Resume
Network Security Application, EngineeR
SUMMARY:
- My standard priority and duty is implementation, deployment of best practice of usability Human - Computer Interaction (HCI), authority guidelines, authorization and communication guidelines, case study phishing warnings, advanced malware, Social Engineering, WAF Testing Framework,DDOS attackstyle which is Smurfs/Teardrops/Ping of Death, the attacks from Confidential connection or for load balancing to take down machine, volumetric attacks using bandwidth, pieces of packets from Confidential or UDP, Applications attacks generating low traffic on victim machine, digital attacks map,SQL injection, scripting, PII confidentiality/integrityconduct assessment to all in and out perimeters periodically involved Compliance internal review and assess the policiescontrols to minimize those risks, ensure unauthorized access create backdoor and by past Firewall, design methodologies, SSL warnings, advanced evasion techniques, cryptography, infrastructure of security of cloud computing, Red Hat dual stack IPv4/IPv6, Practice Business Intelligence BIBig Data, mental model, fraud investigation life cycle, forensics, securing privileged accounts is one of the most important aspects, including plan organize, acquire and implement, deliver and support, monitor and evaluate, business relationship, including analysis on code using Black Duck, Checkmarx, Veracodeto identify other code like cross-site scripting, SQL Injection, XHTML, and other code, identity access management, identify treats, remediation, risk management, vulnerability scanning, penetration testing, implement policy of protecting cardholder data and complying with MetricStream, PCI DSS, COBIT, NERC CIP, ISO27002, HIPAA, GLBA, SOX, FISMA. Define regulations on required compliant and enforce policy.
- Infrastructure, Architect,Design, Administering, Management Remotely (PRTG, Remote Desktop Connection, Zendesk Ticketing Dashboard, Tortoise SVN Automation Software Developer Access and Provided Tier 1-3 Firewalls, E-Commerce, Access Point AP WiFi, Cloud Computing, WLAN, Teleconferencing, support from working on Central Office (CO), NOC Center, Aerial, Data Center, and Customer Premises. Remotely or Onsite with Federal, Local Gov. Utilities, Healthcare, Unified School District, & Small to Mid-Sized Businesses. Use Monitoring Tools from QRadar SIEM, McAfee VSE 7.0 to 8.7i,VSES 1.0 ePO SIEM/Nitro, HP ArcSight, RSA Token Authentication Implementation Process 8.1.
- Configuration and Deployed WAF Testing Framework software is deployed as a GUI application on Windows launch the executable, Setup Scan Target Host, Confidential Port such as 80 or 8080, Advanced Setting such as Output Report, Block Pattern File, Recording Folder, Read Timeout.Implementation, Configuration, Deployment, Managing, and Administering of Identity Access Management IAM create Multi-Factor Authentication, Manage User Credentials, Manage Permissions, Manage Federation, Manage Roles, Manage Users, Utilized Linux to create directories and completed with Red HatFirewallD implementation and deployment with IPtablev4 and IPtablev6,Implementation and Deployment Dual Stack for IPv4 and IPv6, some Unix shell &directory scripting, and Hadoop.
- Utilized TCP/IP protocols while working with LTE, CDMA, GSM, LAN/WAN, IPv6, QIP IPAM, eLTE Wireless, Cellular wireless networks,, and to create command lines for programming CiscoNessus 7k/1k, Juniper, and Huawei routers.
- Configured,load balancing or distribution implemented, troubleshootingF5, Peplink, Arista, Arista, Load Balance Capsula, Cisco ASA, Fortinet, and Checkpoint firewalls as needed.Create a pool, the BIG-IP system automatically assigns a group of default settings to that pool and its members. You can retain these default settings or modify them. Also, you can modify the settings at a later time, after you have created the pool.Set the Quality of Service or Type of Service level within a packet, Specify a load balancing algorithm for a pool.
- Managed up to 500 Access Point Load Balancing on Site to Site VPN Bonding with Hybrid MPLS, Multiple SSID’s MPLS, WLAN Deployment, WAN Dependency & Bandwidth, WAN Flexibility and Cost Reduction, Mobile Smart-devices, Mobile/3G/4G Bandwidth Bonding will enable next - generation video apps.
