure documenting, professional writing, publishing and reporting, research && development supporting <small>(ADVANCED)</small>
*[https://www.credly.com/users/bardoczi/badges <big>'''Credly'''</big> profile here], [https://www.coursera.org/user/87ed0397c74d694a1bc881ed25411fdc <big>'''Coursera'''</big> profile here], notable exam certs. credentials with verifications links
*[https://www.credly.com/users/bardoczi/badges <big>'''Credly'''</big> profile here], [https://www.coursera.org/user/87ed0397c74d694a1bc881ed25411fdc <big>'''Coursera'''</big> profile here], notable exam certs. credentials with verifications links
*
== Knowledge area, related skills - with at least intermediate level exam ==
*Python, bash shell programming, Word, PowerPoint, Access, Excel, Wordpress CMS (in the top 5% based on LinkedIN skill assessments) [11]
*cover full scope of open-source intelligence and fact-checking
*solid knowledge of TCP/IP and related protocols and services
*IBM Cybersecurity Analyst Assessment (IBM, COURSERA VERIFIED)
*Real-Time Threat Detection with Elastic Stack (EC Council)
*IBM Cybersecurity Threat Intelligence (IBM)
*Splunk Search Expert Specialization (Splunk)
*Reverse Engineering & Malware Analysis - Intermediate Level (Udemy)
*Python for Cybersecurity Specialization (Infosec Inst.)
*Blue Team Boot Camp: Defending Against Hackers (EC Council)
*Palo Alto Network Security Operations Fundamentals (PA Cybersecurity Academy)
*IBM Guardium Security (IBM)
*OSINT for Hackers and Penetration Testers (EC Council)
*Practical Cyber Treat Intelligence (EC Council)
*Advanced Open-Source Intelligence and Privacy (EC Council)
*Google Workplace Security (GOOGLE, COURSERA VERIFIED)
*Network Automation with Python (EC Council)
==Recommendations ==
==Recommendations ==
[[File:Bardóczi Ákos, Info A, Sept 2021.jpg|link=link=https://bardoczi.net/wiki/File:%C3%81kos_bard%C3%B3czi.jpg|left|thumb|Bardóczi Ákos, Budapest, Sept 2021]]
[[File:Bardóczi Ákos, Info A, Sept 2021.jpg|link=link=https://bardoczi.net/wiki/File:%C3%81kos_bard%C3%B3czi.jpg|left|thumb|Bardóczi Ákos, Budapest, Sept 2021]]
Line 71: Line 62:
[[File:Security Privacy by Design.png|alt=Security & Privacy by Design (SPbD) at IBM is a simplified and agile set of focused security and privacy practices including threat models, privacy assessments, security testing and vulnerability management. Badge earners will learn the foundations of SPbD@IBM including key concepts, methodology and tools.|thumb|[https://www.credly.com/badges/4a60bfb6-1038-4fcc-b4d2-80fd444a268e Security and Privacy by Design] (IBM)]]
[[File:Security Privacy by Design.png|alt=Security & Privacy by Design (SPbD) at IBM is a simplified and agile set of focused security and privacy practices including threat models, privacy assessments, security testing and vulnerability management. Badge earners will learn the foundations of SPbD@IBM including key concepts, methodology and tools.|thumb|[https://www.credly.com/badges/4a60bfb6-1038-4fcc-b4d2-80fd444a268e Security and Privacy by Design] (IBM)]]
[[File:IBM-DevSecOps-Explorer-Security and Automation for DevOps.png|alt=The badge earner will understand the integration of security into every phase of the DevOps software lifecycle. The course touches on continuous integration (CI), continuous delivery (CD), security testing, and how to build automated security checks and tasks into the development workflow, CI/CD pipeline, and production operations. It also discusses web application security and the importance of culture, collaboration and automation using available security tools.|thumb|[https://www.credly.com/badges/448011d3-850f-4d3a-8ec5-b59bf1a5da0e IBM DevSecOps Explorer - Security & Automation for DevOps]]]
[[File:IBM-DevSecOps-Explorer-Security and Automation for DevOps.png|alt=The badge earner will understand the integration of security into every phase of the DevOps software lifecycle. The course touches on continuous integration (CI), continuous delivery (CD), security testing, and how to build automated security checks and tasks into the development workflow, CI/CD pipeline, and production operations. It also discusses web application security and the importance of culture, collaboration and automation using available security tools.|thumb|[https://www.credly.com/badges/448011d3-850f-4d3a-8ec5-b59bf1a5da0e IBM DevSecOps Explorer - Security & Automation for DevOps]]]


