This site uses Microsoft Clarity for anonymous analytics. Cookie Policy

Dionysis Karamitopoulos

NIS 2 Directive Trained ProfessionalNIS2DTP
Certified Access Management SpecialistCAMS®

Intune  ·  Defender XDR  ·  ISO/IEC 27001:2022

I design secure Microsoft 365 environments. My work covers Identity & Access Management, endpoint governance, and ISO-aligned security architecture. The goal is simple: reduce risk and keep compliance sustainable.

22

Certifications

Across Microsoft, Cisco, Fortinet, Google, Cyber Risk GmbH & more

4+

Years in IT & Security

From Support Engineer to Security Architect

4

Key Projects Delivered

Network design, GRC transformation, CPS & more

6+

Companies & Clients

Full-time, contract, and freelance engagements

ABOUT ME

Building Secure Digital Infrastructures Through Strategic Governance

I'm an Information Security Architect. My focus is Microsoft 365 security. I work on Identity & Access Management, endpoint governance, and secure cloud design. As a Certified Access Management Specialist (CAMS®), my main tools are Intune, Defender XDR, and Entra ID.

I have hands-on experience with ISO 27001:2022 and hold the NIS 2 Directive Trained Professional (NIS2DTP™) credential. My work includes risk management, internal audits, regulatory compliance, and NIS2 readiness assessments. I build security baselines that help teams meet real business goals.

I started in technical support and systems administration. Over time, I moved into security analysis and architecture. Each step gave me a clearer picture of how organisations get attacked — and how to defend them properly.

Career Focus

  • Microsoft 365 security architecture and secure environment design
  • Identity & Access Management — certified CAMS® specialist with Entra ID in hybrid environments
  • Endpoint governance via Intune & Defender XDR
  • ISO/IEC 27001:2022 implementation, risk management, and compliance
  • NIS 2 Directive compliance & readiness — trained NIS2DTP™ professional

Strategic Thinking

I align security with business goals. Risk is managed, not avoided.

Collaborative Leadership

I work across teams to embed security best practices organisation-wide.

Continuous Improvement

I stay current with emerging threats and adapt security strategies accordingly.

"

Better security means less risk, less downtime, and more confidence in your systems.

PROFESSIONAL EXPERIENCE

Career Journey

Showing security-related positions only. For the complete work history, visit my LinkedIn profile.

Full-time
Contract
Freelance
Volunteer
Other
2025
Fiverr and Upwork Freelancers (Buyers and Sellers)

IT & Cybersecurity Consultant

Fiverr and Upwork Freelancers (Buyers and Sellers)

FreelanceNov 2025 - Present

Remote

  • Providing consulting services in IT infrastructure, cybersecurity, and compliance.
  • Delivering technical troubleshooting, configuration guidance, and security hardening.
  • Managing client engagements, scoping requirements, and delivering high-quality technical solutions.
Microsoft Community

Community Security Contributor

Microsoft Community

Volunteer · Self-initiatedApr 2025 - Feb 2026 · 11 months

Remote

  • Voluntarily contributed to the Microsoft Community Hub — not a formal Microsoft employment.
  • Answered security-related questions from users on Microsoft products and services.
  • Provided guidance on Microsoft Defender, Intune, Entra ID, and M365 security configurations.
  • Self-driven initiative to give back to the community and deepen product knowledge.
Simtec Software & Services

IT Systems & Integration Engineer

Simtec Software & Services

ContractMar 2025 - Oct 2025 · 8 months

Thessaloniki, Greece · Hybrid

  • Deployed Microsoft Intune across all endpoints with security baselines and compliance policies.
  • Integrated Microsoft Defender for Endpoint to strengthen threat detection and incident response.
  • Designed Conditional Access, App Protection, and Identity Protection policies.
  • Configured Fortinet FortiGate firewalls with VPN, certificate auth, and deep inspection.
  • Developed ISO/IEC 27001:2022 policies, risk assessments, and incident response procedures.
  • Performed internal audits and gap analyses ahead of external ISO 27001 certification.
  • Delivered cybersecurity awareness training to staff.

Project: Mixys Cloud Platform Security

  • Secured the Mixys cloud infrastructure through configuration and monitoring.
  • Implemented WAF, VPN, and endpoint security for application and data protection.
  • Ensured GDPR compliance: HTTPS/TLS, encryption, audit logs, MFA, and RBAC.
2024
CBS LAN A.E. / Lancom Ltd

Information Security Analyst

CBS LAN A.E. / Lancom Ltd

ContractMar 2024 - Dec 2024 · 10 months

Thessaloniki, Greece · On-site

  • Training programme in IBM QRadar SIEM — log collection, correlation, and event analysis.
  • Identified and classified security incidents and false positives.
  • Exposure to SOC workflows, incident escalation, and reporting.
  • ISO/IEC 27001:2022 control mapping and risk management fundamentals.
  • Analysed EDR alerts and Defender for Endpoint telemetry.
2023
Regency Casino Thessaloniki

MIS Engineer & System Administrator

Regency Casino Thessaloniki

Full-timeOct 2023 - Mar 2025 · 1 year 6 months

Thessaloniki, Greece · On-site

  • Deployed and managed Defender for Endpoint, FortiEDR, and Intune for unified endpoint protection.
  • Configured FortiMail with anti-phishing filters and spam mitigation.
  • Managed Active Directory and GPOs for user provisioning and access control.
  • Led Project BUTLER — integrated new IT systems into casino F&B operations.
  • Delivered technical support aligned with security standards and compliance posture.
2022
SingularLogic

Support Engineer

SingularLogic

Full-timeJul 2022 - Oct 2023 · 1 year 4 months

Thessaloniki, Greece · Hybrid

  • Primary contact for software and hardware technical support.
  • Remote troubleshooting using diagnostic tools.
  • Managed service requests via phone, email, and ticketing systems.
  • Verified support contract terms and coverage for each request.
2020

Career Break

Professional Development

Career BreakSep 2020 - May 2022 · 1 year 9 months

Thessaloniki, Greece

  • Focused on upskilling in cybersecurity, system administration, and networking.
  • Completed certifications and online courses in IT and security.
  • Attended workshops on cloud computing and IT security.
Synapsecom Telecoms S.A.

Professional FIFA Player & Streamer (eSports)

Synapsecom Telecoms S.A.

Full-timeApr 2020 - Sep 2020 · 6 months

Thessaloniki, Greece · On-site

  • Competed in professional FIFA tournaments on live-streamed betting platforms.
  • Managed online presence and engaged with a fanbase during streams.
  • Analysed in-game stats to improve competitive performance.

Specialisation

Areas of Deep Expertise

Four years of hands-on experience across the Microsoft security ecosystem. From architecture design to compliance management.

Identity & Access Management

Identity is the new perimeter. I start every engagement by mapping who has access to what — and why.

Using Microsoft Entra ID, I set up Conditional Access policies that check device health, location, and risk level before granting access. Privileged Identity Management limits admin rights to exactly when they are needed.

Every design follows Zero Trust principles: verify every request, use least privilege, and always assume breach.

Security Architecture & Governance

Good security architecture is not about tools. It is about turning business risk into clear, practical controls.

I use Microsoft Defender XDR to connect security across endpoints, email, identities, and cloud apps. This gives teams one place to see and respond to threats.

I also build governance frameworks — ISO/IEC 27001 policies, risk registers, and audit-ready documentation. The goal is security that the business can actually sustain.

Endpoint & Cloud Security

Secure endpoints start before the device ever reaches the user.

I use Microsoft Intune and Windows Autopilot to enroll devices automatically. The right compliance policies and security baselines apply from day one — no manual setup needed.

Microsoft Defender for Endpoint monitors behaviour and flags threats in real time. In cloud environments, I apply access controls and Defender for Cloud to keep workloads compliant.

Compliance & Regulatory Alignment

Compliance should be the result of good security — not a checklist bolted on at the end.

I work with ISO/IEC 27001:2022, the EU NIS 2 Directive, and GDPR. Risk assessments follow a clear method: identify threats, rate likelihood and impact, apply the right controls.

As a NIS2DTP and CAMS® holder, I have current, formally tested knowledge of EU security regulations. I translate that into steps organisations can actually follow.

Working Across the Full Security Lifecycle

I cover every stage — threat modelling, architecture design, technical setup, and compliance reporting.

Need to build an M365 security stack? Working toward ISO 27001? Responding to NIS 2 requirements? I handle all of it.

Based in Thessaloniki, Greece. Available to clients across the EU, in both Greek and English.

Primary Domain

M365 Security

Compliance Focus

ISO 27001 · NIS2 · GDPR

Location

Thessaloniki, Greece

Languages

Greek · English

ACADEMIC BACKGROUND

Education & Training

EDUCATION

European International University - Paris

Official

Advanced Professional Diploma in Cyber Security, Computer and Information Systems Security/Information Assurance

Sep 2025 – Present

Covers both technical and managerial aspects of cybersecurity. Key areas include risk management, infrastructure protection, and incident response.

Includes preparation for the BSI ISO 27001 Lead Auditor certification. Covers ethical hacking, penetration testing, and strategic security decision-making.

Mediterranean College

Advanced Professional Diploma in Cyber Security, Computer and Information Systems Security/Information Assurance

Sep 2025 – Present

Covers both technical and managerial aspects of cybersecurity. Key areas include risk management, infrastructure protection, and incident response.

Includes preparation for the BSI ISO 27001 Lead Auditor certification. Covers ethical hacking, penetration testing, and strategic security decision-making.

General High School

High School Diploma, Technological

2006 – 2009

KEY COURSES

European International University - Paris

Advanced Diploma Program

Advanced Security Protocols

Enterprise Security Management

Security: Attacks and Countermeasures

Securing Networks

Human and Legal Aspects of Cyber Security

Certification Preparation

BSI ISO 27001 Lead Auditor — Information Security Management Systems

CERTIFICATIONS & CREDENTIALS

Professional Qualifications

Click any badge to view details

All certifications are also published on Credly

Visit my Credly profile to verify credentials, view digital badges, and see the full up-to-date list of earned certifications.

View on Credly
Showing 23 of 23

NIS 2 Directive Trained Professional (NIS2DTP)™

Cyber Risk GmbH

Issued Mar 2026ID: 367458
NIS 2 Directive Trained Professional (NIS2DTP)™ Badge
Click to zoom

AI In Cybersecurity

Cato Networks

Issued Mar 2026
AI In Cybersecurity Badge
Click to zoom

Certified Access Management Specialist® (CAMS)

Identity Management Institute

Issued Mar 2026 · Expires Mar 2028ID: 159541
Certified Access Management Specialist® (CAMS) Badge
Click to zoom

Information Security Specialist

LetsDefend (now part of HackTheBox)

Issued Dec 2025
Information Security Specialist Badge
Click to zoom

Certified Process Injection Analyst (CPIA)

CyberWarfare Labs

Issued Nov 2025ID: 6929df7e7b627b6c7f0cc207
Certified Process Injection Analyst (CPIA) Badge
Click to zoom

Network Defense

Cisco

Issued Nov 2025
Network Defense Badge
Click to zoom

Cyber Threat Management

Cisco

Issued Nov 2025
Cyber Threat Management Badge
Click to zoom

Digital Safety and Security Awareness

Cisco

Issued Nov 2025
Digital Safety and Security Awareness Badge
Click to zoom

Microsoft Purview Insider Risk Management Ninja Training

Microsoft Learning

Issued Sep 2025
Microsoft Purview Insider Risk Management Ninja Training Badge
Click to zoom

Fortinet FortiGate 7.6 Operator

Fortinet

Issued Aug 2025
Fortinet FortiGate 7.6 Operator Badge
Click to zoom

Fortinet Certified Associate Cybersecurity

Fortinet

Issued Aug 2025 · Expires Aug 2027
Fortinet Certified Associate Cybersecurity Badge
Click to zoom

Fortinet Certified Fundamentals Cybersecurity

Fortinet

Issued Aug 2025 · Expires Aug 2027ID: a2c36ea3-2af8-45d7-84b2-9ce586500aea
Fortinet Certified Fundamentals Cybersecurity Badge
Click to zoom

Google Cybersecurity Certificate

Google

Issued Mar 2025ID: 6951990b-53f9-4581-8248-d55eff2ea8e6
Google Cybersecurity Certificate Badge
Click to zoom

Governance, Risk, Compliance, and Data Privacy

IBM SkillsBuild

Issued Mar 2025ID: 0dc96cb7-b7ac-4770-8ec5-719df406c411
Governance, Risk, Compliance, and Data Privacy Badge
Click to zoom

Google Project Management Professional Certificate

Google

Issued Feb 2025ID: 4996b14e-b26d-4699-9bf1-7c440f73ad53
Google Project Management Professional Certificate Badge
Click to zoom

Microsoft Defender for Endpoint Ninja Training

Microsoft Learning

Issued Feb 2025
Microsoft Defender for Endpoint Ninja Training Badge
Click to zoom

