Sven T.

IT Security Architect | Process Analyst

Weimar, Germany

Experience

Jan 2025 - Dec 2025
1 year

IT Security Consultant

Diehl Aviation

  • Analysis and structuring of specific IT security requirements
  • Building a structured requirements backlog as a basis for the division’s IT security projects (including differentiation from group-wide programs)
  • Conducting a systematic delta analysis against group-wide IT security requirements to identify open needs and dependencies
  • Developing a multi-level IT security roadmap including implementation and project planning, aligned with internal and external stakeholders
  • Technical project management at the program level, including status analysis, risk management, action tracking, and goal monitoring
  • Coordinating internal departments and external service providers, including communication planning and management of regular status meetings
Jan 2024 - Dec 2025
2 years

IT Security Consultant – SIEM Readiness & PCI/BAIT/KRITIS Compliance

  • Further development of the SIEM system (QRadar) including the design and implementation of log onboarding for critical assets (PCI-relevant, BAIT/KRITIS-compliant)
  • Definition and implementation of PCI-relevant use cases to detect security-critical incidents
  • Project planning and milestone management for audit preparation (including creating schedules and assigning responsibilities)
  • Requirements management for SOC services, conducting RfI/RfP processes and evaluating external providers
  • Creating audit-proof policies and process documentation (e.g. log onboarding, use case lifecycle, incident detection)
  • Conducting workshops on log onboarding with business units and deriving technical requirements
  • Audit preparation and support (PCI, BAIT, KRITIS) including action tracking based on identified findings
Jan 2024 - Dec 2024
1 year

IT Security Consultant – Coordination and Implementation of BAIT & DORA Requirements

  • Deriving and detailing regulatory measures (BAIT, DORA), integrating them into the ISMS
  • Creating and reviewing policies (e.g. use case lifecycle, incident handling)
  • Managing the tender process for SIEM/SOC (RFI, RfP, evaluation, PoC support)
  • Evaluating and selecting external service providers for CDC operations
  • Strategically advancing application monitoring along MITRE ATT&CK
  • Aligning with business units, risk management, and IT security
Jan 2023 - Dec 2024
2 years

Cyber Defense Consultant – Building IT Security Process Architecture & Tool Integration

  • Designing and building the entire process landscape for security incidents, use case management, vulnerability management, playbooks, and SIEM operations, including full BPMN 2.0 modeling with Adonis and integration into the ISMS
  • Selecting, integrating, and operationalizing tools like Tenable, SIEM & SOAR, including defining use cases and interfaces with IT operations and risk management
  • Establishing central control processes in ServiceNow, including workflow design and automation of the security process chain
  • Coordinating all involved departments and units to harmonize security-related workflows
  • Maintaining and expanding a central change management database to control security measures and release cycles
  • Conducting maturity analyses and publishing processes under regulatory requirements (BSI, NIS2, KRITIS)
Jan 2023 - Dec 2024
2 years

SIEM Onboarding Manager – OT Monitoring & Tenant Integration

  • Developing a group-wide onboarding strategy for monitoring and integrating OT components into the central SIEM (Splunk)
  • Designing and establishing the organizational onboarding process for internal rail tenants (CDC integration)
  • Conducting technical workshops with tenants, including identifying relevant OT assets, assessing connectivity, and clarifying log formats
  • Defining and prioritizing use cases to cover security-relevant OT events in critical environments
  • Creating technical onboarding concepts (e.g. via syslog, API, agents) in coordination with SIEM and SOC teams
  • Closely collaborating with Security Operations and CDC to translate tenant requirements into use cases and alert processes
Jan 2023 - Dec 2024
2 years

Security Analyst – Operationalization of Vulnerability Management & Incident Response

  • Selection, implementation and configuration of a vulnerability management tool (Tenable), including definition of roles, responsibilities and evaluation cycles
  • Support of the introduction and optimization of endpoint protection (Palo Alto Cortex XDR, CrowdStrike) and integration into existing analysis processes
  • First line incident handling & optimization of detection processes, including analysis, escalation logic and handover to L2/L3
  • Coaching and enabling the SOC team, including operational training, process clarification and optimization of the ticketing system
  • Contributing to the operationalization of use case processes and alerting workflows, aligned with KRITIS-relevant requirements
  • Documentation and embedding of the new processes into the ISMS, including supporting guidelines for incident handling and vulnerability assessment
Jan 2022 - Dec 2023
2 years

