Main Page: Difference between revisions

From Ákos Bardóczi
Jump to navigation Jump to search
m (relevant content added to Main skills section)
mNo edit summary
 
(20 intermediate revisions by the same user not shown)
Line 4: Line 4:
[[File:Hacktivity, Security Theater, Oct 2013.jpg|link=link=https://bardoczi.net/wiki/File:Bard%C3%B3czi_%C3%81kos.jpg|alt=Hacktivity, Security Theater, Oct 2013|thumb|Hacktivity, Security Theater, Oct 2013.]]
[[File:Hacktivity, Security Theater, Oct 2013.jpg|link=link=https://bardoczi.net/wiki/File:Bard%C3%B3czi_%C3%81kos.jpg|alt=Hacktivity, Security Theater, Oct 2013|thumb|Hacktivity, Security Theater, Oct 2013.]]


==Main skills - [https://bardoczi.net/genetics/akos_bardoczi_cv_eng.pdf download CV in PDF format]==
==<big>'''How can I download the concise CV in PDF format?'''</big> ==
*notable experience (mostly of these '''in top 5%''' according the [https://www.linkedin.com/in/bardoczi/details/skills/ '''LinkedIN skill assessment tests''']): Python, bash shell programming, C++, Word, PowerPoint, Access, Excel, Wordpress CMS
My recommendation: [https://bardoczi.net/genetics/akos_bardoczi_cv_eng.pdf '''click HERE to download'''] the recent, digitally signed, timestamped version. 
*IBM Cybersecurity Analyst Assessment ([https://www.coursera.org/verify/verify/4ANACY56R7UH '''IBM/Coursera'''])cover full scope of open-source intelligence <small>(EXPERT)</small>
 
*Challenging Forensic Science: How Science Should Speak to Court ([https://www.coursera.org/verify/JU6KR6EPHYVN '''University of Lausanne/Coursera'''])
== Public and notable professional experience ==
*Google Workplace Security ([https://www.coursera.org/verify/K89LM5SK95AV '''Google/Coursera'''])
*'''2021 May – 2022 Apr''' (full-time) – '''IBM DSS (Hungary) – Cyber Threat Defense Analyst''' – I worked as a [https://w3.ibm.com/w3publisher/akos SOC analyst] , , and after working hours, I frequently used the most valuable elearning materials to learn more about IBM and non-IBM security fundamentals and solutions and how possible to link these with each other. 2022. May – I continued learning, deep dived into Cyber Threat Intelligence and Threat Hunting from the most valuable sources, online and print.
*Cybersecurity Threat Intelligence '''([https://www.credly.com/badges/8a0aebe0-8651-41d9-b95c-e38bcea001e1 IBM]''')
*'''2018 May – 2019 Jan''' (contactor) – '''NetAcademia LLC (Hungary)''' – content creator, '''professional writer''' ([https://web.archive.org/web/20190308021452/https:/elemzes.netacademia.hu/ Netacademia Elemzés]) , [https://web.archive.org/web/20181026092442/https:/www.netacademia.hu/kapcsolat/ '''senior lecturer'''] (opensource intelligence, advanced search techniques, email services maintaining, IT security hardening fundamentals)
*IBM Resilient SOAR '''([https://www.credly.com/badges/13fed8a2-03ac-4675-a6b9-8b7d353d15f3 IBM]''')
*'''2016 May - 2018 Apr''' (contractor) '''ISACA Budapest Chapter''' – professional writer (especially enterprise level IT governance practices), writing articles and summaries to Information Systems Audit and Control Association, these topics needed a deep understanding of privacy and cybersecurity standards, such as ISO27K, etc.
*IBM Security Guardium ([https://www.credly.com/badges/e4262087-5f3f-4212-9bd2-120137bcd2ed '''IBM'''])
*'''2008 Sep – 2013 May''' (part-time) '''University of Debrecen''' – [http://www.genetics.dote.hu/bardoczi/ '''Intranet and CMS developer'''] (LAMP). Complete refactoring of the Department of Human Genetics intranet and site, migration from a former system without data loss. TYPO3 CMS hardening. (Debian, Apache, MySQL, PHP)
*EC Council CODERED - [https://codered.eccouncil.org/certificate/59ee9834-d6aa-4f2c-832d-05d8ea8c2e6d '''Real-time Threat Detection with Elastic Stack''']  
*2'''010 Sep – 2011 Sep''' (two European financial institutions, remote) - '''CMS and solution integrator'''. My primary role was to connect/integrate the TYPO3 to legacy systems and administrative sub-projects.
*EC Council CODERED - [https://codered.eccouncil.org/certificate/5d9c1c9b-0fa8-43d3-934a-496370a9d616 '''Practical Cyber Threat Intelligence''']
== Educational background ==
*EC Council CODERED - [https://codered.eccouncil.org/certificate/b8361e5e-4d36-435f-b2f2-94cc1dc2f028 '''OSINT for Hackers and Penetration Testers''']
*'''2005-(2010)''' – University of Debrecen, Faculty of Science and Technology, molecular biologist, summa sine diploma.
*[https://www.udemy.com/certificate/UC-07fa8bb6-ed37-44d5-8b7b-b980d8b46b3e/ '''Reverse Engineering & Malware Analysis''' - Intermediate Level] (Udemy)
*'''2021''' - Eötvös Loránd University, Faculty of Law, [http://akosbardoczi.web.elte.hu/ Juris Doctor]  - I've customized learning schedule!
*Jira (ADVANCED), Confluence (ADVANCED), Microsoft Office 365 Enterprise solutions <small>(ADVANCED)</small>
 
*MS Windows Server versions <small>(INTERMEDIATE)</small>, KALI <small>(INTERMEDIATE)</small>
== Passed exams, qualification, and certifications - at least intermediate/advanced/expert level ==
*EU law basics, the legal protection of intellectual property
 
*cutting edge practices and tools of secure documenting, professional writing, publishing and reporting, research && development supporting <small>(ADVANCED)</small>
===== Partially categorized by skills, and knowledge areas =====
*[https://www.credly.com/users/bardoczi/badges <big>'''Credly'''</big> profile here], [https://www.coursera.org/user/87ed0397c74d694a1bc881ed25411fdc <big>'''Coursera'''</big> profile here], notable exam certs. credentials with verifications links
 
==Public professional experience and volunteering==
===== ''#Python programming'' ''#Management, and #Economics'' ''#Audit'' ''#Law'' =====
*2008. Sept - Self-employed contractor, in keywords: open-source intelligence, user behavior analysis, lecturing, consulting, pro bono (IT emergency cases)
 
*2008. Sept - University of Debrecen – intranet and CMS developer (LAMP architecture)
[https://codered.eccouncil.org/certificate/f1c74da8-c8f1-40e8-90e8-37ada700617d '''Mastering Digital Forensics (LPATH)''']  - [https://codered.eccouncil.org/ EC-Council CODERED]
*2016. May - ISACA Budapest Chapter – professional writer (especially enterprise level IT governance practices, 27K and COBIT5 standards)
 
*2018. Apr - NetAcademia LLC – professional writer ([https://web.archive.org/web/20190308021452/https:/elemzes.netacademia.hu/ Netacademia Elemzés]), lecturer (open-source intelligence, advanced search techniques, email services maintaining, IT security hardening, EDNS)
[https://codered.eccouncil.org/certificate/ec19430d-6246-4191-beae-1a96268a0e70 '''Conducting Reconnaissance for Cybersecurity (LPATH)'''] - [https://codered.eccouncil.org/ EC-Council CODERED]  
*2021. May - 2022. May - IBM - Cyber Threat Defense Analyst
 
== Education, professional membership==
'''[https://codered.eccouncil.org/certificate/70e55e8d-b903-4a6f-8fb7-abdeae8c0dd6 Dark Web Cyber Deception Demystified]''' - [https://codered.eccouncil.org/ EC-Council CODERED]
*2005-(2010) – University of Debrecen, Faculty of Science and Technology, [http://www.genetics.dote.hu/bardoczi/ molecular biologist], summa sine diploma.
 
