Umiejętności
Coaching
Data Mining
Interim Management
Kanban
Linux
Mentoring
Scrum
Threat Management
Unstructured Data
Vulnerability Management
zarządzanie zmianą
Zarządzanie zespołem
przywództwo w zespole
Rozwój osobisty
Duża ilość danych
Algorytmy genetyczne
Telekomunikacja
Scrum, Agile Project Management
Sieci Neuronowe
Języki
angielski
biegły
niemiecki
podstawowy
Doświadczenie zawodowe
Cloud Security and Cryptographic Key Management Lead, VP
Ensuring high quality design and delivery of key products and services related to information security including Cloud Security Products (CASB, Key Vaults), Secrets Management (CI/CD credential vaults) as well as future Structured Data Security products.
Leading a diversified and geographically distributed Scrum teams of security engineers (with key competences related to both Linux and Windows and integration with different public clouds like Azure and AWS).
Leading a diversified and geographically distributed Scrum teams of security engineers (with key competences related to both Linux and Windows and integration with different public clouds like Azure and AWS).
IT Infrastructure Manager
Remote work + ad-hoc on-site IT support for a medical centre. Secure network and virtual infrastructure design and management (VMware vSphere ESXi Bare-Metal Hypervisor). implementing endpoint and cloud security solutions, licensing and security audits, Search Engine Optimization (SEO), ICT uptime and performance monitoring.
KEY ACHIEVEMENTS:
► Reduced patient’s database management efforts through automating processes by 80%.
KEY ACHIEVEMENTS:
► Reduced patient’s database management efforts through automating processes by 80%.
Engineering Project Manager
Responsible for leading multiple projects with virtual and geographically diversified teams.
Working on a cryptographic library / secure element development (SOC TPM/HSM) for a leading leading semiconductor manufaturer and suplier for the secure identification, automotive and digital networking industries.
Working on a cryptographic library / secure element development (SOC TPM/HSM) for a leading leading semiconductor manufaturer and suplier for the secure identification, automotive and digital networking industries.
Partner
Leading Quality Assurance and Cybersecurity offering and projects @intive:
►Cybersecurity, Quality Assurance consulting and offering strategy,
►Development of security penetration testing services and test automation (incl. DevOps, SecOps, etc.),
►Building and supporting SOC, SIEM and managed security services.
►Cybersecurity, Quality Assurance consulting and offering strategy,
►Development of security penetration testing services and test automation (incl. DevOps, SecOps, etc.),
►Building and supporting SOC, SIEM and managed security services.
Head of Cybersecurity Program and Security Operations Center
Banking Institution
Establishing 24/7 Security Operation Center with the right resources, tools and procedures. Building Cybersecurity’s department strategy with necessary competences, continuous security trainings and technologies.
KEY ACHIEVEMENTS:
► In three months effectively gathered critical talents from the market and finally in six months launched 24/7 Security Operations Center with TOP market SIEM technology,
► Together with the team timely slashed critical cybersecurity threats found on the network infrastructure and enhanced security incident response through building threat intelligence,
► Created an environment for efficient processes automation and introducing cost-effective, scalable security systems for cybersecurity data mining (threat hunting).
KEY ACHIEVEMENTS:
► In three months effectively gathered critical talents from the market and finally in six months launched 24/7 Security Operations Center with TOP market SIEM technology,
► Together with the team timely slashed critical cybersecurity threats found on the network infrastructure and enhanced security incident response through building threat intelligence,
► Created an environment for efficient processes automation and introducing cost-effective, scalable security systems for cybersecurity data mining (threat hunting).
Senior Manager, Innovation & Security Solutions in R&C Network
Building Security Solutions Integration and Verification (I&V), Software Configuration Management (SCM) teams and creating Innovation strategy in the area of Network Security, Big Data analytics, Cloud and Virtualization for LTE (VoLTE) radio communication.
KEY ACHIEVEMENTS:
► Implemented extreme (near 100%) I&V test automation for Software Quality Assurance in 3 different projects using DevOps solutions like Jenkins CI, Robot, Ansible, Docker and finally reducing dramatically unit, module and SCT regression feedback to software development (counted in minutes instead of days),
► Developed effective cooperation channels with Technology & Innovation (T&I) centres around the world reducing new product’s time to market.
KEY ACHIEVEMENTS:
► Implemented extreme (near 100%) I&V test automation for Software Quality Assurance in 3 different projects using DevOps solutions like Jenkins CI, Robot, Ansible, Docker and finally reducing dramatically unit, module and SCT regression feedback to software development (counted in minutes instead of days),
► Developed effective cooperation channels with Technology & Innovation (T&I) centres around the world reducing new product’s time to market.