- Managed, Deployed, Administering, Implementation, and TroubleshootingSaaS account and protected against intrusion while working with large enterprises by utilizing Bluecoat Proxy, HP Tipping Point, ZCaler, Sophos, Webroot, AVG, Symantec, McAfee, GFI Vipre, IBM QRadar SIEM, Bit9 Carbon Black, Archsight, Bitdefender, Eset, Kaspersky, CyberArk, Emsisoft, Centurion Technologies, Checkpoint, Fishnet Security, Huawei Data Center UTM Firewall, Ping Identity, Packet Trap, Qualys, DELLSonicWall, Quest, Trace Security, Rapid Fire, Solarwinds, Smoothwall, SonicWall, Splunk, Fireye, and Lumension,, McAfee VSE 7.0 to 8.7i, VSES 1.0 ePO SIEM/Nitro, and Amazon Web Services (AWS).
- Created and maintained various VPNs, including site-to-site and remote Nortel, ADTRAN, Cisco, Fortinet, Huawei, VPNs, and configured Checkpoint, Cisco, and Juniper SX/MX Firewall through the VPN.
- Installed and configured VoIP, Security Management, for Cisco, ADTRAN,att, NEC, Avaya, IBM, Polycom,Peplink, Juniper Networks, Alcatel, Aruba, Aeronhive, Ruckus, Airtight Networks, Firetide, Huawei AR/G3 Router Next Generation Routing & Gateway, routers/switches/firewall/IPS/IDS/Unified Threat Management UTM/SIEM/Cloud Antivirus/Identify
- Users/Identify Content/Identify Applications/URL Filtering/Visibility/Control/Performance/Flexibility/Reliability Scalability/Manageability, with and troubleshot switched and hubs.
- Remote access configuration, troubleshooting, and resolving user issues giving physical or phone support to meet the end users need, create/develop SMS to each individual systems to easily identify need to respond ASAP for worsen repair.
- Global Assessment Process on HIPAA, SOX,COBIT, PCI-DSS,NERC CIP, ISO 27001, SSAE 16, FISMA, and others
- Compliance for individual company.Global Assessment for Backup Disaster Recovery and Update remotely all necessary files, folders, contacts, defined Security Policies, Audit Data, Defined Recovery Objective, Network Access Control (NAC)troubleshooting access control lists (ACLs) like Standard IP Access Lists, Extended IP Access Lists, Standard IPX Access lists, Extended IPX Access Lists, IPX SAP Filters, Idefined deployment plan as well as a Network Access Control (NAC) policy in place, process used to authenticate a laptop or desktop computer or devices to make sure NAC client provides the user’s credentials to the NAC server for authentication. Focus learning more about building & designing IPv6, Big
- Data, Confidentially/Integrity/and Availability (CIA) Alteration offiles & Folders or Data Breach, APT-Ware Vector Rootkits
- Plugin (AKA the Mask) like DuQu, Flame, &Stuxnet Malware, concentrate on DDoS Architecture mitigation attack from
- Smurfs, Teardrops, Ping of Death methods. OpenSSL, Encryptions, cookies.
- Breakfix Manufacture Hardware/Software Lenovo, HP, DELL, SHARP, SONY Viao, Samsung, Client Computer.
- Using variety intrusion detection networks tool such as Blitzblank, Emsisoft, Wireshark, Systernal Commander, HDICMetasploit,NMap, IBM ORadar SIEM/Netcool, Black Duck, Checkmarx, Veracode, NetScout Onfinistream, CiscoSecure
- ACS, Burp, Netflow, Cisco SwitchesNessus 7k/5/1k, NMap, Risk IO Scanning, Qualys Scanning, Checkpoint Assessment
TECHNICAL SKILLS:
Tools: Faronics Asset Management, Python, XHTML Code, Unix/Linux, Metasploit,PacketSniffer, Amazon Web Services(AWS).
