We provide IT Staff Augmentation Services!

Team Lead Media Production Audio Video Support Resume

SunnyvalE

SUMMARY:

  • Over 18 years of Information Technology professional experience
  • Information Technology Cyber Security Enthusiast
  • Know to work and configure VMWare Hypervisor 5.5, 6.0Esxi
  • Familiar with salesforce
  • Knowledgeable about Linux Centos and RedHat administration and troubleshooting
  • Familiar with SIEM tools and Source Fire applications
  • Good understanding of secure wireless Wi - Fi networking as well as OAuth
  • Understanding of Microsoft SQL Server R2 both in queries and SQL visual studio
  • Good in the TCP/IP protocol suites, troubleshooting, security, administration and configuration
  • Understand cryptography techniques for Symmetric and Asymmetric encryption methods
  • Abel to use ISO 27000 and NIST frameworks guidelines within IT security focus
  • Exposed to tools like Spelunk, ArcSight, Wireshark and NMAP and Kali Linux
  • Know how to capture logs within SIEM tools for forensic investigation and remediation
  • Web Application vulnerability, Cross Site Scripting known as XSS, penetration testing and OWASP Guidelines
  • Experienced with QualysGuard vulnerability assessment tool for monitoring and identifying critical vulnerabilities in network, applying patches, Security compliance scanning and risk management.
  • Familiar with Oracle Identity Management and Oracle Access Management and the benefit of SSO authentication process
  • Comfortable With ACL, IDS, TCP/IP, Ports and protocols
  • Know how to apply least privileges apply need to know functionalities for individuals to perform their job functions and no more avoiding privilege creep

PROFESSIONAL EXPERIENCE:

Confidential, Sunnyvale

Team Lead Media Production Audio Video Support

Responsibilities:

  • Administer Cisco Call Manager company’s all hands-on events
  • Review Service Now tickets requests, prioritize and resolve
  • Contract negotiate with Cisco for reliable, effective service delivery and support
  • Mange Bluejeans Audio Video support and troubleshoot as problems arise
  • Add conferences from different geographical locations to a single event transparent to users
  • Act as a moderator for events and record events if necessary for future reviews
  • Use Panapto for recorded events as an archival
  • Implemented Gap Analysis of present Risk assessment methodology and conducting risk assessment and mitigation steps for the client.
  • Troubleshoot codecs, projectors and hand held, Lav and celling microphones when required
  • Configure podium, front end and backend cameras from a web interface as user’s desires
  • Create spreadsheet for calendar events with internal Jira and Service Now ticketing system
  • Assign myself and other team members for related events and provide services to users
  • Periodically do room sweeps to make sure Audio/Video equipment are functional
  • Assist end users to their needs related to events, meetings, conferences

Confidential, San Francisco CA

IT Security Analyst

Responsibilities:

  • Performed Active Directory, LDAP, and remote access provisioning and DE-provisioning activities for Gap, Inc. 's global network infrastructure
  • Administered Symantec data center security server to enforce security to endpoint systems and end users following company’s security guidelines
  • Monitored Symantec data center security Server logs to make sure securities are not breached
  • Leveraged the Symantec data center security to manage privileged access to approved users
  • Monitored user’s logical access control based on the groups they belonged to within Active Directory domain
  • Provisioned access to internal and external users by following company’s guidelines and revoke their access immediately when they left the company by disabling their account in the Active Directory domain
  • Monitored network systems for cyber security attacks using tools such as Fortinet
  • Involved in implementing and improving PCI compliance level 1 protecting customers and stockholders information restricting un-authorized access
  • Actively involved to high 12 level of PCI compliance in accordance to auditing and risk mitigation
  • Helped in risk isolation and process of SOX implementation by reviewing and participation SOX business practices
  • Administered Active Directory, Exchange messaging and remote access management and support experience in an enterprise environment. Provisioning remote access via VPN and RSA SecurID products.
  • Mapped Active Directory Network Drive for users and business partners
  • Monitored Service Now application ticketing system to resolve problems.
  • Created departmental mailboxes for Outlook clients and add or remove users for their business practices.
  • Administered Content Management Portal Office 365 to add or remove mailboxes, conference rooms and participants
  • Fallowed company’s wide security standard operating procedures in regards to user’s excessive privileges and removed such when appropriate
  • Administer Enterprise Softerra LDAP application to add or remove objects such as users and attributes related to each object.
  • Assigned Linux servers for static IP addresses, DNS, nsswitch.conf, and resolv.conf for in a secure network
  • Direct communicator with different vendors and RMA process

Confidential, San Francisco CA

IT Security Analyst

Responsibilities:

  • Performed Active Directory, LDAP, and remote access provisioning and DE-provisioning activities for Gap, Inc. 's global network infrastructure
  • Administered Symantec data center security server to enforce security to endpoint systems and end users following company’s security guidelines
  • Monitored Symantec data center security Server logs to make sure securities are not breached
  • Leveraged the Symantec data center security to manage privileged access to approved users
  • Monitored user’s logical access control based on the groups they belonged to within Active Directory domain
  • Provisioned access to internal and external users by following company’s guidelines and revoke their access immediately when they left the company by disabling their account in the Active Directory domain
  • Monitored network systems for cyber security attacks using tools such as Fortinet
  • Involved in implementing and improving PCI compliance level 1 protecting customers and stockholders information restricting un-authorized access
  • Actively involved to high 12 level of PCI compliance in accordance to auditing and risk mitigation
  • Helped in risk isolation and process of SOX implementation by reviewing and participation SOX business practices
  • Administered Active Directory, Exchange messaging and remote access management and support experience in an enterprise environment. Provisioning remote access via VPN and RSA SecurID products.
  • Mapped Active Directory Network Drive for users and business partners
  • Monitored Service Now application ticketing system to resolve problems.
  • Created departmental mailboxes for Outlook clients and add or remove users for their business practices.
  • Administered Content Management Portal Office 365 to add or remove mailboxes, conference rooms and participants
  • Fallowed company’s wide security standard operating procedures in regards to user’s excessive privileges and removed such when appropriate
  • Administer Enterprise Softerra LDAP application to add or remove objects such as users and attributes related to each object.

Confidential, South San Francisco, CA

Application Security Support Analyst

Responsibilities:

  • Monitored incoming security incidents through ticketing management system, responded to problems and prioritized them accordingly as needed
  • Monitored cyber security incidents using Nessus application and responded to incidents accordingly
  • Verified Access Management security needs for users and gave access to services for viewing sensitive data based on identity and if they had legitimate requirements or credentials for using services while restricting access to non-authorized users
  • Administered CentOS Apache web server and MySQL web interface for Intranet
  • Administered VMware Sphere for various virtualized internal servers and applied patches to the when needed
  • Administered Livelink Document Management System tasks such as creating different groups and adding users to the groups with proper permission for different project workspaces
  • Involved in PKI implementation within the Intranet with help of HR and company’s policy using Internal Certificate Authority and single sign on using LDAP to corporate network
  • SharePoint 2010 Farm Administrator including Sandbox, Development and Production environment
  • Managed SharePoint Company’s announcement such as Rich Media, Audio and Video contents
  • Administered Microsoft Exchange 2010 Enterprise Server, Organization Configuration, Server Configuration, Recipient Configuration for users using Outlook Web App, Outlook Anywhere using Exchange Management Console and Exchange Management Shell
  • Granted users secure access to ReQLogic financial system, delegated purchase orders and assigned signing authority
  • Administered Windows 2008 Windows 2008 R2 Virtual servers using VMware
  • Actively monitored the network using open source Wireshark to capture unsolicited activities
  • Resolved problems, performed upgrades, and maintained end user’s MAC computer Systems
  • Troubleshoot MAC OSX operating systems
  • Re-imaged and deployed MacBook systems for various packages using JAMF Casper Suite

Confidential, Ft Carson, Colorado

Security consulting/training

Responsibilities:

  • Consulted and trained Confidential officials on secure networking practices
  • Duties: Network operations, technical, physical and information systems security consulting and training for military (enlisted and commissioned officers) and government service personnel as it pertains to deployment to Afghanistan, Iraq and other bases. After duty hours work includes time with local Commanders, IT Managers and Defense Intelligence Agency personnel regarding advanced network, security and intelligence factors.
  • Prepared military personnel for various computer security topics and as a result all of the students passed the security certification exams

Confidential, Ft Bliss, Texas

Security consulting/training

Responsibilities:

  • Consulted and trained Confidential officials on secure networking practices
  • Duties: Network operations, technical, physical and information systems security consulting and training for military (enlisted and commissioned officers) and government service personnel as it pertains to deployment to Afghanistan, Iraq and other bases. After duty hours work includes time with local Commanders, IT Managers and Defense Intelligence Agency personnel regarding advanced network, security and intelligence factors
  • Prepared military personnel for various computer security topics and as a result all of the students passed the security certification exams

Confidential, Ft Bliss, Texas

Security consulting/training

Responsibilities:

  • Consulted and trained Confidential officials for CompTIA, A+ course, pc technical skills
  • Duties: Network operations, technical, physical and information systems security consulting and training for military (enlisted and commissioned officers) and government service personnel as it pertains to deployment to Afghanistan, Iraq and other bases. After duty hours work includes time with local Commanders, IT Managers and Defense Intelligence Agency personnel regarding advanced network, security and intelligence factors.
  • Prepared military personnel for various computer security topics and as a result all of the students passed the CompTIA certification exams

Confidential, Ft Bliss, Texas

Security consulting/training

Responsibilities:

  • Trained Confidential officials for CompTIA, Network+ course
  • Duties: Network operations, technical, physical and information systems security consulting and training for military (enlisted and commissioned officers) and government service personnel as it pertains to deployment to Afghanistan, Iraq and other bases. After duty hours work includes time with local Commanders, IT Managers and Defense Intelligence Agency personnel regarding advanced network, security and intelligence factors.
  • Prepared military personnel for various computer security topics and as a result all of the students passed the CompTIA certification exams

Self-employed

IT Support Consultant

Responsibilities:

  • Job involved Troubleshooting security and computer software/hardware issues on a daily basis
  • Installed and maintained Microsoft Windows Server 8 R2 Active Directory for two sites
  • Audited Active Directory using Active Directory Toolkit for security risks in the network environment
  • Established group policies using starter group policy object templates with ADMX format in Windows 2008 environment and linked it to multiple Organizational Units
  • Installed different applications on different systems such as Access, Intuit financial database, various Windows Operating Systems and Microsoft Office Suites and configure for secure operation
  • Established a secure wireless network at the company for mobile computing
  • Put network printer servers in different locations for convenient use

Confidential, Palo Alto, CA

Project Security Consultant

Responsibilities:

  • Managed over five hundred computers connected to lab devices for adequate security posture and configuration
  • Deployed four types of switched based VLANs separating lab related systems from the regular data VLANs to be safe from any malicious network threats
  • Supported users with their computer security needs using Remedy database management tools for assigned level three and four tickets
  • As compliance with core 21CFR Part 11 requirements, I made sure of the integrity and security of the lab computer systems by enforcing Good Manufacturing Practices (GMPs), Good Laboratory Practices (GLPs), and Good Clinical Practices (GCPs), with FDA issued and very comprehensive guidance on systems validation IAW ISO Security Standards
  • Supported scientists with their lab computers in direct access to animal colonies for their research projects such as HIV, Parkinson, Alzheimer’s diseases
  • Installed Symantec Antivirus Corporate edition on client machines, making them managed by server so that virus updates were pushed to clients automatically
  • Put over four hundred lab machines in a designated VLAN which shut down internet and e-mail ports, eliminating system’s vulnerabilities against virus attacks
  • Helped scientists to install and package the various applications for lab devices connected to desktop computers such as Confidential Liquid Chemstation
  • Administered the Enterprise Microsoft Windows 2000 Server Active Directory’s organizational unit for company’s Palo Alto site to add users, groups, and computers and deployed consistent group policies at the organizational unit level
  • Validated computer systems to be compliant with FDA regulations for different lab projects, ensuring that latest Windows patches would not halt the lab systems, affecting the production
  • Consistent in communication with client’s needs in regard to their computer networking

Confidential, CA

Network Security Consultant

Responsibilities:

  • Troubleshoot security and hardware & software issues for campus (both PC and Mac environments)
  • Interacted with faculty members, graduate and post doctorate students to resolve computer issues
  • Supported scientists with their day to day computer needs for their Stem Cell research projects at Bio-X department
  • Helped a group of three people and an excellent team work to migrate from Microsoft Windows NT 4.0 to Microsoft Windows Advanced Server 2003 with Active Directory for the Humanities and Science department at Stanford
  • Assisted IT team to deploy Microsoft Exchange Server 2003 in the network
  • Troubleshoot E-mail issues for different e-mail software such as Microsoft Outlook and Eudora
  • Improved computer networking systems, deploying centralized server storage for all users
  • Prevented virus attacks on the network using different anti-virus utilities
  • Implemented BigFix, allowing dedicated servers to push the latest anti-virus definitions to all laptops and desktop systems when connected to the network
  • Helped to deploy Cisco Wireless Access Points in various locations at the campus with Wi-Fi Protected Access using Cipher type authentication mixed mode TKIP and AES
  • Monitored wireless network signals to determine access point’s needs in different locations
  • Administered and supported Netdb database server allowing clients to have wired and wireless access at any location on campus by their MAC addresses
  • Resolved network connectivity using different TCP/IP commands and utilities
  • Solved the client’s issues regarding Windows XP professional problems

Hire Now