Summary
Overview
Work History
Education
Skills
Languages
Timeline
Generic

Patrick Bahizi

Perwez

Summary

Accomplished engineer proffering extensive cloud monitoring, deployment and troubleshooting skills. Defined, built and maintained infrastructure using vendor-neutral and platform-specific tools. Organized and focused person with extraordinary leadership acumen. Watchful professional offering comprehensive, hands-on experience identifying, investigating and responding to information security alerts. Expertise in searching through data-sets to detect threats and anomalies and administering metrics to maintain security processes and controls. Focused on helping businesses safeguard sensitive data from hackers and cyber-criminals.

Overview

15
15
years of professional experience

Work History

Cloud Security Engineer

Toyota Motors Europe
09.2018 - Current
  • As a Cloud Security Engineer, I led the adoption and management of comprehensive cloud security solutions on Azure platforms, focusing on Identity Access Management (IAM), Data Loss Prevention (DLP), and encryption to secure data and transactions. I spearheaded the integration of identity federation systems and the application of cryptography to maintain data integrity and confidentiality. My role involved developing and enforcing strict security policies compliant with GDPR, HIPAA, and PCI-DSS standards, and implementing robust defense mechanisms against web-based threats such as SQL injection and XSS.
  • I played a key role in vulnerability management, including regular security assessments and the management of web application firewalls to safeguard against unauthorized data access. My collaborative efforts with DevOps teams integrated security into CI/CD pipelines, fostering a security-first mindset. I enhanced user sign-in security through Multi-Factor Authentication (MFA), facilitated seamless access management via Azure AD and Active Directory integration, and streamlined user experience with Single Sign-On (SSO) solutions.
  • To ensure privileged access security, I implemented Privileged Access Management (PAM) and role-based access controls (RBAC) with just-in-time (JIT) access. Additionally, I managed Azure Privileged Identity Management (PIM) for secure privileged access operations and enforced periodic access reviews to comply with security mandates.
  • In deploying microservices on Azure Kubernetes Service (AKS), I was instrumental in setting up Ingress API Gateway, databases, and reverse proxy servers with SSL/TLS encryption. My technical proficiency extended to deploying CI/CD systems using Azure DevOps on Kubernetes, leveraging Terraform, Packer, and Ansible for infrastructure automation, and maintaining continuous integration with GitHub/Azure DevOps, enhancing secure code deployment practices.

Security Analyst

Dimension Data, Sibelga
04.2017 - 09.2018
  • Implementation of security systems architecture
  • Evaluate and integrate new security technologies and controls
  • Conduct system vulnerability assessments and define risk mitigation strategies
  • Collaborate with IT teams to align security technologies with business requirements
  • Developed and optimised security operations and monitoring tools
  • Assisted in the deployment of intrusion detection and prevention systems
  • Implemented firewall policies and managed VPN configurations
  • Conducted regular security audits and compliance checks
  • Supported senior engineers in the daily administration of security tools
  • Participated in the incident response team to handle security breaches
  • Assisted in the development of organisation-wide security policies
  • Provided technical support for security-related issues.

Network Security Analyst

Euroclear Bank
10.2015 - 02.2017
  • Work with business and solution owners to identify and maintain user role definitions
  • Build partnerships with business units to ensure that business requirements continually inform Role Based Access Control program
  • Serve as internal liaison for RBAC/IAM issues with representatives from application solution owners and Information Security
  • Implemented security protocols, including SSL/TLS, IPSec, VPNs, and SSH, to safeguard network communications
  • Configured and maintained NAT setups, firewalls, and wireless network security measures
  • Mitigated various hacker attacks such as DoS/DDoS, DNS spoofing, and man-in-the-middle attacks through initiative-taking strategies
  • Manage and engage change network and conduct change impact assessment
  • Work with stakeholders to understand their access needs and design access roles accordingly
  • Define roles and resource groups for standardization as per client security standards
  • Review active privileges in the system and conclude on creation/modification of roles
  • Communicate requirements to stakeholders, manage conflicts, issues, and challenges to ensure that stakeholders and project team members remain in agreement on solution scope
  • Plan and monitor to determine which activities are necessary to identify relevant stakeholders
  • Provisioned Roles in Net IQ

