Alexander Nagy
Security Expert
Experience
Security Expert
DAK-Gesundheit
- Penetration testing of mobile applications
- Code review
- Gematik audit
- Development of secure software development methods
- Creation of security and test concepts
- Penetration testing of software and architecture
- Analysis of vulnerabilities
- Automation and information security
- Use of Confluence and Jira
- Work with databases, J2EE, JavaServer Faces, Liquibase, Apache, Maven, Mercurial, Oracle Financials
- Documentation and creation of security policies
- Management of software systems, SharePoint, PrimeFaces, Git
- Ensuring compliance with security requirements for .NET, AWS, APIs
- Tools: MobSF, Frida, Android Studio, Drozer, Objection, Azure
Security Architect / Penetration Tester
Agentur für Arbeit
- Penetration testing of web applications and clients
- Penetration testing of software and architecture
- Analysis of vulnerabilities
- Automation and information security
- Use of Confluence and Jira
- Work with databases, J2EE, JavaServer Faces, Liquibase, Apache, Maven, Mercurial, SharePoint, Oracle Financials
- Documentation and creation of security policies
- Management of software systems, SQL, PrimeFaces, Git
- Ensuring compliance with KRITIS and security regulations, AWS, APIs
IT-Security Manager
Investitionsbank Schleswig-Holstein
- Coordination of penetration tests and vulnerability management
- Support of audits of basic security concepts
- SIEM management
- Evaluation and management of security concepts
- Project management
- Penetration testing of software and API architecture
- Analysis of vulnerabilities
- Automation and information security
- Use of Confluence and Jira
- Work with databases, J2EE, JavaServer Faces, Liquibase, Apache, Maven, Mercurial, Oracle Financials
- Documentation and creation of security policies
- Management of software systems, SharePoint, PrimeFaces, Git
- Compliance with security regulations and AWS
Penetration Tester
DHL
- Penetration testing of web and mobile applications
- Code review and retesting of findings
- Penetration testing of software and architecture
- Analysis of vulnerabilities
- Automation and information security
- Use of Confluence and Jira
- Work with databases, J2EE, JavaServer Faces, Liquibase, Apache, Maven, Mercurial, Oracle Financials
- Documentation and creation of security policies
- Management of software systems, SQL, PrimeFaces, Git
- Compliance with security regulations and .NET, AWS
- Tools: Burp, SSLyze, Nessus, Wireshark, MobSF, Frida, Android Studio, Drozer, Objection
Penetration Tester and Project Manager
PwC
- Penetration testing of mobile applications
- Code review
- Gematik audit
- Development of secure software development methods
- Creation of security and test concepts
- Penetration testing of software and architecture
- Analysis of vulnerabilities
- Automation and information security
- Use of Confluence and Jira
- Work with databases, J2EE, JavaServer Faces, Liquibase, Apache, Maven, Mercurial, Oracle Financials
- Documentation and creation of security policies
- Management of software systems, SharePoint, PrimeFaces, Git
- Ensuring compliance with security requirements for .NET, AWS, APIs
- Tools: MobSF, Frida, Android Studio, Drozer, Objection, Azure
Pentest Coordinator and Security Engineer
DHL
- Pentesting of web applications
- Code review
- Development of secure software development methods
- Network testing and SIEM
- Creation of security and test concepts
- Penetration testing of software and architecture
- Vulnerability analysis
- Automation and information security
- Use of Confluence and Jira
- Work with databases, J2EE, JavaServer Faces, Liquibase, Apache, Maven, Mercurial, Oracle Financials
- Documentation and creation of security policies
- Management of software systems, SQL, PrimeFaces, Git
- Compliance with security regulations, .NET, AWS
- Tech Stack: Spring Boot, Kotlin, Apache, Jira, AngularJS, Linux, Windows, NetApp, Aruba, Barracuda, Azure, API
Security Engineer / Penetration Tester
Federal Ministry of the Interior
- Pentesting of web applications
- Code review
- SIEM
- Development of secure software development methods
- Creation of security and test concepts
- Vulnerability management
- Penetration testing of software and architecture
- Vulnerability analysis
- Automation and information security
- Use of Confluence and Jira
- Work with databases, J2EE, JavaServer Faces, Liquibase, Apache, Maven, Mercurial, Oracle Financials
- Documentation and creation of security policies
- Management of software systems, SQL, PrimeFaces, Git
- Compliance with security regulations and AWS
- Tech Stack: Spring Boot, Java, Apache, Jira, AngularJS, Linux, Splunk
Penetration Tester and Security Engineer
VHV
- Pentesting of web and mobile applications
- Web services testing according to OWASP, BSI, MITRE ATTACK
- SIEM and vulnerability management
- Advising on vulnerability remediation
- Creation of security and test concepts
- Penetration testing of software and architecture
- Vulnerability analysis
- Automation and information security
- Use of Confluence and Jira
- Work with databases, J2EE, JavaServer Faces, Liquibase, Apache, Maven, Mercurial, Oracle Financials
- Documentation and creation of security policies
- Management of software systems, SQL, PrimeFaces, Git
- Compliance with security regulations
- Tech Stack: Tomcat, Angular, Java, Linux, SoapUI, iOS, Android, HP Server
Penetration Tester and Auditor
VHV
- Pentesting of web and mobile applications
- Code review
- Web services testing according to OWASP, BSI, MITRE ATTACK
- ISO 27001 audit
- Advising on vulnerability remediation
- Creation of security and test concepts
- Penetration testing of software and architecture
- Vulnerability analysis
- Automation and information security
- Use of Confluence and Jira
- Work with databases, J2EE, JavaServer Faces, Liquibase, Apache, Maven, Mercurial, Oracle Financials
