We provide IT Staff Augmentation Services!

Owner Resume

4.00/5 (Submit Your Rating)

Lawrence, MA

SUMMARY:

  • Motivated and proven manager with 10+ years of progressive operations management, business development, and, sales experience.
  • Proven ability in achieving optimal utilization of resources by developing, delivering, and managing operations via process improvement planning, program coordination, and cultivation of strong and productive relationships.
  • Dependable, thorough, and well - organized planner who is dedicated to work effectively by focusing attention on key priorities.
  • Exceptional communication skills including experience in both written and in verbal formats.
  • Proven track record of creating and implementing new sales programs and long-term strategies aimed at igniting growth.
  • Communicate well with all business levels, including management, support staff, and professional organizations to achieve required corporate goals.
  • Results-oriented leader who is adept at problem solving via a strong focus on customer service and revenue management.
  • Identify importance and functionality of various network devices such as routers, switches, bridges and hubs.
  • Determine components required to meet network specification and for successful operation of common application on the network.
  • Understand concepts related to basic operation of protocols in OSI and TCP / IP Models.
  • Identify the appropriate media, cables, ports, and connectors to connect Cisco network devices to other network devices and hosts in a LAN
  • Determine technology and media access control methods for Ethernet networks. Identify basic switching concepts and operation of Cisco switches such as Collision Domains, Broadcast Domains, ways to switch and CAM Table
  • Verify switch configuration such as hostname, mgmt. IP address, IP Default gateway, username, password, console, VTY login and service password encryption. This verification process also includes review of remote access management
  • Verify network status and switch operation using utilities such as ping, telnet and SSH.
  • Understand importance of VLAN and configure them to create logically separate network and manage traffic. Configure interVLAN routing and SVI interfaces.
  • Configure trunking of Cisco switches as well as PVSTP operations such as root bridge election and spanning tree mode.
  • Identify appropriate IPv6 and IPv4 (VLSM) addressing scheme to satisfy requirements in a LAN/WAN environment. Identify technological requirements for running IPv6 in conjunction with IPv4.
  • Configure basic router configuration and verify network connectivity using Telnet, traceroute, SSH and ping. Determine methods of routing and routing protocols.
  • Configure DHCP (IOS Router), Access Control List, NAT, NTP and syslog for a given network.
  • Troubleshoot issue related to network, network traffic, VLAN, interVLAN, spanning tree operation and WAN.
  • Implement security configuration parameters on network devices. Configure firewalls, routers, and switches web security gateways with appropriate network security.
  • Implement common protocols and services such as IPSec, SNMP, SSH, DNS, TLS, SSL, TCPIP, FTPS, HTTPS, SCP, ICMP, IPv4, IPv6, FTP, SFTP, TFTP, Telnet, HTTP and NetBiOS. Understand importance of commonly used ports.
  • Evaluate wireless security protocols such as WEP, WPA, WPA2, 802.1x, EAP, PEAP, LEAP and ECC.
  • Analyze intrusion detection system (IDS) and intrusion prevention system (IPS). Identify detection methods and techniques such signature based detection and anomaly based detection method.
  • For a business scenario secure the organization by applying secure network administration rules. Configure rules for firewall, VLAN and router. Configure access control list, port security and unified threat management.
  • Use network design elements and components to set up DMZ, subnets, VLAN, NAT, Remote access and virtualized platforms. Troubleshoot security issues related to wireless networking.
  • Identify various control types and risk reduction policies such as mandatory vacations, job rotation, least privilege and Segregation of Duties which need to be applied to ensure risk prevention.
  • Evaluate risk associated with Cloud Computing and Virtualization. Analyze security implications when integrating systems and data with third party vendors / solutions considering factors such as data ownership, backups, policies around unauthorized data sharing etc.
  • For business case, implement risk mitigation strategies such change management, incident management, execution of routine audit and data loss prevention (DLP) controls. Enforce policies and procedures to prevent data loss / theft which included reviewing permission and user access rights on a periodic basis
  • Develop training materials to train user group on importance of security, compliance and best practices such as data handling, clean desk policies and password policies. Provide factors / policies that need to be implemented in physical security and enforcing environmental controls.
  • Develop training materials on various threats, vulnerabilities and attacks. Evaluate mitigation controls and deterrent techniques that must be used for various attacks.
  • Evaluate various tools and techniques that can be used to analyze threats and vulnerabilities. Use techniques such as penetration testing and vulnerability scanning to analyze security threat / vulnerability.
  • Understand various security controls and policies that need to be implemented for application, mobile, operating system, virtual environments, cloud and portable devices
  • Evaluate authentication, security and access controls for an organization based on various authentication factors, identification, and privilege assigned.
  • Analyze cryptographic methods, PKI and certificate management to implement digital certificate and trust models
  • Prepare material, documentation and systems for the security lab.
  • Assist clients with technical issues that arise during simulation and execution of the lab.
  • Prepare lab material for clients on Wireless Network and how to crack WPA and WPA2 keys in virtual environment.
  • Troubleshoot various issue related to tools for Certified Ethical Hacking Labs such as Nmap, Wireshark, Nessus and Snort
  • Perform Nmap host discovery by using various Nmap switches and port scanning within a virtual environment
  • Scan network at home with NetStumbler to generate report on network discovery, usage of channels and spectrogram of channel usage.
  • Analyze packet list, packet details and monitor traffic within home network using Wireshark tool. Apply various wireless filters for packets captured to analyze wireless / wired network traffic.
  • Execute Nessus tool within virtual environment to generate report on vulnerabilities and threats that exist within the operating system such as Windows and Linux. Analyzed the results of the report to identify known threats and vulnerabilities.
  • Perform wireless hacking in virtual environment to crack WPA and WPA2 keys. Discover hidden SSID in wireless networks.
  • Experience with DNS Fingerprinting
  • Basic working knowledge of Google Hacking
  • Experience with NMAP Host Discovery
  • Basic working knowledge of vulnerability scanning with Nessus
  • Experience with creating trojans using Metasploit
  • Configuration of IP address and subnet mask for various devices, including routerscomputers, and printers
  • Installation, configuration, and troubleshooting of Microsoft Windows 7
  • Experience with Linux (Ubuntu) and Shell Scripting
  • Basic working knowledge of HTML, SQL, CSS, C++, Java
  • Basic working knowledge of Microsoft Visio and Access
  • Proficient computer skills in Microsoft Word, Excel, PowerPoint, Windows XP and 7
  • Setup and configuration of SOHO network with computers, printers, and other various devices using WPA2 with usernames and passwords
  • Assist users via phone, on - site, or remote support to install, upgrade, and support desktop and portable computer hardware, software, printers, and peripherals