== Language proficiency ==
== Language proficiency ==
Line 77: Line 69:


== Concise publication list reference, citations ==
== Concise publication list reference, citations ==
*Old Methods in The Cyberspace? (CYBER-HUMINT, OSINT, SOCMINT, Social Engineering), Dobák Imre, Tóth Tamás, University of Public Service, Department of Civil National Security, 2019, Belügyi Szemle, 2021/2. DOI: 10.38146/BSZ.2021.2.2
*[http://real.mtak.hu/121325/1/Dobak-TothBelugyiSzemle2021.evi2.szam195-212.pdf Old Methods in The Cyberspace? (CYBER-HUMINT, OSINT, SOCMINT, Social Engineering)], Dobák Imre, Tóth Tamás, '''University of Public Service, Department of Civil National Security''', 2019, Belügyi Szemle, 2021/2. DOI: [https://10.0.149.2/BSZ.2021.2.2 10.38146/BSZ.2021.2.2]
*Most cited publications in Hungarian  
*Most cited publications in Hungarian  
*minor citations - Mennyi? 62 ezer. Mi 62 ezer? (Bitport, 2016.04.06.) [14] , Egy gigantikus adatszivárgás tanulságai (Bitport, 2016.05.30.) [15]
*minor citations - [https://bitport.hu/mennyi-62-ezer-mi-62-ezer Mennyi? 62 ezer. Mi 62 ezer?] (Bitport, 2016.04.06.)[https://bitport.hu/trendek/egy-gigantikus-adatszivargas-tanulsagai-google-apps-drive-slack Egy gigantikus adatszivárgás tanulságai] (Bitport, 2016.05.30.) [15]
*2017 - Rediscover hidden facebook semantic search engine, reimagine open-source intelligence - (lightning talk @ Hacktivity 2017) Github: http://bit.ly/facebook_graph_search
*2017 - Rediscover hidden facebook semantic search engine, reimagine open-source intelligence - (lightning talk @ Hacktivity 2017) Github: http://bit.ly/facebook_graph_search
*2014 – univ. course „Internet, társadalom, digitális kultúra” (University of Debrecen)
*2014 – univ. course „Internet, társadalom, digitális kultúra” (University of Debrecen)

Revision as of 21:13, 16 November 2022


Ákos Bardóczi detailed resumé

Hacktivity, Security Theater, Oct 2013
Hacktivity, Security Theater, Oct 2013.

How can I download the concise CV in PDF format?

My recommendation: click HERE to download the recent, digitally signed, timestamped version.

