Alexandre Blanc Experience or work background

  • Copied from my LinkedIn profile, not to loose it
  • Independent Strategic and Security (Cyber) Advisor – Consultant – President and OwnerIndependent Strategic and Security (Cyber) Advisor – Consultant – President and OwnerAlexandre Blanc Cyber · Permanent Full-timeAlexandre Blanc Cyber · Permanent Full-timeNov 2023 – Present · 8 mosNov 2023 to Present · 8 mosRemoteRemote
      • I provide the analysis and thinking needed to move your technology projects forward in regards to cyber security.
        I help you solve complex problems, understand and translate needs by connecting business, technology and security.
        For a limited number of cyber security clients and thank to my LinkedIn Top Voice background, I manage LinkedIn pages and advise technology companies on natural growth strategies to support their business development.I provide the analysis and thinking needed to move your technology projects forward in regards to cyber security. I help you solve complex problems, understand and translate needs by connecting business, technology and security. For a limited number of cyber security clients and thank to my LinkedIn Top Voice background, I manage LinkedIn pages and advise technology companies on natural growth strategies to support their business development.
      • Skills: Linux · Network Security · Information Security · Privacy Protection · Cybersecurity · Cybersecurity Incident Response · encryption · cyber security awarenessSkills: Linux · Network Security · Information Security · Privacy Protection · Cybersecurity · Cybersecurity Incident Response · encryption · cyber security awareness
  • LIGHTNING ROD, LLC logoCloud Exit EnthusiastCloud Exit EnthusiastLIGHTNING ROD, LLC · FreelanceLIGHTNING ROD, LLC · FreelanceFeb 2024 – Present · 5 mosFeb 2024 to Present · 5 mosremote · Remoteremote · Remote
      • Working to help companies recoup cloud costs and reduce risks for certain critical workflows.Working to help companies recoup cloud costs and reduce risks for certain critical workflows.
      • Skills: Cloud Computing · Microsoft Azure · Amazon Web Services (AWS) · Cybersecurity · Cybersecurity Incident ResponseSkills: Cloud Computing · Microsoft Azure · Amazon Web Services (AWS) · Cybersecurity · Cybersecurity Incident Response
  • Strategic and Security Advisor at VARSStrategic and Security Advisor at VARSVARS Corporation · Permanent Full-timeVARS Corporation · Permanent Full-timeDec 2020 – Nov 2023 · 3 yrsDec 2020 to Nov 2023 · 3 yrsMontreal, Quebec, CanadaMontreal, Quebec, Canada
    •   helped me get this jobLinkedIn helped me get this job
      • – Managed incident response for ransomware and cyber attack incidents, acting as lead person and coordinating response. Worked with luxury brands, cities, governments and industrial systems that got impacted.
        – Supported foreclosure and collection department to bring needed data and digital proof for accounting experts, lawyers and justice (tribunal) preserving chain of custody of collected data (collaboration with law enforcement)
        – Advised organizations on their digital transformations, cloud migration, risk management and security posture.
        – Created and did lead the dark web investigation practice for 3 years (digital footprint analysis, attack surface analysis etc) including team management.
        – Created the security posture health check practice for the vCISO office, an entry level security posture analysis for SMBs with low security maturity posture..
        – Speaker at conferences for global and specialized market (insurance market, risk managment, government entities and private sector)
        – Delivered press conferences and articles covering best practices and incident management
        – Advised customers for complex cases, including cyber risk during M&A process, and supported sales department
        – Managed corporate LinkedIn pages, content and publications- Managed incident response for ransomware and cyber attack incidents, acting as lead person and coordinating response. Worked with luxury brands, cities, governments and industrial systems that got impacted. – Supported foreclosure and collection department to bring needed data and digital proof for accounting experts, lawyers and justice (tribunal) preserving chain of custody of collected data (collaboration with law enforcement) – Advised organizations on their digital transformations, cloud migration, risk management and security posture. – Created and did lead the dark web investigation practice for 3 years (digital footprint analysis, attack surface analysis etc) including team management. – Created the security posture health check practice for the vCISO office, an entry level security posture analysis for SMBs with low security maturity posture.. – Speaker at conferences for global and specialized market (insurance market, risk managment, government entities and private sector) – Delivered press conferences and articles covering best practices and incident management – Advised customers for complex cases, including cyber risk during M&A process, and supported sales department – Managed corporate LinkedIn pages, content and publications
      • Skills: Linux · Hiring · Privacy Protection · Cybersecurity · Cybersecurity Incident Response · encryption · cyber security awarenessSkills: Linux · Hiring · Privacy Protection · Cybersecurity · Cybersecurity Incident Response · encryption · cyber security awareness
  • Strategic and Security Advisor at VARSStrategic and Security Advisor at VARSRaymond Chabot Grant Thornton · Permanent Full-timeRaymond Chabot Grant Thornton · Permanent Full-timeDec 2020 – Nov 2023 · 3 yrsDec 2020 to Nov 2023 · 3 yrsMontreal, Quebec, CanadaMontreal, Quebec, Canada
    •   helped me get this jobLinkedIn helped me get this job
      • – Managed incident response for ransomware and cyber attack incidents, acting as lead person and coordinating response. Worked with luxury brands, cities, governments and industrial systems that got impacted.
