❖ In charge of CERT-2-CERT relationship
❖ Main point of contact with Customers and Partners regard to cyber security
❖ In charge of the accréditation and certification (TF-SCIRT)
❖ IT security CERT platform: design, build
❖ Drive security aspect of the Cloud Transition (Sensitive information)
❖ Architecture Validation
❖ Risk analyzes for internal project
❖ Definition of technical spécification for internal project
Senior Security Architect :
❖ Maintain a global and world wild cyber security strategy for the Group.
❖ Manage, improve, and expand the secure software design and development processes
❖ Review and evaluate designs and project activities to ensure secure development best
practices
❖ Lead development of security design (secure design protocol using security principles) for a
wide ranging projects and solutions for internal and external projects.
❖ Drive innovation and integration of new security technologies and processes into
development team projects and activities.
Expert/evaluator for the European H2020 calls and project.
❖ Evaluate EU grant applications by scoring each proposal against the criteria set out in the
Horizon 2020 Work Programme.
❖ Assignments mainly concern research and innovation, falling within the Horizon 2020
programme designed to address the challenges Europe is facing through funding excellent
science, technology and innovation
• Development of the cyber security unit: creation of the product line strategy, team
development, process of work, in charge of developing the department infrastructure for specific
product line development. Business Development.
• European project H2020 SCISSOR: definition of the proposal project (financial and technical),
win the fund with best note in cyber security category (4M euro budget - 8 partners), co
coordinator of SCISSOR (********)
• Project Director / Coordinator / Management Board for H2020 SCISSOR:
❖ Administrative management: legal, financial and administrative organization
*
▪ supervision of consortium agreement
▪ ensure contractual commitments within budget and time plan.
▪ responsible for corrective action and deviation plan
▪ european commission reporting, review and meeting (activity,
management,financial report)
▪ responsable of project management team
▪ business model and strategy
❖ Technical management:
▪ responsable of the work package relative to the development of a key
management system (30MM).
▪ in charge of the SCISSOR architecture.
▪ responsable of the coordination and integration of technical partners
contributions.
• Technical Manager: requirement definition, technical specification of solution, state of art. Cryptosystem project: development of an IBE system. Theme: SIEM technology, cloud computing, smart
grid, Key Management.
• Development of a commercial company which designs and sales new model of lamps: Business Plan writing, concept development, collection definition.
• Strategy and Budget definition and management
• Production Department: manufacturer prospection, production requirements definition, import management, contract management, logistics process, stock management.
• Point of sales: development of 2 sales points, marketing, communication, events
Development of an asymmetric cryptographic system
• System & Software:
Survey on Web Service and Security
In charge of specify the project’s architecture and functionalities
In charge of the Web Service implementation and achievement (3 people)
In charge of the system module integration, installation and deployment
Definition of the development platform architecture
• Cryptography:
Survey on pairing: computation, curves, and characteristic
Implementation of cryptography libraries
Support team members on cryptography implementation (5 people)
• Project Management:
Project charter, objective, budget and strategy definition and management
In charge of the team member work: quality, relevance, functioning and test cover
Responsible of the plan definition and achievement
Responsible of the delivery (time line, quality and needs)
Coordinate the different department’s interaction on the project
Monitor the follow-up on the work progress
Project of TRUSTY security line product: development, deployment, product evolution, training, transfer of knowledge.
• Manage, specify and participate to the evolutions for different software (Trusty Products certified EAL3+) performing security functionalities (signature, encryption, pki, etc..)
• In charge of plan and provide the transfer of knowledge on this products.
• In charge of create, maintain and manage the development platform (architecture, design, installation and documentation)
• In charge of plan and provide the transfer of knowledge on the development platform.
• Manage support process level 3
• Coach and guide the team members (3 to 5 people)
• Perform training
• Responsible for task allocation, schedule, resource allocation, tracking, priority management and reporting for the team.
• Conception and development of certified products performing security functions as electronic signature and encryption (TrustySign and TrustyPlatform).
Apply common criteria, specifications, conception, interface design, implementation, unit test cover, installshield and release.
Functionalities: Signature, Encryption, Verification and Decryption
Technologies: Java, C++, Swing, Eclipse, Junit, Web services
Tools: Maven, Subversion, HSM, SSL, Tomcat Oracle, LDAP, installshield
Libraries: BounyCastle, Log4j, ResourcesBundle, xml-security
Standard: X509, PKCS11, PKCS12
• PKI conception and development (TrustyKey): installation, configuration and management of the PKI.
Functionalities: Generate, revoke, renew, publish, ... certificates
Technologies: Java, Junit, Web services
Tools: SSL, Tomcat Oracle,Virtual Machine
Libraries: Spring, Hibernate
Standard: X509