ROMAN ORŁOWSKI

Precision. Resilience. Command. – SecDevOps. Dedicated to protecting people and systems through ethical cybersecurity practices.

Professional Profile

Self-driven cybersecurity expert specializing in cloud infrastructure protection, threat analysis, and secure system architecture. With a passion for creating impenetrable digital environments and a track record of successful implementations across diverse industries. Committed to ethical practices, responsible disclosure, and empowering others with knowledge to foster a safer cyberspace.

$ whoami
> Roman Orłowski - Cybersecurity Specialist
$ skills --list
> Cloud Security | Threat Analysis | Network Defense
$ contact --method
> Email: ro-noc2020@protonmail.com
Download Resume Contact Me

Core Competencies

Azure Security

Defender for Endpoint, Sentinel, Identity Protection, and Cloud Posture Management. Focus on defensive strategies to protect user privacy and data integrity.

Threat Protection

MITRE ATT&CK framework, SIEM solutions, and behavioral analysis. Emphasizing ethical hacking methodologies for vulnerability identification without exploitation.

Network Security

Zero Trust Architecture, VPN configurations, and advanced firewall management. Promoting equitable access to secure networks for all users.

Compliance

ISO 27001, NIST frameworks, GDPR, and industry-specific regulations. Ensuring adherence to global standards for fair and just cybersecurity practices.

Ethical Hacking

CEH principles for reconnaissance, scanning, and enumeration. Prioritizing defense over offense to safeguard systems and promote responsible disclosure.

Privacy Protection

Encryption techniques, anonymization, and data minimization. Educating on GDPR compliance and privacy-by-design to protect individual rights.

Enterprise Security Solutions

1. Hybrid Infrastructure Protection

Network

Zero Trust Segmentation

ℹ️ Azure Network Security Groups, Cisco ISE, Microsegmentation. Ensures least privilege access to protect sensitive data.

Endpoints

Unified EDR/XDR

ℹ️ Microsoft Defender, CrowdStrike, SentinelOne. Real-time threat detection with minimal privacy intrusion.

Cloud

CASB + CSPM

ℹ️ Microsoft Defender for Cloud, Prisma Cloud, AWS Security Hub. Continuous compliance monitoring aligned with NIST.

Identity

Conditional Access

ℹ️ Azure AD, Okta, MFA, PIM. Multi-factor authentication to enhance user protection without complexity.

Data

Encryption & DLP

ℹ️ Azure Information Protection, Symantec DLP. Safeguards sensitive information with encryption and leak prevention.

Monitoring

SIEM & Analytics

ℹ️ Splunk, ELK Stack. Advanced logging for threat hunting, ensuring transparent and ethical monitoring.

2. Zero-Day Response Protocol

Detection

SIEM alerts, EDR telemetry, and threat intelligence feeds. Use CEH-inspired scanning to identify anomalies early.

Triage

Initial assessment using MITRE ATT&CK framework. Prioritize based on impact to human safety and data privacy.

Containment

Network segmentation, endpoint isolation, credential rotation. Minimize harm through swift, ethical actions.

Eradication

Patch deployment, malware removal, system hardening. Align with CEH standards for thorough vulnerability mitigation.

Recovery

System restoration from clean backups, validation testing. Ensure equitable recovery for all affected parties.

Lessons Learned

Post-incident review and process improvement. Share knowledge responsibly to build community resilience.

Disclosure

Responsible reporting to vendors and stakeholders. Promote transparency while protecting vulnerable systems.

3. Security Frameworks

MITRE ATT&CK

Adversary tactics and techniques framework for threat modeling

  • Threat intelligence integration
  • Detection rule development
  • Red team exercises
  • Mapping to CEH methodologies

NIST CSF

Identify, Protect, Detect, Respond, Recover framework

  • Risk assessment methodology
  • Security controls mapping
  • Maturity benchmarking
  • Privacy enhancement focus

CIS Controls

Prioritized set of actions for cyber defense

  • Implementation Groups
  • Configuration benchmarks
  • Hardening guidelines
  • Equitable access recommendations

ISO 27001

International standard for information security management

  • Risk treatment plans
  • Audit and certification
  • Continuous improvement
  • GDPR alignment

4. Threat Risk Matrix

Threat
Likelihood
Impact
Risk Level
Mitigation
Phishing
High
Medium
High
User training, Email filtering, Awareness quizzes
Ransomware
Medium
Critical
Critical
Backups, EDR, Patch management, Immutable storage
Insider Threat
Low
High
Medium
DLP, User monitoring, Least privilege, Behavior analytics
DDoS
Low
Medium
Low
Cloudflare, Rate limiting, Traffic scrubbing
Zero-Day Exploit
Low
Critical
High
Threat intel, Sandboxing, Rapid patching, Isolation
Supply Chain Attack
Medium
High
High
Vendor assessment, Code signing, Dependency scanning

5. For 100 Users & 200 Devices

Automate patch management
WSUS + Intune for Windows, Ansible for Linux. Ensure timely updates to mitigate known vulnerabilities ethically.
Segment networks
VLANs for departments/IoT, microsegmentation for critical assets. Implement Zero Trust to protect user privacy.
Monitor with 24/7 SOC
Microsoft Sentinel + MDE with playbooks for common scenarios. Transparent alerting to build trust.
Train users
Quarterly simulated phishing + interactive security training. Use CEH-inspired scenarios for empowerment.
Backup strategy
3-2-1 rule with immutable backups (Veeam + Azure Blob). Ensure data recovery without compromising privacy.
Implement MFA
Enforce multi-factor authentication across all accounts. Simple setup for accessibility to all users.
Regular Audits
Conduct vulnerability scans and penetration tests ethically, reporting findings responsibly.