PROFESSIONAL EXPERIENCE:
Confidential
Network Security Application Engineer
Responsibilities:
- Managed, Deployed, Administering, Implementation, and Troubleshooting SaaS account specialized in IT, Telecom, Security Reseller/Integrator/Engineer/Design/Sales & Services/IT Consultant, Hybrid Cloud Computing, Cyber Security, CCTV/IP Surveillance Cameras, POS/ATM/Digital Signage Kiosks Designer/Builder/Integrator, Telecom Network Infrastructure Cabling Central Office (CO), and Co-Location, IPv6, QIP IPAM, eLTE Wireless, Cellular wireless networks, Wireless Access Point (AP), Airtight Wireless Security IDS, Faronics Antivirus, LAN/WAN, RFID Handheld Monitoring, HID Reader Controller Proximity Access Security Door, Digital Maglocks, ID Smart Cards, Biometric, Operating Systems (OS).
- Experienced on Paloalto Firewalls and other Firewalls like SonicWall, Cisco ASA, Checkpoint, Juniper Networks are as follow configuration Implementation setting on management interface console using web interface setting up firewall defining management operation, content ID, Session, SNMP, port 25, statistic services, setting high availability (HA), setting authentication LDAP, RADIUS Server, Local User Database, configuring Kerberos (native active directory), setting up Rule Base, inline TCP-Tracking, IPS config-summarization, Firewall Policy. And many more.
- Implementation of RSA Token Authentication Process using RSA Manager 8.1 setup Authentication include setup Agent for SSL/VPN credential, and Token numbers to Key Fob, Mobile Toolbar, and On-Demand for text messaging.
- Administering, Managing, interface, implementation, threat management including analysis on code using Black Duck, Checkmarx, Veracode,McAfee VSE 8.7i, VSES 1.0 ePO SIEM/Nitro, and Amazon Web Services (AWS),QRadar SIEM, and responsible on threat analyst code, scripts, primarily do process of understand the current requirements of the businessreview the use cases using SIEM, evaluate the deployment and upgrade,design architecture. Installed appliances ISO Image, using Port Confidential 5992 - two way forServer, Confidential 16315 non-secure communication client browser, Confidential 31000 TDS (LDAP) back-end database do appliances configuration, customizationof SIEM whichcan include event sources reports, setting up alerting process of events customized new QIDs and assigned for low-level categories for mapping of SIEM variables to QRadar SIEM event components.
- Other additional task configuration such as assigning IP address and passwords etc. I also created backup restore process for file systemobjects installed product core, depot, indexes), DB2 database, stored SSH keys, Deployment Engine database, LDAP tree on TDS.
- Responsible for a daily activation for Splunk customer management, create data source other security McAfee VSE 8.7i, VSES 1.0 ePO SIEM/Nitro, and Amazon Web Services (AWS)
- QRadar SIEM, other configured single sign-on via Splunk WAF and other interface program and applications. Implementation, configuration, deployment, managing, and administering ofidentity access management IAM create Multi-Factor
- Authentication, Manage User Credentials, Manage Permissions, Manage Federation, Manage Roles
- Manage Users, create password policy such as required at least one uppercase/lowercaseLetter/required number/required alphanumeric character/allow users to change their password/enable password expiration(in days)/prevent passwordreuse/number of passwords to remember/password expiration required administrator reset, create credential reports, identity providersactivate MFA on your root account, create individual IAM users, administer passwords, access keys,s,MFA devices for IAM users, either account owner or as a priveled IAM user. Identify Server s creating, uploading, and deleting
- Server s perquisites, install andconfigureOpenSSL, create a private key, create a signing request, submitthe CSR to a authority.DDOS attack style which is Smurfs/Teardrops/Ping of Death, the attacks from Confidential connection or for load balancing to take down machine, volumetric attacks using bandwidth, pieces of packets from Confidential or
- UDP, Applications attacks generating low traffic on victim machine, digital attacks map, SQL injection, scripting, PII confidentiality/integrity conduct assessment to all in and out perimeters periodically involved Compliance internal review and assess the policies controls to minimize those risks,Infrastructure, Architect,Design, Administering, Management Remotely
- (PRTG, Remote Desktop Connection, Zendesk Ticketing Dashboard, Tortoise SVN Automation Software Developer Access and Provided Infrastructure and Architect the Integrity the Security System and Maintainability on IT, Telecom, Security
Environment: Experience deploying and maintaining LTE, CDMA, GSM wireless networks, 3G/4G, IPv6, QIP IPAM, eLTE Wireless,Cellular wireless networks,Provided Tier 3 Firewall support for L2/L3 from implementation, configuration, SNMPIPSEC VPN, URL Filtering, Broadcast/Multicast/Anycast Concept, EIGRP, BGP, QoS, NAT Control, FIX Firewall, SSL VPN, RIP
Confidential
Responsibilities:
- Troubleshooting, OSPF Routing Protocol, VRRP Principle and Configuration, HDLC Principle and Configuration, MPLS Configuration, IPv4/IPv6 Configuration, CLI Configuration, PPP, VLAN, BGP, Cisco capture ARP’s, VPDN Tunneling IPv4, IPv6, FTP, FTTP, NTP, SNMP, Managed Centralize Firewall Policy on consolefor Recovery Point Object (RPO) to Recovery Time Object (RTO) routine.Network Access Control (NAC), troubleshooting access control lists (ACLs) like Standard IP Access Lists, Extended IP Access Lists, Standard IPX Access Lists, Extended IPX Access Lists, IPX SAP Filters, I defined deployment plan as well as a Network Access Control (NAC) policy in place, process used to authenticate a laptop or desktop computer or devices to make sure NAC client provides the user’s credentials to the NAC server for authentication.
