Onur Codur, Developer in Ankara, Turkey
Onur is available for hire
Hire Onur

Onur Codur

Verified Expert  in Engineering

IT Security Developer

Location
Ankara, Turkey
Toptal Member Since
November 14, 2022

Onur is an enthusiastic and passionate security engineer who likes to work predominantly as a security architect to provide strategic direction to the development and operational teams to identify security weaknesses in their solution designs and drive the adoption of security best practices. He believes that security is one of the key driving factors in maintaining the reputation and quality of an organization and its services.

Portfolio

Turkish Aerospace Industries
Cryptography, PKI, Embedded Security, Risk Assessment, Security Architecture...
Ministry of Trade Republic of Turkey
Web Application Firewall (WAF), IDS/IPS, Secure Email Gateways (SEGs)...
Türk Telekom
CCNP, Firewalls, VPN, TCP/IP, Web App Security, DDoS...

Experience

Availability

Part-time

Preferred Environment

Linux, Amazon Web Services (AWS), Windows

The most amazing...

...thing I've designed and managed is a company's security infrastructure with over 100 branch offices and 30,000 endpoints.

Work Experience

Cybersecurity Chief Engineer

2021 - PRESENT
Turkish Aerospace Industries
  • Performed threat modeling and risk assessment to identify vulnerabilities to develop mitigations using well-known cybersecurity control standards like NIST 800-53, ISO27002, and the Open Web Application Security Project (OWASP).
  • Designed security architecture of systems based on security controls, including designing cryptography architecture, PKI mechanisms, and access controls.
  • Generated security requirements, allocating them to the related subsystems of products and performing verification and validation activities of them.
  • Managed a security team, defining roles and responsibilities of team members and assigning tasks.
  • Acted as the technical SME for cybersecurity to other design teams.
Technologies: Cryptography, PKI, Embedded Security, Risk Assessment, Security Architecture, IT Security, Systems Engineering, Secure Software Development Lifecycle (SSDLC), Security, Supply Chain, NIST, DO-326, DO-356

Cybersecurity Engineer

2018 - 2021
Ministry of Trade Republic of Turkey
  • Performed information security operations with firewalls, +SDWAN features, load balancer, web application firewall, web gateway proxy, IPS/IDS, antivirus, and mail security gateway.
  • Designed secure IT and network infrastructure of newly-developed projects according to security by design, security by default, and defense-in-depth concepts.
  • Followed security audit findings related to the area of responsibility and took the necessary actions.
Technologies: Web Application Firewall (WAF), IDS/IPS, Secure Email Gateways (SEGs), Firewalls, Checkpoints, Fortinet Firewall Configuration, Wireshark, Burp Suite, Kali Linux, SSL Certificates, IPsec

Security Systems Management Specialist

2014 - 2018
Türk Telekom
  • Performed security operations with firewalls, firewall orchestration tools, web gateway proxies, remote access VPN devices, monitoring, and network analysis tools.
  • Designed secure infrastructure for telecommunication core systems like multiprotocol label switching (MPLS), long-term evolution (LTE), and digital subscriber line access multiplexer (DSLAM), serving millions of customers.
  • Prepared RFPs and performed PoCs with related vendors to finally integrate suitable solutions.
Technologies: CCNP, Firewalls, VPN, TCP/IP, Web App Security, DDoS, Multiprotocol Label Switching (MPLS)

Network Security Engineer

2012 - 2014
Vision Solutions
  • Developed network access control software by a company installed on large-size IT infrastructures.
  • Collected feedback about network access control software from customers and enhancements and solutions provided to the R&D team.
  • Trained customers and resellers on cyber security products.
Technologies: Linux, SQL

Network Engineer

2011 - 2012
Vodafone Turkey
  • Managed network devices operating in Vodafone's network infrastructure, which required %99.9 availability.
  • Implemented and optimized routing protocols. Also troubleshot data network issues on LAN and WAN.
  • Diagnosed and fixed data network issues on LAN and WAN.
Technologies: Networks, WAN, LAN, Routing, Cisco Certified Network Associate Routing & Switching, Multiprotocol Label Switching (MPLS)

Vulnerability Scanning Tool

A vulnerability scanning tool was developed with Python. The tool scans the servers located in a specified IP range, finds the vulnerabilities, and reports findings. It helps to discover the newly deployed servers and vulnerabilities on those especially.
2018 - 2020

Master's Degree in Cybersecurity

Middle East Technical University - Ankara, Turkey

2006 - 2011

Bachelor's Degree in Electronic and Communication Engineering

Yildiz Technical University - Istanbul, Turkey

APRIL 2020 - APRIL 2023

Certified Information System Security Professional

ISC2

JANUARY 2018 - JANUARY 2021

Project Management Professional (PMP)

Project Management Institute (PMI)

APRIL 2017 - APRIL 2020

Cisco Certified Network Professional

Cisco

Industry Expertise

Network Security

Other

TCP/IP, Networks, Security Architecture, IT Security, Systems Engineering, Cryptography, Firewalls, Web App Security, Web Application Firewall (WAF), IDS/IPS, Secure Software Development Lifecycle (SSDLC), Malware Analysis, ISO 27001, Privacy, GDPR, IoT Security, GSM, Electronic Circuit Design, WAN, LAN, Routing, Multiprotocol Label Switching (MPLS), CCNP, Secure Email Gateways (SEGs), Checkpoints, Fortinet Firewall Configuration, SSL Certificates, IPsec, PKI, Embedded Security, Risk Assessment, NIST, DO-326, DO-356, Web Security, Security Governance, Incident Response, IT Project Management, Cisco, Cisco Routers, Cisco Switches, IP Routing, Supply Chain, Security

Languages

C++, SQL, Python 3

Tools

VPN, Wireshark

Paradigms

Penetration Testing, Cisco Certified Network Associate Routing & Switching, DDoS

Platforms

Linux, Amazon Web Services (AWS), Windows, Burp Suite, Kali Linux

Collaboration That Works

How to Work with Toptal

Toptal matches you directly with global industry experts from our network in hours—not weeks or months.

1

Share your needs

Discuss your requirements and refine your scope in a call with a Toptal domain expert.
2

Choose your talent

Get a short list of expertly matched talent within 24 hours to review, interview, and choose from.
3

Start your risk-free talent trial

Work with your chosen talent on a trial basis for up to two weeks. Pay only if you decide to hire them.

Top talent is in high demand.

Start hiring