Nationality: French Location: Relocation: Yes. |
Date of Birth: Phone: By email request only Email: CV@encryptsolutions.com |
Sylvain Martinez
Objective |
I wish to carry on my international career and am looking for a position with an established and stable company. I have international management experience and a strong technical background in system and network security, Unix administration and programming. I am a very motivated person, with a thirst for knowledge. |
Experience |
August 2002 - Present British Petroleum (BP Plc) - Integrated Supply and Trading - Infrastructure Security Specialist A year after I started to work for BP, I was promoted to the financial trading part of BP as a project manager. § Security Audits - I conducted 5 security audits in different BP offices worldwide and provided security recommendations. This involved meeting site managers, interviewing team leaders, walking on sites and writing reports for feedback to site managers. I also designed a new technical security audit. § Security Laptop - I installed and configured a team security laptop with different operating systems and security tools. This laptop can be used as a had-hoc IDS and perform technical security tests, penetration testing and network analyses. This laptop is used in the technical security audit. The tools used in this project are: Retina, Nessus, Snort, Kismet, Netstumbler, Phone Sweep. § Application Security Review - I did security reviews for many new projects. These reviews involved a great understating of the projects’ infrastructure, identifying any security risks and provide practical recommendations to improve security while keeping the functionalities of the different applications. § Operation, Security Issues Investigation - I am involved in identifying security warnings relevant to BP IST and investigate on them. This can range from a security alert found on the Internet to a security concern expressed by an employee. I investigated some suspicious administrator access failures on production databases, New Apache / OpenSSH vulnerabilities and their impact for BP IST and lately on new viruses and worms where we were being asked to identify BP IST risk exposure to them. § Operation, Security tools evaluation - I provide ongoing advise to users concerning the use of security tools. I evaluated different tools for recommendation: SSH, PGP, IM, etc § Access Control, Enrole project - I helped design this project and took over its management. I organised training, improved the project workflow, redesigned forms, set up reports, got SLA agreed and contacted all the relevant people to change the project from a paperwork design concept into a live application that will be used by most BP IST users. § Certificate
Authority – I managed a project to design, implement and administer a CA
using § Unix Security Build - I reviewed the Unix Security build and produced hardened security build guidelines. § ESM / VSM evaluation -I helped evaluate both products by identifying security and design flaws. I produced some reports and made recommendations. This involved getting a great understanding of both products from an administrator and user point of view.
July 2001- August 2002 British Petroleum (BP Plc) - Global Security Administration and Monitoring Manager I was managing a team of 12
people across the world. My role was to make sure the team was efficient and
the work was delivered to
§ Monitoring - This consisted in analysing the Unix logs sent to the monitoring mailbox and looking for any suspicious user activities. § User Security Administration - Creation, deletion and modification of Unix UserID and setting up permissions using KEON and other BP in house tools. § VPN - We were administrating how users logged on to the BP intranet over the Internet (iLink/iPlanet). User administration of 5 ACE servers for over 2000 Users. Investigation of any problems with SecureID used to logon remotely and for privileged access. § Database Integrity / Assurance Process - Database consistency check, update of user Information, chase accesses given to users which have not been requested nor authorized. § Security
Projects - In order to improve the team efficiency, I designed and
managed many projects. As a result the team was in a position to produce
statistics, improve the Here are the 3 main projects I worked on: i) Statistics project- A webpage displaying live
stats on each task the team is doing and sending team leaders an auto warning
if the ii) Monitoring project - A webpage to offer a front end for the monitoring to do it quicker, deal with more logs (i.e.: Unix, NT) and reduce the number of human errors and better coordination. It also provided a tracking system to search previous problems. iii) Report Project - A webpage to produce reports on the fly (i.e.: number of people with privileged accounts per countries, etc) for management, audit and other teams.
On top of being able to do any of the tasks described above and give guidance to the team, I had to improve how they work: § Communication - I started a weekly team meeting and a monthly individual meeting allowing me to identify problems more quickly and give and receive constant feedback. § Training - I made sure the whole team was trained on each of the tasks we were doing. This was to avoid having key people in some areas causing problems when taking time off. I also motivated the team to get IT training relevant to work. § Procedures - I re-wrote almost all of the procedures and made sure all of the work was documented. § Work
improvement – I standardised documents produced by the team. Improved how
the team handled requests and as a direct result the § Work planning - I re-organized the way the team was working by creating a new monthly rota taking in consideration the time difference and staff location. § Security Consultancy - I was involved in different projects and teams to provide guidance with the BP User Security policy. (Security handover to local, Windows Back office migration, SAP)
When I joined BP I was asked to improve the way the team was working. I would say that my achievement in this role has been to learn quickly, how to be independent, re-motivate the team, bring standards and professionalism to the work we were doing and have new ideas.