- Responsible managing administering, configuring, implementing,Cryptographyremediation, hardening security, patching, upgrade, risk management, assessment, on single centralized console management from policy, reporting, Rule Based, Single Sign On (SSO), verify authentication with the users prior to being granted to access,deployment Endpoint Protection Antivirus,Web Filtering Malware, IPS/IDS Firewallsmake sure to update by accessing website on cryptographic privileges to accesspatching and upgrade.Setup Encryption/Decryption Email/Web Security Domain to block Hacker’s, DDOS Attack’s, NetBot remotely monitoring, SPAM, Web Filtering Malware, basically setup rules, able to flag a message as secure prevent people from sending our secure data such as SSN and credit card info. withoutit, first being securely using via SSL from different manufacturerNuvotera/SpamSoap cryptography or encryption,including analysis on code using Black DuckCheckmarx, VeracodeGFI MAX Email, Symantec email encryption, SilverSky email Encryption.
- Managed, Deployed, Administering vulnerability scanning and Anti-Virus such as Nessus, Qualys Cloud, CurrentWare, GFI Web Security LAN Guard, Symantec, McAfee VSE 8.7i, VSES 1.0 ePO SIEM/Nitro, and Amazon Web Services (AWS), Confidential SonicWall, Node32, Sophos, Fire Eye, ArchSight, Bit9 Carbon Black Eliminate the risk posed by malicious, illegal and unauthorized software., Prevent advanced threats and zero-day attacks., Provide a real-time inventory of all software applications running in your environment Alert Logic, Tipping Point, Bluecoat, Checkpoint, Imperva,IBM QRadar SIEM,Cisco ASA/Iron Port, Cisco Nessus 7k/5/1k, Fire Eye, Cyber Ark, Trace Security, platform.From services provider platform to Data Center customeri used first come first, build secured private connection data replication, secured encrypted transmission and used L2/L3 dedicated firewalls FTP, Mail, Web for customer about Identify specified types of vulnerabilities in a web application, Generate a text report indicating an attack for each identified vulnerability, Identify false positive results at an acceptably low rate, Setup filtering perimeters.
- I prepare for configuration of Blue Coat appliance serial number IP Address, IP Gateway, Subnet Mask, DNS, Setup configuration management, create the virtual appliance after I extract the OVF Template, Configure Explicit Proxy which I log in to CLIusing SSH on Putty putting Host name and IP Address on Port 22, installed 1 DLP Manager and 1 or more Inspectors, Setting up for inspection on Confidential traffic/Web traffic/Main traffic/Network Repositories, Installed MTAs to send traffic to DLP appliance and one to deliver inspected traffic to recipients, other utilized TCP/IP protocols while working with LAN/WAN, Access Point wireless (AP) controller on management console, create root name on device with IP default, create location, create node, upload created location with node add layout map, configure each AP with SSID and to create IP Address on each AP devices and the IP Gateway, implement profile name, SSID setup with analytics security mode WPA2 with 802.X setup Radius Authentication primary authenticationserver port 1812, same secondaryport number 1812, Radius Accounting port number 1813. Setup Guess Account, broadcast SSID enable, association analytics enable to give information on users, client isolation can be connected to any VLAN if needed, NAT configuration start IP address, end IP address, local IP address subnet mask, lease time, DNS Servers, setup Firewalls configuring programming CiscoAironet,CiscoNessus 7k/1k, Juniper, Peplink, Airtight Networks, Ruckus, Aruba, and Huawei Access Point AP, Routers and Switches.Configured, implemented, managed, troubleshoot Cisco ASA, Fortinet, Huawei, Peplink,Aeronhive, and Checkpoint firewalls as needed.
