IT CONSULTANT & EDUCATOR

Bridging Technology & People

I design secure, pragmatic IT architectures and make complex topics understandable. Degree in IT Management & Education with hands-on experience in schools and enterprises.

Profile

Owner of SuDo IT-Solutions (since March 2023). One year as IT Architect in Switzerland, ~5 years as IT Consultant in a grammar school, and 4 years of commercial experience.

Security Cloud Automation Education

Services

Value-driven. Transparent. Actionable.

IT Strategy & Architecture

Target picture, reference architectures, and roadmaps that balance COST, SECURITY, and ADAPTABILITY. ISO 9001COBIT 2019DIN 69901

Cloud & Modern Workplace

Migrations, governance, and enablement — AZURE M365 ENDPOINT. ISO/IEC 27017

Security & Compliance

Risk reduction, standard alignment, and awareness — MFA HARDENING BASELINES. ISO/IEC 27001NIST CSFBSI GRUNDSCHUTZGDPR/DSGVO

Process & Automation

Lean processes & scripting — POWERSHELL BASH. ITIL 4ISO/IEC 20000-1

IT Administration & Consulting

Servers, networks, virtualization, endpoints — OPS SLA. ISO/IEC 27001ISO/IEC 27002

Network Administration

LAN, WLAN, VPN, firewalls — DESIGN OPERATIONS.

Scripting & Automation

Custom tooling to reduce toil — CI ROUTINES.

Hosting & Migration

Application & data hosting — TENANTS SERVERS.

Microsoft 365 & Google Workspace

Administration, governance, enablement — POLICIES TRAINING.

Emergency Remote Support

Rapid troubleshooting — INCIDENTS DOWNTIME↓.

Download TeamViewer Host

Monitoring & Proactive Care

RMM, patching, health checks — STABLE OPS ISO/IEC 20000

Backup & Disaster Recovery

Protect data & recover fast — DR POLICIES. ISO 22301

Unified Communications

VoIP & collaboration — POLY UNIFY.

Hardware & Device Lifecycle (BTO)

Procurement, imaging, deployment — BTO LIFECYCLE.

Vendor Partnerships

AVM PREMIUM LENOVO IDG/ISG HP POLY SANDISK UNIFY

Education & Training

Bridging technology and learning with proven pedagogy.

Education & Training

Workshops, tutoring, and programs — MEDIA PEDAGOGY INCLUSIVE.

STEM Coaching

Analytical thinking & real-world exercises — STEM PRACTICE.

Subject Areas

Math, CS, Physics, History — EXAMS CURRICULA.

Digital Literacy & Awareness

Security awareness & collaboration — SECURITY WORKFLOWS.

Custom Curricula & Workshops

Tailored learning paths with hands-on labs — OUTcomes.

Timeline & Qualifications

Milestones and certifications
Qualifications
Business Economist (in progress)
BUSINESSECONOMICS
Degree in IT Management
MANAGEMENTLEADERSHIP
Degree in Education / Pedagogy
DIDACTICSTEACHING METHODS
Degree in IT Security
SECURITYISM
Microsoft 365 Certified: Fundamentals
MICROSOFT 365CLOUD
Lenovo 360 Authorized Partner – Intelligent Devices & Infrastructure Solutions
LENOVOPARTNER
Lenovo Infrastructure Support Services Credential
INFRASTRUCTURESUPPORT
Lenovo Workstation Credential
WORKSTATIONHARDWARE
HP Business Partner
HPPARTNER
Fujitsu Business Partner (until 2024)
FUJITSUPARTNER
C++ Fundamentals with Qt
C++PROGRAMMING
Apprenticeship in Office Management
ADMINISTRATIONCOMMERCE
Selected Online Certificates
ITILINTUNEWINDOWS SERVER
Experience
IT Consultant / Head of IT
since Jan 2024
LEADERSHIPSTRATEGYCONSULTINGISO 9001COBIT 2019
Tutor & Educator — IT, Mathematics, Physics, Business
CROSS-SCHOOLDIGITAL LEARNINGEXAM COACHING
Founder & IT Architect, SuDo IT-Solutions
since Feb 2023
ARCHITECTUREENTREPRENEURSHIPTRAINING
Freelance IT Architect (Switzerland)
1 year
ARCHITECTUREPROJECTS
Team Lead IT Support, Coretek GmbH (Switzerland)
Aug – Nov 2019
TEAM LEADERSHIPREMOTE SERVICESSUPPORT
IT Consultant / System Administrator
Apr 2020 – May 2024
M365ADMINTRAININGISO/IEC 27001
Volunteer IT Administrator
since Sep 2021
WEB ADMINVOLUNTEER