*2010 – ResearchGate Computer Security and IT Forensics workgroup, founder
[https://codered.eccouncil.org/certificate/84080adc-afbb-4782-968c-4d4ef83ff325 '''Mastering Database Reconnaissance and Exploitation'''] - [https://codered.eccouncil.org/ EC-Council CODERED]
*2014 - IEEE (Institute of Electrical and Electronics Engineers) - associate member
 
*2015 - ACM (Association for Computing Machinery) - [http://member.acm.org/~bardoczi professional member]
[https://codered.eccouncil.org/certificate/bd3adc8e-9d02-43a4-a272-e097142f86aa '''Master Open Source Intelligence (LPATH)'''] (l () -[https://codered.eccouncil.org/ EC-Council CODERED]
*2016 - IEEE Young Professionals - member
 
*2017 - IEEE Consultants Network - member
[https://codered.eccouncil.org/certificate/0ae1c00d-8393-41ca-90ac-4035f1bb4436 '''Mastering Threat Intelligence (LPATH)'''] - [https://codered.eccouncil.org/ EC-Council CODERED]  
*2019 - PMI (Project Management Institute), PMI Hungarian Chapter
 
*2019 - PMI (Project Management Institute), PMI [https://www.projectmanagement.com/profile/bardoczi Switzerland Chapter]
[https://codered.eccouncil.org/certificate/d5b5b741-f33f-4f76-80dc-9ca45164036e '''Microsoft Cybersecurity Pro Track: Threat Detection'''] - [https://codered.eccouncil.org/ EC-Council CODERED] 
[[File:Cybersecurity Threat Intelligence Intermediate.png|alt=This badge earner has completed the learning activities associated with the Cybersecurity Threat Intelligence course. They have learned about different threat intelligence sources and gained an understanding of data protection risks and explored mobile endpoint protection. They can recognize various scanning technologies, application security vulnerabilities and threat intelligence platforms. They have applied this knowledge in completing labs associated with IBM security products.|center|thumb|[https://www.credly.com/badges/8a0aebe0-8651-41d9-b95c-e38bcea001e1 Cybersecurity Threat Intelligence Intermediate] (IBM)]]
 
[[File:IBM Guardium Security.png|alt=This badge earner has completed the learning activities associated with the Cybersecurity Threat Intelligence course. They have learned about different threat intelligence sources and gained an understanding of data protection risks and explored mobile endpoint protection. They can recognize various scanning technologies, application security vulnerabilities and threat intelligence platforms. They have applied this knowledge in completing labs associated with IBM security products.|border|center|thumb|[https://www.credly.com/badges/e4262087-5f3f-4212-9bd2-120137bcd2ed IBM Guardium Security Intermediate]]]
[https://www.linkedin.com/posts/bardoczi_basel-institute-of-governance-open-source-activity-6985739847789359104-8UmS?utm_source=share&utm_medium=member_desktop '''Open-source Intelligence (forensic approach)'''] - [https://baselgovernance.org/ Basel Institute on Governance]
[[File:Challenging Forensic Science - How Science Should Speak to Court (University of Lausanne).jpg|alt=The aim of this course is to promote critical thinking with regard to forensic science. Today, in general, most people are dazzled by the technical possibilities offered by forensic science. They somewhat live in the illusion that forensic evidence is fool proof and brings factual findings with 100% certainty. This course – given by specialists in the field – goes beyond the conventional image that is promoted through TV series such as CSI. It alerts (without alarming) the public on the limits of the techniques in order to promote a sound administration of forensic science in the criminal justice system. It allows participants to understand the importance of probabilistic reasoning in forensic science, because uncertainty is a constitutive part of forensic science. The course is constructed as a series of causes célèbres that could or have led to miscarriages of justice. Some of these cases have been part of case reviews carried out at the School of Criminal Justice of the University of Lausanne.|border|center|thumb|[https://www.coursera.org/verify/JU6KR6EPHYVN Challenging Forensic Science - How Science Should Speak to Court] (University of Lausanne) GA: 87.21%]]
 
[[File:IBM Growth Behaviors.png|alt=This badge earner understands and practices behaviors that foster a culture of growth, innovation, inclusion, and feedback. The IBM Growth Behaviors are Growth Minded, Trusted, Team Focused, Courageous, Resourceful and Outcome Focused.|border|center|thumb|[https://www.credly.com/badges/d0e8bf79-65a2-45ba-a6c8-299482283065 IBM Growth Behaviors]]]
[https://codered.eccouncil.org/certificate/b8361e5e-4d36-435f-b2f2-94cc1dc2f028 '''OSINT for Hackers and Penetration Testers'''] - [https://codered.eccouncil.org/ EC-Council CODERED]
[[File:Cybersecurity IT Fundamentals Specialization (IBM).jpg|alt=There are a growing number of exciting, well-paying jobs in today’s security industry that do not require a traditional college degree. Forbes estimates that there will be as many as 3.5 million unfilled positions in the industry worldwide by 2021! One position with a severe shortage of skills is as a junior cybersecurity analyst.   Throughout this specialization, you will learn concepts around cybersecurity tools and processes, system administration,  operating system and database vulnerabilities, types of cyber attacks and basics of networking. You will also gain knowledge around important topics such as cryptography and digital forensics.   The instructors are architects , Security Operation Center (SOC) analysts, and distinguished engineers who work with cybersecurity in their day to day lives at IBM with a worldwide perspective.  They will share their skills which they need to secure IBM and its clients security systems.|border|center|thumb|[https://www.credly.com/badges/f88f2160-6ccb-4ec1-ac8e-f37c0152c6de Cybersecurity IT Fundamentals Specialization] (IBM)]]
 
[[File:Master C++ learning path.jpg|alt=C++ learning path offered by LinkedIN|border|center|thumb|[https://www.linkedin.com/posts/bardoczi_master-c-activity-6785331237922910209-BU1D Master C++] (LinkedIN)]]
[https://codered.eccouncil.org/certificate/94051de2-4741-41c9-a274-a1f1f01f8bee '''Data Mining for Fraud Detection'''] - [https://codered.eccouncil.org/ EC-Council CODERED]
[[File:International Cyber Conflicts (SUNY).png|alt=By nature, cyber conflicts are an international issue that span across nation-state borders. By the end of the course, you will be able to apply the knowledge gained for analysis and management of international cyber incidents and conflicts including for activities such as development of policy related to cybercrime and cyberwarfare. Management of cyber incidents and conflicts requires an interdisciplinary perspective including an understanding of: 1) characteristics of the cyber threats and conflicts themselves, 2) international efforts to reduce and improve cyber security, and 3) psychological and sociopolitical factors.   The course is designed to reach an international audience and will encourage discussion on relevant current events among participants to enrich the experience with various personal and cultural perspectives on cutting-edge issues. In addition, assignments and other assessments will supplement video lectures and selected readings to ensure application of the material.   After taking this course you will be able to:  • Identify different types of actors involved in cyber threats (individuals, organizations & nation-states) • Distinguish between different types of threats and issues in cyber security including, data theft, political espionage, critical infrastructure protection, and propaganda • Detail the basic characteristics of the Internet infrastructure and international efforts to address Internet governance • List several international efforts to address cyber crime and espionage • Evaluate how principals that govern international conflicts might be applied in context of cyber security • Apply different psychological theories of human motivation and cooperation and communication and political theories in analysis of different international issues related to cyber security including censorship, media operations and role of social technologies.|border|center|thumb|[https://www.coursera.org/verify/T8C7RFKTFUC8 International Cyber Conflicts] (The State University of New York) GA 82%]]
 
