. Network Security Tech Resume Profile
Professional Summary
I have extensive experience in the field of networking. I specialized skills in IT, Telecom in frastructure, Cloud Computing Services Oriented Architecture, Cyber Security Network Management, Devices Management, Identity Management, Hosted Security Compliance Interconnect, Cabling Central Office CO , and Co-Location, Radius Server, 3G/4G multi input multiple output MIMO, OSPF, BGP, VPN Firewall, FCAPS, RADIUS, TACACS, HIPS, ITIL, F5 Load Balancing, Wireless Access Point AP , such as Airtight Wireless Security IDS,Aruba 802.11, Ruckus Bulldog, Aeronhive, Cisco Wireless Aeronet, Call Manager 8.6 Firetide MESH, KBC Networks, Proxim Wireless, Qualys, Sourcefire, Imperva, Check Point, QRadar, Arcsight, Palo Alto Firewall, Barracuda, Kaspersky, NOD32, Tipping Point HP, Websence, Faronics, Centurion Technologies, Avast, AVG, Panda, Emsisoft, Symantec, McAfee, Bitdefender, RFID Handheld Monitoring, HID Reader Controller Proximity Access Security Door, Digital ID, Fingerprinting, Data Disaster Recovery, and Digital Signage.
Technical Summary
I am specialized skills in IT, Telecom, Security Telecom Network Infrastructure Cabling Central Office CO , and Co-Location, Wireless Access Point AP , Airtight Wireless Security IDS, Faronics Antivirus, Check Point Firewall and administering, RFID Handheld Monitoring, HID Reader Controller Proximity Access Security Door. 2009 started advancing in Cloud Computing especially in Cyber Security, Virtual Desktop Systems, and Data Center Storage
Professional Experience
Confidential
. Network Security Tech/Engineer
- Create/Design/Deploy, Compliance Assessment VPN, Build Perimeters Security, IPS/IDS/Firewall compliance, Web Filtering Malware, Web Scraping, Administering OS Windows, managed applications, and management platform for cloud computing structure and Cyber Security, machine desktop, thin client, Radius Servers, disaster recovery, SCC Storage Node Proccessing Node for Power and Memory by using also Microsoft HyperV, VMWare, with interface to R2 Windows 7 or 8. I work mostly with IEEE Standard for based network access control, protocol OSPF, BGP, EAP, EAPOL, 802.1x or so Authentication involve with supplicant client device that wishes to attach to LAN/WLAN, an authenticator and an authentication server.
- IAAS, SAAS, and PAAS models managing and administering the platform Firewall, FCAPS, RADIUS, TACACS, HIPS, ITIL, Check Point CCSA R65/R70, Check Point CCMSE 156-815.71, Check Point CCSE R70 Check Point Firewall, A flattened all-IP architecture is an option for the network within HSPA . In this architecture, the base stations connect to the network via IP often Ethernet providing the transmission bypassing legacy elements for the user's data connections such as 3G/4G multi input multiple output MIMO Using scalable channel bandwidths of 5 20 MHz, optionally up to 40 MHz and oter such as LTE, WIMAX rel 2, iBurst 802.20, and EV-DO Rel 0-A,B, F5 Balancing, to specific network via multiple routing process such as RIP, RIPv2, IGRP, EIGRP, and OSPF, per destination and per packet Cisco Express Forwarding CEF, VPN, IPS Intrusion Detection System, Intrusion Prevention System IPS from desktop virtual system to applications, security, administering Active Directory, Office 365 Cloud Computing Microsoft Exchange Server Microsoft messaging, create user account, outlook, recipients, permission, compliance management, organization, protection, mail flow, mobile, public folders, unified messaging include mailboxes, groups, resources, contacts,, shared, migration. Other job function troubleshooting ADSI Edit for Lightweight Active Directory Access Protocol LDAP , AD Plus.vbs tool to troubleshoot the process any application if stop or hung nor fails, Event viewer displays detailed information on even logs any errors, network monitoring, Nitest, Outlook configuration analyzer tool 2.0 for parameters profile or mailboxes, Microsoft Share Point Designer. I used for design, build, customize websites, manage cyber security antivirus agent, manage users account workstation security monitoring alert management SIEM, identity management, asset tracking systems, remote access support, support client ticketing issues, backup data or data recovery disaster, patch management, integration including PSA open a ticket for repair, system reporting with alert, port testing, and web filtering.
- Using vendor like Symantec, Cisco Security, McAfee, GFI, Blue Coat, HP IPS, Zcaler, Perimeter Firewall, Qualys, Smoothwall, Emsisoft, Internals Networks, Systems Commander, Nessus, Centurion, Trendmicro, Norton, Imperva, Palo Alto Firewall, Barracuda, Kaspersky, NOD32, Faronics, Centurion Technologies, Avast, AVG, Panda.
- Removed all the malware in the systems, clean the data, backup data, from virus, , rootkits, worms, SQL Injections, Cross Script, Java, plug-in, IRC, memory leak, BIOS, registry, services, msconfig, back door, command line, spyware, trojans, bugs, malware and other parasites.
Confidential Desktop Support Analyst
- Support 1,000 or more tickets end user or client on any such as DELL, HP, Lenovo, Toshiba, All Plotter Printer, All Printer and Scanner, IBM or Apple Operating Systems OS , applications, security, hardware/software, Network Internet connection, Wi-Fi, Mesh Topology, AP Wireless, all network printers with plotters, routers, troubleshoot systems, installed all printers, laptops, desktop, server, IDS and Asset Management. Microsoft Migration Windows 7 Packages Software and Applications, Office 365, VPN.
- Create Dashboard and Custom Report for Web GUI problem because of log Partition running out of space and troubleshoot this issues, Firewall, mainframe, updates, imaging, data backup, protect asset tag equipment, updates SSD, Identity Management, SIEM, management asset systems, repair all tickets for clients, secured parameters, installed plotters, programmed, configuration, repair for RMA, updates services desk software for change tickets acquisition for Sempra/SDGE mainframe systems. Other software uses like Tipping Point HP, Websence,
- , Blue Coat, Qualys, QRadar, Arcsight Smoothwall, Emsisoft.
- Troubleshoot PC to any viruses, Trojans horse, worms, rootkits, spam, malware, IDS systems, working with all main brands PC manufacturer for repairs, testing products.
Environment- Trojans horse, worms, rootkits, spam, malware, IDS systems
Confidential Tech Engineer
- Break Fixes troubleshoot LAN/WAN, upgraded PC hardware/software, Migration, PC Deployment, Wireless Access Point installed, programming and configuration.
- Experience in setting up Microsoft DOS, Windows 95/98, NT, WIN 2K XP Workstation, Server, Operating System, MS applications, Office Suites, POP email, SMTP account, IP DNS, remotely access configuration as well as troubleshooting and resolving user issues giving physical or phone support to meet the end users need. Call Manager VoIP admin rights.
- Responsible for troubleshooting and repair of switching equipment's and to all hardware/software, administration access, upgrade, security and set-up OS, migration, troubleshooting, repair application software, malware, firewall, IDS and antivirus.
- Sales and Service Repair HP, Sony, DELL, Toshiba, Compaq, Xerox, network printers, troubleshoot systems Server, laptop, desktop, wireless connection, Surveillance cameras, alarm systems, digital signage, drivers, OS, Wireless Access Point AP , such as Airtight Wireless Security IDS, Aruba 802.11, Ruckus Bulldog, Aeronhive, Cisco Wireless Aeronet, Firetide MESH, KBC Networks, Proxim Wireless, troubleshooting systems for viruses and any malware responsible for troubleshooting and repair of Telco equipment's and switching equipment's which includes Nortel, Ericson, Alcatel etc.
Environment- Microsoft DOS, Windows 95/98, NT, WIN 2K XP Workstation, Server, Storage, Operating System, MS applications, Office Suites, POP email, SMTP account, IP, DNS, OSPF, BGP, MPLS, and IPSec in enterprise LAN, WAN, HTTP, and NAT address, Wireless Access Point AP , such as Airtight Wireless Security IDS, Aruba 802.11, Ruckus Bulldog, Aeronhive, Cisco Wireless Aeronet, Firetide MESH, KBC Networks, Proxim Wireless,.
VoIP System Network Tech, Confidential
- Analyzer captures streams of packets from an Ethernet link, decodes each packet and displays the decodes and related statistics. A Voice over IP Analyzer is essentially a network analyzer with the added ability to decode VoIP signaling protocols and analyze RTP media streams. Always check testing projects what need to be done from customers to contact Manufacturer, Vendors, coordinate with clientele request to all the necessary to finish testing, installation, configuration, troubleshooting, on any projects. A VoIP probe is located at some key point in the network, continuously monitors traffic and performs real time analysis of the media stream.
