Summary
Overview
Work History
Education
Skills
Certification
Languages
Timeline
Generic
Maximilian  Gusset

Maximilian Gusset

Zurich

Summary

Organized and dependable candidate successful at managing multiple priorities with a positive attitude. Willingness to take on added responsibilities to meet team goals. Detail-oriented team player with strong organizational skills. Ability to handle multiple projects simultaneously with a high degree of accuracy.

Overview

27
27
years of professional experience
1
1
Certification

Work History

Cyber Security Architect

KYNDRYL
10.2022 - Current
  • Design of Zero Trust strategy and architecture including security developing of security concepts, directives, guidelines
  • Providing consulting in connection with security incidents and the effectiveness of information security measures
  • Maintenance and ongoing development of identification, assessment and monitoring process of information security risks (ISMS according to ISO 27001 standard)
  • Continuous improvement of business continuity management and resiliency, including periodic BC/DR tests
  • Planning, commissioning, monitoring, and evaluation of regular risk-oriented security audits such as vulnerability assessment and penetration testing
  • Planning and implementing targeted and regular training and awareness-raising measures with regard to IT security
  • responsibility for continuous improvement of the IT security system and monitoring compliance
  • Contributing expertise to further development of existing Security Operation Center (SOC), for architecture, monitoring, early identification and efficient handling of vulnerabilities and incidents in the area of information security and cyber risks, as well as the periodic execution of incident response exercises (War Room Exercises)

Cyber Security Specialist

HUBER+SUHNER
09.2019 - 09.2022
  • Monitored confidential company data and mitigated hacking through network systems updates.
  • Represented company's technical security interests to partners to provide best practices in information security.
  • Applied leading theories and concepts to development, maintenance, and implementation of information security standards, procedures, and guidelines.
  • Performed risk and vulnerability assessments and provided results and recommendations to senior management.
  • Validated and verified system security requirements definitions and analyzed system security designs.
  • Developed, implemented, and documented security programs and policies and monitored compliance across departments.
  • Planned and oversaw configuration changes for security infrastructure platforms.
  • Provided consultation and technical services on all aspects of information security.
  • Counseled senior-level management on current privacy and security trends and recommendations to mitigate risk.
  • Performed and reviewed technical security assessments to identify points of vulnerability and non-compliance and recommend mitigation strategies.
  • Provided technical leadership focused on Information Security
  • Conducted security audits to identify vulnerabilities.
  • Recommend improvements in security systems and procedures.
  • Managed data center system upgrade delivering better reliability and security for server hosting and enterprise applications.
  • Reviewed violations of computer security procedures and developed mitigation plans.
  • Performed risk analyses to identify appropriate security countermeasures.
  • Monitored use of data files and regulated access to protect secure information.
  • Developed plans to safeguard computer files against modification, destruction or disclosure.
  • Engineered, maintained and repaired security systems.
  • Researched and developed new computer forensic tools.

Chief Information Security Officer

White & Case LLP
01.2014 - 08.2019
  • Directed security services and safety functions to align key processes with goals and objectives of organization and regulatory compliance.
  • Oversaw safety of assets by enforcing and regulating security policies and procedures and monitoring and maintaining security systems.
  • Developed and grew staff competencies through team development, implementation and support of specific training.
  • Researched, reviewed and recommended equipment, materials and supplies to prepare and maintain security expenses within approved budget.
  • Coordinated emergency evacuation drills and exercises and developed and improved emergency procedures.
  • Established measures, metrics, thresholds and targets to drive performance in alignment with security and other business strategies.
  • Conducted security audits to identify vulnerabilities.
  • Recommend improvements in security systems and procedures.
  • Performed risk analyses to identify appropriate security countermeasures.
  • Developed plans to safeguard computer files against modification, destruction or disclosure.
  • Reviewed violations of computer security procedures and developed mitigation plans.

IT Security Manager

AGT International
06.2008 - 12.2013
  • Investigated incidents and wrote reports.
  • Oversaw team of security officers and managed scheduling and performance evaluations.
  • Established company-wide security best practices and protocols to mitigate risks.
  • Conducted drills to keep security staff on alert.
  • Led identification, development, implementation and maintenance of security requirements for entire organization.
  • Maintained high standards of excellence for security programs, strategies and plans.
  • Oversaw software configurations and updates for systems across departments.
  • Verified excellence in regards to security programs, strategies and plans within fast-paced and high-risk environments.
  • Created and implemented security network framework across devices.
  • Monitored video surveillance feed and system alerts for suspicious activity.
  • Optimized security programs, administrative functions, business management and inventory control
  • Directed efforts to mitigate threats to personnel and infrastructure, reduce risks and optimize access to critical information.

