Computer Consultant Resume
4.00/5 (Submit Your Rating)
Atlanta, GA
SUMMARY:
To obtain a position using Computer Security in Information Technology in which my leadership, dependability, productivity and ability to educate myself will allow my employer to complete projects on time within budget.
EMPLOYMENT HISTORY:
Confidential, Atlanta, GA
Computer ConsultantResponsibilities:
- Performed as paid employee when school system had funds otherwise volunteered
- Originated disaster recovery procedures with tested restore for each server include multiple backup’s offsite and onsite with a test plan for each server or application which prevented system downtime because of hardware failures
- Backup and restore data using Ubuntu 11.04 sbackup.
- Select Kinetic as on line backup tool after considering price, free trial, responses to phone information requests, PC magazine review, backup scheduling options and on line reviews of on line backup vendors for the school per management request
- Automate Unix/Linux system administration tasks using Perl
- Use O’Reilly Ubuntu Hacks and Network Security Hacks as reference for Ubuntu 11.04, Centos 6.2, Open Solaris and Red Hat
- Use the free online cloud file storage Dropbox for backup redundancy
- Use Mozilla Adblock to block advertisements and Censureblock to ban access to inappropriate sites
- Originated production implementation tasks and change management performed log
- Responded to user issues and resolve them
- Provide Windows XP system administration to prepare for school opening
- Developed single points of failure list and establish redundancy
- Create network diagram for security purposes
- Reviewed system operations and provide enhancements for best practice situation
- Conducted audit of all assets
- Review school infrastructure to be sure installed versions for security purposes are current
Confidential, Atlanta, GA
Computer Consultant
Responsibilities:
- Configured and secured Web Server running Fedora 6
- Configured Apache with least privilege, restricted file ownership and permissions, disabling unneeded accounts, functions, modules and programs, use layers of protection, and documenting all modifications
- Attend monthly technical member groups such as AUUG, ALE, GAISSA, and BDPA
- Exhibited system usage information to management by using system tools
Confidential
UNIX Administrator
Responsibilities:
- Provide leadership with Unix expertise to Confidential operations staff to ensure Unix applications availability 24/7 to Confidential users including documentation to resolve common tasks or situations
- Attend change management meetings to review proposed production chances to ensure changes will not affect the production Unix environment and present Unix OS upgrades or enhancements answering any question presented
- Evaluate and make recommendations to management regarding solutions to tighten security and increase efficiency
- Administered 15 server Unix environment with Solaris servers 2.5/2.6, HP 9/10.2/11.i, Compaq 4.0E with LVM in 24/7 site
- Upgraded Compaq/Digital server from version 4.0A to 4,0E for Y2k
- Hardened production UNIX boxes removing vulnerabilities and run only needed protocols
- Improved disaster recovery procedure (backup scripts, MC Service Guard, HP Omni back) with hard copy test plan to install Unix OS, patches, applications and databases
- Accomplished external third party storage solution running Raid 5 after research to resolve internal capacity storage problem reducing $15,000 from proposed proprietary solution
- Reduced problems for Confidential users printing required documentation from over 100 Unix printers
- Audit list of authorized users and delete unauthorized users
- Review privilege list allowing user least privileges necessary to perform job duties
- Perform SQL commands to provide information from Oracle databases for management
- Create/modify Korn, Perl or Bash scripts for system needs
- Received a bonus for 99.7 system availability to users of the production servers
- Support Oracle 8.05/8.1.7 production environment necessities
- Increased secure status of servers/network using security utilities such as netstat, pam, arpwatch, nmap, access control lists, and snort
- Issued command line Unix commands from the primary standalone server to complete tasks