Menu

Pascal WESSEL

Aubervilliers

En résumé

Past 30 years and present:

- from mainframe operation to system management,
- from basic routing to network management,
- from firewalling to intrusion prevention,
- from user's complaints to standards & procedures...
It's a never ending story, and I like it.

CISSP #428288
GIAC Penetration Tester (GPEN) #9033
GIAC Certified Intrusion Analyst (GCIA) #9647
GIAC Certified Forensics Examiner (GCFE) #2753

1) Although keen in getting in touch, please pay attention to the fact that I am Switzerland based (Geneva area), and not willing to relocate. Thanks.
2) Not working with British recruiters I'm afraid (it needs a valid license to work in this business in Switzerland, and fines are not jokes).

Specialties

- Network & Security architecture: design, implementation and handover.
- AAA: AD, LDAP, Radius, 802.1x, Token, PKI (x509v3).
- Firewall
- Perimeter Security
- Intrusion detection/prevention
- DFIR (Digital Forensic / Incident Response)
- Proxy
- Remote-access technologies
- Wireless Networking
- Linux, FreeBSD, MAC OS X (client & Server)
- System "hardening”
- High-level troubleshooting for routing, VPN, DNS, etc.
- Security audit.
- SLA monitoring.
- Standards and procedures, documentation, (ISO/IEC 27000)
- Team Mgmt.

Trainings

- Firewall-1 CCSE (Certified CheckPoint Security Engineer), 1999 Crissier (CH)
- Cisco CMTD (Configuring, Monitoring, Troubleshooting Dial ), 1999 Crissier (CH)
- ICND (Interconnecting Cisco Network Devices), 2000 Paris (FR)
- ACRC (Advanced Cisco Router Configuration), 2000 Geneva (CH)
- CEMS (Cisco Enterprise Management Solution), 2000 Brussels (BE)
- MCNS 2.0 (Managing Cisco Network Security), 2001 Paris (FR)
- BlackHat Briefing, with Foundstone Training, 2002 Amsterdam (NL)
- CCNA, (Cisco Certified Network Associate), 2003 Geneva (CH)
- Blue Coat BCCPA & BCCPP, 2007 London (UK)
- RIPE NCC LIR Training, 2007 Geneva (CH)
- CheckPoint Security Administration I & II NGX (R65), 2008 Paris (FR)
- Windows 2008 Server Admin courses, 2009 Geneva (CH)
- QualysGuard Training, 2011 Web online training
- Ipanema System Training (OTS), 2011 Geneva (CH)
- SANS SEC503 Intrusion Detection in Depth, 2013 London (UK)
- SANS SEC560 Network Penetration Testing & Ethical Hacking, 2014 Lausanne (CH)
- SANS FOR408 Windows Forensic Analysis, 2015 Praha (CZ)
- SANS FOR518 MAC Forensic Analysis, 2016 Praha (CZ)
- CrowdStrike FHT 101, 2016

Mes compétences :
Architecture
Design
Firewalls
Infrastructure
ISO 27000
Leadership
Network
NETWORK SECURITY
PfSense
Proxy
Qualys
Scanning
Security
Team Leadership
Web
Wireless
Firewall
Sécurité informatique

Entreprises

  • Interoute - Network & Security Technical Manager

    Aubervilliers 2017 - maintenant
  • Kudelski Group - Corporate Security Engineer

    Cheseaux-sur-Lausanne 2013 - 2017
  • SGS - Network & Security Specialist

    Arcueil 2008 - 2012 SGS (2011: CHF 4.8 billion in revenues, 13.7% increase vs. 2010): world’s leading inspection, verification, testing and certification company. 68 000 employees, a network of more than 1 250 offices and laboratories around the world.

    Responsible of several strategic corporate projects like VoIP deployment, Security infrastructure Improvement & management, Wireless implementation for the entire corporation, policy redaction based on the ISO27001 norm. Daily bread also includes bespoke projects from project analysis and feasibility to design, lab and implementation with handover to production.

    • Improving a 50’000 users Internet security gateways architecture scalable to cope with twice the number of employees without increasing the TCO.
    • Analysis, test beds and choice of one PKI solution with workgroup creation and team lead up to the delivery.
    • Deployment of a secure and scalable wireless network infrastructure which provides global roaming to SGS employees over the Globe while cutting TCO by 30%.
    • Corporate vulnerability audits implementation.
    • Migration the world-wide outdated remote-access solution to a new state-of-the-art infrastructure, allowing
    for compliance and auditing.
    • Smooth migration of legacy telephony sites to an outsourced Cisco IPT infrastructure.
    • Support (expertise) to IT, Network and Security Managers/Teams.
    • Research & Development for new technologies and solutions.

