Cyber Security Analysts | Incident Responder | SecOps Specialist
+10 years of experience in network & cyber security. Cyber security enthusiast
Infrastructure-related projects and activities are deeply ingrained in Sorint. The remarkable diversity of projects we have undertaken and continue to support is what sets us apart. From architectural design to flawless implementation, Sorintians have accumulated a wealth of knowledge and fostered a legacy of excellence throughout the years. We transfer this wealth of expertise directly into our clients’ projects. Assuring clients remain at the forefront of the technology.
Performance
Adopting Cloud Technologies
Implementing Virtualization and Containerization
Better Data Management
Automation
Scalability
Long-run cost optimization
Upgrading Software & Application
Performance
Adopting Cloud Technologies
Implementing Virtualization and Containerization
Better Data Management
Automation
Scalability
Upgrading Software & Application
Long-run cost optimization
Showcase of possible activities
From strategy to execution. Typically involves HD/SW, OS, configuration, services installation, security measures, backup & recovery, monitoring, data management, testing, & reporting
The process of carrying out updates to infrastructure, software, drivers, firmware, or other components.
Addressing vulnerabilities, fixing bugs, improving overall performance, & security.
Implementing or enhancing virtualization technologies or containerization platforms.
Transitioning of servers(on-premises, cloud, private, etc).
Migration of technology or stack-technology.
Data migration
Technology upgrading
Network infrastructure upgrading (SDN – NVF – MANO)
Outdated and unsupported legacy system/SW
Adapting and migrating container orchestration tools and environment.
Implement and ensure practices and framework are adherent to industry’s regulations and client’s internal standards.
Offer a solid cybersecurity posture and apply regular security patching activities.
Showcase of possible activities
Technology upgrading
Network infrastructure upgrading (SDN – NVF – MANO)
Outdated and unsupported legacy system/SW
Adapting and migrating container orchestration tools and environment.
Implement and ensure practices and framework are adherent to industry’s regulations and client’s internal standards.
Offer a solid cybersecurity posture and apply regular security patching activities.
From strategy to execution. Typically involves HD/SW, OS, configuration, services installation, security measures, backup & recovery, monitoring, data management, testing, & reporting
The process of carrying out updates to infrastructure, software, drivers, firmware, or other components.
Addressing vulnerabilities, fixing bugs, improving overall performance, & security.
Implementing or enhancing virtualization technologies or containerization platforms.
Transitioning of servers(on-premises, cloud, private, etc).
Migration of technology or stack-technology.
Data migration
Showcase of possible activities
Architectural solutions, tools selection, monitoring, to consolidation and insight generation.
Consulting and implementing unique cloud architecture solutions leveraging on the multiple cloud providers.
Procedural activities for recovering from downtime and avoidance of data loss.
Showcase of possible activities
Defect Tracking, management and continuous monitoring
Defining Quality Standards
Requirement Analysis
Documentation and Reporting
Compliance and Standards
Test Planning
Test Execution
The make it model
The make it model
Instantiated from
Every journey is a unique challenge, but our know-how:
Executed countless projects in the field to prominent entities in Europe, US, and Africa.
For various industries
Customer retention rate
Dedicated sircles specialized in given fields and technologies
Highest certification in various fields and “Training Partner” to some vendors
Expert PM with technical background ensuring project’s objectives are met
Instantiated from
Every journey is a unique challenge, but our know-how:
Executed countless projects in the field to prominent entities in Europe, US, and Africa.
For various industries
Customer retention rate
Dedicated sircles specialized in given fields and technologies
Highest certification in various fields and “Training Partner” to some vendors
Expert PM with technical background ensuring project’s objectives are met
Cyber Security Analysts | Incident Responder | SecOps Specialist
+10 years of experience in network & cyber security. Cyber security enthusiast
Sircle (departments) involved
Cyber Security Analysts | Incident Responder | SecOps Specialist
+10 years of experience in network & cyber security. Cyber security enthusiast
Sircle (departments) involved
From technology/vendor, skill levels, IT domains/specialization, to vender-neutral certifications
ISO 27001 | ISO 20000-1 | ISO 9001 | ITIL
3CX |
6sigma |
Aerohive |
Aerohive Networks |
Alison |
ALTARO |
Amazon |
AMPG International |
APMG |
Apple |
Aruba |
AXELOS |
Barracuda |
BIT |
Blue Team |
BMC |
Brocade |
Business Objects |
CEPIS |
CertProf |
Check Point |
Cisco |
Citrix |
Cloud Champion |
Cloudera |
Cobit |
COMMVAULT |
Company Tutor |
Compaq |
CompTIA |
CROSSNOVA |
CSSC |
Cyberark |
D-LINK |
Databricks Academy |
DataCore |
DELL EMC |
Devops Institute |
Dynatrace |
Ec-Council |
ECDL |
Edx |
eipass |
Elastic |
eLearnSecurity |
EMC |
EnterpriseDB |
enVision |
EUCIP |
EXIN |
Extreme Networks |
F5 |
FacilityLive |
FinOps Foundation |
FireEye |
ForeScout |
FORTINET |
GIAC |
GitLAB |
Google Cloud |
Google Play Academy |
HashiCorp |
Hazelcast |
Hitachi |
HP |
Huawei |
IBM |
Infoblox |
INIM Eletronics |
Istituto Italiano di Project Management |
ISTQB |
Juniper |
Konnex |
Lacework |
LibraEsva |
Linux Foundation |
Linux Professional Institute |
MariaDB |
Meru |
MIA-PLATFORM |
Microsoft |
MikroTik |
MongoDB |
Neo4j |
NetApp |
Netscreen |
Netskope |
Netwitness |
NETWRIX |
Novell |
NUTANIX |
ObserveIT |
Offensive Security |
OpenSecurityTraining2 |
ORACLE |
Palo Alto |
People Cert |
PMI |
Qualys |
Rancher Academy |
Red Hat |
Reevo Cloud Academy |
Reuters |
SCP |
Scrum Alliance |
Scrum.org |
ScrumStudy |
SonicWall |
SOPHOS |
Splunk |
Stormagic |
Sun |
SUSE |
Symantec |
TERADATA |
Toshiba |
Trend Micro |
Triton |
Veeam |
Vendor |
Veritas |
VMware |
WatchGuard |
WatchGuardONE |
WEBROOT University |
ZERTO |
ZyXEL |
Areas and field of focus
Areas and field of focus