We provide IT Staff Augmentation Services!

It Network Security Analyst Resume

4.00/5 (Submit Your Rating)

Palo Alto, CA

PROFESSIONAL EXPERIENCE:

Confidential, Palo Alto, CA

IT Network Security Analyst

Responsibilities:

  • Supported LAN/WAN enterprise and managed Cloud Security Identity Access Management enterprise architecture development and change policy by platform, support and testing, including: SaaS like Salesforce, Office 365, BOX, AWS, GitHub, ServiceNow, Google Apps, other Apps, SaaS, PaaS and IaaS.
  • Focus on business based 360 degree approach for risk tolerance review, business impact and risk analysis, recommend mitigation strategy, develop standards and policies, validate governance compliance, test plans breach response and audit prep for company documentations.
  • Implemented master policy rules for inactive or exceptions the user account, password management, session management, created exception to privileged access workflows or if require a user a dual control password access approval on any like devices, operating systems, routers, switches, remote access using SSH, window domain account, data entries, and define password vault manager, such as create data source support backend from database, including all the devices that correlates to SIEM and Splunk like Checkpoint, Juniper Networks, Palo Alto Networks, Cisco ASA, etc.
  • Skyfence supported data entry for web application credentials, web browser credentials
  • Credential connecting devices, public key, structured/unstructured data, protecting access privileges to documents, create uses cases for new policy, remediation process included coordinating Salesforce, BOX, and other App admin and employees
  • Responses to all the incident and remediation process, investigate the user IP/login credential download/upload/tampering to any documents applications, violation on shared folders, usages, provide deep analysis about users behavior, create granular security access rules in one policy using tool like Netskope configured Netskope installed with Add - On to Enpoint so that Netskope stir from any Enpoint proxy server and I can performed my deep analysis the behavior realtime, monitor usages any Cloud Apps that don’t need too much policy and can be use only one policy to all Apps. Enforce security policy in one paint glass and then the traffic will go back to to the SaaS Application with user using SSO validation from Active Directory Managed CMS Salesforce enforce policy to all administrators working side by side including investigate or searching possible anomaly using Splunk, Elasticsearch, Websence DLP, DeviceLock DLP, Adallom, Okta MFA, Siteminder SSO, Skyfence, Netskope, Sumo Logic, DeviceLock DLP, CyberEdge Risk Tool, KALI, NetCat, NMap, Wireshark, Suricata for IPS/IDS, SmoothWall Web Filtering.
  • Performed investigation by traced IP using SIEM, Elasticsearch, Splunk, Adallom, Skyfence, Ping Identity, CA SSO Siteminder, Netskope for searching/indexing data including: development for a new dashboard for IP Hopping, Brute force attack, emails user account, locate the perpetrator, records all footprint, location, IP Address, create report on evidence that can be collected.
  • GRC Model & Principles by ISO/IEC, from 2 1, 2, COBIT5 EDM/PBRM, Oracle GRC, and other GRC Compliance processes, ensure governance framework setting, metrics use cases, and maintenance, benefits delivery, risk optimization, resource optimization, stakeholder, and transparency.
  • Manage IT strategy, login to an IAM solution, adding extra claim, entitlement options, access to services, enterprises architecture, innovation, portfolio, service agreement, risk, security, suppliers, HR solutions identification/build, changes, assets, configuration, and business process.
  • Configured SSO using GUI access admin to create multi factor authentication and re-direct the URL that were to re-drect.
  • Configuration and Installation VCP-DCV, VCP-Cloud, VCP-NV, VCAP-CID, VCAP-DCD, VCIX-NV, vCenter Log Insight, how to send ESXi logs to it, how to send other syslogs to it, how to navigate and use it, perform advanced configuration, consolidate logs, prevent data loss, identity trends, correlate data with VC Ops, security compliance, troubleshooting, deployment virtual appliance by default VA 3 VMDKs if needed expansion storage, configuration time service (NTP), configuration SMTP Server, configuration archieving, access local SSH setting network from IP address/net mask/gateway, create sharing content Packs with log insight, analysis process ESXi host error, iSCSI/SCSI and NFS error, max latency over time, vCenter Alarms and Events, create alerts for virtual infrastructure for any outages, integrated log Insight with vCenter Operations, leverage log Insight for all devices in the DC so I can complete the picture, configuration Windows 2012 Server for Log Insight, configuring Syslog on a Synology NAS for Log Insight.
  • Splunk Development for Dashboard, Indexing, Searching, Create Query for use cases, notification categorize event types, source types, search processing language (SPL), time chart command, visualizations, pivot, create per index reports, add data into Splunk setting local event logs, remote event logs, files & directories, configure network port for TCP/UDP, collect local performance monitoring from all the machine, collect performance monitoring hosts, check asset investigator for all the authentication, threat list activity IDS attacks, malware attacks, notable events, all changes, input settings parameters, app context configuration rules, indexes each event receives a host value defined using regular expression, index data using sandbox configure data source type. Configuring Palo Alto Networks Firewall uses udp/514 for syslog by default, port udp/514. Create setting on Splunk input.conf and verify that there is no other configuration using the udp or tcp port, create add-on for datasource, create types and tags, create field extractions and aliases, capture and index the data.