[[File:Cybersecurity Analyst Assessment (IBM).jpg|alt=A growing number of exciting, well-paying jobs in today’s security industry do not require a college degree. This is the final course required to assess your acquired  knowledge and skills from from the previous two specializations, IT Fundamentals of Cybersecurity and Security Analyst Fundamentals, to become job-ready for a cybersecurity analyst role.  You will be expected to pass a final assessment quiz for each of the seven (7) prior courses within the IBM Cybersecurity Analyst Professional Certificate.  Upon successful completion of the quizzes, you will acquire the IBM Cybersecurity Analyst Professional Certificate.|border|center|thumb|[https://www.coursera.org/account/accomplishments/verify/4ANACY56R7UH Cybersecurity Analyst Assessment] (IBM) GA: 82.85%]]
[https://courses.thecyberinst.org/certificates/s9jfnzm7ul '''Maltego CaseFile in Action''']  - [https://courses.thecyberinst.org/ CyberInst.]
[[File:Managing Project Risks and Changes (University of California).jpg|alt=This course will help you manage project risk effectively by identifying, analyzing, and communicating inevitable changes to project scope and objectives. You will understand and practice the elements needed to measure and report on project scope, schedule, and cost performance. You will be equipped with the tools to manage change in the least disruptive way possible for your team and other project stakeholders.  Upon completing this course, you will be able to: 1.       Define components of a communications management plan 2.       Understand the importance of communications channels 3.       Define the key elements needed to measure and report on project scope, schedule, and cost performance 4.       Identify project risk events 5.      Prioritize identified risks 6.      Develop responses for a high priority risk 7.      Identify and analyze changes to project scope 8.      Describe causes and effects of project changes 9.      Define the purpose of conducting a lessons learned session|border|center|thumb|[https://www.coursera.org/verify/X7CG3NJQWF6Y Managing Project Risks and Changes] (University of California) GA: 89.20%]]
 
[[File:Understanding Financial Markets (University of Geneva).jpg|alt=In this course, you will learn what the main financial markets and their characteristics are as well as how they are linked to the economy.   Our very diversified team of experts will start by teaching you how the price of stocks and bonds are computed and why they move while you will become increasingly aware of the notion of risk and why it matters when measuring an investment's performance. The focus will then move to less popular markets such as gold, emerging markets, real estate, hedge funds and private markets. These will be analyzed with an emphasis on their particular risks and return opportunities as well as how they can help in building efficient portfolios. Finally, the policies of central banks and their impact on financial markets will be presented to you along with the link between the economy and the price of financial assets.  All along these different steps, experts from UBS, our corporate partner, will show you how the concepts you just acquired are effectively applied in a leading global bank. This focus on practicality means you will not only understand what is going on in global financial markets but also start to figure out how you can use them to achieve financial goals, be it a client's or your own.|border|center|thumb|[https://www.coursera.org/verify/MFJGGKLKLF6Z Understanding Financial Markets] (University of Geneva) GA: 85.97%]]
[https://codered.eccouncil.org/certificate/5cac0b85-c5d8-4b31-87a4-20f32480d427 '''Computer Forensics Best Practices'''] - [https://codered.eccouncil.org/ EC-Council CODERED]
*
 
[https://codered.eccouncil.org/certificate/59ee9834-d6aa-4f2c-832d-05d8ea8c2e6d '''Real-time Threat Detection with Elastic Stack'''] - [https://codered.eccouncil.org/ EC-Council CODERED]
 
[https://www.credly.com/badges/9387a93d-59ca-4087-a7c9-1871a084520c '''IBM Agile Explorer'''] - [https://yourlearning.ibm.com/activity/PLAN-77FDEB8BD679 IBM Internal]  
 
[https://www.credly.com/badges/6ace6a84-dabb-4a5b-9890-419b8f12e5f5 '''IBM Machine Learning Specialist - Associate'''] - [https://learn.ibm.com/ IBM Learn]
 
[https://www.linkedin.com/posts/bardoczi_basel-institute-on-governance-terrorist-financing-activity-7079466892813287424-3YfF?utm_source=share&utm_medium=member_desktop '''Terrorist Financing (counter terrorism)''']  - [https://baselgovernance.org/ Basel Institute on Governance] ([https://baselgovernance.org/asset-recovery ICAR])
 
[https://www.linkedin.com/posts/bardoczi_operational-analysis-of-suspicious-transaction-activity-7079401484542484480-_GhP?utm_source=share&utm_medium=member_desktop '''Operational Analysis of Suspicious Transaction Reports (anti-fraud in financial institutions)'''] - [https://baselgovernance.org/ Basel Institute on Governance] (ICAR)
 
[https://www.udemy.com/course/pci-payment-card-standards-for-corporate-professionals/ '''PCI (Payment Card) Standards for Corporate Professionals'''] - [https://www.udemy.com/user/illumeo/ Illumeo Learning]  
 
[https://codered.eccouncil.org/certificate/14ca480b-5c2a-4811-91c9-41c884b1df3d '''Cybersecurity for FinTech'''] - [https://codered.eccouncil.org/ EC-Council CODERED]
 
[https://codered.eccouncil.org/certificate/6b2601c2-ec1a-454b-b46e-b2513691aada '''Build Security Incident Response for GDPR Data Protection'''] - [https://codered.eccouncil.org/ EC-Council CODERED]
 
[https://codered.eccouncil.org/certificate/e8e78853-b070-41a8-9b62-c574aa3ad650 '''Advanced Open Source Intelligence and Privacy'''] - [https://codered.eccouncil.org/ EC-Council CODERED]  
 
[https://www.coursera.org/account/accomplishments/verify/REUZ5WFNWLNQ '''Information Systems Auditing, Controls and Assurance (ISACA based material, Grade Achieved: 92.50%)'''] - [https://www.coursera.org/hkust The Hong Kong University of Science and Technology]
 
 
[https://www.coursera.org/account/accomplishments/verify/JU6KR6EPHYVN '''Challenging Forensic Science: How Science Should Speak to Court'''] - [https://www.coursera.org/unil University of Lausanne] -
 
[https://www.coursera.org/account/accomplishments/verify/T8C7RFKTFUC8 '''International Cyber Conflicts'''] - [https://www.coursera.org/suny The State University of New York]
 
[https://www.coursera.org/account/accomplishments/verify/RPBRE5CZW5FT '''Introduction to Cybersecurity Tools & Cyber Attacks'''] - [https://www.coursera.org/ibm-skills-network IBM] 
 
[https://www.credly.com/badges/238184f2-52fd-416c-8c64-f1b16ea3d201 '''IBM Enterprise Resiliency'''] - [https://learn.ibm.com/ IBM Learn]
 
'''[https://www.coursera.org/account/accomplishments/verify/MFJGGKLKLF6Z Understanding Financial Markets]''' - [https://www.coursera.org/unige University of Geneva]
 
[https://www.coursera.org/account/accomplishments/verify/X7CG3NJQWF6Y '''Managing Project Risks and Changes'''] - [https://www.coursera.org/uci University of California, Irvine] - 
 
[https://www.coursera.org/account/accomplishments/verify/EW3FJT92T76B '''Genomics for Law'''] - [https://www.coursera.org/illinois University of Illinois at Urbana-Champaign] - 
 
[https://www.coursera.org/account/accomplishments/verify/D23MJAPSC9EF '''AI & Law''']- [https://www.coursera.org/lunduniversity Lund University]
 
[https://codered.eccouncil.org/certificate/8ddf310e-e60b-4681-90f7-29a5ae560435 '''Black Hat Python: Python For Pentesters'''] - [https://codered.eccouncil.org/ EC-Council CODERED]
 
[https://codered.eccouncil.org/certificate/49c5a00a-bedf-41bb-95ab-5338dd3a859a '''Network Automation with Python'''] - [https://codered.eccouncil.org/ EC-Council CODERED]
 
[https://www.credly.com/badges/e43f9b5c-bd2a-45f8-ba20-622ef14bab2c '''IBM Data Science Foundations - Level 2 (V2)'''] - [https://cognitiveclass.ai/ CognitiveClass.AI]
 
[https://www.credly.com/badges/eb32a094-706d-45cf-9fd0-d77d6ca95f34 '''IBM Data Science Tools'''] -  [https://cognitiveclass.ai/ CognitiveClass.AI]
 
[https://www.coursera.org/account/accomplishments/specialization/YMZJ8HYJYVW8 '''Python for Cybersecurity Speciazation'''] - [https://www.coursera.org/infosecinstitute Infosec Institute]
 
 
 
'''Mastering Web and Infrastructure Reconnaissanc'''e - [https://codered.eccouncil.org/ EC-Council CODERED]
 
[https://www.credly.com/earner/earned/badge/51a9f351-86c5-44ad-aa09-18788d6717cc '''Google Cybersecurity Certificate'''] - [https://www.coursera.org/instructor/google-career-certificates Google Carreer Certificates]
 