IBM QRadar SIEM Foundation

IBM Security

Issued Feb 2024ID: a164f832-39f4-4832-b195-b8d2213b31b1
IBM QRadar SIEM Foundation Badge
Click to zoom

Data Analyst Professional

Reatcode Group

Issued Oct 2023
Data Analyst Professional Badge
Click to zoom

Practical Malware Analysis & Triage

TCM Security

Issued Mar 2023ID: cert_hp4qdp18
Practical Malware Analysis & Triage Badge
Click to zoom

Certificate of Training Network Engineer

National and Kapodistrian University of Athens

Issued Nov 2022
Certificate of Training Network Engineer Badge
Click to zoom

ISO 27001:2013 Basic Principles of Information Security Management Systems

TÜV NORD Hellas

Issued Apr 2022
ISO 27001:2013 Basic Principles of Information Security Management Systems Badge
Click to zoom

Certificate of Training Cybersecurity & Cybercrime

National and Kapodistrian University of Athens

Issued Jan 2022
Certificate of Training Cybersecurity & Cybercrime Badge
Click to zoom

Strategic Cybersecurity Management

AttackIQ

Issued Jan 2022
Strategic Cybersecurity Management Badge
Click to zoom

TECHNICAL EXPERTISE

Skills & Technologies

Specialized in Microsoft Security Ecosystem

CORE COMPETENCIES

Microsoft Security ArchitectureIdentity & Access ManagementDefender XDR & EDRIntune & Endpoint GovernanceSecurity GovernanceRisk AssessmentISO 27001 AlignmentNIS2 Directive (NIS2DTP™)CAMS® — Access ManagementNetwork & Email SecurityInfrastructure ProtectionIncident ManagementThreat Investigation

Microsoft 365 Security

Microsoft Defender for Endpoint
Microsoft Defender for Office 365
Microsoft Defender for Identity
Microsoft Defender for Cloud Apps
Security & Compliance Center
Purview Information Protection
Purview Data Loss Prevention
Threat Intelligence & Analytics

Identity & Access Management

Microsoft Entra ID (Azure AD)
Conditional Access Policies
Multi-Factor Authentication
Privileged Identity Management
Identity Governance
Single Sign-On (SSO)
Azure AD Connect
Identity Protection
CAMS® — Certified Access Management Specialist

Endpoint Security & Management

Microsoft Intune
Endpoint Configuration Manager
Windows Autopilot
Application Management
Compliance Policies
Security Baselines

Infrastructure & Network Security

Azure Security Center
Network Security Groups
Firewall Configuration
VPN & Remote Access
Zero Trust Architecture
Secure Network Design
Vulnerability Management
Security Monitoring

Governance, Risk & Compliance

ISO 27001 Implementation
NIS2 Directive Compliance
GDPR Compliance
Risk Assessment & Management
Security Auditing
Policy Development
Incident Response Planning

Systems Administration

Windows Server Administration
Active Directory
PowerShell Scripting
Group Policy Management
Exchange Online
SharePoint Administration
Backup & Recovery
Performance Optimization

COMMUNICATION

Languages

Greek

Native

English

Professional

German

Beginner (A1)

FEATURED PROJECTS

Key Technical Initiatives

GRC Hub – Enterprise Governance, Risk & Compliance Workspace

Product Design & Build – GRC Platform

2025 – Present
In Development

GRC Hub is an enterprise GRC workspace designed to help organizations manage governance, risk, compliance, controls, evidence, audits, vendors, employees, access reviews, security training and regulatory obligations from one centralized platform.

View Full Project Details

Deployment Highlights

  • Risk Register, Control Library & Continuous Control Monitoring
  • Compliance Mapping, Evidence Management & Policy Register
  • Vendor Risk, DSAR, Incidents, NIS2 & DORA Resilience
  • Access Reviews, Security Training & HRIS Lifecycle
  • AI Policy Generator, AI Auditor Co-pilot & AI Risk Prediction
  • ISO 27001, GDPR, NIS2, DORA, SOC 2, HIPAA, PCI DSS, EU AI Act
GRCISO 27001GDPRNIS2DORARisk ManagementComplianceAIAudit Readiness

AI-Enabled Phishing & Email Security Systems – Human, Legal & Governance Analysis

Academic Cybersecurity Governance Project / AI Risk & Compliance Case Study

2025Mediterranean College

A human-centred and legal analysis of AI-powered email security in a UK organisational context. Analyses AI/ML-based email classification, user risk scoring, automated quarantine and escalation workflows as a socio-technical decision system — examining accountability, transparency, human oversight and governance readiness.

