Piseach! BV is specialised in IT solutions for everyone. The company works out customized high quality products and supports the client throughout the process. Anno 2023, the IT landscape has become large and complex. Our world of tommorow has Intelligent Automation, 5G and cloud-based edge computing. Protecting data is a necessity. Experts with the necessary knowledge and skills are a must. Not only to protect your network and your applications, but also to meet requirements such as the General Data Protection Regulation (GDPR). The frequency of attacks on your company network has risen sharply in recent years. The attacks are also more lucrative and more complex than before. Besides your network it is also important that software developers do their share. Secure coding is also a must. An appropriate privacy and cyber security policy is highly recommended. Especially when you know that 79% of companies have already suffered a ransomware attack. And that of that 79%, 35% were no longer able to access their own systems. 33% of them decided not to pay the attackers and use backup for recovery. Also, we are seeing a Cybercrime as a service ecosystem, with attacks accelerating all the time. Research showed that 23.2% of all companies in Belgium, active in 2021, had at least 1 problem after a cyber security incident. Only 34.1% also have documentation on the measures, procedures and practices regarding ICT security. Whatever the needs, we can work out a fully customised solution. Do you prefer to work gradually? No problem.
Kevin is a very correct honest person and a hard worker. You can count on him, his work is finished, he can be deployed anywhere and solves all problems. Kevin thinks far beyond what he is asked of. He ensures that problems are solved end-to-end, contacts colleagues, goes after cases, and ultimately solves the problem. In addition, Kevin is also a very nice colleague, someone with whom you have a nice chat, helpful and cordial. I was very sorry when I had to let him go because of budget issues... Kevin is the very last one I would let go.Nathalie Schelstraete, Teamlead ICT, P&V Insurances
Kevin has worked the last four years at Acerta ICT on the domains MLM (Modular Loan Engine), CKB (Central Client Management) and KPS (Client tool Payroll-Services). We met Kevin as a customer-oriented, flexible motivated, loyal and highly skilled technical colleague with a sharp eye for quality. He worked out solutions with a high degree of independence and professionalism. We wish to thank him for his efforts during this time and wish him all the luck and success in his next assignments. On behalf of Acerta CVBA, department ICT development payroll and business management.Geert Laporte, Teamlead ICT, Acerta
I am writing this letter to strongly recommend Mr. Kevin Simons for your organisation/project. I know Kevin because he worked the last 3 years in a position as experienced consultant at Alten Belgium. Kevin is an enthousiastic, tri-lingual and highly motivated team leader. He has excellent development skills, in addition to strong technical and functional analytical skills. Kevin is able to work in highly complex projects. He can work independently and in multicultural environments. Kevin comes up with creative out-of-the-box solutions and quickly proposes new solutions in a changing environment. In summary, Kevin is in my opinion an outstanding professional and I strongly recommend his skills to anyone.Guy Buschen, Technical Director, Alten Belgium
I had the pleasure to work with Kevin on a migration project, an upgrade of the intranet of the Ministry of Brussels Region. After having hear a couple of candidates I immediately picked Kevin. Not only because of his strong technical skills, but especially because of his experience in working with complex and heterogenous systems. Kevin can work independently as well as in team. In short we can say that Kevin is an exceptional professional who I strongly recommend.Lahcen Afif, Project Manager IS Service, Centrum voor Informatica voor het Brussels Gewest
Kevin worked the last 3 years in a position as developer/technical Designer at KBC Insurance. Kevin joined at the start-up of a highly complex project. Eventhough Kevin was part of another team, Kevin was quickly noticed because of his enthousiastic and highly motivated attitude. Kevin proved also good and quick results. For this reason he got appointed as lead developer for the Claims domain. Kevin then started in my team where he coordinated the rework for a complex part of our system. Kevin combined the function of technical designer together with development activities. He is able to work independently and cooperated well with Belgian/Polish and Indian colleagues. In summary, Kevin is in my opinion an outstanding professional and I strongly recommend his skills to anyone.Raf Verhaegen, ICT Senior Teamleader, KBC
Kevin has been working within our IT Department, updating our databases and intranet system. I have been very impressed with the way he has clearly and precisely operated and implemented the systems and would have no hesitation in recommending him for a similar position.D. S. Hunter, Managing Director, PSI Global Ltd
There are only a few IT professionals for who IT is not only knowledge but also a part of the person himself. Kevin is such a person. He feels the technologies, systems and firm's philosophy, when just starting a new challenge. He adapts himself at the environment and dives directly in the project, fully oriented towards the scope. When immerged in a project, everything out of the project disappears but at the same time he stays available for any question or requests from any actor. He has his specific enthusiasm which gives his colleagues a feeling of new adventure. In a few words he is a professional, open-minded, evaluating IT professional whose knowledge and career have just started. It has been a real pleasure and honor to work with him. Javier Arguello Del Blanco, Experienced IT Consultant, Axen Consultancy
Kevin took me under his wing the first weeks of my assignment. I was a junior at the time so I needed some assistance once in a while. Kevin always took the time to explain things to me in such a manner, I rarely had to ask something twice.Anthony Peck, CEO, Sinpro
The Registered Scrum Master credential formally recognizes the exam takers knowledge of lean principles, Scrum Master techniques, patterns of high-performing teams, and how the Scrum Master role scales in an organization. The Registered Scrum Master credential is the only Scrum Master credential in the market endorsed by Jeff Sutherland, co-creator of Scrum.