Security System Administrator

CRONOS ITS, the EU
02.2012 - 08.2015
  • Installing and maintaining security networks
  • Analyzing existing systems to identify areas for improvement
  • Conducting maintenance checks and upgrades to optimize services and functions
  • Monitoring systems for suspicious activities or breaches
  • Developing IT solutions that adhere to company policies and regulations
  • Managing updates and creation of intranet files
  • Creating, managing, and maintaining corporate Local Area Networks (LAN)
  • Managing and monitoring tools related to security and encryption
  • Handling network objects such as computers, users, and TCP/IP resources
  • Utilizing scripts to automate system administrative tasks and managing command-line interface administration with Linux and Unix
  • Resolving security clearance issues and updating security clearance information
  • Deleting access to mainframe systems and performing risk analysis and management on controls
  • Reviewing security logs and violation reports
  • Configuring hardware and network communications
  • Periodically perform internal assessment to assure compliance with controls
  • Monitoring and performance tuning for both Active Directory and Windows operating systems including connectivity, synchronization, replication, netlogon, time services, FSMO roles, schema, NTDS database partitions, DNS settings, SRV records, certificate authorities and trust relationships
  • Provide operational guidance and serve as a central escalation point for all Microsoft server related technologies such as, but not limited to: Active Directory, Group Policy, AD

Security Systems Administrator

Stefanini – Essilor
08.2010 - 02.2012
  • Producing documentation on operational, system and user procedures & guidelines.
  • Obtaining quotes for supply of goods and services from suppliers.
  • Implementing, and monitoring security measures for the protection of systems and information.
  • Identifying and defining system security requirements
  • Documenting standard operating procedures and protocols.
  • Configuring and troubleshooting security infrastructure devices.
  • Developing technical solutions and security tools to mitigate vulnerabilities and automate tasks
  • Reporting on security incidents and proposing enhancements for system security.
  • Authored security and vulnerability reports, detailing logged incursions and suggesting remediation efforts.
  • Developed and maintained company-wide endpoint security solutions.

Telecom Engineer

VRD Engineering Brussels
04.2009 - 12.2009
  • Experienced in working with ASTERISK software (DIGIUM CARD), installing LINUX OPERATING, Installing, and configuring ASTERISK PBX in ISDN, SS7 Signaling
  • Network protocols used SIP, IAX, H323, MGCP
  • I have also configured sip phones (soft & hard) using ASTERISK PBX
  • Management of Groups and Users accounts in asterisk
  • Maintain the infrastructure of Asterisk Server, Elatix, IP phones and Softphones
  • Configuring VoIP routers and Switches for Clients

PC Support Technician

ATT, Atelier TIC de Tanneur
08.2008 - 12.2008
  • Provide network administration to include LAN troubleshooting and resolution
  • Manage the configuration and performance management of all PC systems and telecommunication
  • Maintains passwords, data integrity and file system security for the desktop environment
  • Install, configure, and maintain back-end and front-end systems
  • Recommend hardware and software solutions and upgrades using established procurement processes
  • Establish, review, approve and process quotes, requisitions, and purchase order for capital equipment
  • Installation and updating of software, as well as the setup and troubleshooting of all equipment
  • Expertly installed, configured, monitored, and troubleshoot PC's and related hardware and all OS platforms
  • Training and Studiesbachelor’s degree in network & telecommunication

Education

Network & Telecommunication - Information Technology

ESI : Haute Ecole De L'informatique
Brussels
08.2009

Skills

  • Identity and Access Management, Security Governance (GDPR, HIPAA, PCI-DSS), Cryptography, Network Security (SSL/TLS, IPSec, VPNs, SSH), Defense against Hacker Attacks (DoS/DDoS, Man-in-the-Middle), Web Application Security (SQL Injection, XSS), Malware Analysis and Antimalware Strategies, Web Application Firewalls, Nessus
  • Penetration Testing
  • Network Security
  • Information Governance
  • Security Needs Assessment
  • Cloud Computing

Languages

French
Bilingual or Proficient (C2)
English
Advanced (C1)

Timeline

Cloud Security Engineer

Toyota Motors Europe
09.2018 - Current

Security Analyst

Dimension Data, Sibelga
04.2017 - 09.2018

Network Security Analyst

Euroclear Bank
10.2015 - 02.2017

Security System Administrator

CRONOS ITS, the EU
02.2012 - 08.2015

Security Systems Administrator

Stefanini – Essilor
08.2010 - 02.2012

Telecom Engineer

VRD Engineering Brussels
04.2009 - 12.2009

PC Support Technician

ATT, Atelier TIC de Tanneur
08.2008 - 12.2008

Network & Telecommunication - Information Technology

ESI : Haute Ecole De L'informatique
Patrick Bahizi