FrancescoTordoniCV
FrancescoTordoniCV
ABOUT ME
As a Vulnerability Management Consultant, I utilize industry-leading tools like Nexpose, Detectify, Burp Suite an
d Nessus to identify and mitigate system weaknesses, ensuring proactive risk management.
I analyze threat intelligence feeds, identify emerging threats, and assess their potential impact, keeping relevant
teams informed of new threats and trends.
I lead team meetings to present comprehensive weekly vulnerability scan reports to stakeholders, providing
actionable insights for continuous security improvement.
I hold CEH, Security+, and ISO27001 Lead Auditor certifications and am deeply passionate about creating and
delivering engaging staff training sessions.
WORK EXPERIENCE
• Manage the patching process, applying vendor-issued updates to close security vulnerabilities and optimize the
performance of software and devices
• Request, review and approve exceptions to a vulnerable item or remediation task that cannot be remediated
according to the policy.
• Conduct stakeholder meetings to address and prioritize vulnerabilities.
• Develop and implement mitigation plans for identified vulnerabilities.
• Maintain documentation of cybersecurity policies and compliance records.
1/4
• Use Brinqa to stream workflows for managing and mitigating threat exposures from infrastructure, cloud,
application security, and vulnerability management.
• Conduct application security assessments using Micorsoft Copilot scripting.
• Track remediation efforts and keeping stakeholders informed.
• Utilize SAP LeanIX and ServiceNow integration to stream vulnerability management in order to assign
vulnerabilities to the correct system owners
IT Infrastructure Consultant
PQE Group [ 03/2023 – 06/06/2023 ]
City: Firenze | Country: Italy
• Help to keep up to date the inventory of all IT assets (servers, networks, storage devices) and document their
configurations and dependencies.
• Establish criteria for qualification, including hardware and software specifications, network performance metrics,
and security standards.
• Develop comprehensive testing procedures to validate each component against the qualification criteria.
• Identify potential risks to the IT infrastructure, such as cyber threats, hardware failures, and data breaches.
• Develop standard operating procedures (SOPs) for the deployment, maintenance, and troubleshooting of IT
infrastructure components.
• Perform tests to validate network performance, including bandwidth, latency, and packet loss.
• Test data backup and recovery processes to ensure data integrity and availability in case of failures.
• Test UPS systems to verify they provide adequate power during outages and that they are properly maintained and
monitored.
• Offer advice and solutions tailored to the unique needs of various clients
• Teach introductory Cybersecurity Courses, educating students using the Security Blue Team Level 1 certification
curriculum.
• Facilitate practical and theoretical learning, ensuring students gain both the knowledge and hands-on experience
needed for foundational cybersecurity skills
• Train new hires to help them integrate into the company’s cybersecurity protocols
• Develop and deliver an innovative security training program and create engaging training sessions
IT Analyst
TE Connectivity [ 2015 – 2018 ]
City: Brno | Country: Czechia
• Administer workstations and servers across US/EMEA, ensuring security and performance
• Manage user rights and profiles via Active Directory
• Perform hardware troubleshooting, minimizing downtime through timely component replacement
• Update security protocols using McAfee ePolicy Orchestrator and Blackberry Enterprise Server
• Provide technical support to remote users
2/4
Presales Technical Consultant
HP Enterprise [ 2011 – 2012 ]
City: Prague | Country: Czechia
• Collecting information on the perceptions, opinions, and preferences of customers in relation to commercial
products or services.
• Using interview techniques to draw as much information as possible by contacting people via telephone calls,
by approaching them face-to-face or by by virtual means.
• Passing information to experts for drawing analysis.
Security+
CompTIA
LANGUAGE SKILLS
3/4
Other language(s):
Italian English
LISTENING C2 READING C2 WRITING C2 LISTENING C1 READING C1 WRITING C1
SPOKEN PRODUCTION C2 SPOKEN INTERACTION C2 SPOKEN PRODUCTION C1 SPOKEN INTERACTION C1
German Spanish
LISTENING B2 READING B2 WRITING B2 LISTENING B1 READING B1 WRITING B1
SPOKEN PRODUCTION B2 SPOKEN INTERACTION B2 SPOKEN PRODUCTION B1 SPOKEN INTERACTION B1
Levels: A1 and A2: Basic user; B1 and B2: Independent user; C1 and C2: Proficient user
DIGITAL SKILLS
Vulnerability Management / Vulnerability Assesment / Rapid7 Nexpose / BURP Suite / Qualys, Tenable(Nessus)
/ Detectify / SERVICE NOW / LeanIX
4/4