Nenad Jankovic

Nenad Jankovic

Network Administrator

Followers of Nenad Jankovic849 followers
location of Nenad JankovicVienna, Vienna, Austria

Connect with Nenad Jankovic to Send Message

Connect

Connect with Nenad Jankovic to Send Message

Connect
  • Timeline

  • About me

    CCISO | CISSP | CISM | CRISC | ISO 27001 LA | CCSK | CEH | CASP+ | CCNP

  • Education

    • Faculty of Applied Management, Economics and Finance

      2015 - 2016
      The Bachelor of Information Technology (Honours) Information Technology
    • Faculty of Management

      2012 - 2015
      Bachelor Computer/Information Technology Administration and Management
    • Polytechnic Academy

      1995 - 1999
      High School Mechanical Technician for Computer Construction
  • Experience

    • BitInfo

      Apr 2002 - Sept 2006
      Network Administrator
    • EuNet

      Oct 2006 - Nov 2011
      Network Architect
    • IP Network Technologies Inc

      Apr 2012 - Nov 2012
      Network and Security Consultant

      Project name: Stellar - DS3 Dallas/MontrealIndustrie: Call CenterMain roles: Replace metro link with a DS3 link, Link between Dallas US and Montreal Canada

    • IP Network Technologies Inc

      Mar 2013 - Sept 2013
      Network and Security Consultant

      Project name: John KeellsIndustrie: Call CenterMain roles: (Switch/Router/Internet links configs and verification) Call center Prepare, Plan, Design and implement in Montreal Canada

    • IP Network Technologies Inc

      Feb 2014 - Aug 2014
      Network and Security Consultant

      Project name: SivetIndustrie: Call CenterMain roles: (Switch/Router/Firewall/MPLS links configs and verification), Call center Prepare, Plan, Design and implement in Montreal Canada

    • IP Network Technologies Inc

      Jul 2015 - Jan 2016
      Network and Security Consultant

      Project name: Stellar - DC MigrationIndustrie: Call CenterMain roles: (switch/router/firewall/WAN links configs and verifications) Datacenter Migration from Site A to Site B

    • IP Network Technologies Inc

      Apr 2016 - Mar 2017
      Network and Security Consultant

      Managing 10 Datacenters around the world: working on backbone, border, customer access and server access networks and on the system infrastructure (OS, services management, virtualization, storage)

    • Opportunity Bank JSC Novi Sad

      Jun 2017 - Jun 2019
      Senior Network & Security Engineer

      (switch/router/firewall/proxy/WAN links configs and verifications); Cisco Identity Services Engine; L3VPN; NGFW PaloAlto; PaloAlto Global Protect VPN; Symantec Message Gateway; Titus data classification; migration of ASA 5510 firewalls to DR; Wireless/Voice; Symantec Web Gateway; Mikrotik wifi; Nessus Vul. testing, PRTG monitoring; Symantec End point protection; McAfee NDLP & HDLP; SIEM Qradar/McAfee

    • NIS Gazprom Neft

      Jun 2019 - Jul 2020
      Information Technology Security Expert

      Coordinate and approve accesses to the Company's information resources/ Managing the work of specialized tools, software solutions and technical systems in the field of information technology security/ Providing methodological assistance to organizational units in the field of information technology security/ Controlling IT processes from a security perspective.

    • Expobank a.d. Beograd

      Jul 2020 - Jul 2021
      CISO

      Direct and approve the design of security systems;Ensure that disaster recovery and business continuity plans are in place and tested;Review and approve security policies, controls and cyber incident response planning;Approve identity and access policies;Review investigations after breaches or incidents, including impact analysis and recommendations for avoiding similar vulnerabilities;Maintain a current understanding the IT threat landscape for the industry;Ensure compliance with the changing laws and applicable regulations;Translate that knowledge to identification of risks and actionable plans to protect the business;Schedule periodic security audits;Oversee identity and access management;Make sure that cyber security policies and procedures are communicated to all personnel and that compliance is enforced;Manage all teams, employees, contractors and vendors involved in IT security, which may include hiring;Provide training and mentoring to security team members;Constantly update the cyber security strategy to leverage new technology and threat information;Brief the executive team on status and risks, including taking the role of champion for the overall strategy and necessary budget; Communicate best practices and risks to all parts of the business, outside IT Show less

    • Sberbank

      Jul 2021 - Aug 2022
      Senior cyber security engineer

      Define the framework of an effective Information Security strategy, issuing instructions concerning the definition and implementation of security policies and guidelines, based on the most recent international standards, and monitors their implementation company wide. Provide the Company with state-of-the-art solutions in order to guarantee a proper and suitable information security strategy, consideringthe overall information security appetite, based on the adoption of a thorough risk assessment process and gap analysis.- Support in security architecture design, implementation andintegration of the new security solutions on group level- Responsible for technical integration of the new solutions in theexisting security system, landscape- Definition and documentation of related IT operationsprocesses- Improvement, stabilization, simplification and automatization ofthe current processing environment Show less

    • Porsche Informatik GmbH

      Aug 2022 - now
      Cyber Threat Intelligence - L3 Security Analyst

      • Performs threat hunting within the clients’ technology environments to uncover indicators of threat activities.• Support SIEM use case management process• Supports the development of tactics, techniques, and procedures in providing proactive threat hunting and analysis against the available information sources• Supports the identification and documentation of Indicators of Compromise (IoCs).• Leverages internal and external resources to research threats, vulnerabilities and intelligence on various threat actors and exploitation tools and platforms.• Use an analytics platform to identify threats in the available information repositories.• Perform threat research to identify potential threat vectors and work with multi-disciplines to improve prevention and detection methods.• Identify gaps in an organisations measurement metrics, telemetry and logging capabilities and propose enhancement strategies to achieve the intended outcomes.• Defining and executing the threat intelligence strategy for the company, accounting for both current threats and the threat horizon.• Managing a team of threat intelligence and defense specialists.• Implementing appropriate formalized processes to identify and assess Cyber Threats.• Identify, assess and report key risks relating to the Confidentiality, Integrity and Availability of information within to C-suite level stakeholders Show less

  • Licenses & Certifications

    • CNSS 4011

      Committee on National Security Systems
    • CNSS 4013

      Committee on National Security Systems
    • Cisco Certified Design Associate

      Cisco
    • Cisco Certified Design Professional

      Cisco
    • Cisco Certified Network Associate Routing & Switching

      Cisco
    • Cisco Certified Network Professional Routing & Switching

      Cisco
    • Cisco Certified Network Associate Voice

      Cisco
    • Cisco Certified Network Associate Security

      Cisco
    • Cisco Certified Entry Networking Technician

      Cisco
    • Cisco Certified Network Professional Security

      Cisco