CERTSIGN
Dragos Irimia has a diverse work experience spanning over many years. Dragos started their career at Intrasoft International as a Senior Software Engineer, where they worked on a large distributed project utilizing Oracle technologies. Dragos then moved to SIVECO Romania, where they were responsible for porting the Siveco ERP application to a newer framework. At Lyngsoe Systems, Dragos was involved in porting the existing reporting infrastructure to an open source component.
Dragos then joined Axway, where they held multiple roles including Senior Java Software Engineer, CI Engineer, and Security Engineer. Dragos worked on projects involving user management, authorization, and authentication, as well as continuous integration for an eclipse-based RCP development studio.
After their tenure at Axway, Dragos worked at certSIGN as a Principal Java Software Engineer, where they played a crucial role in the maintenance and development of new features for the company's in-house software. Dragos continued their work as a Software Engineer at Exerp before joining certSIGN again as a full-time Software Engineer.
In 2018, Dragos started working at UXP Systems as a Senior Solution Software Engineer, where they primarily focused on platform maintenance, bug fixing, and new feature development for the UXP User Lifecycle Management platform. Currently, they are working as a Senior Software Architect at the European Commission.
Dragos Irimia obtained their Bachelor's degree in Information Technology from Universitatea OVIDIUS din Constanta from 1999 to 2003. Dragos also obtained the Sun Java Certified Programmer certification from Sun Microsystems in September 2006.
CERTSIGN
1 followers
certSIGN provides innovative solutions both for organizations that need to protect their assets against possible threats, as well as for clients who wish to improve their IT system. Our wide range of products and solutions allows both international corporations and small organizations to protect their assets, while improving their activity and optimizing their operations. The process of securing the organization starts by identifying its sensitivity and the value of its information, followed by identifying the possible threats to information and the vulnerabilities of its existing systems. Finally, we formulate the plan of measures to implement against these threats and vulnerabilities. Information has become the most valuable asset of a company, after its employees. The security threats to information have increased with its value. As companies’ activities become more and more integrated – from computers to smartphones and cloud computing, the cyber threats to information are growing and becoming more and more sophisticated. To be able to face these risks, analyze the elements in this infographic.