Information Security

Traditional security models focus on keeping external attackers out. The reality is that there are as many threats inside an organization as outside. Mobile technology, cloud computing, social media, employee sabotage and many many more.
Increasing the level of confidence in information security and risk assessment process is one of the most fundamental ways to focus on mitigating overall enterprise risk, determining appropriate levels of effort and resources and identifying where to add value.

Being keen on Information Security, I'm constantly increasing level of knowledge in that area for more than 10 years, having hands-on experience as a primary method and providing consultancy on threat intelligence, vulnerability identification, remediation, detection and countermeasure planning.

Hands-on experience

  • Cloud security and privacy, information and data protection.
  • Vulnerability assessment performing a regular attack and penetration (A&P) reviews of different systems, web apps, xxs, rce, injections.
  • HSM, PKI, SSL, key exchange methods, cipher specs, types of encryption algorithms, hashes, MACs, etc.
  • Network security audit, wireless networks and Physical Access Control Systems (PACS) penetration tests.
  • IT Japanese version of Sarbanes-Oxley (JSOX), Enterprise Information Risks and Internal Controls assesment counterpart.
  • In a process of application for CISSP and CCSK cerification.
Enterprise Identity and Access Management

Identity Management

Enterprise Identity and Access Management

RFID and Near-Field Communication

Radio Frequency Identification

RFID and Near-Field Communication

Application and Software Development

Software Development

Application and Software Development

Cloud Infrastructure Management and Architecture

Microsoft Azure

Cloud Infrastructure Management and Architecture

Nix Architecture and System Administration

Linux and Unix

Nix Architecture and System Administration

Windows Server Environment and Active Directory

Active Directory Infrastructure

Windows Server Environment and Active Directory

Database Design and BI

Business Intelligence

Database Design and BI

Scripting and Automation

Automation

Scripting and Automation

Firewalls, Enterprise and Application Gateways

Network

Firewalls, Enterprise and Application Gateways

Continuous Integration and Delivery

Development and Operations

Continuous Integration and Delivery

Office 365 Enterprise Services

Office 365

Office 365 Enterprise Services

SEO, Google, Yandex, Bing

Search Engine Optimization

SEO, Google, Yandex, Bing

Enterprise Mobility and Mobile Device Management

Mobile Device Management

Enterprise Mobility and Mobile Device Management

Information Technology Management

IT Management

Information Technology Management

Servers, Hardware and Storages

Virtualization and Hardware

Servers, Hardware and Storages

Anton Popov
Anton Popov

Anton Popov

An accomplished, result driven, critical thinking Technical Expert on Identity Management, Microsoft On-Premise and Azure cloud solutions as well as on Linux\Unix with hands on experience in Software development, its Continuous Integration, IT Architecture and Information Security.
Extensive experience in the full life cycle of the information systems design and implementation process in the Enterprise Environment at the edge of each IT branch.
Constant information technologies self-development, quick learner.

Anton Popov
live:anton.popov_3
anton@pureidm.com
Planet Earth
Planet Earth