R&D Manager, WCDMA/OSS Leadership Team
Leading four local R&D teams working in Agile (SCRUM) environment in an area of WCDMA and LTE radio communication and four additional subcontracting remote teams in China (in sum over 50 employees).
KEY ACHIEVEMENTS:
► Reinvigorated the team and driven it into a full effectiveness in less than six months,
► Achieved critical milestones for an entire software program release within the estimated budget and customer-critical deadlines to increase overall customer perceived satisfaction,
► Kept annual R&D attrition very low (4%) in a quite big team (over 20 direct employees).
KEY ACHIEVEMENTS:
► Reinvigorated the team and driven it into a full effectiveness in less than six months,
► Achieved critical milestones for an entire software program release within the estimated budget and customer-critical deadlines to increase overall customer perceived satisfaction,
► Kept annual R&D attrition very low (4%) in a quite big team (over 20 direct employees).
Emergency Manager, 3rd line technical support for Intelligent Networks (prepaid billing systems)
Resolving emergency situations for portfolio of NSN IN products, installation of Intelligent Network (IN) platforms (based on Solaris OS), monitoring system availability, quality and correctness.
KEY ACHIEVEMENTS:
► High efficiency and hardworking, very quick shift to emergency management activities
Familiar with:
▪ GSM, WCDMA, LTE and telecommunication protocols
▪ TCP/IP (firewalls, OS configuration)
▪ LINUX / UNIX / Solaris clusters and Oracle / SQL
▪ High Availability (HA) Solutions (RMS, Sun Cluster)
▪ Prime Power and Sun Fire
▪ Volume Manager (Veritas)
▪ SS7 communication
KEY ACHIEVEMENTS:
► High efficiency and hardworking, very quick shift to emergency management activities
Familiar with:
▪ GSM, WCDMA, LTE and telecommunication protocols
▪ TCP/IP (firewalls, OS configuration)
▪ LINUX / UNIX / Solaris clusters and Oracle / SQL
▪ High Availability (HA) Solutions (RMS, Sun Cluster)
▪ Prime Power and Sun Fire
▪ Volume Manager (Veritas)
▪ SS7 communication
Technical Product Manager, Forensics and Security Department Head (CSO)
Software certification management (Windows Logo Program), R&D product management for IT infrastructure and assets auditing suite (e-Auditor). Planning and developing a complete strategy for a new security and forensics unit, close cooperation with the board, closing critical business deals.
KEY ACHIEVEMENTS:
► Successfully closed first deals of security products and services in six months.
Familiar with:
▪ Strategy and business management
▪ Closing new business deals, developing negotiating strategies
▪ Software development and certification management
▪ Researching and development of IT products and services
▪ Computer forensics and data recovery
▪ Public Key Infrastructure (PKI), Digital Software Signing
▪ Cipher and hash algorithms (RSA, 3DES, MD5, SHA1)
▪ Linux and Windows security testing, auditing and penetration testing (kismet, aircrack, p0f, nessus, snort, netcat, metasploit, tcpdump, ettercap, ...)
▪ Radio Network Analysis (802.11, Bluetooth)
▪ Commercial Information Gathering
KEY ACHIEVEMENTS:
► Successfully closed first deals of security products and services in six months.
Familiar with:
▪ Strategy and business management
▪ Closing new business deals, developing negotiating strategies
▪ Software development and certification management
▪ Researching and development of IT products and services
▪ Computer forensics and data recovery
▪ Public Key Infrastructure (PKI), Digital Software Signing
▪ Cipher and hash algorithms (RSA, 3DES, MD5, SHA1)
▪ Linux and Windows security testing, auditing and penetration testing (kismet, aircrack, p0f, nessus, snort, netcat, metasploit, tcpdump, ettercap, ...)