- Installed and configured VoIP Gateway QOS Quality of Services , OSPF, BGP, MPLS, and IPSec in enterprise LAN, WAN, VPN, PSTN, MPLS, POTS, corporate PBX or both Cisco router, ADTRAN router, switch troubleshooting, hubs, switch.
- Worked with the most forms of Internet connectivity such as with Dial-up Modem, ISDN Modem, ADSL Modem, Cable Modem, LAN/WAN/MAN, Wireless and T1T3, DS1DS3, behind a router enabling Internet connectivity even in places where there is no broadband access such as Remote. F5 Balancing, to specific network via multiple routing process such as RIP, RIPv2, IGRP, EIGRP, and OSPF, per destination and per packet.
- Administering user setup account and installed IP Devices VoIP Phones, Axes PBX Systems, Inter-Tel 5000 PBX Systems Phones and program systems features.
- Set up VoIP, setup wireless access connectivity in any businesses or non-business and create ISP dial up connection, wireless LAN configuring DHCP, uses WI-FI 802.11b, 802.11g, Call Center, moved phones to a new location, trained customers all the necessary information they need regarding overviews company products.
- Installed working in analyst the data, cleansing, mapping and migration of data in the existing site system to a new systems.
- Lotus Notes, Microsoft Exchange, SQL database, responsible for data activities and for developing or completing and documenting, migration strategy care team repair all the necessary hardware, software, malware, drivers thru customer premises troubleshoot Operating Systems Most Microsoft Products OS . Penetrate most malware and clean system, backup data, maintain data maps for TCP/IP unique business requirements develop the technical environment for cleansing of legacy system data, as needed develop requirements for load programs.
- Troubleshoot blackberry application such as messaging, video web media.
Environment- PSTN, MPLS, POTS, ADSL Modem, Cable Modem, OSPF, BGP, MPLS, and IPSec in enterprise LAN/WAN/MAN, Wireless and T1T3, DS1DS3, Cisco ISA Firewall. Cisco VoIP Enterprise. and Cisco Wireless Airnet.
Confidential Telecom IT Security Tech/Engineer,
- Windows 3.1.1, 95, 98, ME, NT 4.0, Windows 2000, XP, Vista Operating System. Implementing configuration Windows hardware/software, diagnostic, testing, troubleshooting, DELL computer, IBM, Sony and Compaq, automating optimizing Windows, security access workstation users, performing systems recovery, managing network connection, cabling network with CAT-3, 4, 5, 6, 7, fiber optic, Ethernet hubs, trunk line, build or Infrastructure Voice Data, 110 Block Installation, termination, splicing, route cables, cross-connect, DC power installation, cutover switch existing line and build a new paneling.
- Administering Blackberry Enterprise Server users account configuring monitoring service to send notification messages through a messaging server within the organization troubleshoot configuring JNDI Java Naming and Directory Interface delegate port to use a specific port number and open the port on the firewall by programming systems command on Administration Service instance and navigate to system. I work mostly with IEEE Standard for based network access control, protocol EAP, EAPOL, 802.1x or so Authentication involve with supplicant client device that wishes to attach to LAN/WLAN, an authenticator and an authentication Radius Server and VPN and created alert. F5 Balancing, to specific network via multiple routing process such as RIP, RIPv2, IGRP, EIGRP, and OSPF, per destination and per packet Cisco Express Forwarding CEF.
- Open a ticket for repair, backup data contacts and support end-users.
- Infrastructure Communication Equipment's such as Microwave, CPE , MPLS, XDSL, T1T3, POTS, Heat mapping software, Network using Sunset SDH/MTT, T-Bred, Alcatel, NEC system DSX-40, MITEL SX2000, QX-S3126T, troubleshoot blackberry and Motorola Bluetooth application such as messaging, video web media, V-SAT Satellite Hughes Network System, Dish Network, Pegasus V-SAT Satellite, Wireless Access Point AP , such as Airtight Wireless Security IDS, Aruba 802.11, Ruckus Bulldog, Aeronhive, Cisco Wireless Aeronet, Firetide MESH, KBC Networks, Proxim Wireless, other uses for testing ADSL/ADSL2 , STM-1/4 optical, ITU mapping multiplexer section and high and low order path overhead to monitor and test the SDH network. I work mostly with IEEE Standard for based network access control, protocol EAP, EAPOL, 802.1x or so Authentication involve with supplicant client device that wishes to attach to LAN/WLAN, an authenticator and an authentication server.
