We provide IT Staff Augmentation Services!

Consulting/ Service Tech Resume

Orion, MI

SUMMARY:

Highly - qualified IT Professional immediately capable of providing exemplary technical training and perational support Demonstrated success in managing concurrent projects involving complex network operations. Brings analytical skills and leadership to deliver innovative solutions with Internal Audit activities, strategic vision, and counsel to large multi-user networking operations with attention to detail.

AREAS OF EXPERTISE:

  • Network Management
  • IT Solutions
  • Installation, Test & Repair
  • Security Operations
  • Healthcare IT
  • Training & Support
  • System Maintenance
  • Vulnerability Protection
  • Data Recovery
  • Internal Audit

TECHNICAL EXPERTISE:

  • Cisco Unified Wireless Site
  • NSA 4011 Security Check Point
  • Cisco CCNA Cisco Wireless
  • Cisco VOIP

PROFESSIONAL EXPERIENCE:

Confidential, Orion, MI

Consulting/ service tech

Responsibilities:

  • Technical site surveys to determine structural and technical requirements.
  • Wireless setup
  • Diagnose, troubleshoots and resolves hardware, software, or other network and system problems, and replaces defective components.
  • Diagnose security anti­virus solution for less vulnerabilities.

Confidential, Memphis, TN

Proposal Writer

Responsibilities:

  • Research information for proposal
  • Writing proposals
  • Adding documents to repository
  • Coordinated team meetings for brainstorming sessions
  • Stay current with industry trends relating to information security
  • Sarbanes Oxley, HIPPA, GBL Act
  • Incident Management Processes
  • Incident Response Team
  • Disaster Recovery Management for Security Operations
  • Update Standard Operating Procedure, MOU information security compliance
  • Newt, Tolz scanner, SIEM
  • Ability to influence Directors, CIO and supervisions in meeting which concern technical decisions.
  • (SME) Subject Matter Expert in IT Security, (e.g., Threats & Vulnerabilities)
  • (SME) with monitoring/Profiling tools (i.e., Tolz, Newt, wire-shark, snort)
  • Ability to develop security protection, policies, procedures for process, Improvement by Harden the system and upgrading network printer.
  • Framework (ISO Audit, HIPPA, SOX)
  • Revised (SOP) Standard Operation Procedures and Policies
  • Assist with the development, maintenance of, and training on technical documentation and Standard Operating Procedures (SOP)
  • 7 years of Cyber Security experience, working in a SOC or CIRT environment
  • Technical proficiency in security event logging, network communication, Window system administration
  • Technical proficiency in malware analysis, application security, Desktop Hardware Cyber Security proficient knowledge of information security systems such as firewall, IDS/IPS, ESA, router/switch analysts identify and evaluate security gaps, and help to create and implement sound security solutions application security testing or security integrations with Systems Development Lifecycle (SDL) )
  • Infrastructure security; (i.e.- securing networks and servers or security monitoring) Identity and access management; (i.e. authentication methods, or provisioning, or entitlement management)
  • Data security or encryption Key responsibilities include: • Implementation of identity management solutions and risk mitigation “Single Sign-on or Two Factor Sign on” Preferred technology experience in the following: Identity & Access Manager -CA Identity Manager- Identity & Access Manager
  • Performing risk assessment, threat analysis, and vulnerability assessment
  • Establishing data protection requirements and strategies with port security.
  • Developing information security policy, controls and standards
  • Conducting security penetration testing
  • Conducting benchmarking and metrics activities
  • Administer information security controls and software such as endpoint protection, endpoint detection and response, intrusion detection/prevention (IDS/IPS), security incident and event management (SIEM), data loss prevention (DLP), and physical security systems

Confidential, Orion, MI

GMIT Security Architect

Responsibilities:

  • Architecture and Design Network systems
  • Cisco Hardware, Software and Cisco IOS
  • GMIT Incident Management Processes
  • Day to Day Monitoring of GM (IT) Information Technology system according to the NIST
  • Cisco Layer 3 and Layer 2 troubleshooting on 3750 and 4500 Layer 2/3 Cisco interface switches.
  • Identify security issues and risks, and develop mitigation plans
  • Implement security measures to safeguard information systems assets against accidental or unauthorized modification, destruction, or disclosure to protect the business interest of the corporation.
  • Stay current with industry trends relating to information security
  • (SME) with monitoring/Profiling tools (ie., NIMI systems, Encase, wireshark, snort)
  • (SOC) Security Operations Center Monitoring ad­hoc wireless system, NIMI system
  • Sarbanes­Oxley, HIPPA Training and NIST
  • Incident Response Team
  • Disaster Recovery Management
  • Auditing of IT systems
  • Demonstrated ability to monitor, review, report, and enforce security policies and procedures
  • Demonstrated ability to communicate to all level of management in written and verbal form
  • Improve the system by upgrading from 3750 switches to 4500 switches for scalability
  • Replace 3750 switches for Blades on 4500 switches for scalability therefore help with space on T/C.
  • Knowledge of cloud technologies
  • Ability to guide and coach business partner groups on application systems activities. Conduct Security Awareness sessions with business partners
  • Attention to Detail - Is thorough when performing work and conscientious about attending to detail
  • Oral and written Communication
  • Problem Solving - Identifies problems; determines accuracy and relevance of information; uses sound judgment to generate and evaluate alternatives, and to make recommendations.
  • Public Key Infrastructure (PKI)

Confidential, Auburn Hills, MI

Security Specialist & Adjunct Professor

Responsibilities:

  • Penetration testing
  • Incident Response Procedures
  • Security Management (SIEM)
  • Identify security issues and risks, and develop mitigation plans
  • Stay current with industry trends relating to information security
  • Lead IT Team
  • IT Auditing
  • Technical Knowledge of Base Articles
  • Oral and Written Communication Skills

Confidential, Auburn Hills, MI

Information Tech Work-Study Student

Responsibilities:

  • Penetration testing of Security Operations
  • Incident Response Procedures
  • Security Management (SIEM) for Security Operations
  • Identify security issues and risks, and develop mitigation plans for (SOC) Security Operations Center
  • Stay current with industry trends relating to information security
  • Problem Solving - Identifies problems; determines accuracy and relevance of information; uses sound judgment to generate and evaluate alternatives, and to make recommendations.
  • Public Key Infrastructure (PKI)

Confidential, Orion, MI

Computer Services Technician

Responsibilities:

  • Technical site surveys to determine structural and technical requirements.
  • Wireless setup
  • Diagnose, troubleshoots and resolves hardware, software, or other network and system problems, and replaces defective components.
  • Diagnose security anti­virus solution for less vulnerabilities.

Confidential, Madison Heights, MI

Help Desk Support

Responsibilities:

  • Customer Service Representative
  • Inventory control
  • Parts Control
  • Help Desk Support
  • Work Proactively with pump and motors

Hire Now