Karel Koster Email and Phone Number
Karel Koster work email
- Valid
- Valid
- Valid
Karel Koster personal email
Karel Koster is a Managing a Global Cyber Security Team, CISSP-ISSAP, SABSA SCF at FedEx. They possess expertise in information security, security, network security, information security management, business continuity and 31 more skills. They is proficient in English. Colleagues describe them as "Karel is cool; calm and collected, just what you need in our field of work where security incidents drive you off course on a daily basis. I have had the pleasure of working with Karel for almost 4 years at Aegon NL where he was information security officer in my team. Karel is excellent at seeing through complex matters quickly, and has a good understanding of the political context security problems often exist in. A pragmatic with broad experience in both operational and strategic… Show more" and "I have had the pleasure of working with Karel on two occasions, he is a very astute and professional person, with excellent technical skills both in Security and I.T. He managed to troubleshoot an obscure 802.1X authentication issue after two other experts (one of whom was reccomended by Cisco) had failed dismally. If I had the opportunity I wouldn't hesitate in making him a full time member of my team."
-
Manger It - Attack Surface ManagementFedex Feb 2024 - PresentAmsterdam, North Holland, Netherlands -
Manager It - Information SecurityFedex Apr 2018 - Feb 2024Amsterdam Area, NetherlandsLeading a global team of Information Security Analysts and Advisors within the FedEx Express Int. Responsible for implementing, maintaining and executing several GRC processes, such as Vulnerability management, Information security assessment, Customer Assurance and Cloud governance within LAC, EMEA and APAC for FedEx Express Int. -
Head Of Information SecurityIngenico Epayments Oct 2016 - Mar 2018Amsterdam Area, NetherlandsAs the Head of Information Security I was responsible for all Information Security areas of Ingenico ePayments GlobalCollect Platform and its affiliated entities. I oversaw and coordinated information security efforts across the company in order to safeguard the company’s assets, infrastructure, intellectual property and business continuity. I managed the ISM team of ePayments North campus and was responsible for embedding security within Ingenico ePayments North Campus managed development and service delivery platforms. -
Information Security ArchitectIngenico Epayments Aug 2014 - Sep 2016Amsterdam Area, NetherlandsIn my current role I am liaison between the information security group, IT and business architects. My tasks and responsibilities include:- Developing and maintaining physical and logical information security architectures, as well as standards, principles and services, inline with PCI-DSS and applicable privacy laws and regulations;- Developing and implementing security architecture roadmap;- Information security representative within strategic IT programs within the Ingenico group. Therefor liaising between the program stakeholders and the various CISO's within the Ingenico group;- Serve as information security expert in: application development, database design, network and operation system security design and control development;- Develop and provide implementation guidance on information security business, functional and non-functional requirements for all IT projects;- Manage and execute information security improvement projects such as identity and access management, secure software development and tokenisation. -
Information Security OfficerAegon Nederland Nov 2009 - Jul 2014The Hague Area, NetherlandsTasks and responsibilities were:• Maintain information security governance and reporting on information security towards executive board;• Information security risk analysis and tactical advise for Aegon executives and directors;• Manage and coach internal and external information security personnel, such as security managers, interns and contractors; • Design and implement information security policies and controls compliant with Sarbanes Oxley (SOX), ISAE3402, DNB and other regulations;• Manage strategic and innovative security improvement programs such as BYOD security, web application firewalls security, penetration testing processes, secure coding processes, identity access management systems;• Design, implement and maintain the information security incident management program;• Design and manage IT vulnerability management program;• Implement information security management within Aegon corporate headquarters;• Design and execute information security awareness program;• Review, monitor and support strategic IT programs. -
Operational Risk Manager / Security ManagerAegon Nederland Nov 2007 - Nov 2009The HagueThe scope of this role covered the following Aegon NL departments: Asset management, HR, Finance, Legal, IT, Facilities. Tasks and responsibilities included: • Advice on and implementation of operational risk and information security controls;• Assess whether business units comply with information security and risk policies by testing various controls;• Implement, test and monitor SOX and SAS70 process controls;• Design and maintain business continuity plans for all critical business processes;• Provide operational risk and information security advise to directors;• Risk, security and business impact assessments. -
Network Security And Infrastructure ConsultantNobel Sep 2005 - Oct 2007As a consultant I worked on project basis for several clients. I advised on, designed,implemented and secure WAN/LAN network infrastructures. Some examples of project:- Design and deploy a centralized managed WIFI network over 15 offices in 10 countries inNL for a US pharmaceutical company. Decentralized rollout by local IT staff, highly secured and centrally managed from Headquarters;- Designed the network segmentation for a pharmaceutical production plant. Segmentedthe production, quality control and back office network is a way that information could onlyflow from production, to quality control and then to the back office but never the other wayaround;- Designed and implemented a high secure computing zone using firewall, IDS/IPS sensorsand centralized monitoring of all network and server logs.Covered areas of knowledge: switches, load balancers, wireless networks, routers, networksegmentation, MPLS, DNS, (virtual) firewalls, IDS/IPS, tcp/ip, server hardening, proxy servers,logging and monitoring, VPN, PKI infrastructures, spam/content filtering, multifactorauthentication. -
Network Security And Infrastructure EngineerWortell 2002 - 2005In this role I implemented and secured network infrastructures for several clients by installing and configuring switches, routers, firewalls and proxy servers. -
System AdministratorWortell Aug 1999 - 2002Deployed by Wortell as an IT contractor I performed various roles at a diverse range of clients: support engineer, Microsoft and Novell system administrator, project manager, college professor and IT manager.
Karel Koster Skills
Frequently Asked Questions about Karel Koster
What company does Karel Koster work for?
Karel Koster works for Fedex
What is Karel Koster's role at the current company?
Karel Koster's current role is Managing a Global Cyber Security Team, CISSP-ISSAP, SABSA SCF.
What is Karel Koster's email address?
Karel Koster's email address is ka****@****ect.com
What skills is Karel Koster known for?
Karel Koster has skills like Information Security, Security, Network Security, Information Security Management, Business Continuity, Vulnerability Assessment, Cissp, Cisco Technologies, Itil, Vulnerability Management, Operational Risk Management, It Audit.
Who are Karel Koster's colleagues?
Karel Koster's colleagues are Majid A., Todd Moody, Rita Huff, Kimthye Liew, Tiara T, Laurence Minas, Wendy Medina.
Not the Karel Koster you were looking for?
-
-
-
Karel Koster
Ijmuiden -
1chello.nl
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial