We provide IT Staff Augmentation Services!

Customer Monitoring Outbound Resume

5.00/5 (Submit Your Rating)

MO

SUMMARY

  • Cyber Security / Certified Ethical Hacker / CEHAccomplished Information Technology professional offering experience in Software Development and IT Management.
  • Trained in Information Security (Certified Ethical Hacking - CEH) to secure hardware and software systems from computer hacker attacks, prevent network penetration and intrusions. Proven record of resolving complex technical issues. Reliably secure computer systems from threats and exploits. Test with scanning, enumeration, system hacking tools.
  • Incident or event investigation and analysis and tests security products and systems to detect security weaknesses. Assess and detect network vulnerabilities.

TECHNICAL SKILLS

  • Leadership: Project and Information Management
  • Business Management
  • Strategic Planning
  • Team Building
  • Project time proficient
  • Results oriented
  • Ability to initiate
  • Problem Solving
  • Decision maker
  • Information gathering tools
  • Metasploit Tools
  • BackTrack5 VM Ware
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Penetration Testing Methods
  • MegaPing
  • System Hacking
  • Zed Attack Proxy (ZAP)
  • Viruses and Worms
  • Sniffing
  • Acunetix WVS
  • Session Hijacking Hacking Web Applications
  • SQL Injections
  • Evading IDS
  • Firewalls and Honeypots
  • Buffer Overflow
  • IDS SET
  • Hacking Wireless Networks

PROFESSIONAL EXPERIENCE

Customer Monitoring Outbound

Confidential, MO

Responsibilities:

  • Monitored MAS system for alarm signals and respond to alarms using information provided in instruction screens.
  • Placed necessary outgoing calls to verify alarms, dispatch proper authorities, and notify responsible parties.
  • Documented alarm handling and processing in accordance with departmental procedures. Make full use of Standard Operating Procedures (SOPs)

IT Support

Confidential, Kansas City, MO

Responsibilities:

  • Tested and set-up personal computer product hardware including monitors, printers, and laptops.
  • Assessed current configurations and working statuses of hardware.

IT Manager

Confidential

Responsibilities:

  • Created and managed IT software development consulting agency to provide Government IT Services.
  • Provided IT staffing services as sub-contractor on a government contract to halp locate and hire IT contractors.
  • Hired, organized, and led a multi-discipline team of IT contractors to coordinate work efforts to build and complete a federal contractor’s project within given time constraints.
  • Delegated assignments to contractors. Supervised designs and development of client IT projects till completion.

IT Software and Database Developer

Confidential, Nashville, TN

Responsibilities:

  • Developed and maintained reports and software and databases in .NET, VB and SQL Server.
  • Developed a cost effective software application for Customer Support to extract massive merchant text data from various file formats to a datagrid and import it into databases. Teh coding process was used to solve other major data managing problems.
  • Created business management software for an electrical company to manage: employee personnel data, customer support, HR, and accounting. All applications recognized passwords and security levels.

Software Developer and Database

Confidential, Nashville, TN

Responsibilities:

  • Created an accurate way to test all VB applications before releasing to production for use.
  • Overhauled all reports created with Crystal Reports used by Claims and Accounting departments.
  • Designed, created, and maintained software applications and databases. Debugged VB code.
  • Modified, created, and supported existing stored procedures and tested SQL code.

We'd love your feedback!