cV

Matthias Simonis

Security Enthusiast

Email: matthias@matthias-simonis.de

Web: www.matthias-simonis.de

Phone: 0176 4738 5529

Address: Franziskastra├če 3b, 50733 Cologne, Germany


ABOUT ME

Why am I the right man for the job?

I did a complete career from support agent to abuse analyst at 1&1 Internet AG, where I could establish knowledge about many technics that I used in my further jobs. I did support for the whole portfolio of 1&1 products except DSL, which includes linux hosting, linux root servers, common e-mail issues. In the Abuse department we also handled abuse threats for any service.

I am very enthusiastic working in Canada because it is my most favourit country and in the position you offer I can use most of the skills I gathered in my past career. Additional I offer a great amount of experience in handling different abuse cases and automated case management. For me this is a perfect match.


MY WORK

I have gathered my work experience in this companies
Apr 2012 - Today

eco - Verband der Internetwirtschaft e.V.

Security Expert

Here I am developer for Projects like Initiative-S or the ACDC-Project. Also I administrate the infrastructure for our department containing webhosting, e-mail and applications.

I am commited to the Working Group for Abuse and sometimes E-Mail Security where we discuss security-threats and takedowns with the industrie (AV/ISP/Security-Companies).

Projects
  1. https://botfrei.de/

    Information-Platform for users with virus infections. Botfrei works together with isps to support their users by desinfecting their systems.

  2. https://initiative-s.de/

    Website-Check: Website-Owners can subscribe their websites for a daily malware scan.

  3. https://acdc-project.eu/

    Data Exchange Database for Security Threats.

New gathered Knowledge
  1. AngularJS
  2. ElasticSearch
  3. Bootstrap/Material
  4. Kali-Linux

Mar 2012 - Dec 2014

cyscon GmbH

Security Developer

At cyscon I administrated servers running projects I worked on. Here I developed a url-analying software and the whole isp-reputation database. We analyzed url-threats if they are really harmful, reported them to theis as-owners and then tracked the time till the threat was handled properly. Also we invendet the first self-service-website for users with virus-infections.

Projects
  1. https://c-sirt.org/

    URL-Prozessing-Project. We analyzed URL-Threats and reported them to their as-owners. This platform was also used to shared hige URL-feeds between the AV-Industrie.

  2. https://check-and-secure.com/

    Self-Service-Website for Users. We designed kind of an assistant users can use to clean up their computers. It was the first of its kind.

  3. https://www.swiss-isa.ch/

    Self-Service-Website for Users. We designed kind of an assistant users can use to clean up their computers.

New gathered Knowledge
  1. Prozessing (analyzing, filtering) large threat-lists
  2. Threat-Feed-Sharing
  3. ISP-Reputation-Calculation
  4. Queues (RabbitMQ)

Mar 2011 - Mar 2012

der Webwart

CTO

Here I tried to establish my own company around web-security. We handled whole cms and did analyze and solve complete security threats for our customers.

New gathered Knowledge
  1. Mailserver (Postfix/Dovecot)
  2. SSL/TLS
  3. nginx
  4. MariaDB
  5. WordPress
  6. git
  7. bacula
  8. ispconfig

Jan 2010 - Mar 2012

1&1 Internet AG

Abuse-Engineer

With my gathered knowlegde about linux and web-technologies, I got into the abuse-department of 1&1. In my first year I was an analyst analyzing attacks on customers webspaces, root-servers or e-mails. As analyst I also managed the signature-database of the abuse-department used to find malicous files on customer webspaces.

In my second year I became one of the abuse-engineers of our team. In this position we did choose the threats to handle and worked out processes how to handle these threats in our department and with our customers. Here we also did alot of automation like processing whole hacks on our webspaces automatically or detecting froud threats in our registration process.

New gathered Knowledge
  1. Web-Security
  2. Server-Security
  3. Threat-Detection
  4. Threat-Analyze
  5. Threat-Handling
  6. Abuse Handling
  7. Spam

Jan 2008 - Dec 2009

1&1 Internet AG

Backend Support for Hosting

The biggest part of this job was to help our technical support with issues they could not solve. For example difficult PHP-Questions or linux-Questions.

New gathered Knowledge
  1. Internal Prozesses
  2. User Management
  3. Right Management
  4. Bug Mangement

Jan 2007 - Dec 2007

1&1 Internet AG

Technical Support for Hosting

I was a part of the support of the Hosting-Part of 1&1 Internet AG and got used to linux and helping people fixing their issues for example in Bash, PHP but other web technologies too.

New gathered Knowledge
  1. SSH
  2. Debian Linux
  3. Bash
  4. MySQL
  5. PHP
  6. HTML/JavaScript
  7. E-Mail
  8. Telnet
  9. DNS
  10. Domain-Handling

Sep 2003 - Dec 2006

Ehrhardt + Partner GmbH & Co. KG

IT Specialist/Trainee

I did develope logistic applications fore storage management. In my professional training I learned to use the console on an AS/400 and program in COBOL.

New gathered Knowledge
  1. Telnet
  2. OS/400
  3. COBOL
  4. SQL

MY EDUCATION

My formal education
2003 - 2006

Technical college: Carl Benz-School in Koblenz

IT Specialist

2000 - 2002

Technical college: BBS Cochem

Advanced Vocational Certificate of Education/Assistant for data processing

1994 - 2003

Middle School

O-level

MY SKILLS

My practical skills and knowledge

Threat-Management

Threat-Detection
7 out of 10
Threat-Analyze
9 out of 10
Reporting/Statistics
8 out of 10

Administration

Debian Linux
8 out of 10
SSH
8 out of 10
E-Mail
7 out of 10
Webhosting
9 out of 10

Web-Software

WordPress
9 out of 10
OTRS
8 out of 10
Feng-Office
7 out of 10
ISPConfig
8 out of 10
AngularJS
8 out of 10

Programer

PHP
9 out of 10
JavaScript
8 out of 10
HTML
9 out of 10
CSS
7 out of 10