encryption > evidence

next-level IT security and infrastructure

enevit s.r.o.
Salmovská 1534/11
Praha 2 - 120 00
IČ: 17954193
DIČ: CZ17954193

+420 774 880 720
tomas.blazicek@enevit.cz

Do you have...


802.1X - Network Access Control

For both wired and wireless networks, I have deployed 802.1X solutions for multiple clients,
ensuring that only verified users and devices can physically access company network.
Technologies I used included Fortinet, Ubiquiti, Microsoft, FreeRADIUS and Mikrotik.


Zero Trust Infrastructure

Security philosophy spanning multiple topics like identity management, network segmentation,
hardening and access control, or multi-factor authentication, I implemented the Zero Trust
model in many infrastructures and used countless technologies when doing so.


Auditing and Monitoring

Providing visibility of what happens in your infrastructure, auditing and monitoring tools are vital
for IT survival. From compromised accounts to filled up storages or failing climate control, my
clients know what happens in their systems. Tools I use include Zabbix, Graylog, Prometheus,
Grafana and multiple vendor-based XDR systems.


Are you ready for…


Due Dilligence and Security Audits

Potential investors, future business partners and customers need to know if your IT security is solid and your data safe.
Most of all, you need to know that. Over the years, my clients have passed
rigorous audits and due dilligence processes (done by large multi-national corporations) with flying colours.


Disaster Recovery and Incident Response

When a security incident happens or a disaster-level outage hits, you need to be ready. What is the next step?
Who is responsible for what? Which people should be contacted?
Robust infrastructure, detailed documentation and well trained people can minimize the impact of
catastrophic scenarios on your business.


Certifications and Government Requirements

With growing business, certifications like ISO 27001 or SoC, and compliance with government
security guidelines like NIS2 become more and more relevant. Access control, data security,
asset management, internal policies and many other aspects of your IT security are expected to
meet certain criteria. I can help you achieve them.




Selective skillset overview

Infrastructure


Networking

Fortigate | Sophos | Mikrotik | Ubiquiti
Cisco | Dell | Juniper | HP

Hyperconverged

Dell VxRail | Microsoft S2D
Proxmox Ceph

Hypervisors

VMWare vSphere | Microsoft Hyper-V
KVM/Proxmox

OS-Native Services

AD and relates systems | NPS
WSUS, WDS

Cloud

Azure
AWS | GCP

NVR

Wisenet/Hanwha | Ubiquiti
HikVision

Backup

Veeam
Acronis | OS/Vendor-native

Storage

Synology
QNAP | OS-native

 


Security


Vulnerability Tools

Ping Castle | OpenVAS
Metasploit Framework | Qualys

Monitoring and Auditing Tools

Zabbix
Graylog | Nagios | OS/vendor-native

OSINT

Maltego | Spiderfoot | Data analysis
BIZguard | external sources

Company-level processes

Security Audits | Due Dilligence
Documentation - DR, IR, BC, directives

Preparation for certifications (ISO, SoC, NIS)

Password Management

Bitwarden (Cloud and On-prem)
Hashicorp Vault | Keepass

Access Management

Directory services (AD, OpenLDAP)
MFA Mechanisms | ZTA/ZTNA

Vendor-native IAM systems

Encryption

Storage encryption | Certificates
Comm encryption

Algorithms | PKI systems

Measures

Endpoint and Network Hardening
AV solutions | IPS/IDS

SSL Decryption | App and Web filtering

 


DevOps, Scripting & Databases


Containers

Docker | Kubernetes

Dev Tools

PlasticSCM | TeamCity | YouTrack | Jira
Git and flavours | BitBucket Pipelines

Databases

Postgres
MySQL | MS SQL

Scripting

Python
Bash | PowerShell

 


Management


Team Management & Projects

Team Leading | Mentoring
Project Management | Agile/SCRUM

Financial Management

Budgeting | Forecasting | Cost Management
Project Financing

Licensing & Law

IT Law - Licensing, Data Privacy, Regulations
Licensing models | License types

Crisis Management

Disaster Recovery and Incident Response
Infrastructure re-building

Crisis communication

 


Highlights


Crisis Management

Experience with IT takeovers during acquisition projects

Ad-hoc resolution of security threats in unique situations

Robotics

Implementation of first robotic warehouses in Czech Republic

Deployment and configuration of multiple types of logistic robots

Infrastructure (re)building

Complete overhauls of infrastructures for mid-sized companies

Architecture and deployment of complete infrastructures from scratch

Clustering

Deployment of multiple types of HCI clusters

Deployment of (vanilla) Kubernetes clusters

Private Cloud

Deployment of private clouds on multiple platforms

Creating financial structure of offered services

Programming

Idea and high-level architecture of three separate softwares

Creating proof-of-concept versions of said softwares