[https://www.credly.com/badges/8af51a25-7f8f-4f6c-829d-65296bf0bd45/ '''Certified Cybersecurity Candidate'''] - [https://www.isc2.org/ (ISC)2]
 
[https://codered.eccouncil.org/certificate/8000a0ce-6c7b-466d-b5de-6cec854afcbc '''Blue Team Boot Camp: Defending Against Hackers'''] - [https://codered.eccouncil.org/ EC-Council CODERED]
 
[https://codered.eccouncil.org/certificate/1f867daa-23ef-4af6-b4d3-a59bae7e2816 '''Power of Next Generation Firewalls'''] - [https://codered.eccouncil.org/ EC-Council CODERED]
 
[https://www.udemy.com/certificate/UC-07fa8bb6-ed37-44d5-8b7b-b980d8b46b3e/ '''Reverse Engineering & Malware Analysis - Intermediate''']  - Udemy
 
[https://www.coursera.org/account/accomplishments/verify/X4K3UYW5655K '''Palo Alto Networks Security Operations Fundamentals'''] - [https://www.coursera.org/palo-alto-networks Palo Alto Netorks] 
 
[https://www.credly.com/badges/13fed8a2-03ac-4675-a6b9-8b7d353d15f3 '''IBM Resilient SOAR Foundations'''] - [https://www.securitylearningacademy.com/ IBM Security Learning Academy]
 
[https://www.coursera.org/account/accomplishments/specialization/WZ72VP46UN8X '''Splunk Search Expert Specialization'''] - [https://www.coursera.org/splunk Splunk]
 
[https://www.udemy.com/certificate/UC-e46ec0d1-14bf-4bba-b048-745e44ebde1a/ '''English for IT Professionals'''] - Udemy
 
[https://www.credly.com/badges/d0e8bf79-65a2-45ba-a6c8-299482283065 '''IBM Growth Behaviors'''] - [https://yourlearning.ibm.com/activity/PLAN-2A67F1F6AE59 IBM Internal]
 
[https://www.credly.com/badges/e4262087-5f3f-4212-9bd2-120137bcd2ed '''IBM Guardium Foundations'''] -  [https://www.ibm.com/training/course/8G101G IBM Training]
 
[https://www.credly.com/badges/8a0aebe0-8651-41d9-b95c-e38bcea001e1 '''IBM Cybersecurity Threat Intelligence'''] - [https://yourlearning.ibm.com/activity/ITS-8H150G IBM Internal]
 
[https://www.credly.com/badges/d6c62a22-4776-4d41-9454-e239f2b9a79b '''Big Data Foundations - Level 2'''] - [https://cognitiveclass.ai/ CognitiveClass.AI]
 
[https://www.credly.com/badges/f88f2160-6ccb-4ec1-ac8e-f37c0152c6de '''IBM Cybersecurity IT Fundamentals Specialization'''] - [https://www.coursera.org/instructor/skillsnetwork Skills Network (IBM)]
 
[https://www.coursera.org/account/accomplishments/verify/K89LM5SK95AV '''Google Workspace Security'''] - [https://www.coursera.org/googlecloud Google Cloud Training]
 
 
[https://www.coursera.org/account/accomplishments/verify/4ANACY56R7UH '''IBM Cybersecurity Analyst Assessment'''] -  [https://www.coursera.org/ibm-skills-network IBM]
 
 
'''Python, bash shell programming''', Word, PowerPoint, Access, Excel, Wordpress CMS, '''linux ([https://www.linkedin.com/in/bardoczi/details/skills/ in the top 5% based on LinkedIN skill assessments]''')
 
[https://www.credly.com/users/bardoczi/badges <big>'''Credly'''</big> profile here], [https://www.coursera.org/user/87ed0397c74d694a1bc881ed25411fdc <big>'''Coursera'''</big> profile here], notable exam certs. credentials with verifications links
==Recommendations ==
==Recommendations ==
[[File:Bardóczi Ákos, Info A, Sept 2021.jpg|link=link=https://bardoczi.net/wiki/File:%C3%81kos_bard%C3%B3czi.jpg|left|thumb|Bardóczi Ákos, Budapest, Sept 2021]]
[[File:Bardóczi Ákos, Info A, Sept 2021.jpg|link=link=https://bardoczi.net/wiki/File:%C3%81kos_bard%C3%B3czi.jpg|left|thumb|Bardóczi Ákos, Budapest, Sept 2021]]
"''Working with Ákos is one of the most enlightening and eye opening experience I have ever had. His broad spectrum of knowledge and work ethics is unique. I would recommend him as a colleague or a contractor to anyone working in IT Sec any day.''" (DevOps professional)


"''Ákos worked with my team as an external advisor for about a month and helped us to develop custom techniques suitable for our special needs. He is a highly skilled professional and a great advisor too who has a deep, practical knowledge in various fields of IT security and cybersecurity thanks to his enthusiasm for learning new things day-by-day. His approach to different kinds of problems is often unique compared to others so he can be a valuable member of any business community. He also has the ability to give down to earth advices while his ideas are still fit to the wider theoretical / conceptual framework of the project. I would definitely recommend him.'' " (PhD candidate)
* "''Working with Ákos is one of the most enlightening and eye opening experience I have ever had. His broad spectrum of knowledge and work ethics is unique. I would recommend him as a colleague or a contractor to anyone working in IT Sec any day.''" '''(DevOps professional)'''


"''Bevallom, első körben nem könnyű felvenni Ákos gondolatmenetének ritmusát. A-ról beszél, de közben már D-n agyal, időbe telik, mire számomra is kikristályosodnak az ötletei, akkor viszont hatalmasat ütnek. Olyan aspektusokból képes vizsgálni sokszor triviálisnak tűnő dolgokat, melyre kevesen gondolnánk, ezáltal mindig tud valami újat, formabontót javasolni. Szívesen dolgoztam és fogok is vele dolgozni a jövőben, ha az OSINT nagymesterét keresed, ne habozz, ő a te embered!''" (online marketing expert)
* "''Ákos worked with my team as an external advisor for about a month and helped us to develop custom techniques suitable for our special needs. He is a highly skilled professional and a great advisor too who has a deep, practical knowledge in various fields of IT security and cybersecurity thanks to his enthusiasm for learning new things day-by-day. His approach to different kinds of problems is often unique compared to others so he can be a valuable member of any business community. He also has the ability to give down to earth advices while his ideas are still fit to the wider theoretical / conceptual framework of the project. I would definitely recommend him.'' " '''(PhD candidate)'''
[[File:Introduction to Enterprise Resiliency (IBM).jpg|alt=Resiliency is the ability to provide the required capability in the face of adversity, without significant impact. This is not something that just happens, but rather must be thoroughly planned for and tested. This badge earner has acquired knowledge around keeping hardware, the operating system, middleware, and applications up and running throughout planned and unplanned outages. The earner has also gained an understanding about recovering a site from an unplanned event without data loss.|border|thumb|[https://www.credly.com/badges/238184f2-52fd-416c-8c64-f1b16ea3d201 Introduction to Enterprise Resiliency] (IBM) GA: 82.50%]]
* “''As a new member of our security team YOU play an important role in the team’s life, you show dedication, growth, progress. Thank you for your efforts and excellent mentality in these fields. With you on board the Budapest Security Delivery Center are stronger and more successful.''” '''(former IBM manager)'''
"''Gratula: a cikket value proposition szempontból egyedülállónak tartom a magyar piacon: egyrészt szépen kidolgozott alkotás, másrészt merész szakmaisággal támasztja alá a kijelentéseit. Ez multi környezetnen nem szokás, csak a frázisok mennek manapság. Jó volt végigolvasni.''" (reader, Business Developement Manager)


"''Ex rendőrként (10+ év nyomozói tapasztalattal) adnék dupla likeot erre''" (reader, Six Sigma),
* "''Bevallom, első körben nem könnyű felvenni Ákos gondolatmenetének ritmusát. A-ról beszél, de közben már D-n agyal, időbe telik, mire számomra is kikristályosodnak az ötletei, akkor viszont hatalmasat ütnek. Olyan aspektusokból képes vizsgálni sokszor triviálisnak tűnő dolgokat, melyre kevesen gondolnánk, ezáltal mindig tud valami újat, formabontót javasolni. Szívesen dolgoztam és fogok is vele dolgozni a jövőben, ha az OSINT nagymesterét keresed, ne habozz, ő a te embered!''" '''(online marketing expert)'''
[[File:Security Privacy by Design.png|alt=Security & Privacy by Design (SPbD) at IBM is a simplified and agile set of focused security and privacy practices including threat models, privacy assessments, security testing and vulnerability management. Badge earners will learn the foundations of SPbD@IBM including key concepts, methodology and tools.|border|thumb|[https://www.credly.com/badges/4a60bfb6-1038-4fcc-b4d2-80fd444a268e Security and Privacy by Design] (IBM)]]
[[File:IBM-DevSecOps-Explorer-Security and Automation for DevOps.png|alt=The badge earner will understand the integration of security into every phase of the DevOps software lifecycle. The course touches on continuous integration (CI), continuous delivery (CD), security testing, and how to build automated security checks and tasks into the development workflow, CI/CD pipeline, and production operations. It also discusses web application security and the importance of culture, collaboration and automation using available security tools.|border|thumb|[https://www.credly.com/badges/448011d3-850f-4d3a-8ec5-b59bf1a5da0e IBM DevSecOps Explorer - Security & Automation for DevOps]]]
"''Ritkán olvasni ilyen érdekes és tartalmas szakmai írást magyarul. Gratula érte''" (reader, Brand and Business Development Manager)
==Other public works, articles and presentations in the past few years==
2017 - Rediscover hidden facebook semantic search engine, reimagine open-source


intelligence (lightning talk @ Hacktivity 2017) Github: http://bit.ly/facebook_graph_search
* ''"Gratula: a cikket value proposition szempontból egyedülállónak tartom a magyar piacon: egyrészt szépen kidolgozott alkotás, másrészt merész szakmaisággal támasztja alá a kijelentéseit. Ez multi környezetnen nem szokás, csak a frázisok mennek manapság. Jó volt végigolvasni. Ritkán olvasni ilyen érdekes és tartalmas szakmai írást magyarul. Gratula érte"''" '''(reader, Business Developement Manager)'''
 
* "''Ex rendőrként (10+ év nyomozói tapasztalattal) adnék dupla likeot erre''" '''(reader, Six Sigma)'''
 
== Language proficiency ==
*native Hungarian
*English (C1)
 
== Concise publication list of references, citations ==
*[http://real.mtak.hu/121325/1/Dobak-TothBelugyiSzemle2021.evi2.szam195-212.pdf Old Methods in The Cyberspace? (CYBER-HUMINT, OSINT, SOCMINT, Social Engineering)], Dobák Imre, Tóth Tamás, '''University of Public Service, Department of Civil National Security''', 2019, Belügyi Szemle, 2021/2. DOI: [https://doi.org/10.38146/BSZ.2021.2.2 10.38146/BSZ.2021.2.2]
*Most cited publications in Hungarian
*minor citations - [https://bitport.hu/mennyi-62-ezer-mi-62-ezer Mennyi? 62 ezer. Mi 62 ezer?] (Bitport, 2016.04.06.);  [https://bitport.hu/trendek/egy-gigantikus-adatszivargas-tanulsagai-google-apps-drive-slack Egy gigantikus adatszivárgás tanulságai] (Bitport, 2016.05.30.) [15]
*2017 - Rediscover hidden facebook semantic search engine, reimagine open-source intelligence - (lightning talk @ Hacktivity 2017) Github: http://bit.ly/facebook_graph_search
*2014 – univ. course „Internet, társadalom, digitális kultúra” (University of Debrecen)
*2014 – univ. course „Internet, társadalom, digitális kultúra” (University of Debrecen)
*2013 - Hacktivity 2013 - Data mining in the age of social web
*2013 - Hacktivity 2013 - Data mining in the age of social web
*2012 - Guberálnak [interview in Hungarian, HVG, 2012. September, (http://bit.ly/bardoczi_hvg) you can find the grabbed version here (http://bit.ly/bardoczi_hvg_interju) ]
*2012 - Guberálnak [interview in Hungarian, HVG, 2012. September, (http://bit.ly/bardoczi_hvg) you can find the grabbed version here (http://bit.ly/bardoczi_hvg_interju) ]
*2006 - Kavicsok [„Bolyai-books”], co-author, Gének, bitek, közgondolkodás [p. 157-190] (http://bit.ly/bolyai_tanulmanykotet )
*2006 - Kavicsok [„Bolyai-books”], co-author, Gének, bitek, közgondolkodás [p. 157-190] (http://bit.ly/bolyai_tanulmanykotet )
==Language proficiency==
*native Hungarian
*English (C1)
==Most notable articles according the amount of citations and shares from the past few years==
Jump to the related wiki article [https://bardoczi.net/List_of_publications]
==More about my professional presence in Hungarian online (partial)==
*Egy gigantikus adatszivárgás tanulságai - Bitport.hu, 2016.05.30. [https://bitport.hu/trendek/egy-gigantikus-adatszivargas-tanulsagai-google-apps-drive-slack]


*Mennyi? 62 ezer. Mi 62 ezer? - Bitport.hu, 2016.04.06. [https://bitport.hu/mennyi-62-ezer-mi-62-ezer]
== Memberships, volunteering ==
 