- Created and maintained various VPNs, including site-to-site and remote Nortel VPNs, and configured Checkpoint, Cisco, and SRX Juniper firewall through the VPN.Create dashboard and custom report for Web GUI problem because of log partition running out of space and troubleshoot this issues, Medical Telephone Nurse Call Alert, Paging Systems, Home Automations, Wireless, Voice/Data Cabling, Sales Laptop/Desktop/Servers, Manage Back Office, Business Continuity, Help Desk, Cloud Computing, IT Services Provider Worldwide, Security Scanner, and Security Persona.Always check projects what need to be done from customer’s to company clientele, contact Manufacturer, Vendors, and coordinate with clientele request to all the necessary for projects. Site Survey, job costing, attend pre-bid meeting discuss and gather all the necessary information such as drawing, print materials, design, equipment, and all the policy and legal matters.
- Administering, Managing, interface, implemented, risk manager,QRadar, HP Tipping Point, McAfee Nitro, GFI, Accelops SIEM, Alien Vault, Splunk SIEM and Other SIEM Vendor primarily do process of understand the current requirements of the business, review the use cases using SIEM, evaluate the deployment and design architecture. Installed appliances ISO Image), using Port Confidential 5992 - two way for Server, Confidential 16315 non-secure communication client browser, Confidential 31000 TDS (LDAP) back-end database do appliances configuration, customization of SIEM which can include event sources reports, setting up alerting process of events customized new QIDs and assigned for low-level categories for mapping of SIEM variables to QRadar event components.Other additional task configuration such as assigning IP address and passwords etc. I also created backup restore process for file system objects (installed product core, depot, indexes), DB2 database, stored SSH keys, Deployment Engine database, LDAP tree on TDS.Responsible for a daily activation for Splunk customer management, create data source other security SIEM, other configured single sign-on via SplunkWAF.
- Create/Design/Deploy, PCI Compliance Assessment for scanning all Internet-facing IP Address for vulnerabilities, provide physical & logical segmentation network assessment, Host, Policy, Patching, Create tracking inventory and categorize assets establishes an evaluation baseline in this way i can continue maintain database of all Internet Protocol (IP) devices attach to the network. Reading and Interpreting reports, designate level of DSS violation non-compliance reports set high level vulnerabilities for Level, Severity, and Description. Ensuring Data Integrity Security with regulatory reporting management that can be identify policies managed applications, and management platform for cloud computing structure. Sarbanes Oxley (SOX), Health Insurance Portability and Accountability Act (HIPAA), Payment Card Industry Data Security Standard (PCI DSS), and Cyber Security, machine desktop, thin client, Radius Servers, disaster recovery, SCC Storage Node & Processing node for Power and Memory.Create, implement, and deployed Single Sign On (SSO), Identity Provider (IDP), Service Provider (SP), Security Assertion Markup Language (SAML), Biometric, Multi-Factor Authentication (MFA), create tow factor identity in two ways on IDP or One Premise, using Okta, OneLogin, PingOne, (SaaS), Amazon Web Services (AWS), and One Premise with ADFS 2.0, Ping Federate.Defined Recovery Objectives first classified the Data, determined my tolerance for downtown and Data Loss. My (RPO) the tolerable period last backup & prior to failure. My (RTO) after a failure for system and Data to be Restored to the Recovery Point.Including analysis on code using Black Duck, Checkmarx, Veracode.