View Full Project Details

Deployment Highlights

  • EU AI Act risk categorisation
  • UK GDPR accountability, profiling & automated decision-making
  • Human-in-the-loop oversight & automation bias analysis
  • Obligation → Risk → Control → Owner → Evidence mapping
  • Excel-based Governance Mapping Template with dashboard
  • Evidence checklist for audit readiness
AI SecurityEmail SecurityEU AI ActUK GDPRCybersecurity GovernanceHuman FactorsGRCAudit Readiness

Microsoft Defender XDR Detection Engineering Pack

Detection Engineering / Threat Hunting

Apr 2026

Designed a structured Microsoft Defender XDR detection pack with 40 KQL rules across Basic, Intermediate, Advanced, and Complex levels, built for Advanced Hunting and Custom Detection use cases.

View Full Project Details

Deployment Highlights

  • 40 KQL rules across 4 complexity tiers
  • Defender XDR — Advanced Hunting aligned
  • Custom Detection rule support
  • Operational tuning logic included
  • Threat hunting use-case coverage
  • Basic → Complex rule progression
Defender XDRKQLDetection EngineeringThreat HuntingMicrosoft Security

Enterprise Security Management – Network Architecture & Security Implementation

Financial Services Secure Network Design

Jan 2026 – Mar 2026Mediterranean College

Designed and implemented a secure enterprise network for a financial services scenario using a three-zone architecture, site-to-site IPsec VPN, DHCP, NAT, EIGRP routing, DMZ service controls, and ACL-based segmentation.

View Full Project Details

Deployment Highlights

  • Three-zone architecture: Access, Distribution, Core Operations
  • Site-to-site IPsec VPN between two sites
  • DMZ-based public service exposure
  • ACL-based traffic filtering and segmentation
  • EIGRP dynamic routing
  • DHCP, NAT, and controlled inter-zone communication
Network SecurityCisco NetworkingIPsec VPNACLsSecurity ArchitectureDMZEnterprise Networking

Industrial Network Architecture – Pigadia Ski Resort

Axess Infrastructure Deployment

Dec 2025 – Feb 2026Fiverr

Designed and deployed a Layer 3 network for a ski resort. The system handles access control and parking automation across the whole site.

Deployment Highlights

  • Core switching: SG2428P / SG3210
  • ER706W-4G router with 4G WAN failover
  • VLAN segmentation: AXESS, CCTV, Guest WiFi, Management
  • 9 industrial PoE cabinets across the resort
  • Dedicated parking infrastructure (APS1, APS2, barrier, counter)
  • Static IP alignment with AXESS vendor range (10.10.10.x)
  • Inter-VLAN routing and firewall policy design
  • CCTV isolated on a dedicated subnet
  • Centralised device management via OC300
Layer 3 NetworkingVLANPoEFirewallCCTVInfrastructure

Documentation

Pigadia – AXESS Network & Infrastructure Overview

High-level overview of the network. Covers gate cabinets, chairlift integration, ticket office, parking automation, and server connectivity.

View PDF

Omada L3 Network Architecture – Pigadia Deployment

Layer 3 network design and VLAN segmentation. Includes core switching, ER706W-4G gateway, industrial PoE cabinets, and parking network. Built for traffic isolation and scalable access control.

View Doc

Pigadia – Omada Network Architecture & Runbook

Full deployment runbook. Includes VLAN design, IP addressing, PoE cabinets, parking integration, firewall rules, and security hardening guidelines.

View Doc

Cyber-Physical Systems (CPS) Smart Office – Network & Security Design

University Project – Mediterranean College

Nov 2025 – Jan 2026Mediterranean College

University project. The goal was to design a secure Smart Office network. It uses IoT devices and enterprise IT systems. A Head Office and a Branch Office connect via IPsec VPN. The project was built in Cisco Packet Tracer with full security documentation.