Confidential, San Diego, CA

Network Security Application Engineer/IAM Infrastructure Architect

Responsibilities:

  • Managed and development including administering of Identity Access Management products particular with SailPointIQ v6.4 & v7.0 Compliance management, policies identity, provisioning identity, risk identity, roles identity, tech works. Responsible on entire process with compliance dashboard, progress reports, motivation required, access review over all, show auditor in place the necessary information need for audit invoke evidenced reports, explained them, provide evidence that those controls as intended. Managed to defined types of policies create Separation of Policy SOD for admin to payroll conflict, edit SOD rule for Mac/Windows/Unix/Red Hat Linux (OS), SSH, Apps, Servers, Devices access privileged.
  • Development, Design Hardening Hardware/Software requirements for the Installation process from hardening the hardware sizing recommended footprint, setup the installation application server host which are servers that run IdentityIQ inside a J2EE application server, also installation of relational database server 4, 8, core hosts can be install defends on sizes that house IdentityIQ’s back-end Relational database also. Connect networks all the necessary cables together be sure to be supported by IdentityIQ Platform matrix to insure the Deployment, Implementation a complete Solution for IdentityIQ Infrastructure from SailPoint.
  • Lay out Diagram Illustrates a Typical IdentityIQ installation can provide drawing if necessary design for primary data center from “Application Server End User” in Green, “Application Server to DB” in Blue, “Application Server to Managed Systems” in Orange. Followed guideline from SPECjbb2013, SPECjbb2005, SPECjbb2000 for common benchmark used to evaluate the performance of this particular processor 8 for Java applications. Used diagnostic tool for IdentityIQ for interpret IIQ DB performance status, database performance test. Use Java System Properties to deployed typical Server Roles which is UI/Presentation Servers and Batch and Task Servers This types use advances in the multi-threading capabilities between the 6.2 and 6.4 Release Versions. I used minimum of 4GB RAM Dedicated for AppServer JVM Heap depend larger numbers of roles. If Tuning needed I varied based on the version of Java in use ex. (JRockit vs. Oracle/Sun vs. IBM) and Sevlet container technology in use (Tomcat vs. WebSphere vs. WebLogic). I consult the documentation FOR MY SPECIFIC VERSION OF Java and my specific Servlet container to find setting appropriate for my environment. Con Apps, GoToMeeting, Jive, Microsoft exchange online, Microsoft figuring IAM Solution Modules from compliance manager to access certifications, policy management audit reporting, Life Cycle Manager from access request provisioning, password management. Configuring Unified Governance Platform and build it for Policy Model, Role Model, Identity Warehouse, Workflow Engine, Risk Model, Analytics, Integration Modules for 3rd Party Provisioning, IT Service Management, Mobile Device Management, IT Security and this is for using Connector from Database such as IBM DB2 for Windows, JDBC, Microsoft SQL Server, Oracle DB, Sybase DB, Directories LDAP, Active Directories AD, Lotus Notes, Novel eDirectory, Open LDAP, Oracle Internet Directory, Red Hat Directory Server, Sun Java Directory, IBM Tivoli Directory Server, Enterprise Vertical Applications, Epic, Cerner, GE Centricity, Oracle Applications Oracle E-Business Suite, Oracle HRMS, PeopleSoft HRMS, People Tools Remedy AR Systems, SAP HR, SAP Solutions, Siebel, SaaS Connectors, Amazon Web Services IAM, Box.Net, DUO, Google Apps, NetSuite, Rally, Salesforce, ServiceNow, WebEx, Workday, Yummer, Operating Systems AIX, IBM-iSeries (AS/400), Red Hat Enterprise Server SUSE Linux Enterprise Solaris, Unix, Windows Server, Mainframe Security Facilities like CA-ACF2, CA-TOP Secret Generic Mainframe, RACF. Governance Connectors from Open VMS, BEA ALES, Yammer, Delimited File, LDIF, Rule-Based XML, Provisioning Integration Modules like BMC Identity Manager, IBM Tivoli Directory Integrator, IBM Tivoli Identity Manager, Microsoft Forefront Identity Manager, Novell Identity Manager, Oracle Identity Manager, Oracle Waveset (Sun Identity Manager), Service Desk Integration Modules like BMC Remedy, ServiceNow, HP Service Manager, IT Security Integration Modules Connector like HP ArcSight, Bit9 Carbon Black, IBM QRadar SIEM, CyberArk, Lieberman Software, McAfee ePO SIEM. Activity Collectors like Flat file, Mainframe SMF, StealthBits, Windows Event Logs, UNIX Syslog. IdentityIQ Connector Factory.