▪ Radio Network Analysis (802.11, Bluetooth)
▪ Commercial Information Gathering
Szkolenia i kursy
Technical Trainings and Certificates:
1. Internal Information Security Management Systems' Auditor compliant with ISO 27001 - DEKRA 2008
2. Internal Quality Auditor compliant with ISO 9001:2008 - INCERT 2011
3. Specialized training in the protection of classified information in ICT systems and networks - Internal Security Agency (ABW) 2007
4. CCNA (Cisco Certified Network Associate) - CISCO Systems 2006
5. Planning, Implementing and Maintaining a Software Asset Management (SAM) Program (70-123) - Microsoft 2008
6. Microsoft Certificate of Excellence, Microsoft Certified Professional (MCP), Unizeto 2008
7. Quo Vadis Cryptology - Threat of Power Attacks and Cache Timing Attacks - Enigma 2007
8. Protection of personal data / Privacy Policy - Progress 2008
9. Information security in small and medium business - DSC 2007
10. Solaris Volume Manager - Nokia Siemens Networks 2009
11. Fujitsu Primepower, Sun Microsystems Sun Fire - Nokia Siemens Networks 2009
12. Certified Scrum Master - Reactor, The Scrum Alliance 2010
13. ISTQB Software Certified Tester - SiSi, 2013
14. Six Sigma Yellow Belt Professional - 6SigmaStudy, 2014
Managerial Competency trainings:
1. Competence Academy - Procter & Gamble, Zepter and others 2005
2. Crisis Management - Business Center Club 2005
3. Time management - NZS Szczecin 2004
4. Interpersonal Communication - Adecco 2006
5. The art of negotiation - Procter & Gamble 2006
6. The art of presentations, how to carry out public appearances - Procter & Gamble 2006
7. Project Management - Procter & Gamble 2006
8. Secret techniques of influence - KNM Szczecin, 2008
9. Neuro-linguistic programming as the key to effective sales and customer service - Prestige 2008
10. Social and Emotional Intelligence - Inicjatywa 2008
11. How to implement your own business idea - Euroeconomicus 2008
12. Finance and Economic - Certified Trainings by National Bank of Poland 2009
13. Working without Boundaries - Reactor 2010
14. CoachWise Essentials Program - Clear Vision, ICF Accredited Coach Training Program, Part of ACTP - Co-creative Alliance 2010
15. Continuous Learning for Tomorrow's Managers - SkillSoft 2010
16. Milionaire Scool, Poland as a business area, Innovation scool - Wroclaw entrepreneurship incubator 2010-2011
17. Frontline Leadership, Situational Leadership (Workshops) - The Ken Blanchard Companies 2011
18. Clifton StrengthsFinder - Gallup, Inc. 2012
19. Coaching for Performance - TNM Coaching Group
1. Internal Information Security Management Systems' Auditor compliant with ISO 27001 - DEKRA 2008
2. Internal Quality Auditor compliant with ISO 9001:2008 - INCERT 2011
3. Specialized training in the protection of classified information in ICT systems and networks - Internal Security Agency (ABW) 2007
4. CCNA (Cisco Certified Network Associate) - CISCO Systems 2006
5. Planning, Implementing and Maintaining a Software Asset Management (SAM) Program (70-123) - Microsoft 2008
6. Microsoft Certificate of Excellence, Microsoft Certified Professional (MCP), Unizeto 2008
7. Quo Vadis Cryptology - Threat of Power Attacks and Cache Timing Attacks - Enigma 2007
8. Protection of personal data / Privacy Policy - Progress 2008
9. Information security in small and medium business - DSC 2007
10. Solaris Volume Manager - Nokia Siemens Networks 2009
11. Fujitsu Primepower, Sun Microsystems Sun Fire - Nokia Siemens Networks 2009
12. Certified Scrum Master - Reactor, The Scrum Alliance 2010
13. ISTQB Software Certified Tester - SiSi, 2013
14. Six Sigma Yellow Belt Professional - 6SigmaStudy, 2014
Managerial Competency trainings:
1. Competence Academy - Procter & Gamble, Zepter and others 2005
2. Crisis Management - Business Center Club 2005
3. Time management - NZS Szczecin 2004
4. Interpersonal Communication - Adecco 2006
5. The art of negotiation - Procter & Gamble 2006
6. The art of presentations, how to carry out public appearances - Procter & Gamble 2006
7. Project Management - Procter & Gamble 2006
8. Secret techniques of influence - KNM Szczecin, 2008
9. Neuro-linguistic programming as the key to effective sales and customer service - Prestige 2008
10. Social and Emotional Intelligence - Inicjatywa 2008
11. How to implement your own business idea - Euroeconomicus 2008
12. Finance and Economic - Certified Trainings by National Bank of Poland 2009
13. Working without Boundaries - Reactor 2010
14. CoachWise Essentials Program - Clear Vision, ICF Accredited Coach Training Program, Part of ACTP - Co-creative Alliance 2010
15. Continuous Learning for Tomorrow's Managers - SkillSoft 2010
16. Milionaire Scool, Poland as a business area, Innovation scool - Wroclaw entrepreneurship incubator 2010-2011
17. Frontline Leadership, Situational Leadership (Workshops) - The Ken Blanchard Companies 2011