Security Assessment Services

Comprehensive security evaluations for businesses and individuals

For Businesses

Comprehensive security evaluations for organizations of all sizes:

  • Infrastructure vulnerability assessment
  • Policy and compliance gap analysis
  • Employee security awareness evaluation
  • Incident response readiness assessment
  • Detailed report with actionable recommendations

For Individuals

Personalized security guidance for home users:

  • Home network security evaluation
  • Device security configuration review
  • Privacy and data protection assessment
  • Online account security check
  • Personal cybersecurity best practices

Sample Projects

Problem → Solution → Result

SMB Cloud Migration

Legacy analysis, security baseline, migration plan. Result: fewer outages, more transparency.

School Security Hardening

Patch mgmt, rights model, MFA rollout. Result: reduced risk & clear roles.

Process Automation

Scripted recurring tasks. Result: hours saved weekly, fewer errors.

Customer Reviews

Trusted by professionals and private clients alike
★★★★★
5.0 / 5.0
Based on 4 verified Google reviews

"Outstanding service, fast support and very knowledgeable in IT & Security."

See all reviews
★★★★☆
4.0 / 5.0
Based on 4 Trustpilot reviews

"Reliable partner for businesses – pragmatic solutions that actually work."

See all reviews

Booking & Pricing

Transparent. Flexible. Client-focused.

Business Security Assessment

€499one-time
  • Comprehensive infrastructure analysis
  • Policy and compliance review
  • Detailed report with recommendations
  • 1-hour consultation to discuss findings

Home Security Check

€99one-time
  • Home network security evaluation
  • Device security configuration review
  • Personal cybersecurity guidance
  • 30-min follow-up consultation

Ongoing Security Monitoring

€149/month
  • Continuous vulnerability monitoring
  • Monthly security reports
  • Quarterly policy reviews
  • Priority incident response

Architecture Review

2-hour deep dive into your current setup with a concise roadmap.

  • Reference architecture fit
  • Risk & cost trade-offs
  • Priority backlog

IT Management Coaching

One-on-one mentoring for new IT leads and aspiring managers.

  • Metrics & service design
  • Governance & processes
  • Stakeholder communication

Cloud Readiness Workshop

Assess workloads & plan a pragmatic path to the cloud.

  • Inventory & dependencies
  • Governance & controls
  • Migrate or modernize?

Executive Briefing – AI & Security

60-minute briefing for leadership: risks, controls, and business value.

  • Threats & safeguards
  • Policy & enablement
  • Use-case shortlist

Discount Packages

Save with prepaid sessions:

  • 5 sessions → 5% off
  • 10 sessions → 10% off

Incident Response – Intro Call

Discuss preparedness and options for a light retainer.

  • Contact paths & SLAs
  • Playbooks & roles
  • Readiness checklist

Teaching Packages

Competitive, flexible, learner-first.

Teaching – Individual (1:1)

€29 per session
  • Personalized one-on-one learning
  • Flexible scheduling
  • Focus on your goals and pace

Teaching – Mini Group

€25 per person
  • Small group (2–4 participants)
  • Interactive and collaborative learning
  • Shared exercises & peer exchange

Teaching – Max Group

€15 per person
  • Group sessions with up to 10 people
  • Affordable and engaging
  • Team-oriented learning environment

Publications

Author & Instructor profiles

Amazon Author Profile

All books and formats at a glance.

Udemy Instructor Profile

Courses, ratings and updates.

Articles & Whitepapers

Short essays on education, security, and cloud governance — publishing soon.

Contact

Fast & secure ways to reach me
Direct Contact

Okan Acikel
IT Consultant & Educator
Owner — SuDo IT-Solutions

For sensitive topics, please encrypt with my PGP key below.

Imprint & Privacy

Legal information and privacy policy:

Imprint · Privacy

Secure Communication (PGP)

Use my public key to encrypt messages

Public Key

Fingerprint: B102 E1DF E10C 4442 D7B3 F8AB 1A67 4BEB 0199 E1AE

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=BGrY
-----END PGP PUBLIC KEY BLOCK-----

How to Use

  1. Copy or download the key and import it into your PGP client.
  2. Verify the fingerprint out-of-band.
  3. Encrypt your message to this key and email it to contact@okan-acikel.com.