Analysis, development and implementation of Security Infrastractures and process definition. Risk analysis identification through requirements weakeness control. Provide training and support to the security administrator team.
Responsible of an Identity Access Management platform, involved in projects of system integration of security control (physical and logical access) and authorization workflow. Conduction of Vulnerability Assessment test preparation and analysis, in cooperation with customers.