TECHNICAL SKILLS:

Standards: COSO/COBIT, Sarbanes-Oxley Act, SAS-70, ITIL, ISO 27001, Privacy Act of 1974, Gramm - Leach - Bliley Act (GLB),Certification and Accreditation, General Computer Controls, Application control, Testing, Compliance Testing, Vulnerability Scans, Project Management, Risk Assessment, Change Management, Configuration Management, Contingency Planning; Policies and Procedures, Intrusion Detection Systems, Incident Response, Media Protection, Physical Security, Computer operations, Environmental Security, Network Security, System Security, Personnel Security, OMB Circular A-130 Appendix III, NIST 800-53, FIPS, STIG, DITSCAP, DIACAP, FISMA, FISCAM, RMF (Risk Management Framework).

Software and platform: UNIX, Sun Solaris, HP-UX, Linux Red Hat, Wintel, LDAP, Windows, LAN/WAN, Wireless Network, TCP/IP; ACL tools, Remedy, HP-UX, Linux Red Hat, DMZ, IDS, Checkpoint, Cisco Routers/Switches, Sybase, Eye Retina Scan, SAINT, Tenable security center, Big fix, Tripwire, RSA, PL/SQL, Power Point, Visio, word, SharePoint, excel, access.

KEY SKILLS:

  • Network & System Security ; Risk Management; Physical and environmental security
  • Authentication & Access Control
  • Good knowledge of FISMA compliance
  • Vulnerability Assessment Expert
  • Good knowledge on technologies like; Kerberos, RADIUS, TACACS+, WPA2 AES 256, Intrusion Detection system (IDS), Intrusion Prevention systems (IPS) and DoS attacks Threat Mitigation
  • Excellent in developing security policies, procedures and guidelines
  • Regulatory Compliance, Strong technical writing and managerial skill
  • Excellent with Microsoft Word, Excel, Project, Access, Power Point, Publisher, Visio
  • Fast learner and Ability to multi-task, can work independently and as a contributing team member
  • Interpersonal and verbal/written communication skills
  • Knowledge of information security standards, rules and regulations.
  • Excellent knowledge of cellular technology and mobile device troubleshooting.
  • Ability to identify risks, threats, and thinking outside the box.
  • Team player mentality and meticulous attention to detail.
  • Exceptional written, oral and communication skills.
  • Technical expertise and problem solving skills.

PROFESSIONAL EXPERIENCE:

Confidential, Lawrence, MA

Owner

Responsibilities:

  • Served as both Founder and Relationship Manager while supervising workflow for team of employees.
  • Managed complex account relationships with emphasis on communicating and setting client expectations.
  • Analyzed financial information to produce forecasts of business, industry, and economic conditions.
  • Identified appropriate data sources and coordinated with various industry thought-leaders and outside sources to gather financial data and documentation for better financial projections and forecast reports.
  • Developed and trained a team of professionals, and oversaw business operations for the office, including: customer service, sales, planning, policy development, financial administration, and inventory control.
  • Drove business development by cultivating strong customer relationships and giving benefit-oriented sales presentations to generate revenue. Fostered a cohesive team through innovative support initiatives.

Confidential, Casablanca, Morocco

Sales Associate

Responsibilities:

  • Led contract negotiations with existing and potential clients, among them private medical practices.
  • Developed and maintained relationships with the Ministry of Health officials and private clinics to accurately forecast future business. Collaborated with the Sales Manager a strategy for new markets.
  • Responsibilities included: advertising medical equipment to increase sales while prospecting for buyers.
  • Experienced as a result-driven sales professional in m aximizing profits. Developed and implemented a plan to expand business beyond government sales. Evaluated promotional materials for marketing.
  • Gathered accurate research information in a timely manner via formulation of new marketing strategies.
  • Continually identified customer challenges and collaboratively shaped solutions to meet their needs.

We'd love your feedback!