Environment: LAN/WAN, RFID, HID, TCP/IP, Cisco routers, Juniper routers, Huawei routers, Bluecoat proxy, Blackberry Enterprise Server, Red hat, Unix/Linux, Cisco ASA, CiscoNessus 7k/1k,Fortinet, Checkpoint
Confidential, CA
Desktop & Network Support Analyst Engineer
Responsibilities:
- Supported 1,000 or more tickets end user or clients on DELL, HP, Lenovo, Toshiba, All Plotter Printer, Scanner, IBM or Apple Operating Systems (OS), applications, security, hardware/software, Network Internet connection, WiFi, Mesh Topology, AP Wireless, all network printers with plotters, routers, troubleshoot systems, installed all printers, laptops, desktop, server, IDS, and Asset Management. Microsoft Migration Windows 7 Packages Software and Applications.
- Administering, Managing, interface, implementation, threat management McAfee VSE 8.7i, VSES 1.0 ePO SIEM/Nitro, and
- Amazon Web Services (AWS), QRadar SIEM, and responsible on threat analyst code, scripts, primarily do process of understand the current requirements of the business, review the use cases using SIEM, evaluate the deployment and upgrade,design architecture
- Configured, implemented, troubleshot Cisco ASA, Fortinet, and Checkpoint firewalls as needed.
- Build Antivirus AV protection on Servers 2000/2003/2008/2012 and deployed to all the PC clients and devices, repair BIOS, memory leak, blue screen, black screen, systems when they are hit with any virus, trojans, keylogger, worms, rootkit, spam mails, plugins, modified machine from local systems, registry, if any are founds including patching, updates, and clean data, secured all data backup, protect all Applications including all OS like Windows 3.1.1, 95, 98, ME, NT 4.0, Windows 2000, XP, Vista Operating System. Implementing configuration Windows hardware/software, diagnostic, testing, troubleshooting, Confidential computer, IBM, Sony, and Compaq, automating optimizing Windows, security access workstation users, performing systems recovery, Utilized and added to TCP/IP knowledge on a daily basis.
- Created Dashboard and Custom Report for Web GUI proble€m because of log Partition running out of space and troubleshoot issues, Firewall, mainframe, updates, imaging, data backup, protect asset tag equipment, updates SSD management asset systems, repair all tickets for clients, secured parameters, installed plotters and network them.
- Programmed, configured, and repaired for RMA, updates services desk software for change tickets acquisition for Confidential mainframe systems. Troubleshoot Applications, OS to any viruses, Trojans horse, worms, rootkits, spam, malware, IPS/IDS systems, working with all main brand PC manufacturer for repairs, testing products.
Environment: IBM OS, Apple OS, Windows 7/8, Cisco ASA, Fortinet, Checkpoint
Confidential, CA
Network Tech/Engineer
Responsibilities:
- Created and maintained various VPNs, including site-to-site and remote Nortel VPNs, and configured Checkpoint, Cisco, and Juniper firewall through the VPN.
- Implemented and maintained Fortinet as firewall security.
- Utilized TCP/IP protocols while working with LTE, CDMA, GSM, IPv6, QIP IPAM, eLTE Wireless,Cellular wireless networks,LAN/WAN, wireless networks, and to create command lines for programming Cisco routers.
- Remote access configuration, troubleshooting, and resolving user issues giving physical or phone support to meet the end users need.
- Managed, Administering, Implementation, and Troubleshooting SaaS account and setup account for users Blackberry give password, troubleshooting Platform system, secured and managed Blackberry user’s account. Network setup and installation such as Modem, IP VoIP connectivity, IP PBX system, Point of Sales (POS), remedy software repair application
- Troubleshoot LAN/WAN, upgraded PC hardware/software, Migration, PC Deployment, Wireless Access Point installed, programming, and configuration.
- Experience in setting up Microsoft DOS, Windows 95/98, NT, WIN 2K XP Workstation, Server, Operating System, MS applications, Office Suites, POP email, SMTP account, IP DNS.
- Responsible for troubleshooting and repair of switching equipment and to all hardware/software, administration access, upgrade, security, setup OS, migration, troubleshooting, repair application software, malware, firewall, IDS, and antivirus.
- Including analysis on code using Black Duck, Checkmarx, Veracode for Cross-Site SQL Injection and other code for analysis.