  • Configuring JVM, JVM Garbage Collection (GC) Policy, Virtualized Application Server Hosts, Heap and Permanent Generation Space, Memory Assignment Dedicated and not Shared, Virtual CPU Assignment is full Ghz, Network Interface Dedicated for IdentityIQ (1G or better), Memory Ballooning configured using ESX Server coaxing the Guest OS into cooperating with it when possible and large pages administrative action that has to be Enabled “Server Wide” on the application server’s host operating system. I access the Root level on my SailPoint professional services and create scripts that automates and enable this feature using Linux Server Scripts which is Identity the amount of RAM on the host or virtual machine. Multiply the amount of RAM by 0.8 to find the amount available for use by huge pages. Divide the RAM for huge pages by 2048 to find the page count of the number of larges to reserve. See if a “hugetbl”group exists, if not create one and find its GID. Create a /mnt/hugepages mount to allow mmap() access to huge pages. Populate the /etc/sysctl.conf with the following parameters: kernel.shmmax, kernel.shmall, vm.nr hugespages, vm.hugetlb shm group. Add root, apache, spadmin, sailpoint, mysql users to the ‘hugetlb’ group. Some of these users may not existto the environment but this is the way should the script. Edit /etc/security/limits.conf to follow all those users huge tables access. Apply the config patch a Tomcat/JBoss/etc. for large pages. An example that would apply to Tomcat’s configuration. Configuration of Windows Local Policy set for Lock Pages in Memory.
  • IdentityIQ configuration and deployment uses Regular Purging of Operation Records, Dedicated Application Servers, Dedicated Host(s) for UI and Tasks, Identify Refresh Task(s) threads adjusted that support partitioning 6.2 and newer release from performance benefits.
  • Use “Partitioned” Account Aggregation for Connectors that Natively support it and use like for Search and Query. This Optimize Re-Aggregation is an Options after my initial Deployment is done and production Server is online, this should be checked for every account aggregation that is performed on a regular basis. This optimization checkbox skips processing the some internal logic and the correlation logic for accounts that have not changed in the data feeds coming from the remote system. It also prevents unnecessary commit from being made to the database backend for IdentityIQ. This accelerates greatly the process of account aggregation because less work is done for accounts that have not changed. Note on this if none of the fields from the remote system have changed since the last aggregation then any modifications to correlation rules or correlation mappings or Identity correlation workflows then you should not check this out. If you have modified the new correlation logic, then you should run a full account aggregation, without optimization, to ensure that your new correlation logic is applied correctly. Once your correlation logic modification is applied correctly, you can re-check this option and resume using optimized aggregation s to reduce aggregation runtimes this is recommended to all connectors that do not natively support portioning. Disable Unnecessary Task Options because not all of these options are needed on every employment. Including Policies, Risk Scorecards, Identity Histories, Process LCM Events, Etc. Never check “Refresh all application account attributes” option, Place policy evaluations into their own dedicated refresh task, Place Risk calculations into their own dedicated refresh task, Place Events that launch Workflows (joiner, leaver) into their own dedicated refresh task, Place automated role assignment, detection, and attribute promotion into its own task, Create dedicated Identity Refresh Tasks for sub-sets of the user base than require more frequent scrutiny or review of their risk, Place provisioning items (like Provisioning Assignments) into its own dedicated refresh task. Set Values for Days before snapshot deletion via Rules but not searchable through any specific user interface.