Professional Journey

2024 - Present

Freelance Cybersecurity Consultant

Performed pentesting, incident response, and security training for SMBs and NGOs. Delivered risk-based reports and improved client defenses via OWASP/NIST-aligned strategies, emphasizing ethical disclosure.

2023 - 2024

Senior Engineer for Cloud & Infrastructure – Microsoft Project

Implemented Defender for Endpoint, EDR, SIEM, and Identity Protection. Reduced threat exposure and educated teams on latest threat intel and mitigation tactics, fostering collaborative defense.

2022 - 2023

Support Engineer – Intellias

Led cloud migration across 5 EU regions. Managed Azure resources, SLAs, policy enforcement, and authored technical documentation and procedures, ensuring GDPR compliance.

2021

IT Specialist – Cinema City

Rebuilt regional IT infrastructure. Delivered OS deployments (Debian/Win), supported POS systems, and enforced backup/recovery procedures with a focus on data protection.

2020 - 2021

Platform Engineer – Discovery

Handled SIEM ops via Splunk and SolarWinds. Authored automation scripts and participated in incident bridges and recovery plans, promoting team brotherhood.

2020

NOC Engineer – Sperasoft

24/7 infrastructure monitoring. Produced SOPs, ran escalations, and participated in collaborative network response workflows for equitable security.

2019 - 2020

Enterprise Operation Center Analyst – Grand Parade / William Hill

Led vulnerability scans, threat hunting, patch management, and awareness training. Created incident response scenarios aligned with CEH principles.

2018 - 2019

Junior Network Specialist – Emitel SA

Maintained MPLS and SDH links. Resolved Cisco-related issues, handled Jira tickets, and configured VPN and signal systems with privacy considerations.

2017 - 2018

Security Intern – Local Firm

Assisted in basic audits and learned CEH fundamentals. Contributed to team efforts in building defensive strategies for small businesses.

2015 - 2017

Service Specialist NOC – Horsebridge

Monitored enterprise level distributed network using PRTG, Ruckus, BlueSocket, Radwin, WireShark, ZenMap. Resolved incidents, escalated issues, and maintained ISO 9001 standards.

2011 - 2014

Telecommunication Engineer – BT Openreach

Provided telephone and broadband services, performed circuit mapping, jumper wire routing, and ensured compliance with health and safety principles and quality standards (ISO 9001).

2006 - 2010

IT Support (1st/2nd line) – First Red Midland Buses

Managed IT equipment installation and maintenance, provided desktop and server support, ensured antivirus compliance, and handled Exchange server maintenance.

2003 - 2006

IT Technician – M1 - REAL Ltd

Installed and maintained IT equipment, supported POS systems, generated sales reports using Oracle Discoverer, performed MySQL queries, and managed daily backups on multiple servers.

Certifications

Committed to continuous learning and upholding the highest standards in cybersecurity. These certifications reflect expertise in ethical hacking, protection strategies, and compliance.

Certified Ethical Hacker (CEH)

EC-Council. Mastery in ethical hacking methodologies, vulnerability assessment, and defensive techniques to protect systems responsibly.

CompTIA Security+

Foundational knowledge in network security, compliance, and operational security. Emphasizes practical skills for entry-level protection.

Microsoft Azure Security Engineer Associate

Expertise in implementing security controls, maintaining security posture, and protecting data in Azure environments.

CISSP (In Progress)

ISC2. Advanced certification covering security and risk management, asset security, and communication protection.

AWS Certified Security - Specialty

Specialized in designing and implementing security solutions on AWS, focusing on data protection and incident response.

Cybersecurity Resources

To empower everyone with knowledge, here are free and accessible resources for learning cybersecurity. These align with CEH principles and promote equitable access to education for a just cyberspace.

  • TryHackMe - Hands-on labs for beginners to advanced ethical hacking.
  • Cybrary - Free courses on CEH, penetration testing, and defensive strategies.
  • OWASP - Community-driven resources for web application security and vulnerability management.
  • SANS Institute - Free cheat sheets and webinars on threat intelligence and incident response.
  • NIST Cybersecurity Framework - Guidelines for improving organizational security posture.
  • EC-Council CEH - Official resources for ethical hacking certification preparation.
  • PortSwigger Web Security Academy - Free interactive lessons on web vulnerabilities.

Remember, use these tools defensively to protect yourself and others. Always obtain permission before testing systems.

Cybersecurity Awareness Quiz

Test your knowledge with this interactive quiz inspired by CEH concepts. It's designed for all levels to promote learning and awareness in a supportive way.

Question 1: What is the first phase of ethical hacking in CEH?

Reconnaissance
Scanning
Gaining Access
Maintaining Access

Question 2: Which practice best protects against phishing?

Clicking all links
Verifying sender and using MFA
Sharing passwords
Ignoring updates

Question 3: What does responsible disclosure mean?

Publicly sharing exploits immediately
Reporting vulnerabilities to vendors first
Ignoring found issues
Selling vulnerabilities

Question 4: Why is encryption important for privacy?

It protects data from unauthorized access
It slows down systems
It shares data publicly
It removes data

Question 5: What framework helps map adversary tactics?

MITRE ATT&CK
OWASP Top 10
PCI DSS
HIPAA

Interactive Terminal

Try some Kali OS commands (simulated). Expanded with educational commands on CEH concepts and defensive tips:

Kali Linux Terminal Simulator
Type 'help' for available commands
Try: nmap, msfconsole, searchsploit, whoami, ceh_phases, privacy_tip, disclosure
$

Contact

For professional inquiries, please contact me via email:

ro-noc2020@protonmail.com