*2010 – ResearchGate Computer Security and IT Forensics workgroup, founder
*[[File:Big Data Foundations - Level 2 (IBM).jpg|alt=This badge earner understands the big data ecosystem and hadoop commands and operations to work with big data. The earner also has foundational knowledge around Spark and its operations including RDDs, DataFrames, and the various libraries associated with the Spark Core (MLlib, Spark SQL, Spark Streaming, GraphX).|border|thumb|[https://www.credly.com/badges/d6c62a22-4776-4d41-9454-e239f2b9a79b Big Data Foundations] - Level 2 (IBM)]]Adatbányászat a közösségi web korában - Antivirus Blog, 2013. 10. 15. [https://antivirus.blog.hu/2013/10/15/hacktivity_2013_ii_nap]
*2014 - IEEE (Institute of Electrical and Electronics Engineers) - associate member
*2015 - ACM (Association for Computing Machinery) - [http://member.acm.org/~bardoczi professional member]
*2016 - IEEE Young Professionals - member
*2017 - IEEE Consultants Network - member
*2019 - PMI (Project Management Institute), PMI Hungarian Chapter
*2019 - PMI (Project Management Institute), PMI [https://www.projectmanagement.com/profile/bardoczi Switzerland Chapter]
==Public educational and research activity (this section is under construction)==
==Public educational and research activity (this section is under construction)==
*OSINT training space for my trainees: http://osint.atlassian.net/
*OSINT training space for my trainees: http://osint.atlassian.net/
*ResearchGate - https://www.researchgate.net/profile/Bardoczi-Akos/research
*Harvard Dataverse - https://dataverse.harvard.edu/dataverse/bardoczi
*Harvard Dataverse - https://dataverse.harvard.edu/dataverse/bardoczi
*ResearcherID/ORCID: https://orcid.org/0000-0003-4239-2308
*ResearcherID/ORCID: https://orcid.org/0000-0003-4239-2308
*Google Scholar - https://scholar.google.nl/citations?hl=en&pli=1&user=VMA6YtUAAAAJ
*Google Scholar - https://scholar.google.nl/citations?hl=en&pli=1&user=VMA6YtUAAAAJ
==Recently passed advanced level exam certifications (PMI/NASBA/IIBA) on LinkedIN - with unique cred. identifiers==
'''<big><u>IT, IT security && development</u></big>'''
*'''Data Science of Economics, Banking, and Finance,''' with Barton Poulson (AQfnHBrikHZheJivguWe0xOYfZYA)
*'''Data-Driven Network Security Essentials''' (AZmGMiEAa-76sM-t5Alvb6Z5lcoW)
*[[File:Data Science Foundations - Level 2 (IBM).jpg|alt=This badge earner has a solid understanding of data science methodologies, and tools. The individual also has a hands-on appreciation of programming languages to use in data science tasks.|border|thumb|[https://www.credly.com/badges/e43f9b5c-bd2a-45f8-ba20-622ef14bab2c Data Science Foundations] - Level 2 (IBM)]]'''Design Thinking: Data Intelligence''' (AVz42mWP04sKoxHFGUiH80-gWouP)
*'''IT Security Foundations: Network Security''' (Afs4pJfoT-kMD3iE1MHPrf-XekPm)
*'''IT Security Foundations: Operating System Security''' (AQgX_h1Uj-WDdTgRvMy5VKK280k1)
*'''Data-Driven Network Security Essentials''' (AZYE9VFT6crGSu_HFFdBRdafdT5y)
*'''Linux: System Information and Directory Structure Tools''' (AdlET7yH933bU5b7mI2mG3GUP-6x)
*'''Planning a Microsoft Cloud Solution''' (ASOGXW1qkH9-q3pfgU2PdP4Vu7fw)
*'''SharePoint Advanced: Enhancing Functionality with JavaScript''' (AcbL742BBtpIfMrnY0stNu6NU4AV)
*'''SharePoint Advanced: Working with PowerPivot''' (AV857ZHpBUMCnrpOKPjRz1HX70Io)
*'''Social Media Marketing with Facebook and Twitter''' (AWPATerZz-j3dSVDU8eq6VmRESAA)
*'''Symmetric Cryptography Essential Training''' (ASKC6G5XSlpg3GfobeyonROC3QwV)
*'''Writing a Business Report''' (AaxUcDf5k8XsGE2uoeDrSYiQCPaw)
<big>'''<u>Economics && management sciences</u>'''</big>
*[[File:IBM Resilient SOAR (Security Foundational).png|alt=This badge earner has demonstrated knowledge of the basic features and functions needed to work with the IBM Security Resilient incident response product. The badge earner can effectively navigate in the Resilient UI, work with users and authentication, administer the organization, and understands Resilient product administration.|border|thumb|[https://www.credly.com/badges/13fed8a2-03ac-4675-a6b9-8b7d353d15f3 IBM Resilient SOAR Foundations]]][[File:Genomics for Law (University of Illinois).jpg|alt=Genomics for Law exam|thumb|[https://www.coursera.org/verify/EW3FJT92T76B Genomics for Law] (University of Illinois) GA: 95.65%|link=https://bardoczi.net/wiki/File:Genomics_for_Law_(University_of_Illinois).jpg]]'''Advanced Branding''' (AYuOtQfOjqESIW55lcdzwRDlAjaU)
*'''Advanced Business Development: Communication and Negotiation''' (ARk7P85WZ5Aw52oGhll4ZfGL0-SG)
*'''Business Analysis: Business Benefits Realization''' (AUhff3ELcphdNnZxqfDGHG_R0ccu)
*'''Business Analyst and Project Manager Collaboration''' (AR9xWafLbmoZKgaeco-9Hq-vOiq)
*'''Business Analytics: Forecasting with Seasonal Baseline Smoothing''' (AV_WBIpU1PCKG0a01OwG3OzAhE1)
*'''Business Intelligence for Consultants''' (AVUosKH5lEKbE9oadqENvxgdxT09)
*'''CMO Foundations: Creating a Marketing Culture''' (ASsP5ng6tTsEOKAE-fhz7RfkxBxN)
*'''Creating a Culture of Service''' (AVUHerchA3L-w7rLCJ7JLuYgSVi1)
*'''Crisis Communication''' (ARrPUyTK-keNibWAi0esd2zprdCD)
*'''Finance Foundations: Risk Management''' (AVMJWgfPJIRl-IBnyV-Pb0frWabI)
*'''Leading Projects''' (AUVUCUqtZCZxfDkRMd5R4a5X76Ee)
*'''Project Management: Solving Common Project Problems''' (Af3FSkp_4Bmyxy55Lve0m9vh7mwW)
*'''Sales Coaching''' (Ab_tJazVWi2qYoRmjrBV7IBPvB8l)
== Remarks==
== Remarks==
[[File:IBM Automation Compass.png|alt=This badge earner understands multiple essential elements of Intelligent Automation and the Future of Work to evolve their automation journey. Essential elements include why automation and the Future of Work are important to transform the business, and how Digital Workers and people will collaborate together. It also includes the workflows, Digital Worker and key drivers of the Future of Work that are necessary for an enterprise’s successful automation implementation.|border|thumb|301x301px|[https://www.credly.com/badges/43d36c28-73c6-4a7e-ab33-32559e6a5c0c IEEE Special Interest Group on Humanitarian Technology]]]
During my university years and later I gained a higher level of knowledge and experience in the IT, CS, economic sciences, especially management. I would also like to mentor
During my university years and later I gained a higher level of knowledge and experience in the IT, CS, economic sciences, especially management. I would also like to mentor


newcomers and graduates from economics or IT fields. I can help experienced professionals as well in many cases.
newcomers and graduates from economics or IT fields. I can help experienced professionals as well in many cases.


'''<big>§ All clients, contractors and companies must have integrity and follow the standard ethical rules. I take it very seriously!</big>'''
'''<big><u>§ All clients, contractors and companies must have integrity and follow the standard ethical rules. I take it very seriously!</u></big>'''
==Contact details==
==Public contact details==
Tel.: +36 70 505 5200 (HU) / +36 1 999 0444 / +41 76 701 5200 (CH) / +49 151 6466 4588 (DE) / Fax.: +36 1 9997 993
 
'''<big>FYI:</big>''' <big>I should previously save your ID to my contacts, some services may filter the messages from senders who have never contacted before, '''[mailto:akos@secure.bardoczi.net?subject=New%20contact&body=Please%20add%20me%20to%20your%20contact%20list%20on%20with%20this%20number%20or&#x20;ID.%20My%20preferred%20IM%20service%20is%20 recommended to ping me before].''' You can send your name/nick and ID anytime with whis link.</big>
 
'''<big>[https://t.me/bardoczi Telegram] (preferred)</big>'''
 
'''<big>Signal</big>''' <big>sgnl://message/[12026706006]</big>
 
'''<big>[https://account.wire.com/user-profile/?id=73eca856-a35b-43f5-9013-97ab629bd534 WIRE]  @bardoczi</big>'''


'''<big>[https://wa.me/+12026706006 WhatsApp]</big>'''
* +36 70 505 5200 (HU) / +36 1 999 0444 (HU)
* +1 202 470-0790 (US)
* +41 76 701 5200 (CH)
* +49 151 6466 4588 (DE)
* +39 366 311-1200 (IT)
* +32 497 25-75-65 (BE)
* Fax: +36 1 9997-993


'''<big>[http://m.me/bardoczi Facebook Messenger]</big>'''
'''<big>Note:</big>''' <big>I should previously save your ID to my contacts, some services may filter the messages from senders who have never contacted before, '''[mailto:akos@secure.bardoczi.net?subject=New%20contact&body=Please%20add%20me%20to%20your%20contact%20list%20on%20with%20this%20number%20or&#x20;ID.%20My%20preferred%20IM%20service%20is%20 recommended to ping me before].''' You can send your name/nick and ID anytime with whis link.</big>


* '''<big>[https://t.me/bardoczi Telegram] (preferred)</big>'''
* '''<big>Signal</big>''' <big>sgnl://message/[12026706006]</big>
* '''<big>[https://account.wire.com/user-profile/?id=73eca856-a35b-43f5-9013-97ab629bd534 WIRE]  @bardoczi</big>'''
* [https://meet313.webex.com/meet/pr27424904214 '''Webex Meet''']
* '''<big>[https://wa.me/+12026706006 WhatsApp]</big>'''
* '''Element ID:''' [https://matrix.to/#/@bardoczi:matrix.org '''@bardoczi:matrix.org''']
* '''Threema ID:''' [https://threema.id/WKNXT53F '''WKNXT53F''']
* Email: akos@cerp.ch, akos.bardoczi.ch@ieee.org__INDEX__
* In addition - [https://m.me/akos.bardoczi/ '''IM to Facebook page''']


