I'm an educated data technician with deep knowledge in infrastructure and system administration, working as Cyber Security Engineer at IT Relation A/S. I love acquiring new knowledge, and participates in cyber-security CTF challenges, training like TryHackMe and Hackthebox in my spare time. For the past 14 years I have been doing volunteer work, where I have continuously working on skills for Linux server administrator and programming in Python (Django). Abilities that I enjoy to keep on top with maintenance and work on a homelab setup at home. Topics of which I write about regularly on my blog. I am also a trained firefighter and rescue specialist as well as a skilled waiter and sommelier with in-depth knowledge within food, wine, spirits, customer contact and service, and management.
As Cyber Security Strategist in IT Relations Cyber Defence Center (CDC), my responsibilities primarily covers working with maturing our Security Operation (SOC) and our Incident Response (CSIRT) capabilities. I drive our framework governance using SIM3 (Security Incident Management Maturity Model), SOC-CMM (SOC Capability Maturity Model), as well as NIST CSF, ISO 27035 and similar ensuring an ever-evolving Cyber Defence Center ready for the Security Events and Incidents of the past, present, and the future. Being Cyber Security Strategist, I'm also responsible for setting short-term and long-term goals and roadmaps, and enabling the management-level to understand current and upcoming topics and ensuring a sound foundation for decision-making. Commercially I partake in R&D for new security-tooling and services, and as part of the CDC and CSIRT, I take part in critical Incident Responses as tier 3 investigator and enabling Incident Management. Furthermore, I'm leading creation and improvements in the procedures, processes and systems for Cyber Threat Intelligence gathering and Risk Assessments hereof, as well ensuring actionable ready-to-go recommendations for the constituents.
At the role of Cyber Security Engineer I take part of our Security Operations (SOC) team within the Cyber Defence Center. For the first year my responsibilities primarily covered customer security i.a. incident response, alert handling and triage using SIEM and SOAR tools, procedures, risk assessments and vulnerability scanning, and internal DevOps for our Security products. Furthermore, I was integral in developing our running roadmaps for the team and participate in developing and evaluating new innovative security solutions and services for internal use and for our customers. Since the later parts of 2021 and further evolving in 2022, I have worked with tier 3 incident handling, digital forensics, malware analysis and continuously developing and improving Incident Response capabilities as well as the CSIRT processes and procedures. Also taking part in our R&D with researching security-tooling and DevOps programming primarily in Python. Furthermore, I'm leading creation and improvements in the procedures, processes and systems for Cyber Threat Intelligence gathering and Risk Assessments hereof, as well ensuring actionable ready-to-go recommendations for the constituents. A good part of my time is as well devoted to governance/compliance within the team, where I'm working with continuous implementation, improvement and auditing of framework-implementations in our processes, procedures, and playbooks for SIM3, NIST Cybersecurity Framework, ISO 27035 and similar.
I started in IT Relation's Customer Operations during my apprenticeship for becomming a skilled Datatechnican. In the Customer Operations I worked with many systems, performed service requests and debugging/incident handling for our customers. During this time, I learned pleanty about the in's and out's of HyperV, VMWare, Xen as hypervisors as well as Citrix systems, Microsoft systems, specialised applications as well as being part of the Linux-team. In the summer of 2020 I joined the Security Operations (SOC), where I started working on internal procedures, certifications in F-Secure, Carbon Black, Cylance and other EPP/EDR systems used in our work. For the remainding time of my apprenticeship I have worked within our SOC-team with customer security i.a. alert-handling, CVE/CVSS risk assessments, light incident response and working on implementation of "The Hive" into our workflow with a great deal of Python-programming.
UNF's purpose is to spread interest in natural science and technology primarily to high school students and the general public. I have gained experience in teaching and dissemination, communication, organization and leadership as well as developing a broad network.
As a volunteer in the Skanderborg Festival Club, you work at the Danish festival "Smukfest" or colloquially "The most beautiful festival in Denmark". In 2013 I helped in the festival's wine bar "Vinoteket". In 2014, I was given responsibility as "Sub-chairman", which meant responsibility for cash flow, motivation and engagement of employees, additional sales, receipt of goods and inventory management. In 2017, in parallel with my sub-chairman work at Vinoteket, I was part of the stage crew on the festival's biggest stages, the Beech Tree Stages.
After my time as a conscript in the Emergency Management Agency in Herning, I had a desire to continue to be a part of it. From April 2010, right after my conscript service, I was accepted into the Volunteer Force, DFI and became a volunteer at the Emergency Management Agency in Herning.
Write to me:
Otherwise, contact me via danni@danniranderis.dk or call me at +45 50701386