IT Security Officer – Implementation of Enterprise Security Use Cases

German Development Bank FFM

  • Development and implementation of standard use cases in Splunk Enterprise Security
  • Testing developed use cases to ensure functionality and quality
  • Documenting use cases and processes in the relevant tools
  • Creating playbooks to support SOC operations
Jan 2021 - Dec 2022
2 years

IT Security Consultant for Security Operation Processes

German Private Bank

  • Development of processes for the technical integration of infrastructure and application components into a Splunk SIEM system in the AWS Cloud
  • Coordination of processes with internal stakeholders and relevant stakeholders
  • Detailed process documentation and ensuring and creation of overarching guidelines
  • Support of the process implementation, including workshops
  • Integration of infrastructure components and development of use cases
  • Setup of monitoring and alerting processes for the SIEM system
Jan 2021 - Dec 2022
2 years

IT Security Assessment and Recommendations

Cooperative Bank

  • Recording and assessing project status for identified IT security vulnerabilities
  • Analyzing and evaluating remediation measures defined by business units
  • Documenting progress and providing an overview of next steps
  • Coordinating audit preparations and consolidating relevant information and measures into a detailed project plan
  • Developing recommendations for vulnerability remediation and optimizing security measures
Jan 2020 - Dec 2021
2 years

IT Security Consultant – Process Analysis, Monitoring Concepts, Vendor Management

  • Analysis of process structures of two global IT security service providers
  • Identification and development of approaches to standardize vendor management
  • Definition of standardized "Reason Codes" for uniform classification of IT security incidents
  • Development of basic structures for consistent KPI reporting across various IT security areas
  • Derivation and implementation of measures to improve vendor management and monitoring
Jan 2019 - Dec 2020
2 years

IT Security Process Map Analysis, SOC Collaboration

E-Commerce

  • Cataloging the security operation processes and identifying existing gaps
  • Defining the necessary processes to close security gaps
  • Focusing on attack vectors in the webshop and securing them
  • Log analysis and collaborating with internal stakeholders to create use cases
  • Prioritizing and implementing use cases and integrating them into the SIEM system
  • Creating necessary playbooks to support SOC operations
Jan 2018 - Dec 2019
2 years

Product Owner Process Analysis and CIS Checks

Semiconductor Group

  • Taking on the role of Product Owner for an internal Scrum team in an agile project environment
  • Analyzing, documenting, and clustering existing IT security processes
  • Identifying process and system gaps and developing measures to close these gaps (focus on AWS-based system landscape and its security optimization)
  • Implementing an alert system for CIS checks in AWS to notify security experts in cloud projects

Summary

I have built my career designing and implementing IT security strategies and processes across various industries, from aviation and banking to e-commerce and semiconductor sectors. I focus on clear, structured requirements analysis, developing and integrating SIEM, incident response, and compliance frameworks. I leverage hands-on experience in regulatory measures like PCI, BAIT, DORA, and KRITIS to create robust security architectures.

My expertise extends to orchestrating cross-departmental coordination and guiding the selection and onboarding of technical security tools. I combine analytical process analysis with effective project and change management to safeguard critical assets and ensure reliable security operations.

Languages

German
Native
English
Advanced

Education

Otto von Guericke University Magdeburg

Master of Science · Industrial Engineering

Certifications & licenses

AWS Practitioner

IT Baseline Protection Practitioner (BSI)

Information Security Officer ISO 27001

Product Owner

Professional Scrum Master PSM II

Professional Scrum Product Owner PSPO I

Scrum Master

Six Sigma

Six Sigma Green Belt

Splunk Administrator

Splunk Power User 27001, BSI, BAIT, NIST, DORA, KRITIS, PCI

Need a freelancer? Find your match in seconds.
Try FRATCH GPT
More actions