Paul Piscuc, Developer in Overijse, Belgium
Paul is available for hire
Hire Paul

Paul Piscuc

Verified Expert  in Engineering

DevSecOps Specialist, Senior Security Analyst and Developer

Overijse, Belgium

Toptal member since April 7, 2021

Bio

Paul is a DevSecOps specialist with expertise in the banking sector using cloud infrastructure (AWS, GCP, Azure), Kubernetes, and Terraform. Paul built a threat intelligence platform that can ingest various formats of threat information, process them, and push the data to another system such as a firewall to block malicious IPs. He is an expert with Go and designing and implementing scalable infrastructures to the highest security standards.

Portfolio

Isabel Group
Kubernetes, Terraform, Amazon Web Services (AWS)
Proximus
Ansible, Docker, Jenkins, Python, Splunk, ArcSight, Elasticsearch
Provision
QualysGuard, ArcSight, Splunk, AccessData, SAFE Network, Security Architecture...

Experience

Availability

Part-time

Preferred Environment

Linux

The most amazing...

...system I've developed is a threat intelligence platform that is scalable, secure, and built on top of cloud technologies and Kubernetes.

Work Experience

Senior Security Analyst (Financial Sector)

2018 - PRESENT
Isabel Group
  • Developed automation using Go for various security processes that helped reduce the time that a security analyst needs to perform security investigations.
  • Performed security assessments for various infrastructures in the cloud and on-premises to comply with banking and international regulations. The infrastructure reviewed include Vanilla Kubernetes, OpenShift, AWS EKS, and GCP GKE.
  • Designed and helped teams solve various technical or security issues in cloud infrastructures in Azure, GCP Google Cloud Platform and in Azure and implemented secure infrastructures in Azure and AWS.
Technologies: Kubernetes, Terraform, Amazon Web Services (AWS)

Security Consultant (Telecommunications Sector)

2014 - 2018
Proximus
  • Designed the architecture and performed the implementation of a scalable and automated SIEM solution in a MSSP environment (based on ArcSight Enterprise Security Manager MSSP multi-tier architecture and distributed Splunk Enterprise Security).
  • Built CI/CD pipelines for SOC (Security Operation Center) team using Ansible, Docker , Go, Python, and Jenkins.
  • Implemented network security solutions like Checkpoint VPN, F5 LTM, Imperva Web Application Firewall to secure customer's networks.
Technologies: Ansible, Docker, Jenkins, Python, Splunk, ArcSight, Elasticsearch

Security Consultant (A Security Solutions Distributor)

2011 - 2014
Provision
  • Designed and implemented web application, vulnerability scanning, application firewalls, IPS, and database encryption infrastructures for customers in the banking and pharmaceuticals sector.
  • Assisted customers in performing digital forensics investigations using Guidance Encase Forensic and Access Data FTK.
  • Assisted companies to debug application performance issues, visualize, and detect network issues with the help of various tools, including Riverbed Cascade.
Technologies: QualysGuard, ArcSight, Splunk, AccessData, SAFE Network, Security Architecture, Web Security, Digital Forensics

System Administrator (Cloud Provider)

2010 - 2011
Appnor
  • Managed approximately 250 Linux servers in Europe and US and helped build a small datacenter for the company.
  • Wrote Puppet modules to automate and manage the Linux fleet of servers.
  • Designed and implemented Firewalls, DNS servers, DDoS, mail, and other types of services using Debian and Ubuntu systems.
Technologies: Linux, Puppet, DNS, VPN, Firewalls

Software Analyst (Transport Sector)

2007 - 2010
Transmeridian
  • Designed and implemented the company's network and IT infrastructure.
  • Guided the management of the company's software, implemented. database replication, database optimization, and server load balancing.
  • Wrote procedures and disaster recovery procedures to safely restore the company's data.
Technologies: IP Networks, Cisco, Linux

Threat Intelligence Platform for Developers

https://envoyproject.com
EnvoyProject is a threat intelligence platform that can ingest various formats of threat information (IPs, hashes of files, etc.), process them, and offer the data to an analyst or push the data to another system such as a firewall to block the malicious IPs. The entire infrastructure is scalable, build on microservice architecture, and highly secure.

OTP One Time Password Solution for Enterprises

A Python-based application for enterprises that performed authentication and authorization using 2FA 2-factor authentication and that could generate OTP one time passwords via SMS. The application was sent as a VM virtual machine that the customer could import into their VMware infrastructure and start using OTP one time passwords.
2010 - 2012

Master's Degree in IT Security

Academy of Economic Studies - Bucharest, Romania

2007 - 2010

Bachelor's Degree in Computer Science

Academy of Economis Studies - Bucharest, Romania

JANUARY 2021 - PRESENT

Certified Kubernetes Administrator

Linux Foundation

JULY 2018 - JULY 2021

AWS Certified Solutions Architect Associate

AWS

APRIL 2016 - PRESENT

CISSP Certified Information Security Professional

ISC2

OCTOBER 2014 - OCTOBER 2016

FireEye Junior System Engineer

FireEye

JANUARY 2014 - JANUARY 2016

HP ATP - TippingPoint Security

HP ExpertOne

JUNE 2013 - JUNE 2015

HP ArcSight ESM Administrator

HP ExpertOne

NOVEMBER 2012 - NOVEMBER 2014

SafeNet DataSecure - ProtectDB Certified Engineer

SafeNet

MARCH 2012 - MARCH 2014

Imperva Security Specialist

Imperva

Tools

Azure Kubernetes Service (AKS), Google Kubernetes Engine (GKE), Amazon EKS, GitLab CI/CD, Ansible, Splunk, Terraform, Jenkins, ArcSight, Puppet, VPN

Paradigms

DevOps, DevSecOps, Secure Code Best Practices

Platforms

Kubernetes, Linux, OpenShift, Docker, Amazon Web Services (AWS), Azure, QualysGuard, AccessData, Imperva Incapsula

Languages

Go, Python

Industry Expertise

Network Security

Frameworks

Django

Storage

Elasticsearch, SAFE Network

Other

Web Security, Security Analysis, CI/CD Pipelines, Nomad, Economics, Computer Science, Statistics, IT Security, Reverse Engineering, Security Design, Endpoint Security, Security Architecture, Digital Forensics, DNS, Firewalls, IP Networks, Cisco, Database Encryption

Collaboration That Works

How to Work with Toptal

Toptal matches you directly with global industry experts from our network in hours—not weeks or months.

1

Share your needs

Discuss your requirements and refine your scope in a call with a Toptal domain expert.
2

Choose your talent

Get a short list of expertly matched talent within 24 hours to review, interview, and choose from.
3

Start your risk-free talent trial

Work with your chosen talent on a trial basis for up to two weeks. Pay only if you decide to hire them.

Top talent is in high demand.

Start hiring