CV

Matthias Simonis

Software Engineer / Operations Guy

Email: work@matthias-simonis.de

Web: www.matthias-simonis.de

Phone: 0176 4738 5529

Address: Elberscheidter Feld 11, 42555 Velbert, Germany


ABOUT ME

Why am I the right man for the job?

I did a complete career from support agent to abuse analyst at 1&1 Internet AG, where I could establish knowledge about many technics that I used in my further jobs. I did support for the whole portfolio of 1&1 products except DSL, which includes linux hosting, linux root servers, common e-mail issues. In the Abuse department we also handled abuse threats for any service.

Later in my career I worked mainly on my skills of how to work and staying state of the art. With that I am a person that never stands still. I want to actively utilize new technologies and I embrace everything about with the agile and DevOps culture.


MY WORK

I have gathered my work experience in this companies
Aug 2016 - Today

G DATA Software AG

Senior Software Engineer

Developer for the backend processing of incoming samples of suspicious urls and files. It is also part of my daily job to discuss design choices in our software, push DDD in the company and make operations as easy at it gets to focus on business value.

Operating Docker Swarm on Ubuntu Linux, CI/CD trying to have all the infrastructure as code with.

New gathered Knowledge
  1. Distributed Systems
  2. Domain Driven Design
  3. Docker, Docker Swarm
  4. Ansible

Apr 2012 - Jul 2016

eco - Verband der Internetwirtschaft e.V.

Security Expert

Here I am developer for Projects like Initiative-S or the ACDC-Project. Also I administrate the infrastructure for our department containing webhosting, e-mail and applications.

I am commited to the Working Group for Abuse and sometimes E-Mail Security where we discuss security-threats and takedowns with the industrie (AV/ISP/Security-Companies).

Projects
  1. https://botfrei.de/

    Information-Platform for users with virus infections. Botfrei works together with isps to support their users by desinfecting their systems.

  2. https://initiative-s.de/

    Website-Check: Website-Owners can subscribe their websites for a daily malware scan.

  3. https://acdc-project.eu/

    Data Exchange Database for Security Threats.

New gathered Knowledge
  1. AngularJS
  2. ElasticSearch
  3. Bootstrap/Material
  4. Kali-Linux

Mar 2012 - Dec 2014

cyscon GmbH

Security Developer

At cyscon I administrated servers running projects I worked on. Here I developed a url-analying software and the whole isp-reputation database. We analyzed url-threats if they are really harmful, reported them to theis as-owners and then tracked the time till the threat was handled properly. Also we invendet the first self-service-website for users with virus-infections.

Projects
  1. https://c-sirt.org/

    URL-Prozessing-Project. We analyzed URL-Threats and reported them to their as-owners. This platform was also used to shared hige URL-feeds between the AV-Industrie.

  2. https://check-and-secure.com/

    Self-Service-Website for Users. We designed kind of an assistant users can use to clean up their computers. It was the first of its kind.

  3. https://www.swiss-isa.ch/

    Self-Service-Website for Users. We designed kind of an assistant users can use to clean up their computers.

New gathered Knowledge
  1. Prozessing (analyzing, filtering) large threat-lists
  2. Threat-Feed-Sharing
  3. ISP-Reputation-Calculation
  4. Queues (RabbitMQ)

Mar 2011 - Mar 2012

der Webwart

CTO

Here I tried to establish my own company around web-security. We handled whole cms and did analyze and solve complete security threats for our customers.

New gathered Knowledge
  1. Mailserver (Postfix/Dovecot)
  2. SSL/TLS
  3. nginx
  4. MariaDB
  5. WordPress
  6. git
  7. bacula
  8. ispconfig

Jan 2010 - Mar 2012

1&1 Internet AG

Abuse-Engineer

With my gathered knowlegde about linux and web-technologies, I got into the abuse-department of 1&1. In my first year I was an analyst analyzing attacks on customers webspaces, root-servers or e-mails. As analyst I also managed the signature-database of the abuse-department used to find malicous files on customer webspaces.

In my second year I became one of the abuse-engineers of our team. In this position we did choose the threats to handle and worked out processes how to handle these threats in our department and with our customers. Here we also did alot of automation like processing whole hacks on our webspaces automatically or detecting froud threats in our registration process.

New gathered Knowledge
  1. Web-Security
  2. Server-Security
  3. Threat-Detection
  4. Threat-Analyze
  5. Threat-Handling
  6. Abuse Handling
  7. Spam

Jan 2008 - Dec 2009

1&1 Internet AG

Backend Support for Hosting

The biggest part of this job was to help our technical support with issues they could not solve. For example difficult PHP-Questions or linux-Questions.

New gathered Knowledge
  1. Internal Prozesses
  2. User Management
  3. Right Management
  4. Bug Mangement

Jan 2007 - Dec 2007

1&1 Internet AG

Technical Support for Hosting

I was a part of the support of the Hosting-Part of 1&1 Internet AG and got used to linux and helping people fixing their issues for example in Bash, PHP but other web technologies too.

New gathered Knowledge
  1. SSH
  2. Debian Linux
  3. Bash
  4. MySQL
  5. PHP
  6. HTML/JavaScript
  7. E-Mail
  8. Telnet
  9. DNS
  10. Domain-Handling

Sep 2003 - Dec 2006

Ehrhardt + Partner GmbH & Co. KG

IT Specialist/Trainee

I did develope logistic applications fore storage management. In my professional training I learned to use the console on an AS/400 and program in COBOL.

New gathered Knowledge
  1. Telnet
  2. OS/400
  3. COBOL
  4. SQL

MY EDUCATION

My formal education
2003 - 2006

Technical college: Carl Benz-School in Koblenz

IT Specialist

2000 - 2002

Technical college: BBS Cochem

Advanced Vocational Certificate of Education/Assistant for data processing

1994 - 2003

Middle School

O-level

MY SKILLS

My practical skills and knowledge

Programer

Distributed Systems
7 out of 10
CI/CD
8 out of 10
Mob- / Pair-Programming
9 out of 10
C# (.Net core)
7 out of 10
Python (3.x)
6 out of 10
PHP
7 out of 10
JavaScript
7 out of 10
HTML
7 out of 10
CSS
6 out of 10

Operations

Debian/Ubuntu Linux
9 out of 10
Infrastructure as Code
8 out of 10
Ansible
9 out of 10
Docker Swarm
9 out of 10
Prometheus Monitoring
7 out of 10
ELK Stack
7 out of 10

Threat-Management

Threat-Detection
7 out of 10
Threat-Analyze
9 out of 10
Reporting/Statistics
8 out of 10