Bernhard Bowitz
Senior Security Architect
Experience
Senior Security Architect
Intermediate Beratung
- Consulting on an ongoing IT security architecture project
- Documenting past progress and planning next steps
- Applying and implementing the BSI IT baseline protection
- Building and maintaining security management systems
- Applying the ISO 27001 standard series
- Integrating ITIL processes into security architectures
- Collaborating with public clients, regulatory authorities and internal and external service providers
Security Consultant / Project Manager
- Securing a large Europe-wide network in a VS-NfD project in the KRITIS sector
- Consulting, planning, review and documentation
- Technical consulting in the network area including migration planning, segmentation and IP harmonization
- Support in the regular operation of the security infrastructure based on BSI C5 and BSI 200-2
- Focus on SIEM and SOC platforms and generating use cases and playbooks
- Identifying, planning and independently implementing projects to improve the security infrastructure
- Technical, hands-on project management and leading internal teams
- Compliance with VS-NfD requirements and VSA classification regulations
Project Manager / Consultant
- Consulting, planning and hands-on project management for a closed on-premises high-security network
- Focus on BSI, VS-NfD, VSA, ITSCM as well as SOC, SIEM and ISMS/KRITIS in OT/IoT
- Technical consulting in the network and data center area
- Support in the regular operation of security infrastructure and LAN/WAN environment
- Development of use cases and playbooks on the Splunk platform
- Implementing security infrastructure projects in the existing data center
- Development and ongoing updates of the GENU VPN architecture
- Architecture and development work in Windows and Linux environments
- Network segmentation as well as testing and extending the LAN/WLAN environment
- Reviewing and updating the HPE/Aruba switching platform and gateway
- Introducing EDR (endpoint security) and DriveLock encryption
- Improving email security with DLP and ProofPoint
- SharePoint project management and reporting to C-level and board of directors
- Leading the IT security department and coordinating vendors and service providers
Project Manager / Consultant
- Consulting on the architecture of an on-premises hospital network
- Renewing the network to the current B3S security standard
- Managing infrastructure services like DNS, DHCP and RDP
- Advising on security regulations in the healthcare sector
- Implementing a SIEM and SOC platform
- Consulting on tendering and implementation for a closed high-security network
Project Manager
- Architecture, design and implementation of a complete rebuild of a third-party connection platform and data gateway
- Supporting several thousand users in the VS-NfD environment at NATO security level
- Integration of Deep Security Enterprise solutions such as Opswat, Infodas and S-Dot
- Documentation and vulnerability analysis in the IoT/OT domain
- Implementing IAM/PAM/LDAP in the government network following BSI KRITIS requirements
- Developing connection solutions like Thin Client, SINA, Terminal Services and ReCoBS
- Requirement analysis for data gateways and SOC platforms with Splunk
- Script development with PowerShell, VBS, Batch and Ansible
- Managing the BCM-GRC HiScout Suite
- Compliance with the Classification Regulations (VSA) as well as EU and NATO requirements
- Conducting training workshops and preparing audited project documentation
Network Architect
- Network architecture based on BSI IT baseline protection for on-premises environments
- Design and rebuild of a SIEM (Splunk, Wazuh) and planning of SOAR/SOC/CDC as well as IAM/PAM
- Development of a cyber security strategy for on-premises and cloud
- Support of the DriveLock implementation from design to production
- Build and design of a geo-redundant data center
- Introduction of Elastic SIEM with Siemplify SOAR
- Container management with Kubernetes
- Analysis of security events and incident response planning
- Introduction of IAM/PAM tools such as CyberArk REST API, Omada and Saviynt
- Configuration of Stormshield and Cisco firewalls in separate private networks
- Rollout of TrendMicro Deep Security servers and agents
Technical Pre-Sales Lead
ERP/ SCM System Singapore Pte
- Preparation of a blockchain-based security platform (PAM/IAM/SIEM/SOC/SOAR)
- Leading the sales team and technical training
- Architecture and customized concepts for new clients
- Creating proposals and technical support during implementation
- Development based on blockchain technology and Wazuh
Development Lead
SecureScrypt Team
- Development of a cloud management platform with a payment gateway for SaaS sales
- Architecture of a private cloud with no connection to AWS or Azure
- Development of the SentosaXchange payment gateway for marketplace transactions
- Implementation of Splunk as a security platform, including SOC use cases and playbooks
- Integration of IAM and PAM services
- Training staff in cloud service administration
Project Manager / Consultant
- Integrator of a complete EPM, IAM, PAM, PSM, and Vault system, onboarding 64 AWS environments in a military environment
- Setup of a system with security gateways, HSM, DDI, and PKI
- Implementation of BSI and BMWi guidelines to NATO level
- Setup of an endpoint security solution with DriveLock
- Migration and implementation from BeyondTrust to CyberArk REST API
- Administration of RHEL OpenShift and integration of the OMADA IAM/PAM Identity Suite
- Script development with PowerShell, VBS, Batch, and Ansible
- Migration of CyberArk environments from version 10.x to 11.x
Security Developer
SecureScrypt Pte. Ltd.