  • Used SunSpider Benchmark Performance for evaluation JavaScripts performance and monitoring Browser application software. If end-user complaints about performance of IdentityIQ from workstations troubsleshooting using the SunSpider 1.0.2 benchmark for all the verification of their local browser like Firefox or Internet Explorer and run the test against to the URL provided. Latency of 1000ms or lower between client and IdentityIQ could be modem broadband requirements when browser communicate with the application server. IdentityIQ at least 128kbps of bandwidth for end-user browser connecting application server.
  • Based 10 approach design the from IdentityIQ access request management, Roles, UAR/Cert, Policies, Managed Entitlements, Provisioning Policies, Event Triggers, Tomcat, MySQL, Data Collectors, Provisioning Engine, RACF Export, SAP Simulator, Active Directory AD, Integration Excecutor, Email Ticketing, Design Workflow The Actors across various flows Compliance Officer to Line Manager, Workgroup Accounting Manager Group, ERP Owners Group, Active Directory Application Owner, AR Accountant.
  • Splunk Development for Dashboard, Indexing, Searching, Create Query for use cases, notification categorize event types, source types, search processing language (SPL), time chart command, visualizations, pivot, create per index reports, add data into Splunk setting local event logs, remote event logs, files & directories, configure network port for TCP/UDP, collect local performance monitoring from all the machine, collect performance monitoring hosts, check asset investigator for all the authentication, threat list activity IDS attacks, malware attacks, notable events, all changes, input settings parameters, app context configuration rules, indexes each event receives a host value defined using regular expression, index data using sandbox configure data source type. Configuring Palo Alto Networks Firewall uses udp/514 for syslog by default, port udp/514. Create setting on Splunk input.conf and verify that there is no other configuration using the udp or tcp port, create add-on for datasource, create types and tags, create field extractions and aliases, capture and index the data.
  • Create a method types of provisioning which is based on access request and workflow to user account profile and also hiring someone can be automate, verify first Open LDAP and Active Directory AD,
  • Specialized in IT, Telecom, Integrator/Engineer/Design/Services/IT Consultant, Hybrid Cloud Computing, CCTV/IP Surveillance Cameras, POS/ATM/Digital Signage Kiosks, Infrastructure Cabling Central Office (CO), Wireless Access Point (AP), Airtight Wireless Security IPS/IDS, LAN/WAN, RFID, HID Reader Controller Proximity Access Security Door, ID Smart Cards, and Biometric.
  • Develop and create Proxy Server on the cloud using AWS EC2, Server 2003, 2008, 2012 automation Ruby SDK v2, RDS, ELB, Round53/S3, ElasticCache, EMR, Glacier, IAM, Import/Export Snowball, Redhift, RDS, OpsWorks, SES, VPC, WAF, Kinesis, Lambda, Trusted Advisor, Service Catalog, Storage Gateway, Elastic Beanstalk, Elastic File System, API Gateway, Cloud Formation, CodeDeploy, CodePipeline, Cognito, Data Pipeline, AppStream, AWS IoT, Directory Service, DynamoDB, CloudWatch, Mobile Hub, Mobile Analytics, Machine Learning, Red Hat, and other cloud based service such as multi factor authentication process MFA, including SaaS Apps.