The holder of the Certified Malware Analysis Professional proves that he can bypass anti-analysis techniques, run malware step by step, identify c2 communication, localize and analyze dropped malware, understand it's persistence mechanisms, understands it obfuscation and can reverse engineer the malware samples.
The Practical Web Defense certification proves that the holder of this certificate has a highly technical knowledge of web application security. All legacy as well as newer technologies are discussed. Eventually he has proven that he has in-depth knowledge of different techniques that can be used to gain control over your web application. He has also provided a full pentesting report. On top of that he applied code fixes as well as virtual patching (using modsecurity) to prevent that the web application remained vulnerable.
The Web Application Penetration Testing certification proves that the holder of this certificate has a highly technical knowledge of web application security. All legacy as well as newer technologies are discussed. Eventually he has proven that he has in-depth knowledge of different techniques that can be used to gain control over your web application. He has also provided a full pentesting report.
The Mobile Application Security and Penetration Testing certification proves that the holder of this certificate has a complex understanding of mobile application vulnerabilities and exploits. He has also proven that he has a vast in-depth knowledge of different techniques that can be used to gain control over your mobile application, that he can reverse engineer mobile applications, perform several mobile pentests and write working exploits to abuse the security flaws found in mobile applications.
Practical Network Defense is a certification for individuals who display advanced knowledge of network protection. You are expected to configure secure remote access as well as configuring features to control, identify and prevent threats, in order to make the network and systems more secure. You have proven that you can deploy and configure company policies. And that you have a vast knowledge of domains and active directory.
Digital Forensics Professional is the most practical and advanced certification available on the market on digital forensics. You are expected to recover corrupted disks, locating hidden data and working with partitions. You also need to analyse malicious documents and metadata as well as executing thorough investigations against Skype, the recycle bin and shellbags.
Threat Hunting Professional certification is the most practical and professionally oriented certification you can obtain in threat hunting and threat identification in general. Instead of putting you through a series of multiple-choice questions, you are expected to perform an actual threat hunt on a corporate network. This threat hunt is modeled after real-world scenarios and cutting-edge malware.
This exam is a 100% practical certification on penetration testing and information security essentials. After receiving an engagement letter you, as a penetration tester, need to prove your skills in the fastest growing area of information security.
(ISC)² Certified in Cybersecurity is a foundational cybersecurity certification designed to help recipients build a pathway to a rewarding career in cybersecurity. This entry-level certification will prove to employers you have the foundational knowledge, skills and abilities necessary for an entry- or junior-level cybersecurity role.
This course prepares the student to securing web applications thoroughly. The most advanced techniques are discussed. Eventually the trainee has built up vast in-depth knowledge of different techniques that can be used to gain control over your web application.
This course prepares the student to thoroughly securing web applications as well as executing penetration tests on networks, in order to make them more secure. In this course you'll also learn how to use Ruby as well as the metasploit framework. Finally the trainee has built up the necessary knowledge to secure systems.
This course prepares the student to execute state-sponsored-like operations as well as executing numerous undocumented attacks, in order to make them more secure. In this course you'll also learn stealthy lateral movement and evasion techniques against modern defenses.
This course prepares the student to thoroughly reverse engineer software and malware using different methods. In this course you'll also unpack packed executables manually and bypass anti-reversing techniques.
The CCENT certificate validates the skills required for entry-level network support. The holders of this certificate have the knowledge and skills to install, operate, and troubleshoot a small enterprise branch network. Additionally they have the necessary fundamentals to secure the network.
The CCENT certificate validates the skills required to manage and support medium-size routed and switched networks. The holders of this certificate have the knowledge and skills to install, operate, and troubleshoot a small enterprise branch. Additionally they have the necessary skills to secure the network.
The holder of the OCA Java SE 5/6 certificate has proven that he has the necessary skills to program with the Java core platform.
The holder of the OCP Java SE 6 certificate has proven that he has the necessary professional skills to program with the Java core platform.
The holder of the OCUP Fundamental certificate has proven that he has the necessary professional skills to construct simple UML models. He is also comfortable with the most frequently used elements of UML.
The holder of the OCUP Intermediate certificate has proven that he has the necessary professional skills to construct complex UML models. He is also comfortable with a vast selection of elements of the UML language. For example, he can model distributed systems.
The holder of the ITIL Foundation certificate has proven that he works using the best practices described in ITIL, a framework for setting the management processes within an IT organisation. He, together with others, contributes to a higher quality of Service Management.