- Development of a blockchain security framework
- Implementation of encryption using QKD (Quantum Key Distribution) over fiber optics between two data centers
- High-security development for financial applications
Lead Project Manager / Consultant
- Cyber security in embedded automotive platforms
- Planning and implementation of CyberArk (EPM, PAM, PSM), IAM, and SIEM/SOC
- Container management with Kubernetes
- Integration of the OMADA (OIS) IAM/PAM Identity Suite
- Conducting penetration tests with Wireshark and Aircrack
- Budget planning and negotiations with vendors
Sub-project Consultant
- Introduction of SOC/SOAR platforms including Siemplify, Splunk, and Wazuh
- Technical consulting, planning, and implementation in the aviation and logistics sectors
- Pre-sales design and vendor management
- Introduction of business continuity processes (ITSCM) and ISMS in critical infrastructure (KRITIS)
- Conducting penetration tests in the Azure cloud environment
- Creating scripts with PowerShell and documentation in an agile environment
Project Manager / Technical Project Manager
- Design and implementation of a Europe-wide security system for the ECB 4CB network
- Integration and customization to BAIT and MaRisk requirements
- Integration of HiScout GRC within the BSI IT baseline protection
- Cloud operation with QRadar, NexPose, and TheHive
- Planning penetration tests with Burp Suite and Metasploit
- Preparation for cloud migration to Azure and AWS
Global Project Manager
- Architecture, planning, and integration of DLP, ATP, EDR, and Anti-DDoS systems
- Implementation of ISMS, SIEM, and SOC
- Preparation for cloud migration with Splunk in an agile environment
- Introduction of the OMADA IAM platform for cloud environments
- Development of a blockchain security infrastructure
- Design and rollout of the Azure cloud migration
- Management of system integrators and vendors
Security Compliance Consultant
Deutsche Bank
- Development of an ISMS concept in compliance with GDPR
- Participation in the development of a global network of approx. 25,000 servers
- Development of a SIEM based on Splunk and HP ArcSight
- Application of patch and update processes in mainframe, Unix, and Linux environments
- Endpoint security management with IBM BigFix and Tanium
- Conducting penetration tests in wireless and cloud networks
- Reorganization of admin rights (AMR4V)
Senior Enterprise Security Architect
- Documentation and implementation of security requirements according to BSI 100 Basic Protection and ISO 27XXX
- Consulting on 3G/5G network security and risk analysis
- Designing a SOC/ISMS and developing a VMware concept (SaaS)
- Using automation tools like Ansible and Terraform
- Creating cryptography solutions for mobile environments and documenting embedded software
Consultant / Trainer
- Developing training concepts for IT security based on BSI Basic Protection and ISO 27001
- Conducting workshops on SOC and SIEM
- Designing defense measures against targeted attacks
- Performing penetration tests and security analyses with Wireshark
- Consulting on securing firewalls and VPN gateways
Consultant / Team Member
- Expanding and securing the GSM-R network and planning the transition to LTE
- Implementing an ISMS under BSI Basic Protection and ITSig
- Building a SOC/SIEM including use-case and playbook frameworks
- Threat analysis according to ISO 27001 and BNA 109
- Risk and change management as well as vendor management
Team Member / Project Manager
- Migrating and expanding the data center and rebuilding the facility
- Connecting to black fiber and system analysis
- Structuring the SOC and expanding the SIEM
- Installing PKI components and working with hardware security modules (SINA, SafeNet)
- Migrating from SSL-SHA1 to SHA-2 and ADS patching
- Risk and residual risk analysis for high-availability networks
Technical Director
Neoi Pte. Ltd.