- Compliances Assessment, Managed/Administering Security Identity Management, SIEM, VPN, IPS/IDS/Firewall/Web Filtering Malware, FCAPS, RADIUS, TACACS, HIPS, ITIL, Extracting Web content, uses different tools and technic on different vendors, like
- Check Point CCSA R65/R70, Check Point CCMSE 156-815.71, Check Point CCSE R70 Check Point Firewalls, Symantec, Cisco Security, McAfee, GFI, Blue Coat, HP IPS, Zcaler, Perimeter Firewall, Qualys, QRadar, Arcsight Smoothwall, Emsisoft, Internals Networks, Systems Commander, Nessus, Centurion, Trendmicro, Norton, Imperva, Palo Alto Firewall, Barracuda, Kaspersky, NOD32, Faronics, Tipping Point HP, Websence, Centurion Technologies, Avast, AVG, Panda.
- Removed all the malware in the systems, clean the data, backup data, from virus, , rootkits, worms, SQL Injections, Cross Script, Java, plug-in, IRC, memory leak, BIOS, registry, services, msconfig, back door, command line, spyware, trojans, bugs, malware and other parasites.
- Dealt with account managers, vendors, small to mid-sized business and customers warranty repair work, processed RMA return material authorization approval, set-up new contracts for a new clients, handled customers technical complaint/support, process development and improvement, migration systems, travel to customers site, PC, Servers, applications software, BIOS, Registry, Disaster Recovery Data, repair re-configure, updates, migration, security parameters, anti-hack systems, checksum, ports, Services, and also use Retina, Highjack, Snipper, Comodo, A-Square, monitor using main configuration setting, other responsibility set-up POS Point of Sale , RFID, CCTV/IP Surveillance, Digital Signage, Flat panel TV, Paging sytems, in Business Store configuring units, application software, installed.
Confidential Splicing/Data Network Tech/Engineer
- Splicing cables, from CO to Branches CO, Aerial, BB, Customer Premises, NOC, troubleshooting and repair of Microwave, Network Infrastructure Communication and switching equipments like Nortel Networks, AT T switch, Alcatel, Cisco, Lucent, XDSL, T1/T3, Bi-directional, or full duplex, voice path with limited frequency range of 300-3400 Hz: in other words a signal to carry the sound of the human voice both ways at once and also at the same time Data connection to the Internet or we call it LAN/WAN connections. F5 Balancing, to specific network via multiple routing process such as RIP, RIPv2, IGRP, EIGRP, and OSPF, per destination and per packet..
- Call-progress tones, such as dial tone and ringing signal subscriber dialing operator services such as directory assistance, long distance and conference calling assistance a standards compliant analog telephone interface. Usually the pair of wires from the central switch office to a subscriber's home Other services such as MPLS, POTS, PSTN, ISDN, and Cabling to CO and Co- Branches, Security Parameters, all the customers premises repair troubleshooting ATM, switch, configured, updates, Infrastructure Cisco system, Installed DC Power for all the Telecommunication equipments CPE, built Multilayer Switched Networks, created and deployed a Global Intranet, VPN, and implemented, developed, designed, maintained, configured, tested, troubleshooting techniques in environments that use Cisco Multilayer Switches, Multiplexers, IP Provisioning, ADSL, DSL Deployment, VoIP Gateway.
- Infrastructure Communication Equipment's such as Microwave, CPE , MPLS, XDSL, T1T3, POTS, Heat mapping software, Network using Sunset SDH/MTT, T-Bred, Alcatel, NEC system DSX-40, MITEL SX2000, QX-S3126T. Other task i have was troubleshoot such as messaging, video web media, V-SAT Satellite Hughes Network System, Dish Network, Pegasus V-SAT Satellite, Wireless Access Point AP , such as Airtight Wireless Security IDS, Aruba 802.11, Ruckus Bulldog, Aeronhive, Cisco Wireless Aeronet, Firetide MESH, KBC Networks, Proxim Wireless, other uses for testing ADSL/ADSL2 , STM-1/4 optical, ITU mapping multiplexer section and high and low order path overhead to monitor and test the SDH network. I work mostly with IEEE Standard for based network access control, protocol EAP, EAPOL, 802.1x or so Authentication involve with supplicant client device that wishes to attach to LAN/VLAN, an authenticator and an authentication RADIUS or Harding Server.