- Build Antivirus AV protection on Servers 2000/2003/2008/2012 and deployed to all the PC clients and devices, repair BIOS, memory leak, blue screen, black screen, systems when they are hit with any virus, trojans, keylogger, worms, rootkit, spam mails, plugins, modified machine from local systems, registry, if any are founds including patching, updates, and clean data, secured all data backup, protect all Applications including all OS like Windows 3.1.1, 95, 98, ME, NT 4.0, Windows 2000, XP, Vista Operating System. Implementing configuration Windows hardware/software, diagnostic, testing, troubleshooting, Confidential computer, IBM, Sony, and Compaq, automating optimizing Windows, security access workstation users, performing systems recovery, sales and service Repair HP, Sony, DELL, Toshiba, Compaq, Xerox, network printers, troubleshoot systems Server, laptop, desktop, wireless connection, Surveillance cameras, alarm systems, digital signage, drivers, OS, access point AP, troubleshooting systems for viruses and any malware responsible for troubleshooting and repair of Telco equipment and switching equipment which includes Nortel, Ericson, Alcatel etc.
- Administering Blackberry Enterprise Server users account configuring monitoring service to send notification messages through a messaging server within the organization, troubleshoot configuring JNDI (Java Naming and Directory Interface) delegate port to use a specific port number and open the port on the firewall by programming systems command on Administration Service instance and navigate to system.
Environment: LAN/WAN, TCP/IP, IDS, Windows 7, Cisco ASA, Cisco Nessus 7k/1k, Fortinet, Checkpoint, MS, Nortel VPN
Confidential, Merced, CA
Network Tech/Engineer
Responsibilities:
- Created and maintained site-to-site and remote various VPNs including Nortel VPNs.
- Utilized and added to TCP/IP knowledge on a daily basis.
- Worked at customer site, remote NOC center, with Quest Communications, AT&T NOC Center Services, and Vital Network Services.
- Responsible for troubleshooting and repair of switching equipment which includes Nortel, Ericson, Alcatel and to all troubleshooting network using, Ethernet crossover cable, Console cable, HyperTerminal, Solarwinds, Putty, installation, diagnostic, programming, change pin#, generate reports, Network Analyzer, Infrastructure Telecom equipment, Cisco router Catalyst 3750 switch, Adtran router 924E, MPLS, POT, LTE, CDMA, GSM.
- Administering Blackberry Enterprise Server users account configuring monitoring service to send notification messages through a messaging server within the organization
- Troubleshot and configured JNDI (Java Naming and Directory Interface), delegate port and open the port on the firewall by programming systems command on Administration Service instance and navigate to system.
- Site survey wireless access Point(AP) Cisco Aeronet, Firetide Mesh Design (AP) Hotview, Airtight (AP) Firewall security, VPN access, wireless antennae, repeaters, performing testing T1 loopback ID configuration Gateway/IP Access, DNS, DMARC circuits repair, cabling, DMZ switch, external switch, CLM switch
- Build Antivirus AV protection on Servers 2000/2003/2008/2012 and deployed to all the PC clients and devices, repair BIOS, memory leak, blue screen, black screen, systems when they are hit with any virus, trojans, keylogger, worms, rootkit, spam mails, plugins, modified machine from local systems, registry, if any are founds including patching, updates, and clean data, secured all data backup, protect all Applications including all OS like Windows 3.1.1, 95, 98, ME, NT 4.0, Windows 2000, XP, Vista Operating System. Implementing configuration Windows hardware/software, diagnostic, testing, troubleshooting, Confidential computer, IBM, Sony, and Compaq, automating optimizing Windows, security access workstation users, performing systems recovery, installed HP Server, Sun Firewall, Microwave, IP Camera, Sony camera, Acti, Axis, PBX system, VoIP, port server
Environment: Cisco routers, ADTRAN routers, Nortel VPN, TCP/IP, Sun Firewall, Cisco Aironet, Cisco Nessus 7k/1k
Confidential, Sacramento, CA
VoIP Systems/Network Tech
Responsibilities:
- Created and maintained site-to-site and remote various VPNs including Nortel VPNs, and LTE, CDMA, GSM.
- Utilized and added to TCP/IP knowledge on a daily basis.
- Installed and configured VoIP Gateway QoS (Quality of Services), SNMP, PSTN, MPLS, POTS, corporate PBX or both Cisco router, ADTRAN router, Firewall, troubleshooting, Hubs, Switches such as 2960/3560/2950/6500/ SD208P/SRW2024/Nessus 7010/750/1000/5000/5500 , configured, updates. Infrastructure Cisco systems.