- Software and hardware development as well as PCB layout
- Developing security concepts for Windows and Unix environments
- Developing modern encryption for military and government sectors
- Developing TV and payment applications for Android and iOS
- Managing an international team of over 100 developers
- Implementing a network security platform with SINA and AVDA
- Securing clouds with PKI-based security
Senior Systems Engineer / Manager
PIC Pte. Ltd.
- Management of 200 technical staff in Hong Kong, China and South America
- Design of new IT security and network solutions
- Design and implementation of IP/VoIP systems for service providers
- IT risk management, analysis and delivery of training
VP IT / Head of Asia Pacific Group
Credit Suisse First Boston
- Global engineering and infrastructure support team leadership
- Analysis of existing networks for security risks
- Development of new risk solutions and migration of systems to Windows
Senior Systems Engineer
- Planning of 5G mobile networks following security standards such as 3GPP
- Installation of terminal server networks for Swiss banking groups
- Experience in packet protocol as a basis for GSM systems
- Development of encrypted mobile devices and satellite phones
SVP
Goldtron Group Singapore Pte. Ltd.
- Head of the Singapore development group and main coordinator of the Hong Kong team
- Design of the MXI platform for combined mobile and VoIP services
- Installation of the first VoIP network in Malaysia
Interim CTO
Lintux Hong Kong Ltd.
- Acquisition of new clients and order coordination with Chinese factories
- Training of technical staff and technology transfer
- Development of IP systems
Senior Consultant
Merrill Lynch International Inc.
- Network migration from Novell to Windows and Transaction Server
- Development of investment applications for stock market monitoring
- Integration of Reuters and Bloomberg live feeds
- Implementation of the first security requirements for banks in the investment area
Contract Engineer
PIC Intl. Hong Kong
- Project implementations in Iraq, Lebanon, Syria and Saudi Arabia
- Installation of complete radio communication networks
- Development of the first encrypted satellite phone
RF Development Engineer
Pathcom Inc.
- Development of CB and UHF radio systems
- Oversight of manufacturing in the USA and Japan
- Development of the first Asia-made radio synthesizer and UHF transceivers
Developer
Taitoma Group
- Design and development of software and hardware for Asian manufacturers
- Implementation of project management methods and strategic leadership
- Development of IT security and risk mitigation solutions
Summary
More than 30 years of experience as a technical IT engineer, project manager and sales analyst—see full CV for details.
For over 15 years I have specialized in digital (cyber) security and bring deep technical and consulting expertise in highly sensitive areas such as VS-NfD, NATO security projects, aviation security (LSÜ2) and government IT security. I am Ü2 certified and have extensive experience with BSI courses and international standards (ISO 27001, NIST, ENISA).
I have designed, proposed, developed and hands-on implemented multiple VSA-compliant security solutions for data processing up to the "SECRET" classification level—in both consulting and technical roles.
Skills
Support Clients In Finding The Right Business And Technology Solutions As A Consultant Designing Cutting-edge Security Architectures.
Expert In Classification Regulations (Vsa), Especially The Four Classification Levels: Vs-nfd, Confidential, Secret, Top Secret.
Core Topics:
- Secure Hardware Development (Layer 2 Network Devices, Mobile Security Solutions)
- Security Architectures Following Vs-nfd Guidelines
- Development And Hardening Of Mobile Platforms (Smartphones, Tablets)
- Vulnerability Analysis And Implementation Of Protections
- More Than 15 Years Of Experience As An Analyst In It, Ot, Etc.