IT System Engineer

Jet Aviation
02.2004 - 04.2007
  • Proposed technical feasibility solutions for new system designs and suggested options for performance improvement of technical components.
  • Completed technical reviews of existing systems and suggested updates or changes.
  • Configured new systems and protocols according to strict company guidelines.
  • Installed hardware, completed software updates and assessed security patches for optimized computer use.
  • Developed mission-critical real time systems for use in Aviation.

System Engineer

LUWA
02.2004 - 02.2007
  • Provided preventive maintenance for servers, storage equipment and software.
  • Implemented firewalls and antivirus software to maintain network integrity.
  • Configured, tested and maintained network equipment
  • Resolved issues related to operational components for LAN and WAN systems.
  • Built and maintained Active Directory, Exchange Server,Network infrastructure consisting of Windows and Linux products.

Computer Technician

PCI AG
10.2001 - 01.2004
  • Used diagnostic tools to identify hardware failures and replace non-functional components.
  • Tested and installed motherboards, processors and graphics cards on desktops and laptops
  • Assessed system hardware and software and suggested modifications
  • Linked computers to network and peripheral equipment.
  • Refurbished PC systems and peripherals such as monitors, networking equipment, printers and more.
  • Imaged and prepared new computers for integration into company networks and systems.

Network Technician

Basoft AG
04.1998 - 09.2001
  • Troubleshot hardware and software to determine and rectify network problems.
  • Performed necessary maintenance to support network availability.
  • Installed cabling, wireless routers and telephone systems for data communications networks.
  • Diagnosed and resolved hardware, software and network problems and replaced defective components.
  • Identified and resolved issues with network devices.
  • Dressed and installed fiber cabling and hardware.
  • Provided detailed reporting on performed maintenance and repairs to support overall network health.

1st / 2nd Level Supporter

Swisscom
03.1996 - 02.1998
  • Carried out day-day-day duties accurately and efficiently.
  • Identified issues, analyzed information and provided solutions to problems.
  • Resolved problems, improved operations and provided exceptional service.

Education

Ph.D. - Blockchain Technologies

Capitol Technology University
Laurel, MD, USA
03.2025

Master of Science - Master of Science in Research Methods Application

Capitol Technology University
Laurel, MD, USA
03.2021

Bachelor of Science - Business Information Technology

Kalaidos University Zurich
Zurich
02.2014

Graduate Computer Scientist - Technical Information Technology

Polytechnics School Zurich
Zurich
02.2012

Skills

Cyber Security and Risk Management:

  • Cyber Security Strategy
  • Security Compliance
  • Security governance principles
  • IT policies and procedures
  • Risk-based management concepts

Cyber Security Assessment and Testing:

  • Vulnerability assessment and penetration testing
  • Disaster Recovery/ Business continuity plans
  • Awareness training for clients

Cyber Security Architecture and Engineering:

  • Engineering using secure design principles
  • Fundamental concepts of security models
  • Security Configuration and Systems
  • Cryptography
  • Designing and implementing physical security

Cloud Security:

  • Cloud Concepts, Architecture and Design
  • Cloud Data Security
  • Cloud Platform and Infrastructure Security
  • Cloud Application Security
  • Cloud Security Operations

Cyber Security Operations:

  • Cyber Defense
  • Cyber Engineering
  • Cyber Warfare
  • Cyber Resilience
  • Cyber Threat Hunting and Intelligence

Communications and Network Security:

  • Protecting network parts
  • Protecting communication channels

Identity and Access Management:

  • Physical and logical access to assets
  • Identification and authentication
  • Authorization mechanisms

Certification

CISSP

CCSP

CISA

Microsoft Certified Azure Security Engineer Associate

Microsoft Certified Azure Fundamentals

Languages

English
Bilingual or Proficient (C2)
German
Bilingual or Proficient (C2)
French
Upper intermediate (B2)
Spanish
Beginner (A1)

Timeline

Cyber Security Architect

KYNDRYL
10.2022 - Current

Cyber Security Specialist

HUBER+SUHNER
09.2019 - 09.2022

Chief Information Security Officer

White & Case LLP
01.2014 - 08.2019

IT Security Manager

AGT International
06.2008 - 12.2013

IT System Engineer

Jet Aviation
02.2004 - 04.2007

System Engineer

LUWA
02.2004 - 02.2007

Computer Technician

PCI AG
10.2001 - 01.2004

Network Technician

Basoft AG
04.1998 - 09.2001

1st / 2nd Level Supporter

Swisscom
03.1996 - 02.1998

Ph.D. - Blockchain Technologies

Capitol Technology University

Master of Science - Master of Science in Research Methods Application

Capitol Technology University

Bachelor of Science - Business Information Technology

Kalaidos University Zurich

Graduate Computer Scientist - Technical Information Technology

Polytechnics School Zurich
Maximilian Gusset