Mehmet Ünlü, Developer in Berlin, Germany
Mehmet is available for hire
Hire Mehmet

Mehmet Ünlü

Verified Expert  in Engineering

Computer Engineering Developer

Location
Berlin, Germany
Toptal Member Since
October 18, 2022

Mehmet is a software development and cybersecurity specialist with over ten years of experience. His recent tasks are evaluating security requirements, defining security architectures, designing and implementing security controls, and coordinating security activities for embedded and back-end systems. Mehmet is passionate about creating and developing secure software systems, cloud computing, IoT, embedded systems, and automotive cybersecurity.

Portfolio

MBition GmbH
Security Architecture, Embedded Systems, Internet of Things (IoT)...
Vodafone
Security Architecture, SIM Cards, Security, Penetration Testing, Cybersecurity...
Escrypt GmbH
Security Architecture, Embedded Systems, IoT Security, Security...

Experience

Availability

Part-time

Preferred Environment

Linux, Windows, Microsoft Office, GitLab, Jenkins, Confluence, Jira

The most amazing...

...thing I've done was analyzing highly complex automotive electronic control units (ECUs) and defining architectures for the highest level of security.

Work Experience

Expert Security Architect

2022 - PRESENT
MBition GmbH
  • Orchestrated security design decisions across different feature verticals. Ensured a robust and secure posture in products.
  • Executed design and implementation of security components and features across multiple layers of an underlying Linux-based platform.
  • Identified threats and risks of system components using threat assessment and remediation analysis (TARA).
  • Suggested security controls and countermeasures to mitigate identified threats and risks.
  • Supported the certification processes according to UNECE R155 and ISO/SAE 21434.
  • Contributed to the strategic direction of security-relevant components and activities.
Technologies: Security Architecture, Embedded Systems, Internet of Things (IoT), Connected Cars, Security, Cybersecurity, Architecture, Application Security

Security Architect

2020 - 2022
Vodafone
  • Analyzed product requirements and commercial strategies. Provided security technology solutions and design choices to support commercial propositions and roadmaps.
  • Took end-to-end security ownership of the security information management (SIM) solution. Led adoption and integration across markets through local IT leadership (product architecture).
  • Supervised technical and risk assessments and external development teams.
  • Worked closely with related people across the organization to define and influence the security strategy for new technologies and business segments. Utilized 5G, IoT, and integrated SIMs.
  • Performed vulnerability assessments of (e)SIM and SIM-centric services, SIM periphery, and SIM hardware.
  • Ensured security compliance for new integrated services within Vodafone. Drove international security schemes within standardization bodies.
  • Ensured the security of cloud infrastructure and applications (SIM/eSIM testing and profile definition tools), including the cloud migration processes.
  • Led the coordination and planning of penetration tests.
Technologies: Security Architecture, SIM Cards, Security, Penetration Testing, Cybersecurity, Cloud Security, Architecture, Application Security, Vulnerability Assessment

Security Manager

2019 - 2020
Escrypt GmbH
  • Led as a project security manager for a key management solution (KMS). Ensured product security during the whole lifecycle of the KMS product for the company.
  • Supported the creation and maintenance of security-relevant work products.
  • Led coordination of security process activities within the project.
Technologies: Security Architecture, Embedded Systems, IoT Security, Security, Penetration Testing, Cybersecurity, Application Security

Security Architect

2018 - 2019
Valeo
  • Evaluated the system security requirements.
  • Performed a security analysis and defined security mitigations.
  • Defined the security concept for the product by considering the product and back-end constraints.
  • Established the system architecture for products.
Technologies: Security Architecture, Connected Cars, Security, Cybersecurity, Architecture, Application Security

Senior Software Developer

2013 - 2018
Secusmart GmbH
  • Evaluated system and software requirements of the company's secure mobile communication solutions.
  • Designed and developed back-end components for the company's secure mobile communication solutions.
  • Tested and deployed several back-end components.
Technologies: Software Development, C, C++, Java, Python, Source Code Review, Cybersecurity, Architecture, Application Security

Security Architecture for a Telematics Control Unit (TCU)

Set up the security architecture for Valeo's TCU, an electronic control unit (ECU). I provided all the connectivity needs of a modern connected car (cellular network, WiFi, Bluetooth, V2X). I evaluated security requirements, performed threat and risk analysis, and defined system security architecture.

Security Management for KMS

Coordinated security activities for the whole lifecycle (requirements, design, development, testing, deployment, maintenance, decommissioning) of Escrypt's key management solution, which automotive manufacturers and suppliers mainly use.

Cloud Migration for eSIM tools

Built the security architecture and migration for two software tools to AWS. Those were some tools used for designing and testing eSIM services and products for Vodafone. I evaluated security risks, defined the cloud architecture, and migrated the applications and databases to the AWS cloud environment.

Design and Development of a Secure Client Authenticator

Design and development of a secure client authenticator (SCA) service which implements an authentication protocol for encrypted mobile communication. It also complies with SMS requirements for Germany's BSI (Federal Office for Information Security). I was involved as a full-stack developer in implementing SCA with smart cards and applied cryptography techniques.

Languages

C, C++, Java, Python

Platforms

Linux, Windows, Amazon Web Services (AWS), Embedded Linux

Industry Expertise

Cybersecurity

Other

Computer Engineering, Security Architecture, Connected Cars, Software Development, Security Management, Software Design, Applied Cryptography, Threat Modeling, Software Development Lifecycle (SDLC), Vulnerability Assessment, CISSP, Security, Architecture, Microsoft Office, Embedded Systems, Internet of Things (IoT), SIM Cards, IoT Security, Cloud Security, Risk Assessment, Source Code Review, Application Security

Tools

GitLab, Jenkins, Confluence, Jira

Paradigms

Penetration Testing

2010 - 2012

Master's Degree in Information Security Technology

Eindhoven University of Technology - Eindhoven, Netherlands

2002 - 2010

Bachelor's Degree in Computer Engineering

Bilkent University - Ankara, Turkey

FEBRUARY 2019 - FEBRUARY 2025

Certified Information Security Systems Professional

ISC2

Collaboration That Works

How to Work with Toptal

Toptal matches you directly with global industry experts from our network in hours—not weeks or months.

1

Share your needs

Discuss your requirements and refine your scope in a call with a Toptal domain expert.
2

Choose your talent

Get a short list of expertly matched talent within 24 hours to review, interview, and choose from.
3

Start your risk-free talent trial

Work with your chosen talent on a trial basis for up to two weeks. Pay only if you decide to hire them.

Top talent is in high demand.

Start hiring