- Ot – Managing Physical Operations
- Iot – Bridging Physical Devices (Ot) To Digital Systems (It)
- Kritis – Critical Infrastructures Including It And Telecom, Finance And Insurance, Energy (Electricity, Gas, Oil, District Heating), Public Sector, Military Environment
- Vsa – Classification Regulations For The Four Classification Levels
Technical Strengths & Technological Expertise – Consulting & Technical Implementation (Selection):
- Many Years Of Experience As A Certified Security Consultant (Bsi 100–200, C5, Vsa Isms, Grc, Bcm, Hiscout Suite)
- Implementing Kritis With An Isms In Risk Management To Ensure The Joint Security Goals Of Availability, Confidentiality And Integrity Of Information And Systems
- Hands-on Project Management And Technical Implementation In Soc, Siem, Soar (Splunk, Ibm Qradar, Exabeam, Thehive, Cortex, Arcsight)
- Use Of Drivelock (Edr, Device & Application Control), Cyberark Epm, Pam, Psm, Beyondtrust, Zscaler, And More
- Consulting On Processing Classified Information Under Vs-nfd Criteria (National & International)
- Architecture And Implementation Of It Security Solutions In Government Environments (Germany, Nato, Eu, Usa, Embassies)
- Kritis – The Critical Infrastructures That Need Special Protection From Cyber Attacks And System Failures To Ensure Stability And Safety Of Society
Iam & Pam Expertise:
- Implementation Of Abac/rbac Solutions In Conjunction With Identity & Access Management (Iam)
- Development Of Secure Access Architectures For Cloud And Devops Environments (E.g. Cyberark Rest Api, Empowerid, Saviynt)
- Planning And Integration Of Pki, Ssl Certificates, Hsm, Ms Ndes, Safenet, And More
Project Experience & Roles (Skill Foci):
- Project Management, Pmo, Agile Coach, Technical Project Manager (Hands-on), Security Consultant
- Development Of Secure Products (Hardware And Software), Including Mobile Border Scanners, Fingerprint Solutions, Sim Card–based Authentication
- Client Focus: Public Sector, Military, Government Agencies, Banks, Insurance, Automotive, Energy And Transport
Industry Know-how & Regulations:
- Finance Sector: Dora, Bait, Vait, Risk And Compliance Management, Incident Response
- Industry & Military: Itscm, Network Security, Vs-nfd, Nato Standards, Bsi Basic Protection
- E-government: E-banking, Secure Digital Identities, Smartcard Authentication
Technology Stack (Selection):
- Security Tools: Splunk, Arcsight, Qradar, Wazuh, Exabeam, Thehive, Cortex, Misp, Nexpose, Zalert
- Penetration Testing: Wireshark, Metasploit, Acunetix, Burp Suite, Aircrack
- Cloud Platforms: Aws, Azure, Strato, Telekom Cloud – Incl. Cloud Security & Migration
- Scripting & Programming: Powershell, Batch, Vbs, Java, C++, Sql, .Net
- Os & Infrastructure: Windows Server (2003–2022), Linux/unix, Rhel/openshift, Oracle
- Protocols & Architecture: Vlan, Ngw, Ddi, Pap Structures, Secure Segmentation
- Blockchain & Quantum Security: Own Platform Developments & Research Since 2020
Soft Skills & Working Style:
- Analytical And Structured Approach
- Strategic Thinking With A Focus On Execution
- Expert-level Technical Understanding
- Team Leadership Up To 80 People, International & Remote
- Excellent Documentation, Training And Presentation Skills
Hardware Competence (25+ Years Experience) – Security Hardware & Biometrics:
- Developed The First Portable Android-based Passport Scanner With Integrated Multi-fingerprint Recognition For Border Control, Police, Bka And Banks
- Developed Patented Biometric Systems Based On Fingerprint Recognition (E.g. Nurugo Technology)
- Integrated Secure Sim And Sd Cards For Passwordless Authentication In Mobile And Stationary Security Applications
Embedded Systems & Cryptography:
- Experience In Designing And Implementing Security-critical Embedded Hardware With Hardware-based Encryption Mechanisms (Aes-256, Diffie-hellman, Quantum Ready)
- Research And Development In Quantum Computing–based Encryption (Since 2020)
Security Components & Interfaces:
- Development And Integration Of Nfc And Smartcard Technology
- High-security Solutions For Transactions (Uaf, Biometric)
- Hardware Security Modules (Hsm) & Key Management Systems (Kms)
- Pap Architectures (Packet Filters, Application Layer Gateway)
Production & Technical Implementation:
- Lead Prototype Development, Production Control And Documentation Of Security-critical Hardware
- Rollout Of Security-certified Devices In Cooperation With Government, Military And Civilian Organizations Worldwide
Software And Technology Competence – Cloud & Infrastructure:
- Planning, Architecture And Migration Of Cloud Environments (Aws, Azure, Strato, Telekom Cloud)
- Building Secure Cloud Platforms With Marketplace Integration For Cloud Services (Xaas, Saas, Iaas)
- Virtualization And Automation Solutions (Vmware Vrealize, Vmware Cloud Foundation, Ansible)
Cybersecurity Solutions:
- Siem/soc/edr: Splunk, Ibm Qradar, Exabeam, Hpe Arcsight, Elk/elastic Siem, Thehive, Cortex, Nexpose, Misp
- Endpoint Security: Fireeye, Sophos, Trendmicro, Drivelock (Device Control, Application Control, Encryption)
- Iam & Pam: Empowerid, Cyberark, Beyondtrust, Saviynt, Psm, Pvwa, Cpm, Abac/rbac Integration, Epm, Pam, Psm
- Pki & Certificate Management: Ms Ndes, Safenet, Ssl/tls, Hsm Integration
Network & Security:
- Network Analysis And Segmentation: Vlan, Ngw, Ddi, Pap Architecture
- Penetration Testing: Metasploit, Burp Suite, Acunetix, Aircrack, Wireshark
- Security Architectures For Classification Levels: Vs-nfd, Vsa, Nato Secret/restricted, Usa/tc Standards
Software Development & Scripting:
- Languages: Java, C++, .Net, Sql, Json
- Scripting: Powershell, Vbs, Batch
- Source Code Analysis, Extensions, Adaptations & Fixes
- Version Control & Devops: Git, Gitlab, Ci/cd Integration
Standards & Regulations:
- Iso/iec 27001, Bsi 200-2, Bsi C5, Nist, Enisa, Gdpr, Dora, Bait, Vait
- Emergency Management According To Bsi 100-4
- Risk Management, Grc, Business Continuity Management (Bcm)
- 5g Security Tools, Palo Alto Networks, Zscaler Zero-trust, Cisco, Fortinet, Proofpoint
Roles & Responsibilities In Projects – Project Leadership & Management:
- Project Manager/pmo For Complex It And Security Projects With Up To 80 Team Members – Local And International (Remote/on-site)
- Responsible For Project Planning, Budget, Schedule, Quality And Risk Control
- Applying Agile Methods (Scrum, Kanban, Safe), Certified In Jira & Atlassian Suite
Consulting & Technical Expertise:
- Enterprise Security Consultant Focusing On High-security Requirements In Government/military And Industrial Environments
- Analysis And Evaluation Of Existing Security Architectures
- Development Of Tailored Security Solutions According To International Standards
- Point Of Contact For Classified Information Processes (Vs-nfd, Nato, Eu, Usa, Embassies)
Security Operations & Incident Response:
- Setup And Operation Of Siem And Soc Environments Including Use Case Development, Playbooks, Escalation Chains
- Consulting And Technical Implementation Of Soar Automation (Splunk, Cortex Etc.)
- Vulnerability Management & Assessment Including Cdc Interface And Incident Documentation
Product Development & Innovation:
- Development Of New Security Products (Hardware & Software) From Concept To Market Launch
- Technical And Commercial Leadership In Pre-sales And Sales Situations
- Supporting Research Teams With Trend Analysis And Market Introductions For Innovative It Security Solutions
Languages
Education
Philipp Reitz Polytechnic
Diploma in Engineering · Frankfurt, Germany
Humanistic Gymnasium Wiesbaden
Wiesbaden, Germany · 1.1
TU Darmstadt
Electrical engineering, electronics, mathematics, physics · Darmstadt, Germany
Certifications & licenses
AISP
BSI 100 / BSI 200 / C5 certification
BSI C5
BSI Basic Protection
CISA
CISM
CISSP
ISO/IEC 27001 & 20001
ISO27001
ITILv3
MCP
Prince2
Ü2 / LSÜ2
Similar Freelancers
Discover other experts with similar qualifications and experience