- Documentation and creation of security policies
- Management of software systems, SQL, PrimeFaces, Git
- Compliance with security regulations
- Tech Stack: Angular, Java, Apache, Linux and Windows Server, iOS
Penetration Tester and Auditor
Anonymous
- Pentesting of web and mobile applications, web services, and networks according to OWASP, BSI, MITRE ATTACK
- ISO 27001 audit
- Advising on vulnerability remediation
- Development of secure software development methods
- Creation of security and test concepts
- Penetration testing of software and architecture
- Vulnerability analysis
- Automation and information security
- Use of Confluence and Jira
- Work with databases, J2EE, JavaServer Faces, Liquibase, Apache, Maven, Mercurial, Oracle Financials
- Documentation and creation of security policies
- Management of software systems, SQL, PrimeFaces, Git
- Compliance with security regulations
- Tech Stack: Angular, Java, Apache, Linux and Windows Server, Cisco Switch, Fortinet
Penetration Tester
Anonym
- Penetration tests according to OWASP, BSI, MITRE ATT&CK Framework
- Code review
- Consulting on fixing security issues
- Development of secure software development methods
- Tech Stack: Angular, React, Java, Linux, AWS, iOS, Android
Penetration Tester and IT Security Consultant, Auditor
Anonym
- Penetration testing of web and mobile applications
- Web services testing according to OWASP, BSI, MITRE ATT&CK
- Oversight of IT projects as Project Security Officer
- ISO 27001 audit
- Consulting on fixing security issues
- Development of secure software development methods
- Creation of security and testing concepts
- Tech Stack: Angular, React, Java, Linux, AWS, iOS, Android
IT Security Consultant and Auditor
Anonym
- Threat modeling
- Vulnerability assessment according to OWASP, BSI, MITRE ATT&CK
- Managed bug bounty program
- Security awareness testing, SIEM, ISO 27001 audit
- System hardening for Industry 4.0 (IT/OT hybrid environment)
- Consulting on fixing security issues
- Acting as Project Security Officer
- Tech Stack: .NET, CentOS, Windows Server, AWS, Sophos Firewall, Jira, Citrix Netscaler, NetApp, VMware
Penetration Tester
Anonym
- Infrastructure penetration testing
- Web application and web service penetration testing
- Wireless network testing
- Consulting on fixing security issues
- Tech Stack: Windows Server, Windows and macOS clients, React, Sophos Firewall, Cisco routers
Penetration Tester
Anonym
- Infrastructure penetration testing
- Web application and web service penetration testing according to OWASP, BSI, MITRE ATT&CK
- Consulting on fixing security issues
- Tech Stack: MEAN stack, Linux, F5 Firewall, NetApp
Penetration Tester
Anonym
- Vulnerability assessment and threat modeling for web applications and e-commerce
- Advising on fixing security vulnerabilities
- Tech Stack: Magento, Salesforce, Windows Server, Sophos Firewall, Jira
Security Engineer (Penetration Tester) and Web Developer
Vesper Development Ltd.
- Creating websites and online presences
- Providing customer support
- Automated security analysis and penetration testing
- System hardening
IT Support and Administration
Niké Ltd.
- Supporting the setup and operation of data centers
Industries Experience
See where this freelancer has spent most of their professional time. Longer bars indicate deeper hands-on experience, while shorter ones reflect targeted or project-based work.
Experienced in Information Technology (13.5 years), Banking and Finance (2 years), Government and Administration (1.5 years), Insurance (1 year), Transportation (1 year), and Professional Services (1 year).
Business Areas Experience
The graph below provides a cumulative view of the freelancer's experience across multiple business areas, calculated from completed and active engagements. It highlights the areas where the freelancer has most frequently contributed to planning, execution, and delivery of business outcomes.
Experienced in Information Technology (18.5 years), Operations (7.5 years), Quality Assurance (4.5 years), Project Management (4 years), and Audit (2 years).
Skills
.Net
Java
Python
Sql
Linux
Centos
Windows Server (2008, 2012, 2016)
Aws
F5
Sophos Firewall
Azure
Jira
F5 Load Balancer
Citrix Netscaler
Netapp
Weblogic
Fortinet
Salesforce
Barracuda
Sso
Saml
Openid
Oauth
Ios
Android
Aruba
Datadog
Burp Suite Pro
Nessus
Openvas
Nmap
Wireshark
Sslyze
Dirbuster
Nikto
Metasploit
Sqlmap
Netsparker
Splunk
Remedy
Fortify
Owasp (Top 10)
Mitre Attack
Osstmm
Nist
Gematik
Iso 27001
Bsi
Languages
Education
Middlesex University
MBA · United Kingdom
Diploma · IT and Cyber Security · United Kingdom
Certifications & licenses
Financial Modeling And Valuation Analyst
Google Project Manager Professional
Offensive Security Certified Professional (OSCP)
Certified Ethical Hacker (CEH)
Profile
Frequently asked questions
Do you have questions? Here you can find further information.
Where is Alexander based?
What languages does Alexander speak?
How many years of experience does Alexander have?
What roles would Alexander be best suited for?
What is Alexander's latest experience?
What companies has Alexander worked for in recent years?
Which industries is Alexander most experienced in?
Which business areas is Alexander most experienced in?
Which industries has Alexander worked in recently?
Which business areas has Alexander worked in recently?
What is Alexander's education?
Does Alexander have any certificates?
What is the availability of Alexander?
What is the rate of Alexander?
How to hire Alexander?
Average rates for similar positions
Rates are based on recent contracts and do not include FRATCH margin.
Similar Freelancers
Discover other experts with similar qualifications and experience
Experts recently working on similar projects
Freelancers with hands-on experience in comparable project as a Security Expert
Nearby freelancers
Professionals working in or nearby Munich, Germany