  • Configuration and Installation VCP-DCV, VCP-Cloud, VCP-NV, VCAP-CID, VCAP-DCD, VCIX-NV, vCenter Log Insight, how to send ESXi logs to it, how to send other syslogs to it, how to navigate and use it, perform advanced configuration, consolidate logs, prevent data loss, identity trends, correlate data with VC Ops, security compliance, troubleshooting, deployment virtual appliance by default VA 3 VMDKs if needed expansion storage, configuration time service (NTP), configuration SMTP Server, configuration archieving, access local SSH setting network from IP address/net mask/gateway, create sharing content Packs with log insight, analysis process ESXi host error, iSCSI/SCSI and NFS error, max latency over time, vCenter Alarms and Events, create alerts for virtual infrastructure for any outages, integrated log Insight with vCenter Operations, leverage log Insight for all devices in the DC so I can complete the picture, configuration Windows 2012 Server for Log Insight, configuring Syslog on a Synology NAS for Log Insight. vSphere 5 installation, configuration virtualization hypervisor ESXi Server type 1 hypervisor, and managed the entire console for configuration vSphere client and administration inventory, management solutions applications, any plugins, events, controls ESXi HA/DRS Cluster.
  • Managed K1000/K2000 Management Appliance Dashboard, Label from LDAP Active Directory, LDAP Browser, Label from Apps/OS/Server/Java JRE updates patching/LDAP user, admins, global, Snagit All versions, LDAP Cloud NAT, Inventory from devices/software/software catalog/license compliance/processs/ startup programs/services/discovery schedules/discovery results/SNMP inventory configurations, monitoring devices/monitoring devices/alerts/profiles/maintenance Windows/log enablement packages, Assets/asset types/import types, Distribution managed installations/file synchronizations/ Wake-on-LAN/replication/alerts, Scripting OS like Microsoft Windows/Mac OS X/Linux/run managed label associated deploy devices/repair scripting logs or search scripting logs/configuration policies like automatic updates/desktop wallpaper/event log reporter/active directory/power management/MSI installer/registry/remote desktop control troubleshooter/UltraVNC/Uninstaller, Security policy IE/XP SP3 Firewall/McAfee Antivirus/McAfee SuperDAT/Symantec Antivirus/Parental Controls/Security Policies/Mac Profiles, Security Patch Management/OVAL Scan/SCAP Scan/DELL Updates/Reports/Notifications/Control Panel Settings users/credential/roles
  • Maintain upgrading, and troubleshooting 12.4s SSL connection due to ADX 12.3 platform not to use the SSLv3 and fixed this using rconsole virtual and using command for disable/able SSL2/SSL3 within the SSL profile. Configured Brocade ADX SSL/TLS implementation of 12.4t or 12.5.02e, create key pair/CSR, transferring certificate/keys, configured either SSL Termination at the loadbalancer or SSL Proxy Brocade ADX to allowing encryption/decryption and re-encrypt. Configuring Policy-Based Server for load balancing (PB-SLB) for distribute traffic on the source IP address of the client., troubleshooting ADX Packet Capture Debug filter mode/Buffer Attributes/Configure filters, Working with ADX High Availability for SYM active standby priority/track-priority define value when configuring VRID for backup. Other job FTP, NAT Persistence, Image Upgrade, DOS protection, Port Profile, CSW Nested Rules, Content Switching Rewrite, Healthcheck Elements, Configuring a Port Policy, Configuring Primary/Backup Servers.
  • Provided Identity Access Management enterprise architecture development for policy by platform and language of business, Firewall support monitor, capture, vulnerability scanning, ethical hacking, forensic, create backdoor, remediate, multi authentication, and malware analysis Adallom, Skyfence, Netskope, Remnux, CyberEdge Risk Tool, Wireshark, Omnipeek, Puppets, Rapid7, Radware, Proof Point, SecureAuth, Voltage Security, DNS Tools, Network Analyzer, Watch Dox, Veracode, Websence Triton, Symantec DLP/Antivirus, OWASP Testing, Metasploit Pen Testing, Nikto Web Assessment Tools,
  • Utilized Linux to create directories and completed training with Red Hat.
  • Utilized TCP/IP protocols while working with LAN/WAN, wireless networks, and to create command lines for programming Cisco, Juniper, and Huawei routers.
  • Configured, implemented, troubleshoot Cisco ASA, Fortinet, Brocade, Juniper Networks, Huawei, and Checkpoint firewalls as needed.
  • Protected against intrusion while working with large enterprises by utilizing Bluecoat Proxy.
  • Created and maintained various VPNs, including site-to-site and remote Nortel VPNs, Red Hat Dual Stack IPv4/IPv6 and configured Checkpoint, Cisco, and Juniper firewall through the VPN.