Deployment Highlights

  • HQ with CPS Control Server, Backup, and SIEM
  • IoT devices: smart lamp, door lock, CCTV, thermostat, sensors
  • Secure Wi-Fi with WPA2-PSK and AES encryption
  • VLANs: 10 (Servers), 20 (IoT), 30 (Branch)
  • Site-to-site IPsec VPN (AES) between HQ and Branch
  • OSPF for dynamic routing
  • Firewalls and ACLs for perimeter security
  • AAA local authentication on all devices
  • Branch users control HQ IoT devices through VPN
CPSIoT SecurityIPsec VPNVLANOSPFCisco Packet TracerSIEMACLWPA2

Documentation

University of Derby – CPS Smart Office Presentation

Project presentation covering the network design, VLAN segmentation, IPsec VPN, and before/after hardening analysis.

View PDF

Our Network Topology

Visual topology showing HQ and Branch architecture, VLANs, IPsec tunnel, IoT devices, and server placement.

View Image

Enterprise GRC Transformation & Risk Reduction Program

300+ Employees – Financial Sector

Oct 2025 – Jan 2026Fiverr

A 4-month GRC project for a 300+ person financial firm. Work covered risk identification, impact review, and policy redesign. All outputs were built to meet regulatory requirements.

Deployment Highlights

  • Risk workshops and structured risk register
  • 5×5 risk matrix model
  • Executive heat maps for exposure and residual risk
  • Core governance and security policy redesign
  • Control ownership with RACI model
  • ISO 27001 / NIST control alignment
  • Measurable reduction in critical risk exposure
  • Improved audit readiness and policy enforceability
GRCISO 27001NISTRisk ManagementRisk RegisterRACIPolicy FrameworkAudit Readiness

Documentation

Anonymized Enterprise GRC Transformation Report

Anonymized 4-month GRC project for a financial services firm. Includes risk assessment, heat maps, control gaps, policy redesign, RACI model, and mitigation roadmap.

View PDF

Project Butler – F&B Systems Optimization

Regency Casino Thessaloniki

Oct 2024 – Jan 2025Regency Casino Thessaloniki

Led Project Butler at Regency Casino Thessaloniki. The goal was to improve Food & Beverage operations through better technology. The project was delivered on time at 100% completion.

Deployment Highlights

  • Built a business plan aligned with department needs
  • Coordinated IT, Finance, and F&B teams
  • Installed devices and printers across the department
  • Worked with Butler company on custom solutions
  • Enhanced access security and user management
  • Delivered on schedule — 100% completion
F&B SystemsProject ManagementIT InfrastructureAccess SecurityUser Management

COMMUNITY & MEMBERSHIP

Professional Memberships

Cloud Security Alliance

Corporate Member

Science & Technology

Cloud Security Alliance

Feb 2026 - Present

ISC2

Candidate

Science & Technology

ISC2

Feb 2026 - Present

CyberSecurity NonProfit (CSNP)

Member

Science & Technology

CyberSecurity NonProfit (CSNP)

Feb 2026 - Present

Chartered Institute of Information Security

Affiliate

Science & Technology

Chartered Institute of Information Security

Feb 2026 - Present

CAUSES I CARE ABOUT

Economic Empowerment
Education
Science & Technology

Speaking & Events

Webinars

Sessions where I share knowledge on cybersecurity, Microsoft 365 security architecture, and compliance frameworks.

AI & Cybersecurity

Artificial Intelligence & Cybersecurity: Threats, Defense and Regulatory Compliance

A free seminar at Edu Festival 2026. The talk covers how AI is changing cybersecurity. It looks at AI as both an attack tool and a defence tool. Key topics include the CIA Triad and the EU AI Act.

Edu Festival 2026 · ONLINEMediterranean College – School of Computing
AI / GenAIEU AI ActCIA TriadEdu Festival 2026

Download Full Resume

Complete professional profile in PDF format

Download CV (PDF)

GET IN TOUCH

Let's Connect

I'm always interested in discussing new opportunities, collaborations, or sharing insights about cybersecurity and IT infrastructure. Feel free to reach out through any of the channels below.

0/500

Dionysis (DK) Karamitopoulos

Information Security Architect & M365 Security Engineer. Specialising in Entra ID, Intune, Defender XDR, Security Architecture & ISO/IEC 27001:2022.

Based in Thessaloniki, Greece. I work with organisations across the EU on Microsoft 365 security — from IAM and endpoint protection to ISO 27001 and NIS 2 compliance.

I hold 22+ certifications across Microsoft, Cisco, Fortinet, and Google. I am a NIS 2 Directive Trained Professional (NIS2DTP) and Certified Access Management Specialist (CAMS®).

Navigation

© 2026 Dionysis Karamitopoulos. All rights reserved.