FillianaCare – IT Infrastructure, System Administration & Cybersecurity Operations

FillianaCareIT_2
ClientFilliana Care G.P
SkillsIT · Cyber Security · System Administration

FillianaCare - IT Infrastructure, System Administration & Cybersecurity Operations

Project Overview

Since 2018, I have been responsible for designing, implementing, and maintaining the IT infrastructure and cybersecurity operations of FillianaCare. Beyond the corporate website, this project covers the full internal systems architecture, user management, security hardening, and continuous monitoring of both on-premise and online services.

The goal was to build a secure, scalable, and well-structured IT environment that supports daily operations while protecting sensitive company data and digital assets.

Scope of Work

  • System Administration & Infrastructure Design

  • Identity & Access Management

  • Network Security & Firewall Configuration

  • Endpoint Monitoring & Incident Response

  • Long-term IT & Security Roadmap Execution

Infrastructure & Systems Implemented

  • Windows Server Environment

    • Active Directory (AD)

    • Remote Desktop Services (RDS)

    • File Server with role-based access control

  • User & Permission Management

    • Department-based folder and file access

    • Secure authentication and controlled privileges

  • Network Security

    • Firewall configuration and custom security rules

    • Secure internal and external access policies

  • Virtualization

    • Dedicated Virtual Machine hosting Wazuh Manager

FillianacareIT_3

Cybersecurity Monitoring & Protection

  • Deployment of Wazuh Manager on a virtual machine

  • Installation of Wazuh agents on all employee endpoints

  • Centralized log collection and basic security monitoring

  • Continuous visibility into system activity and anomalies

Role & Responsibilities

  • Acting as System Administrator

  • Designing and executing IT & Security roadmaps

  • Maintaining infrastructure, users, and access policies

  • Monitoring systems and responding to security incidents

  • Supporting the company’s overall digital and online strategy

Business Value

  • Secure and organized internal IT environment

  • Protection against real-world cyber threats

  • Reduced operational risk

  • Improved visibility and control over systems and users

  • Long-term, stable IT foundation supporting business growth

Real-World Security Incident (True Case)

Approximately back in November of 2025, abnormal activity was detected targeting the company’s online services, originating from China, Singapore, and Brazil.

What Happened

  • Automated bots attempted brute-force attacks against a public service offered on the website

  • Suspicious behavior was identified through log analysis and monitoring data

Response & Resolution

  • Incident investigation using collected logs and alerts

  • Identification of the vulnerable service

  • Immediate mitigation of the vulnerability

  • Blocking of all malicious IP addresses through the Web Application Firewall (WAF)

  • Restoration of secure operation with no service disruption

This incident validated the importance of monitoring, logging, and layered security controls already in place.

Logo_Web_Embed
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.