- Worked with the most forms of Internet connectivity such as with Dial-up Modem, ISDN Modem, ADSL Modem, Cable Modem, LAN/WAN/MAN, Wireless, and T1T3, DS1DS3, behind a router enabling Internet connectivity even in places where there is no broadband access such as Remote
- Administering user setup account and installed IP Devices, VoIP Phones, Axxess PBX Systems, Confidential 5000 PBX Systems Phones and program systems features.
- Set up VoIP, setup wireless access connectivity in any businesses or non-business and create ISP dial up connection, wireless LAN configuring DHCP, uses WI-FI 802.11b, 802.11g, Call Center, moved phones to a new location, trained customers all the necessary information they need regarding overviews company products.
- Installed working in analyst the data, cleansing, mapping, and migration of data in the existing site system to a new systems.
- Lotus Notes, Microsoft Exchange, SQL database, responsible for data activities and for developing or completing, and documenting, migration strategy & care team repair all the necessary hardware, software, malware, drivers thru customer premises troubleshoot Operating Systems (Most Microsoft Products OS).
- Penetrate most malware and clean system, backup data, maintain data maps for TCP/IP unique business requirements develop the technical environment for cleansing of legacy system data, as needed develop requirements for load programs.
- Troubleshoot blackberry application such as messaging, video & web media.
Environment: Nortel VPNs, TCP/IP, Cisco router, ADTRAN router, IP Devices, VoIP Phones, Axxess PBX Systems, MS OS
Confidential, Rancho Cordova, CA
I&R Cable/Switch Tech
Responsibilities:
- Created and maintained site-to-site and remote various VPNs including Nortel VPNs, and LTE, CDMA, GSM, SNMP.
- Utilized and added to TCP/IP knowledge on a daily basis.
- Implemented and maintained ADTRAN, Fortinet, Cisco ASA, and Juniper as firewall security.
- Experience deploying and maintaining wireless networks, configured and implemented Cisco routers, Switches such as 2960/3560/2950/6500/ SD208P/SRW2024/Nessus 7010/750/1000/5000/5500 , configured, updates, Infrastructure Cisco systemBuild Antivirus AV protection on Servers 2000/2003/2008/2012 and deployed to all the PC clients and devices, repair BIOS, memory leak, blue screen, black screen, systems when they are hit with any virus, trojans, keylogger, worms, rootkit, spam mails, plugins, modified machine from local systems, registry, if any are founds including patching, updates, and clean data, secured all data backup, protect all Applications including all OS like Windows 3.1.1, 95, 98, ME, NT 4.0, Windows 2000, XP, Vista Operating System. Implementing configuration Windows hardware/software, diagnostic, testing, troubleshooting, Confidential computer, IBM, Sony, and Compaq, automating optimizing Windows, security access workstation users, performing systems recovery, managing network connection, cabling network with CAT-3, 4, 5, 6, 7, fiber optic, Ethernet hubs, trunkline, build or Infrastructure Voice & Data, 110 Block Installation, termination, splicing, route cables, cross-connect, DC power installation, cutover switch existing line and build a new paneling.
- Administering Blackberry Enterprise Server users account configuring monitoring service to send notification messages through a messaging server within the organization, troubleshoot configuring JNDI (Java Naming and Directory Interface) delegate port to use a specific port number and open the port on the firewall by programming systems command on Administration Service instance and navigate to system.
- Dealt with account managers, vendors, small to mid-sized business’ and customers’ warranty repair work, processed RMA return material authorization approval, set-up new contracts for a new clients, handled customer’s technical complaint/support, process development and improvement, travel to customer’s site, ATM machine repair re-configure, updates, migration, security parameters and also use Retina, Symantec, Fire Eye, GFI, McAfee, Sophos, Kaspersky, A-Square, monitor using main configuration setting by creating or editing first, set-up POS (Point of Sale) in Business Store configuring units, troubleshooting, installed. Application software Lotus Notes, repair Operating System and software from virus, spyware, trojan, bugs, malware, and other parasites.
Environment: Nortel VPN, Cisco ASA, Fortinet, Juniper Networks, Cisco routers, TCP/IP, Windows 3.1.1, 95, 98, ME, NT 4.0, Windows 2000, XP, Vista Operating Systems.