18. Clifton StrengthsFinder - Gallup, Inc. 2012
19. Coaching for Performance - TNM Coaching Group
Edukacja
Specjalizacje
Inżynieria
Telekomunikacja
IT - Administracja
Administrowanie sieciami
IT - Administracja
Bezpieczeństwo/Audyt
IT - Rozwój oprogramowania
Testowanie
IT - Rozwój oprogramowania
Zarządzanie IT
Zainteresowania
Professional
– Business Negotiations and Change Management
– Coaching and mentoring
– Unstructured data processing (BigData)
– Network Security, Data Security, Security Risk Management and Cryptography
– Genetic Programming, Neural Networks and Artificial Intelligence
Non-Professional
– Dancing
– Bike riding
– Mountain walking
– Business Negotiations and Change Management
– Coaching and mentoring
– Unstructured data processing (BigData)
– Network Security, Data Security, Security Risk Management and Cryptography
– Genetic Programming, Neural Networks and Artificial Intelligence
Non-Professional
– Dancing
– Bike riding
– Mountain walking
Organizacje
– Information Systems Audit and Control Association (ISACA)
– Independent Students' Association (Niezależne Zrzeszenie Studentów Szczecin)
– AIESEC Szczecin (International Organization of Economy Students)
– IAESTE Szczecin (The International Association for the Exchange of Students
– Szczecin Linux / Unix Users Group (SZLUUG) (symphatist)
– Independent Students' Association (Niezależne Zrzeszenie Studentów Szczecin)
– AIESEC Szczecin (International Organization of Economy Students)
– IAESTE Szczecin (The International Association for the Exchange of Students
– Szczecin Linux / Unix Users Group (SZLUUG) (symphatist)
Inne
2010
– Laureate of the contest for the most innovative and enterprising business idea – participation in the "School of Millionaire" and “Innovation 2010” project
2009
– Award of the Mayor of Szczecin for best master’s thesis – “Passive Fingerprinting of Operating Systems using Neural Networks and Artificial Intelligence”
http://www.wi.zut.edu.pl/aktualnosci/871-nagroda-prezydenta-miasta-szczecin-za-najlepsz-prac-magistersk-dla-bartosza-bielskiego
2008
– Laureate of the Polish „Best Student of the Year” – „Primus Inter Pares” Competition
– Award for best master's thesis focused on the latest technologies (Regional Center of Innovation and Technology Transfer)
2004-2007
– Involvement in organizations connected with programming (CodeGURU, SzLUUG)
– Active propagation of free and legal software in Poland (Open Source and GNU)
1999
– Founder of an international USENET group discussing Internet security and protection of information (alt.pl.comp.os.hacking)
– Laureate of the contest for the most innovative and enterprising business idea – participation in the "School of Millionaire" and “Innovation 2010” project
2009
– Award of the Mayor of Szczecin for best master’s thesis – “Passive Fingerprinting of Operating Systems using Neural Networks and Artificial Intelligence”
http://www.wi.zut.edu.pl/aktualnosci/871-nagroda-prezydenta-miasta-szczecin-za-najlepsz-prac-magistersk-dla-bartosza-bielskiego
2008
– Laureate of the Polish „Best Student of the Year” – „Primus Inter Pares” Competition
– Award for best master's thesis focused on the latest technologies (Regional Center of Innovation and Technology Transfer)
2004-2007
– Involvement in organizations connected with programming (CodeGURU, SzLUUG)
– Active propagation of free and legal software in Poland (Open Source and GNU)
1999
– Founder of an international USENET group discussing Internet security and protection of information (alt.pl.comp.os.hacking)
Grupy
Algorytmy genetyczne
Dolacz! - jesli interesuja Cie algorytmy genetyczne, programowanie rozproszone oraz metody rozmyte to ta grupa jest wlasnie dla Ciebie!
Auditorzy Systemów Zarządzania
Grupa osób związanych z auditowaniem Systemów Zarządzania takich jak ISO 9001, ISO 14001, PN-N/OHSAS 18001, ISO 27001, ISO/TS 16949, ISO 22000 (IFS, BRC), ISO 13485, ISO/IEC 17025, IRIS itp.
CIA
Dla osób mających lub chcących uzyskać dyplom CIA. Wymiana materiałów szkoleniowych wiedzy i doświaczeń.
CSO
Grupa osób związanych ze stanowiskami Chief Security Officer (CSO) oraz Administrator Bezpieczeństwa Informacji (ABI), w szczególności również Audytorów Systemu Zarządzania Bezpieczeństwem Informacji
Fuzzy Computing
Logika rozmyta okazała się bardzo przydatna w zastosowaniach inżynierskich, czyli tam, gdzie klasyczna logika klasyfikująca jedynie według kryterium prawda/fałsz nie potrafi skutecznie poradzić sobie
ICF Wrocław
International Coach Federation oddział Wrocław - grupa dla coachów i wszystkich zainteresowanych coachingiem. Wymiana wiedzy, standardów oraz luźne dyskusje.
pol.icf.org.pl
ISACA
ISACA (Information Systems Audit and Control Association) - Stowarzyszenie do Spraw Audytu i Kontroli Systemów Informatycznych.