Public and notable professional experience

  • 2021 May – 2022 Apr (full-time) – IBM DSS (Hungary) – Cyber Threat Defense Analyst – I worked as a SOC analyst , , and after working hours, I frequently used the most valuable elearning materials to learn more about IBM and non-IBM security fundamentals and solutions and how possible to link these with each other. 2022. May – I continued learning, deep dived into Cyber Threat Intelligence and Threat Hunting from the most valuable sources, online and print.
  • 2018 May – 2019 Jan (contactor) – NetAcademia LLC (Hungary) – content creator, professional writer (Netacademia Elemzés) , senior lecturer (opensource intelligence, advanced search techniques, email services maintaining, IT security hardening fundamentals)
  • 2016 May - 2018 Apr (contractor) – ISACA Budapest Chapter – professional writer (especially enterprise level IT governance practices), writing articles and summaries to Information Systems Audit and Control Association, these topics needed a deep understanding of privacy and cybersecurity standards, such as ISO27K, etc.
  • 2008 Sep – 2013 May (part-time) University of DebrecenIntranet and CMS developer (LAMP). Complete refactoring of the Department of Human Genetics intranet and site, migration from a former system without data loss. TYPO3 CMS hardening. (Debian, Apache, MySQL, PHP)
  • 2010 Sep – 2011 Sep (two European financial institutions, remote) - CMS and solution integrator. My primary role was to connect/integrate the TYPO3 to legacy systems and administrative sub-projects.

Educational background

  • 2005-(2010) – University of Debrecen, Faculty of Science and Technology, molecular biologist, summa sine diploma.
  • 2021 - Eötvös Loránd University, Faculty of Law, Juris Doctor - I've customized learning schedule!

Knowledge area, related skills - with at least intermediate level exam

Supplemental courses

Recommendations

Bardóczi Ákos, Budapest, Sept 2021
  • "Working with Ákos is one of the most enlightening and eye opening experience I have ever had. His broad spectrum of knowledge and work ethics is unique. I would recommend him as a colleague or a contractor to anyone working in IT Sec any day." (DevOps professional)
  • "Ákos worked with my team as an external advisor for about a month and helped us to develop custom techniques suitable for our special needs. He is a highly skilled professional and a great advisor too who has a deep, practical knowledge in various fields of IT security and cybersecurity thanks to his enthusiasm for learning new things day-by-day. His approach to different kinds of problems is often unique compared to others so he can be a valuable member of any business community. He also has the ability to give down to earth advices while his ideas are still fit to the wider theoretical / conceptual framework of the project. I would definitely recommend him. " (PhD candidate)
  • As a new member of our security team YOU play an important role in the team’s life, you show dedication, growth, progress. Thank you for your efforts and excellent mentality in these fields. With you on board the Budapest Security Delivery Center are stronger and more successful.(former IBM manager)
  • "Bevallom, első körben nem könnyű felvenni Ákos gondolatmenetének ritmusát. A-ról beszél, de közben már D-n agyal, időbe telik, mire számomra is kikristályosodnak az ötletei, akkor viszont hatalmasat ütnek. Olyan aspektusokból képes vizsgálni sokszor triviálisnak tűnő dolgokat, melyre kevesen gondolnánk, ezáltal mindig tud valami újat, formabontót javasolni. Szívesen dolgoztam és fogok is vele dolgozni a jövőben, ha az OSINT nagymesterét keresed, ne habozz, ő a te embered!" (online marketing expert)
  • "Gratula: a cikket value proposition szempontból egyedülállónak tartom a magyar piacon: egyrészt szépen kidolgozott alkotás, másrészt merész szakmaisággal támasztja alá a kijelentéseit. Ez multi környezetnen nem szokás, csak a frázisok mennek manapság. Jó volt végigolvasni. Ritkán olvasni ilyen érdekes és tartalmas szakmai írást magyarul. Gratula érte"" (reader, Business Developement Manager)
  • "Ex rendőrként (10+ év nyomozói tapasztalattal) adnék dupla likeot erre" (reader, Six Sigma)


Language proficiency

  • native Hungarian
  • English (C1)

