Skills:
Skills:
Skills:
Skills:
I planned and redesigned the Symantec Endpoint Protection infrastructure for over 10,000 Windows and Linux endpoints, modeled and adjusted policies for compliance, and administered and managed the endpoint security solution. Key tasks included antimalware protection, incident response, forensic analysis, malware analysis, lifecycle and patch management, reporting, and collaboration with business units in 2nd and 3rd level support. SQL jobs and scripts were tested and adjusted as needed.
I managed the existing Hyper-V data center and McAfee Endpoint Security with ePO while redesigning the infrastructure. The goal was to migrate on-premise McAfee Endpoint Security to Microsoft Defender. I planned strategy and implementation, created presentations with product comparison matrices, conducted workshops on Defender suite technologies, and showed how Defender 365 products reduce attack surfaces. Securing Microsoft 365 services, policy configuration, and system hardening were also key tasks.
Skills:
Since 2016 I worked for Sparkassen Finanz Informatik in cybersecurity/defense, compliance, information security management, business continuity, cloud security, Azure Entra ID, IT service management, audits, regulation, license management, product lifecycle, security infrastructure design and support.
For planning and implementing a Microsoft Azure security architecture I followed these steps:
Additional tasks:
In vulnerability management I ran Qualys, planned scans, generated reports, and escalated to stakeholders. I prepared and supported security audits for regulatory compliance. Other work:
Skills:
I handled governance, risk & compliance and IT operations at VW locations: Managing encryption and signature updates on endpoints, migrating ePO from version 4 to 5, evaluating and deploying MOVE AV in Citrix VDI, domain controller security with McAfee Change & Application Control, McAfee SIEM administration, creating product comparison matrices, migrating F-Secure and Symantec to McAfee, SIEM reporting, evaluating Rapid7/Qualys/Nessus/IBM SIEM, gateway administration, documentation, incident & escalation management, patch & release management with Microsoft System Center, and 2nd/3rd level support.
Skills:
My core work included central management of McAfee ePolicy Orchestrator servers and infrastructure, API scripting, SQL scripting, migrations and updates, policy, task, antivirus, intrusion, firewall rule automation, vulnerability and disk encryption management, IT disaster planning, enforcing and reviewing policies, reporting, and test environments. I recently completed migrating ePO from v4.x to v5.x for a multi-tenant antivirus system, handling heterogeneous environments, replacing Symantec with McAfee on 5000 units, working with virtualization, networking, databases, and security teams. I optimized performance by 30–50%, and replaced SQL Server 2005 with a clustered SQL Server 2008 R2 solution. I manage ODBC, users, security, roles, rights, maintenance plans, emergency planning, queries, performance with PowerShell and SQL Monitor, analyze IPsec traffic, and report to stakeholders. In daily ops I handle vulnerability management, audits, reporting, documentation, updates, custom scans, logs, incident response, lifecycle, licensing, policies, SCCM packaging, and escalations.
Skills:
From January 2011 to December 2012 I worked freelance for Unisys in Munich in 2nd/3rd level support. I supported the Bavarian justice system and ministry, migrating Windows XP/Office 2003/Server 2003 to Windows 7/Office 2010/Server 2008 R2. I provided technical and admin support to teams, user and role management, GPO maintenance, cross-site integration, patch & release management, ensured network availability with Nagios and System Center, followed BSI baseline guidelines for SLAs and incident management, managed file/print servers, Exchange, data security and recovery, SQL server admin, and helped design infrastructure with VMware and Citrix.
Skills:
I worked with the security team to migrate ePO from 3.x to 4.x: policies, tasks, agents and antivirus components. I integrated and adjusted ePO structure with global AD schema, created client/server tasks, user auditing, server/auth config, incident analysis and remediation, SQL Server 2005/2008 admin, database migration, instance setup, performance tuning, backups, ITIL incident/change management, documentation, reporting, and training for international branches.
Skills:
Parallel to Brose Automotive project I:
I ran both old and new domains concurrently via a bidirectional trust and DFS namespace with Robocopy jobs for data sync. I defined and rolled out GPOs, deployed printers via PushPrinterConnect.exe, set up RemoteApps on terminal servers, migrated users with ADMT retaining old SIDs for CRM, implemented a new backup for HP Tape Library with CA Arcserve Backup 12.5 on Server 2008, and provided user support and documentation.
Skills:
I worked as an IT technician in Germany’s largest private security service center during a merger. I integrated diverse LAN, WAN, WLAN, FC segments into the central data center, managed active and passive network components, optimized office processes for incompatible file formats, proposed a Drupal-based CMS wiki, migrated clients/servers from Windows 2000/XP to XP/Vista and Windows Server 2000/2003 to 2003/2008, migrated servers to VMware ESX 3.5, supported 24x7 helpdesk with OTRS, monitored with Nagios and GFI Network Server Monitor, managed AD, GPO, print, remote sites, Office users, Citrix Metaframe, network security with Symantec, McAfee, TrendMicro, SonicWall, Cisco, and administered SQL Server 2000/2005/2008, Exchange 2003/2007. I combined technical skill, teamwork, and communication to drive efficient workflows.
Skills:
Discover other experts with similar qualifications and experience
2025 © FRATCH.IO GmbH. All rights reserved.