        – Supported foreclosure and collection department to bring needed data and digital proof for accounting experts, lawyers and justice (tribunal) preserving chain of custody of collected data (collaboration with law enforcement)
        – Advised organizations on their digital transformations, cloud migration, risk management and security posture.
        – Created and did lead the dark web investigation practice for 3 years (digital footprint analysis, attack surface analysis etc) including team management.
        – Created the security posture health check practice for the vCISO office, an entry level security posture analysis for SMBs with low security maturity posture..
        – Speaker at conferences for global and specialized market (insurance market, risk managment, government entities and private sector)
        – Delivered press conferences and articles covering best practices and incident management
        – Advised customers for complex cases, including cyber risk during M&A process, and supported sales department- Managed incident response for ransomware and cyber attack incidents, acting as lead person and coordinating response. Worked with luxury brands, cities, governments and industrial systems that got impacted. – Supported foreclosure and collection department to bring needed data and digital proof for accounting experts, lawyers and justice (tribunal) preserving chain of custody of collected data (collaboration with law enforcement) – Advised organizations on their digital transformations, cloud migration, risk management and security posture. – Created and did lead the dark web investigation practice for 3 years (digital footprint analysis, attack surface analysis etc) including team management. – Created the security posture health check practice for the vCISO office, an entry level security posture analysis for SMBs with low security maturity posture.. – Speaker at conferences for global and specialized market (insurance market, risk managment, government entities and private sector) – Delivered press conferences and articles covering best practices and incident management – Advised customers for complex cases, including cyber risk during M&A process, and supported sales department
      • Skills: Linux · Hiring · Privacy Protection · Cybersecurity · Cybersecurity Incident Response · encryption · cyber security awarenessSkills: Linux · Hiring · Privacy Protection · Cybersecurity · Cybersecurity Incident Response · encryption · cyber security awareness
  • Director of SecurityDirector of Securityadaware (an Avanquest company)adaware (an Avanquest company)Nov 2019 – Dec 2020 · 1 yr 2 mosNov 2019 to Dec 2020 · 1 yr 2 mosMontreal, Canada AreaMontreal, Canada Area
      • My role is to do my best to enhance the security posture and protect the organization, developing a security culture.
        If you see something say something. I’ve been lucky having support from cyber security community on many occasions, and I think we should be reachable on issues spotted by others. So, all my posts on this platform are my own, but I’m still reachable for security issues spotted on our things.My role is to do my best to enhance the security posture and protect the organization, developing a security culture. If you see something say something. I’ve been lucky having support from cyber security community on many occasions, and I think we should be reachable on issues spotted by others. So, all my posts on this platform are my own, but I’m still reachable for security issues spotted on our things.
      • Skills: Linux · Hiring · Privacy Protection · Cybersecurity · Cybersecurity Incident Response · encryption · cyber security awarenessSkills: Linux · Hiring · Privacy Protection · Cybersecurity · Cybersecurity Incident Response · encryption · cyber security awareness
  • Director, information technologiesDirector, information technologiesMaya HTTMaya HTTMay 2011 – Oct 2019 · 8 yrs 6 mosMay 2011 to Oct 2019 · 8 yrs 6 mosMontreal, Canada AreaMontreal, Canada Area
      • Opinion and convictions, shared through my linkedin profile, posts, articles and likes are only my own, not my employer’s ones/
        – Director of IT
        – Management of a team of 10, including sysadmins, network administrators, security / vulnerability assessment and developers
        – Managing an IT infrastructure made of > 600 physical machines, 1500 IPs (VMs, active equipments), public /24
        – Managing physical security (alarm systems, video surveillance, access management)
        – consulting on different projects (infrastructures, development)
        – participating in consulting work on IT related side, in order to validate technology choices and viability
        – managing emergency recovery plans and IT services continuity
        – backup and recovery plans and strategy
        – managing IT conformity against complex partial or full constraints, ITAR requirement, NIST etc.