  • Created/Designed/Deployed/Assessment Compliance for scanning all Internet-facing IP Address for vulnerabilities.
  • Ensured Data Integrity Security with regulatory reporting management that can be identified with policies, managed applications, GLBA, NER-CIP, SOX, HIPAA, Oracle GRC, PCI DSS, ISO- 27000/27001/27002/27003/27004/27005/27006/27011/27031/27033/27035/17799, 200000 1, 2, COBIT4/5
  • Configuration, installation, deployment, admin, managed the identity access management include Oracle, Siteminder, Okta, Ping Identity, DUO, SSO & MFA, AD, for SailPointIQ, CyberArk, LORIC, and other IAM I primarily provided Identity Access Management enterprise architecture development for policy by platform and language of business. Configuring user rights for role based access control ( Confidential ).
  • Experienced on Firewalls Cisco ASA, Websence DLP, SonicWall, Palo Alto Networks, Sourcefire, Checkpoint, Juniper Networks, Arista, Huawei, Peplink, and ADTRAN.
  • I used and keep learning my scripting languages like Red Hat BASH, Ruby Rails, SQL, MySQL, Python, Unix, Java Scripts, HTML, PowerShell, Access, CMD, VB Script, Oracle, OS X, NMap, Ubuntu, PHP, Regex, ServiceNow Syntax Marcos, Session Initial Protocol. Solarwinds SWIS API, Special Vars, VIM, Web Programming, Zsh, Ububtu Server, vSphere4.1, VLC Windows & OS X.
  • Any Firewalls like Palo Alto Networks PAN-OS 7.0 or higher with GUI/CLI commands configured Dual VPNs using ECMP, OSPF Tunneling Traffic, IPSecs, IKE Gateway, Interface configuration from Branch to Data Center, Virtual router setup Multicast, BGP, RIP, Static Route, ISP Gateway, use Elasticsearch/Splunk SIEM for any correlates endpoint devices for searching, indexing, etc. for syslog, http logs, DB logs, any data sources. Knowledge security assessment process and capturing data packets using Wireshark, Suricata, NMap, Netcat, Metasploit, Configured and implementation Secure Shell SSH tunneling control sessions decryption to prevent non SSH application bypass firewall, understanding cypher like AES128 CTR/AES196CTR/AES256CTR, configured SSH decrypt rule, security policy ex. Name/Zone/Address/User/HIP Profile/Zone/Application/Service/Action, decrypt rule. Configured RADIUS Juniper for use on Palo Alto Networks, using ARP entries.
  • Configuring Big IP F5 AFM v11 for Load Balancing for using Round Robin Scheme.
  • Design and infrastructure architect permissions, auditing, shadowing, alerting, implementation for Endpoint DLP to a group policy data leak prevention (DLP) with context/content awareness for protecting sensitive information. Enforces device access policy, extent to control data communication to a network protocol and applications. Devicedlock, Networklock manage, devicelock discovery any exposed sensitive data in real-time alerts using SIEM, device search server (DLSS). Setup active directory domain controller, create group policy to all the device from USB, IPhone, WiFi/Bluetooth, Network Shares SMB, Clipboard, Social Network, Webmail, HTTP/HTTPS/FTP/FTPS/Telnet, instant messaging Skype, printer, Servers, Storages, memory card CD-R/DVD-R, Cloud File Sharing, remote access, and content filtering.
  • GRC Model & Principles by SOX, RSA Archer, GLBA, PCI-DSS, HIPAA, ISO/IEC, from 2 1, 2, COBIT5 EDM/PBRM and other GRC Compliance processes, ensure governance framework setting, metrics use cases, and maintenance, benefits delivery, risk optimization, resource optimization, stakeholder, and transparency, manage multiple GRC iniative on a single consolidated platform, support unique areas of operation with a common foundation and configured modules, establish multiple contexts for managing risk with criteria-based evaluation analyze the level of risk using qualitative analysis modes, scope and orchestrate internal validation activities across all GRC focus areas and track status, create visibility to critical gaps and deficiencies and track remediation progress, orchestrator management assessments and audit testing with flexible assessment tools, securely store audit work papers and testing evidence in a robust content repository prove your compliance by recalling the historical state of your regulatory environment at any point in time.