== Top 30 most cited Hungarian publications ==


Email: akos@cerp.ch, akos.bardoczi.ch@ieee.org
* [http://dx.doi.org/10.13140/RG.2.2.35629.26085 Uncovering bare metal servers hidden location behind the cloud?] (2022. 09. 13)
* [http://dx.doi.org/10.13140/RG.2.2.24724.07046 A zöldebb programozási nyelv] (2022.08.29)
* [http://dx.doi.org/110.13140/RG.2.2.31434.95683 Az OSINT, virtualizáció és a nálunk idővel okosabb helymeghatározás] (2022. 08. 10)
* [http://dx.doi.org/10.13140/RG.2.2.14657.74084 Tudásmenedzsment szoftveres támogatása 1x1] (2021. 03. 09)
* [http://dx.doi.org/10.13140/RG.2.2.15496.60168 Mennyi idő megy kárba egy PhD elkészítésekor?] (2020. 11. 28)
* [http://dx.doi.org/10.13140/RG.2.2.10188.18568 A net szívcsakrája – a DNS] (2018. 04. 30)
* [http://dx.doi.org/10.13140/RG.2.2.30006.27206 Szemléletmódváltás vagy halál?] (2018. 04. 30)
* [http://dx.doi.org/10.13140/RG.2.2.28328.55049 A webfejlesztés művészete – egyedi vagy CMS?] (2018. 05. 02)
* [http://dx.doi.org/10.13140/RG.2.2.13229.05608 A Facebook alaposan atomizálta a társadalmat, mi jön most?] (2018. 04. 30)
* [http://dx.doi.org/10.13140/RG.2.2.23819.67361 Home office – elmélet, gyakorlat, másképp] (2018. 05. 05)
* [http://dx.doi.org/10.13140/RG.2.2.12704.76801 Nyílt-forrású információszerzés – kémek, kurvák, gengszterek, OSINT] (2018. 05. 07)
* [http://dx.doi.org/10.13140/RG.2.2.35878.29761 Így könnyítheti meg a támadó dolgát a többlépcsős hitelesítés] (2017. 11. 02)
* [https://web.archive.org/web/20190131010854/https://www.isaca.hu/index.php/hirek/isaca-budapest-chapter/item/479-kimaxolt-self-branding-minden-idok-legnagyobb-alhekkere Kimaxolt self-branding - minden idők legnagyobb álhekkere] (2018. 03. 12)
* [http://dx.doi.org/10.13140/RG.2.2.16584.49928 Magatartástudomány, social engineering és a HUMINT] (2018. 04. 30)
* [http://dx.doi.org/10.13140/RG.2.2.31159.70569 Mikor válik a kultúra részévé az online tanulás?] (2018. 05. 13)
* [http://dx.doi.org/10.13140/RG.2.2.30143.20643/1 Miért kerül nagyon sokba a világnak az olcsó router?] (2018. 05. 24)
* [http://dx.doi.org/10.13140/RG.2.2.29481.98401 Te is lehetsz igazságügyi informatikus?] (2018. 05. 30)
* [http://dx.doi.org/10.13140/RG.2.2.36192.87046 Android vagy Apple? Zsebekben és nagyvállalati környezetben, hitkérdéseket félretéve] (2018. 06. 12)
* [http://dx.doi.org/10.13140/RG.2.2.26965.40167 GDPR az információszabadság ellen: hogyan könnyíti a bűnözők dolgát és nehezíti a nyomozókét és kutatókét?] (2018. 06. 12)
* [http://dx.doi.org/10.13140/RG.2.2.25287.68008 Dizájnelem, amit a keresők is szeretni fognak: az email cím] (2018. 07. 01)
* [http://dx.doi.org/10.13140/RG.2.2.31998.56645 Céges bölcsészmérnökök a döntéselőkészítésben] (2018. 07. 02)
* [http://dx.doi.org/10.13140/RG.2.2.28643.12325 Nyelvek, keresők, mesterséges intelligencia vs egy-egy keresőkifejezés értékének mérése] (2018. 07. 02)
* [http://dx.doi.org/10.13140/RG.2.2.17318.50245 Kétlépcsős hitelesítés céges környezetben: elmélet és gyakorlat] (2018. 07. 11)
* [http://dx.doi.org/10.13140/RG.2.2.12285.33769 Buborékeffektus: hogyan írjuk és olvassuk a webet? És hogyan kellene?] (2018. 08 23)
* [https://web.archive.org/web/20181026111045/https://elemzes.netacademia.hu/2018/09/18/insta-ai-felsotest/ Nyelv, mesterséges intelligencia, na meg felsőtest strandszezon utánra] (2018. 09. 18)
* [http://dx.doi.org/10.13140/RG.2.2.18996.22405 Bezár a Google Plus – miután alaposan lecsapolták] (2018.10. 09)
* [http://dx.doi.org/10.13140/RG.2.2.15640.78087 Mesterséges intelligenciáról – komolyan I.] (2018. 10. 19)
* [http://dx.doi.org/10.13140/RG.2.2.23190.52806 Üzenetküldők, amik felfedik az új mobilszámod (is) egy creepy fícsörön keresztül] (2018. 10. 30)
* [http://dx.doi.org/10.13140/RG.2.2.14801.92001 Az AI-ról, komolyan II: a lexikális tudás felértékelődése a jövő döntéseiben] (2018. 11. 08)
* [http://dx.doi.org/10.13140/RG.2.2.26545.97125 A DMARC, mint a hamisított levelek mérésének lehetséges eszköze] (2018.11.18)
* [http://dx.doi.org/10.13140/RG.2.2.14801.92001 AI: rosszul elsülő tudománykommunikáció, mint lehetséges globális fenyegetés] (2018. 11. 19)
* [http://dx.doi.org/10.13140/RG.2.2.31579.13601 Az adatszivárgások anatómiája] (2019. 01. 20)
* [http://dx.doi.org/10.13140/RG.2.2.22351.66722 Bűvös userID, ami a fél életed megmutatja bárkinek több szolgáltatásban] (2019. 04. 08)


__INDEX__
== Check this site by technical view! ==
[[File:Cisco-talos-intelligence.png|left|thumb|[https://www.talosintelligence.com/reputation_center/lookup?search=bardoczi.net]]]
[[File:Domaintools.png|left|thumb|[https://whois.domaintools.com/bardoczi.net]]]
[[File:Google-pagespeed-insights.png|left|thumb|[https://pagespeed.web.dev/analysis?url=https%3A%2F%2Fbardoczi.net%2F]]]
[[File:Ibm-security-x-force.png|left|thumb|[https://exchange.xforce.ibmcloud.com/url/bardoczi.net]]]
[[File:Otx-alienvault.png|left|thumb|[https://otx.alienvault.com/indicator/domain/bardoczi.net]]]
[[File:Qualys-ssl-labs.png|left|thumb|[https://www.ssllabs.com/ssltest/analyze.html?d=bardoczi.net]]]
[[File:Securityheaders-probely.png|left|thumb|[https://securityheaders.com/?q=bardoczi.net&followRedirects=on]]]
[[File:Virustotal.jpg|left|thumb|[https://www.virustotal.com/gui/domain/bardoczi.net/relations]]]
__FORCETOC__
__FORCETOC__

Latest revision as of 03:23, 26 September 2023


Ákos Bardóczi detailed resumé

Hacktivity, Security Theater, Oct 2013
Hacktivity, Security Theater, Oct 2013.

How can I download the concise CV in PDF format?

My recommendation: click HERE to download the recent, digitally signed, timestamped version.

Public and notable professional experience

  • 2021 May – 2022 Apr (full-time) – IBM DSS (Hungary) – Cyber Threat Defense Analyst – I worked as a SOC analyst , , and after working hours, I frequently used the most valuable elearning materials to learn more about IBM and non-IBM security fundamentals and solutions and how possible to link these with each other. 2022. May – I continued learning, deep dived into Cyber Threat Intelligence and Threat Hunting from the most valuable sources, online and print.
  • 2018 May – 2019 Jan (contactor) – NetAcademia LLC (Hungary) – content creator, professional writer (Netacademia Elemzés) , senior lecturer (opensource intelligence, advanced search techniques, email services maintaining, IT security hardening fundamentals)
  • 2016 May - 2018 Apr (contractor) – ISACA Budapest Chapter – professional writer (especially enterprise level IT governance practices), writing articles and summaries to Information Systems Audit and Control Association, these topics needed a deep understanding of privacy and cybersecurity standards, such as ISO27K, etc.
  • 2008 Sep – 2013 May (part-time) University of DebrecenIntranet and CMS developer (LAMP). Complete refactoring of the Department of Human Genetics intranet and site, migration from a former system without data loss. TYPO3 CMS hardening. (Debian, Apache, MySQL, PHP)
  • 2010 Sep – 2011 Sep (two European financial institutions, remote) - CMS and solution integrator. My primary role was to connect/integrate the TYPO3 to legacy systems and administrative sub-projects.