        – IT related purchase and supply chain management, software and hardware life cycle management
        – validation of highly restricted technology projects (industrial environment etc)
        – licenses and conformity management
        – IT providers contract management (hardware, softwares, services)
        – Management of telecommunications (IPBX, subscriptions, scalability, resilience and redundancy, fibers…)
        – Crisis management (market shortage, destructive event recovery, assessment of damage and recovery time)
        – vulnerabilities management
        – Resource planning
        – Market monitoring
        – Creation of innovative projects on infrastructure management
        – Creation of automation tools empowering employees autonomy (self services tools)Opinion and convictions, shared through my linkedin profile, posts, articles and likes are only my own, not my employer’s ones/ – Director of IT – Management of a team of 10, including sysadmins, network administrators, security / vulnerability assessment and developers – Managing an IT infrastructure made of > 600 physical machines, 1500 IPs (VMs, active equipments), public /24 – Managing physical security (alarm systems, video surveillance, access management) – consulting on different projects (infrastructures, development) – participating in consulting work on IT related side, in order to validate technology choices and viability – managing emergency recovery plans and IT services continuity – backup and recovery plans and strategy – managing IT conformity against complex partial or full constraints, ITAR requirement, NIST etc. – IT related purchase and supply chain management, software and hardware life cycle management – validation of highly restricted technology projects (industrial environment etc) – licenses and conformity management – IT providers contract management (hardware, softwares, services) – Management of telecommunications (IPBX, subscriptions, scalability, resilience and redundancy, fibers…) – Crisis management (market shortage, destructive event recovery, assessment of damage and recovery time) – vulnerabilities management – Resource planning – Market monitoring – Creation of innovative projects on infrastructure management – Creation of automation tools empowering employees autonomy (self services tools)
      • Skills: Linux · Hiring · Privacy Protection · Cybersecurity · Cybersecurity Incident Response · encryption · cyber security awarenessSkills: Linux · Hiring · Privacy Protection · Cybersecurity · Cybersecurity Incident Response · encryption · cyber security awareness
  • IT manager – Network and system administratorIT manager – Network and system administratorArchivtech SASArchivtech SASJun 2008 – May 2011 · 3 yrsJun 2008 to May 2011 · 3 yrs
      • My main role is IT Manager, but in fact, my job concerns a more large range of technical skills, from productions servers management, network administration, and specific tools developments for backup services the company provide.
        Mainly writing scripts (bash / vbs / php …) and simple web interfaces to manage all the processes we needs.
        As the job needs it, i also help customers and partners, in different situations, giving advices on network architecture and data security, on both gnu/linux and windows architecture.
        As an IT manager, i can fix users problems to main security consideration and strategy, due to my wide experience in computer skills.
        I also manage the company Web services (web, MTA, dns etc).My main role is IT Manager, but in fact, my job concerns a more large range of technical skills, from productions servers management, network administration, and specific tools developments for backup services the company provide. Mainly writing scripts (bash / vbs / php …) and simple web interfaces to manage all the processes we needs. As the job needs it, i also help customers and partners, in different situations, giving advices on network architecture and data security, on both gnu/linux and windows architecture. As an IT manager, i can fix users problems to main security consideration and strategy, due to my wide experience in computer skills. I also manage the company Web services (web, MTA, dns etc).
      • Skills: Linux · Hiring · Cybersecurity · encryptionSkills: Linux · Hiring · Cybersecurity · encryption
  • Radio Encryption software developmentRadio Encryption software developmentsolarcomsolarcomJul 2007 – Jan 2008 · 7 mosJul 2007 to Jan 2008 · 7 mos
      • Designing and building specific software for radio encrypted data communication systems, using radio modems (on HF / VHF) for military purposes.Designing and building specific software for radio encrypted data communication systems, using radio modems (on HF / VHF) for military purposes.
      • Skills: Linux · Cybersecurity · encryptionSkills: Linux · Cybersecurity · encryption
  • IT manager – Network and sysadmin – developer – computer system analystIT manager – Network and sysadmin – developer – computer system analystCompaq – rightvision – dadiland – air – ademe – creasyweb…Compaq – rightvision – dadiland – air – ademe – creasyweb…Sep 1999 – Jun 2007 · 7 yrs 10 mosSep 1999 to Jun 2007 · 7 yrs 10 mos
      • In order to summarize the past experiences, i have been technician at Compaq reseller (Accredited Compaq Technician), IT Manager at Rightvision (manufacturing internet appliances Linux/Windows), Webmaster-developer on an internet game website (managing asp/sql server), Corporate Manager in my internet webservices company (providing web hosting and developments) , Computer analyst and sysadmin / netadmin at "Ademe" (French State Department of Ecology), php/mysql developer at creasyweb… worked in lot of places in France and some missions abroad.In order to summarize the past experiences, i have been technician at Compaq reseller (Accredited Compaq Technician), IT Manager at Rightvision (manufacturing internet appliances Linux/Windows), Webmaster-developer on an internet game website (managing asp/sql server), Corporate Manager in my internet webservices company (providing web hosting and developments) , Computer analyst and sysadmin / netadmin at "Ademe" (French State Department of Ecology), php/mysql developer at creasyweb… worked in lot of places in France and some missions abroad.