March 2001 - June 2001 Bluestone Consulting - CA, Unix Field Consultant My duties were to provide Unix administration support to the different clients Bluestone was working with. This includes Shell/Perl Scripting, Security administration, Software installation and support. |
|
July 1999 - December 2001 Merrill Lynch Investment Managers - Senior UNIX Specialist My duties were split between project work and manning the UNIX support desk, which was rotated around the team on a daily basis. I was also the Unix security specialist. My general UNIX Administration Duties were: - 24x7 support of 50 Unix servers (Ultra 10 to E4500) and tuning - Setting up new user logins or deleting old users - Providing support and consultation to Sybase DBAs and Network team My main project work were: § Firewall and Network Security – I was part of the team in charge of the Checkpoint Firewall I and Nokia Firewalls. We had to design, check and implement firewall rules, address translation, fail over, VPN. I was also conducting security audits, penetration testing. For this project some of the tools I used were TCPdump, snort, Cops and ASET. § Advanced Shell Script FTP Scheduler - Development, implementation and support of an extra FTP layer allowing automatic and secure FTP transfer. It has been done in C-shell/Perl script and was used to transfer critical financial data between the company's worldwide offices. The key words for this project were security, modularity, and efficiency. § Advanced Perl patch installer - Development, implementation and support of an "intelligent" package installer script in Perl. Remotely checking packages on all the Unix servers against the software installed, version, hardware, and operating system. Generating HTML, CSV and text file reports. This script has first been used during the company Y2K testing and is now used on a weekly basis to generate reports on the different servers patch status. § Servers monitoring robot - Optimisation of all the shell script generating the HTML files used by the Unix team to check the Unix network and servers configuration: disk space warning; network connection; network services; hardware/software listing; firewall, web server and proxy status. § Remote UNIX server connection - Find, evaluate, document and implement the possible replacement of Solstice used by the developers to access the Unix servers from their NT workstation and Laptop. The 3 main products I worked on were: VNC, SAMBA, Citrix Metaframe. § Backup Solution – I was in charge of the Veritas Netbackup solution and the StorageTeck Robot Library. I had to design the backup policy, coordinate and plan the backup tapes management. |
|
July 1998 - July 1999 Merrill Lynch Investment Managers - London, UK Unix and NT Security Administrator § Financial Information eXchange (FIX): This was my most important project as I had to evaluate the security risk of the whole project, work with all the different teams and third party involved and find a solution to all the security issues. This project was mainly about cryptography and PKI. As a result of my report, the design of the project was changed. § Security administration of 50 Solaris Servers, 100 NT4 servers and 2 OS/2 servers § Access control management: setting the security policy, users access on files/servers, security risk evaluation on new projects, security support for other teams § I wrote an application in Visual Basic and Visual C++ to automate the Access Control Management (Adding, deleting, moving users, access on files/servers, algorithm to find UserID from part of a full name, etc). This saves up to a third of the time needed for each Access Control problem. § Remote access management: Managing the 'ACE' server from Security Dynamics, SHIVA. Setting and auditing the Firewall-1. § Penetration testing: Maintaining an up to date security database, testing security problems. This was done by a daily check on security web sites/mailing list. § Unix security report: Evaluating and checking the security level of the Unix company network. § WEB Security report: Evaluating and checking the security level of the Apache WEB server used by the company. |
|
April 1997 - April
1998 Acces et Solutions Internet (ASI) Lyon,
FRANCE Network Security Consultant § Audited the company network security on a monthly basis § Created automatic bank deduction program § Created, implemented and secured a vocal courier service § Created a network activity monitoring robot (in C and shell script) § Created an e-commerce application in order to let the company’s customer buy online. The applet and server application have been written in JAVA. |
Education |
1996 - 1998 Bachelor of Science degree § The different subject I have chosen were: C programming, Java programming, Fortran programming, Network programming, Network administration, Artificial Intelligence § For my second year I specialized in Computer Security. § My Final year Bachelor’s project was to create my own cryptography algorithm and implement it on UNIX and Windows. I then had to find many enhancements for my application (Hide a message in a picture, copyright a picture, use of fractal function to crypt, etc) § My Bachelor of
Science work placement took place at Top Gun Karting
(
1997 DUETI (Bachelor of Science degree) § This is an international degree. You have to spend a year abroad in a University, and at the end of the year you have to write a dissertation on your international experience. You then do a presentation in front of an academic and professional jury. This presentation lasts for 2 hours and the subject is free § In July 1997, my dissertation was accepted and I received the jury’s congratulation for my presentation and the success of my international experience. The presentation subject I chose was: "The benefits of an international experience for a career, and how to adapt"
1994 - 1996 DUT (Associate Degree) § This degree
equivalent to an HND degree in § During this 2 years degree I have been in charge of the Linux Student Network used by 200 students. § My final year
project was to install and administrate a complex Linux network, in the aim
of increasing my network knowledge (TCP/IP, DNS, NFS, § My work
placement took place at ASI ( |
Certifications and
Training |
§ SANS Windows Security § Peak Performance Course (to optimise work pressure performance) § Arcsight IDS § Sun Solaris 7 Systems Administration I § Sun Solaris 7 Systems Administration II § Sun Solaris 7 TCP/IP § Sun Solaris 8 System Security § Integralis Firewall I Administration § Integralis Firewall I Advanced § Securing the Distributed Environment § First Aid at Work |
Awards |
§ Winner of the European individual computing competition (Artificial Intelligence) organized by EPITA: PROLOGIN 1996 where 4000 people participated and 100 finalists had to program during a 36 hours non-stop final: http://www.encryptsolutions.com/english/author/prologin.html
§ My cryptography algorithm (BUGS) is referenced on the US NAVY WEB Site and I have designed a web site for this project: http://www.encryptsolutions.com/. My application is in the process of becoming part of the GNU project.
|