Confidential, San Diego, CA

Network Support Analyst Engineer

Responsibilities:

  • Supported 1,000 or more tickets for end users or clients on DELL, HP, Lenovo, Toshiba, All Plotter Printer, Scanner, IBM or Apple Operating Systems (OS), applications, security, hardware/software, Network Internet connection, WiFi, Mesh Topology, AP Wireless, all network printers with plotters, routers, troubleshoot systems, installed all printers, laptops, desktop, server, IDS, and Asset Management.
  • Microsoft Migration Windows 7 Packages Software and Applications.
  • Administering, Managing interface implementation, threat management McAfee VSE 8.7i, VSES 1.0 ePO SIEM/Nitro, and Amazon Web Services (AWS), IBM QRadar 7.2.4v SIEM, IBM Guardian Encryption, DELL IAM.
  • Responsible for threat analyst coding and scripts. Built Antivirus AV protection on Servers 2000/2003/2008/2012 and deployed to all the PC clients and devices, repair BIOS, memory leak, blue screen, black screen, systems when they are hit with any SSRF, from virus, trojans, keylogger, worms, rootkit, spam mails, plugins, etc.
  • Experienced;
  • Experienced on Firewalls Cisco ASA, SonicWall, Palo Alto Networks, Sourcefire, Checkpoint, Juniper Networks, Arista, Huawei, Peplink, and ADTRAN.
  • Scripting Programming Languages Red Hat Bash, Ruby Rails, SQL, MySQL, Python, HTML, Cloud Computing, Ubuntu, Linux cURL, VIM, OS X, CMD Utils, Power Shell, GitHub, Google Universal Analytics URL, NMap, Perl, Unix, SIP, The WebGW, Zsh
  • Oracle GRC Compliance, RSA Archer, HIPAA, NERC-CIP, PCI-DSS, COBIT5, ISO/IEC

We'd love your feedback!