      • Skills: Linux · Cybersecurity · encryption

Loading

Not f'd — you won't find me on Facebook
juin 2024
L M M J V S D
 12
3456789
10111213141516
17181920212223
24252627282930
 

 
Suivez moi sur twitter - follow me on twitter
 
Follow on LinkedIn
[FSF Associate Member]
 
Free Software, Free Society
VIRTUALISATION :
Compacter une image virtualbox VDI
Bon petit tutoriel esxi
Marche d'appliances vmware
Installer ESXi sur un disque IDE
Installer ESXi 3.5 sur un disque USB
Installer proxmox avec DRBD et migration / réplication à chaud
Installer OSSEC avec VMware
Information sur le VDI
SECURITE - FIREWALL :
Ouvrir des ports dynamiquement iptables - knockd
Autre tres bon tuto knockd
Docs Arp poisoning - Anglais
Metasploit test de pénétration
Zone H - sites piratés en temps réel
Blog invisible things
Tips protection sécurité wordpress
Pfsense - distribution firewall opensource - adsl internet failover
Iproute 2 mini how to - linux advanced routing
ClearOS - la passerelle sécuritaire lan - wan
HAUTE DISPONIBILITE :
CDN - Accélération de la distribution de données
drbd iscsi ocfs2 dm multipath tutoriel
Load balancing LVS
Load balancing opensource list
HA-Proxy :
HAproxy - http load balancer
Simple tutoriel HAproxy
HAproxy - debian tutoriel
Centos - Ip failover
Configuratoin DM-Multipath Redhat
VMware Doubletake - continuité
Quelques liens sur la réplication MySQL : Manuel MySQL, chapitre sur la réplication
Manuel MySQL, Tutoriel clair sur la mise en place
Autre tuto sur la mise en place de la réplication MySQL
Références pour optimisation du serveur MySQL
Utilisation de EXPLAIN mysql pour optimiser vos bases
optimiser vos bases - requetes et index
STOCKAGE RESEAU :
Un outil de clonage disque en reseau
Internet NAS 250Go 250 accès VPN
Server ISCSI avec Ubuntu tuto
ISCSI centos redhat tutoriel
Gérer et étendre un LVM
Créer sa piratebox ! trop cool
Deaddrops, les clés USB dans les murs, aussi cool !
OPTIMISATION WORDPRESS :
Télécharger Xenu
Comment utiliser Xenu
optimisation hébergement wordpress
Super howto wordpress (En)
Test de charge serveur web - Load impact
VPN - ROUTEUR - LAN:
Zeroshell - le mini-routeur wifi tout en un
Retroshare, votre réseau d'échange crypté!
Openvpn sur centos redhat
Intégrer Linux dans active directory
Routage inter-vlan avec Linux
Routage avec OSPF
Network Weathermap
TENDANCES - WEB:
Boutons twitter
Analyser les tendances des recherches Google
Protocole sitemap - robots.txt
Creer des animations CSS3
Code php pour interagir avec twitter
E reputation
Jquery
TRUCS ET ASTUCES GNU/LINUX :
Tuxmachines.org - Actus et tips linux
Configurer GRUB2 et grub2 ici
Panoet - en anglais - tips & tricks
Readylines tips and trick pertinents
Squid Clamav - proxy antivirus
Apprendre Unix en 10 minutes
13 tips sur les expressions régulières
IE Sous linux IES
LDAP 2.4 Quickstart guide
Tutoriel LDAP
Installation annuaire LDAP
Serveur Mail Postfix - Dovecot - LDAP - MDS
Créer un linux personnalisé en ligne - custom linux
Super site sur linux - en
Capistrano - déploiement automatisé
MONITORING :
Nagios tutoriel et doc
Nagios plugin NRPE tuto
Nagios plugin NRPE autre tuto
Nagios plugin NRPE officiel
Zabbix - fonctionnalités
Zabbix - installation
Guide MRTGsys - grapher la charge locale
MRTGsys - ajouter des graphs
MRTGsys - interpréter les données
Shinken - Monitoring
Thruk Monitoring webinterface
Shinken - Tutoriel
Shinken - Référence chez Nicolargo
AUTRES LIENS :
RemixJobs IT jobs
USB Multiboot
Reset mot de passe windows
Java python et autres tips, intéressant !
Forum inforeseau
Open Clipart
Excellent comic en ligne
Inforeseau.fr