Concise publication list reference, citations

Memberships, volunteering

  • 2010 – ResearchGate Computer Security and IT Forensics workgroup, founder
  • 2014 - IEEE (Institute of Electrical and Electronics Engineers) - associate member
  • 2015 - ACM (Association for Computing Machinery) - professional member
  • 2016 - IEEE Young Professionals - member
  • 2017 - IEEE Consultants Network - member
  • 2019 - PMI (Project Management Institute), PMI Hungarian Chapter
  • 2019 - PMI (Project Management Institute), PMI Switzerland Chapter
C++ learning path offered by LinkedIN
Master C++ (LinkedIN)
By nature, cyber conflicts are an international issue that span across nation-state borders. By the end of the course, you will be able to apply the knowledge gained for analysis and management of international cyber incidents and conflicts including for activities such as development of policy related to cybercrime and cyberwarfare. Management of cyber incidents and conflicts requires an interdisciplinary perspective including an understanding of: 1) characteristics of the cyber threats and conflicts themselves, 2) international efforts to reduce and improve cyber security, and 3) psychological and sociopolitical factors. The course is designed to reach an international audience and will encourage discussion on relevant current events among participants to enrich the experience with various personal and cultural perspectives on cutting-edge issues. In addition, assignments and other assessments will supplement video lectures and selected readings to ensure application of the material. After taking this course you will be able to: • Identify different types of actors involved in cyber threats (individuals, organizations & nation-states) • Distinguish between different types of threats and issues in cyber security including, data theft, political espionage, critical infrastructure protection, and propaganda • Detail the basic characteristics of the Internet infrastructure and international efforts to address Internet governance • List several international efforts to address cyber crime and espionage • Evaluate how principals that govern international conflicts might be applied in context of cyber security • Apply different psychological theories of human motivation and cooperation and communication and political theories in analysis of different international issues related to cyber security including censorship, media operations and role of social technologies.
International Cyber Conflicts (The State University of New York) GA 82%
This course will help you manage project risk effectively by identifying, analyzing, and communicating inevitable changes to project scope and objectives. You will understand and practice the elements needed to measure and report on project scope, schedule, and cost performance. You will be equipped with the tools to manage change in the least disruptive way possible for your team and other project stakeholders. Upon completing this course, you will be able to: 1. Define components of a communications management plan 2. Understand the importance of communications channels 3. Define the key elements needed to measure and report on project scope, schedule, and cost performance 4. Identify project risk events 5. Prioritize identified risks 6. Develop responses for a high priority risk 7. Identify and analyze changes to project scope 8. Describe causes and effects of project changes 9. Define the purpose of conducting a lessons learned session
Managing Project Risks and Changes (University of California) GA: 89.20%
In this course, you will learn what the main financial markets and their characteristics are as well as how they are linked to the economy. Our very diversified team of experts will start by teaching you how the price of stocks and bonds are computed and why they move while you will become increasingly aware of the notion of risk and why it matters when measuring an investment's performance. The focus will then move to less popular markets such as gold, emerging markets, real estate, hedge funds and private markets. These will be analyzed with an emphasis on their particular risks and return opportunities as well as how they can help in building efficient portfolios. Finally, the policies of central banks and their impact on financial markets will be presented to you along with the link between the economy and the price of financial assets. All along these different steps, experts from UBS, our corporate partner, will show you how the concepts you just acquired are effectively applied in a leading global bank. This focus on practicality means you will not only understand what is going on in global financial markets but also start to figure out how you can use them to achieve financial goals, be it a client's or your own.
Understanding Financial Markets (University of Geneva) GA: 85.97%

Public educational and research activity (this section is under construction)

Remarks

During my university years and later I gained a higher level of knowledge and experience in the IT, CS, economic sciences, especially management. I would also like to mentor

newcomers and graduates from economics or IT fields. I can help experienced professionals as well in many cases.

§ All clients, contractors and companies must have integrity and follow the standard ethical rules. I take it very seriously!

Public contact details

  • +36 70 505 5200 (HU) / +36 1 999 0444 (HU)
  • +1 202 470-0790 (US)
  • +41 76 701 5200 (CH)
  • +49 151 6466 4588 (DE)
  • +39 366 311-1200 (IT)
  • +32 497 25-75-65 (BE)
  • Fax: +36 1 9997-993

Note: I should previously save your ID to my contacts, some services may filter the messages from senders who have never contacted before, recommended to ping me before. You can send your name/nick and ID anytime with whis link.