Educational background

  • 2005-(2010) – University of Debrecen, Faculty of Science and Technology, molecular biologist, summa sine diploma.
  • 2021 - Eötvös Loránd University, Faculty of Law, Juris Doctor - I've customized learning schedule!

Passed exams, qualification, and certifications - at least intermediate/advanced/expert level

Partially categorized by skills, and knowledge areas
#Python programming #Management, and #Economics #Audit #Law

Mastering Digital Forensics (LPATH)  - EC-Council CODERED

Conducting Reconnaissance for Cybersecurity (LPATH) - EC-Council CODERED

Dark Web Cyber Deception Demystified - EC-Council CODERED

Mastering Database Reconnaissance and Exploitation - EC-Council CODERED

Master Open Source Intelligence (LPATH) (l () -EC-Council CODERED

Mastering Threat Intelligence (LPATH) - EC-Council CODERED

Microsoft Cybersecurity Pro Track: Threat Detection - EC-Council CODERED

Open-source Intelligence (forensic approach) - Basel Institute on Governance

OSINT for Hackers and Penetration Testers - EC-Council CODERED

Data Mining for Fraud Detection - EC-Council CODERED

Maltego CaseFile in Action  - CyberInst.

Computer Forensics Best Practices - EC-Council CODERED

Real-time Threat Detection with Elastic Stack - EC-Council CODERED

IBM Agile Explorer - IBM Internal

IBM Machine Learning Specialist - Associate - IBM Learn

Terrorist Financing (counter terrorism) - Basel Institute on Governance (ICAR)

Operational Analysis of Suspicious Transaction Reports (anti-fraud in financial institutions) - Basel Institute on Governance (ICAR)

PCI (Payment Card) Standards for Corporate Professionals - Illumeo Learning

Cybersecurity for FinTech - EC-Council CODERED

Build Security Incident Response for GDPR Data Protection - EC-Council CODERED

Advanced Open Source Intelligence and Privacy - EC-Council CODERED

Information Systems Auditing, Controls and Assurance (ISACA based material, Grade Achieved: 92.50%) - The Hong Kong University of Science and Technology


Challenging Forensic Science: How Science Should Speak to Court - University of Lausanne -

International Cyber Conflicts - The State University of New York

Introduction to Cybersecurity Tools & Cyber Attacks - IBM

IBM Enterprise Resiliency - IBM Learn

Understanding Financial Markets - University of Geneva

Managing Project Risks and Changes - University of California, Irvine -

Genomics for Law - University of Illinois at Urbana-Champaign -

AI & Law- Lund University

Black Hat Python: Python For Pentesters - EC-Council CODERED

Network Automation with Python - EC-Council CODERED

IBM Data Science Foundations - Level 2 (V2) - CognitiveClass.AI

IBM Data Science Tools - CognitiveClass.AI

Python for Cybersecurity Speciazation - Infosec Institute


Mastering Web and Infrastructure Reconnaissance - EC-Council CODERED

Google Cybersecurity Certificate - Google Carreer Certificates

Certified Cybersecurity Candidate - (ISC)2

Blue Team Boot Camp: Defending Against Hackers - EC-Council CODERED

Power of Next Generation Firewalls - EC-Council CODERED

Reverse Engineering & Malware Analysis - Intermediate - Udemy

Palo Alto Networks Security Operations Fundamentals - Palo Alto Netorks

IBM Resilient SOAR Foundations - IBM Security Learning Academy

Splunk Search Expert Specialization - Splunk

English for IT Professionals - Udemy

IBM Growth Behaviors - IBM Internal

IBM Guardium Foundations - IBM Training

IBM Cybersecurity Threat Intelligence - IBM Internal

Big Data Foundations - Level 2 - CognitiveClass.AI

IBM Cybersecurity IT Fundamentals Specialization - Skills Network (IBM)

Google Workspace Security - Google Cloud Training


IBM Cybersecurity Analyst Assessment - IBM


Python, bash shell programming, Word, PowerPoint, Access, Excel, Wordpress CMS, linux (in the top 5% based on LinkedIN skill assessments)

Credly profile here, Coursera profile here, notable exam certs. credentials with verifications links

Recommendations

Bardóczi Ákos, Budapest, Sept 2021
  • "Working with Ákos is one of the most enlightening and eye opening experience I have ever had. His broad spectrum of knowledge and work ethics is unique. I would recommend him as a colleague or a contractor to anyone working in IT Sec any day." (DevOps professional)
  • "Ákos worked with my team as an external advisor for about a month and helped us to develop custom techniques suitable for our special needs. He is a highly skilled professional and a great advisor too who has a deep, practical knowledge in various fields of IT security and cybersecurity thanks to his enthusiasm for learning new things day-by-day. His approach to different kinds of problems is often unique compared to others so he can be a valuable member of any business community. He also has the ability to give down to earth advices while his ideas are still fit to the wider theoretical / conceptual framework of the project. I would definitely recommend him. " (PhD candidate)
  • As a new member of our security team YOU play an important role in the team’s life, you show dedication, growth, progress. Thank you for your efforts and excellent mentality in these fields. With you on board the Budapest Security Delivery Center are stronger and more successful.(former IBM manager)
  • "Bevallom, első körben nem könnyű felvenni Ákos gondolatmenetének ritmusát. A-ról beszél, de közben már D-n agyal, időbe telik, mire számomra is kikristályosodnak az ötletei, akkor viszont hatalmasat ütnek. Olyan aspektusokból képes vizsgálni sokszor triviálisnak tűnő dolgokat, melyre kevesen gondolnánk, ezáltal mindig tud valami újat, formabontót javasolni. Szívesen dolgoztam és fogok is vele dolgozni a jövőben, ha az OSINT nagymesterét keresed, ne habozz, ő a te embered!" (online marketing expert)
  • "Gratula: a cikket value proposition szempontból egyedülállónak tartom a magyar piacon: egyrészt szépen kidolgozott alkotás, másrészt merész szakmaisággal támasztja alá a kijelentéseit. Ez multi környezetnen nem szokás, csak a frázisok mennek manapság. Jó volt végigolvasni. Ritkán olvasni ilyen érdekes és tartalmas szakmai írást magyarul. Gratula érte"" (reader, Business Developement Manager)
  • "Ex rendőrként (10+ év nyomozói tapasztalattal) adnék dupla likeot erre" (reader, Six Sigma)

Language proficiency

  • native Hungarian
  • English (C1)

Concise publication list of references, citations

Memberships, volunteering

  • 2010 – ResearchGate Computer Security and IT Forensics workgroup, founder
  • 2014 - IEEE (Institute of Electrical and Electronics Engineers) - associate member
  • 2015 - ACM (Association for Computing Machinery) - professional member
  • 2016 - IEEE Young Professionals - member
  • 2017 - IEEE Consultants Network - member
  • 2019 - PMI (Project Management Institute), PMI Hungarian Chapter
  • 2019 - PMI (Project Management Institute), PMI Switzerland Chapter

Public educational and research activity (this section is under construction)

Remarks

During my university years and later I gained a higher level of knowledge and experience in the IT, CS, economic sciences, especially management. I would also like to mentor

newcomers and graduates from economics or IT fields. I can help experienced professionals as well in many cases.

§ All clients, contractors and companies must have integrity and follow the standard ethical rules. I take it very seriously!

Public contact details

  • +36 70 505 5200 (HU) / +36 1 999 0444 (HU)
  • +1 202 470-0790 (US)
  • +41 76 701 5200 (CH)
  • +49 151 6466 4588 (DE)
  • +39 366 311-1200 (IT)
  • +32 497 25-75-65 (BE)
  • Fax: +36 1 9997-993

Note: I should previously save your ID to my contacts, some services may filter the messages from senders who have never contacted before, recommended to ping me before. You can send your name/nick and ID anytime with whis link.

Top 30 most cited Hungarian publications

Check this site by technical view!