    Technologies: Check Point, Juniper SSL-VPN, Cisco (routing, switching), Blue Coat Reporter, F5 GTM, Aruba, Airwave, Aerohive, VMWare, Win2008r2 Servers, AD, Ipanema, Splunk, Nagios, FreeBSD, Linux Debian and Red Hat), Qualys, Nessus, ISO/IEC 27001:2005.
  • Vanco - Chief Security Officer

    Paris La Défense 2005 - 2008 Vanco (2007: 183M£ revenues, 750 employees): retail and Wholesale local, national and international telecommunications services, Broadband and internet products and services, IT and Network Solutions, professional services. Acquired by Reliance Globalcom in May 2008.

    • Design and implement secure network security solutions.
    • Own and deliver every aspect of network Security project.
    • Deploy and tune firewalls, VPNs, IDS/IPS, Proxy Servers, Log correlators, Vulnerability scanning
    services.
    • Documentation of deployed security solutions and handover to production.
    • Perform complex security changes accurately and in timely manner.
    • Meet all SLA’s either internal or external on change requests.
    • Procedural works (R&D reports, procedures and guidelines).
    • Mentor and manage junior security engineers.
    • Serve as an escalation point for Level2 and Level3 security engineers.
    • Develop routine maintenance procedures and implement such procedures for routine execution.
    • Carry out detailed post-mortem investigations into major system outages, document the findings and
    make appropriate technical recommendations.
    • Interface with 3rd parties/vendors to ensure sufficient support and coverage during integration and
    testing phases. Security audits of existing implementations of new products Vanco is planning to use for
    its own services or for end customers.
    • R&D: new products or technologies labs.

    Technologies: Check Point, Juniper (routers, firewalls, IDP, NSM, SSL-VPN), Cisco (routing, switching), Blue Coat (ProxySG, Director, Reporter, Proxy-AV/anti-virus, BCWF/content-filtering), Squid, nginx, LogLogic, Nagios, Qualys, FreeBSD, Linux Debian and CentOS), Remedy, VitalSuite, SMARTS.
  • Media-Online / NevaNetworks - Internetworking Support Engineer

    2001 - 2005 Media-Online / NevaNeworks: Geneva (CH) based company offering IT consultancy to private banking and SLA monitoring, network troubleshooting via direct contracting or via outsourced carrier’s services.

    • Built the company IT and monitoring infrastructure. Responsible of the physical access security.
    • New products and services evaluation, performing network & security configuration, debug, pre-
    sales support, documentation and security staff (3 employees) management.
  • Sunrise Communications - Internetworking Support Engineer

    2000 - 2001 sunrise communications: voice, data, mobile, Internet, infrastructure, and support services to telco, ISPs, mobile virtual network operators, and telco companies in Switzerland and internationally.

    • Technical project evaluation and implementation. Network maintenance and optimisation. Technical documentation and monitoring tools implementation at group level. Vulnerability testing for systems and networks.
  • Firmenich - Network & Security Administrator

    Neuilly-sur-Seine 1998 - 2000
  • Firmenich - System Engineer

    Neuilly-sur-Seine 1991 - 1997
  • Dupont-de-Nemours - Senior Operations Support

    1989 - 1990

Formations

  • The SANS Institute

    Washington Dc 2014 - 2014 GIAC Penetration Tester (GPEN)

    GPEN certification is for security personnel whose job duties involve assessing target networks and systems to find security vulnerabilities. Certification objectives:penetration-testing methodologies, the legal issues surrounding penetration testing and how to properly conduct a penetration test as well as best practice technical and non-technical techniques specific to conduct penetration test.
  • The SANS Institute

    Washington Dc 2013 - 2013 GIAC Certified Intrusion Analyst (GCIA)

    GIAC Certified Intrusion Analysts (GCIAs) have the knowledge, skills, and abilities to configure and monitor intrusion detection systems, and to read, interpret, and analyze network traffic and related log files.
  • ISC (Zurich)

    Zurich 2012 - 2012 CISSP

    Sécurité Informatique - CISSP ID 428288
  • Université De Genève (Genève)

    Genève 1983 - 1985 sans dplôme

    Etudes non terminées.
  • Collège Du Soir (Genève)

    Genève 1980 - 1983 Maturité scientifique
Annuaire des membres :