Skip to main content

I Can Create🧬

My Projects

  • ISAH BV.

    Development of a Secure and Efficient Software Pipeline

    For this project, I developed a network plan and implementation strategy for ISAH Business Software, focusing on their migration to the Cloud and ensuring security within their software pipeline. This project involved setting up a Kubernetes cluster in Azure, using Git for version control, and implementing automated security tests before deploying code to production. I analysed the existing infrastructure and selected the tools and technologies necessary to establish a secure and efficient software pipeline.

    Working closely with the team, I built the software environment step by step, including the integration of automated testing and security processes. The project included thorough documentation of all processes and the development of a prototype that meets the highest security standards. By proactively contributing to the generation of new ideas and testing the software environment, we delivered a robust and well-documented solution that supports ISAH in their cloud migration and training objectives.

  • CM.COM

    Penetration Test Project

    I conducted an extensive penetration testing project for CM.com with a team of five colleagues. The process began with a preparatory phase, during which we established clear agreements on the scope and boundaries of the test. These agreements were formalized in a penetration testing contract and a liability waiver to ensure well-defined responsibilities and limitations.

    Over the course of four weeks, we systematically identified and analyzed vulnerabilities within CM.com’s systems. Findings were immediately reported and carefully documented in a comprehensive report, including an overview of risks and their potential impact. Based on these findings, we developed a Secure Solution, a set of recommendations and measures to enhance the security of the systems.

    My contribution to this project included assisting with penetration testing and creating the related documentation. I also helped draft other relevant documents and contracts required for the project. My team members handled the remaining tasks.

    Due to the confidentiality of the information, I cannot share specific details. However, this project significantly enhanced my skills in penetration testing, documentation, and contract management.

  • Fonteyn

    Because Fonteyn Vakantieparken has grown in part through acquisition and is not (yet) centralized, there are various IT environments with different functionalities present multiple times.

    Think of administration, HR and reservation software. But also support services such as file and print services, Active Directory and tooling to manage workstations, for example.

    For operations, this is not desirable because every month, the location managers have to send the figures from their own accounting package to headquarters. But there is also no overview of the ICT costs, management and especially the security of the systems.

    The big question from the management is, “How secure is our data right now?”.

  • Plan B

    Asylum Seekers Centre (AZC)

    Implementation of Internet Connectivity at an Asylum Seekers Centre (AZC)

    In this project, I played a key role in designing and implementing a comprehensive network solution to provide internet connectivity across an Asylum Seekers Centre (AZC) accommodating approximately 1,200 residents. The park previously had no network infrastructure, and the goal was to deliver reliable internet access to all residents, including those in temporary housing containers, enabling them to communicate with family and perform essential online tasks.

    To achieve this, we implemented a point-to-point network using fibre optics available at the site, ensuring connectivity throughout the park without laying additional cables. The solution included the installation of access points connected via routers to provide Wi-Fi access within the residential units. Key considerations included maintaining privacy, secure monitoring of network traffic, and ensuring compatibility with existing communication tools like WebEx and walkie-talkies used by staff. The project was carefully planned to address potential risks such as signal obstructions, equipment damage, and network security, ensuring a robust and secure internet environment for all AZC residents.