>
Experienced IT Professional with a demonstrated history of working in the information technology and services industry. Skilled in Computer and Network Repairs, Network Security, and Cybersecurity. Possesses outstanding Customer Service skills, initiative, interpersonal skills, strong problem-solving techniques, and an intense degree of creativity. Works well under pressure and has no need of supervision. Results-oriented Professional with a MicroMasters in Cybersecurity from RITx. Strongly believes that Digital Transformation is the engine that will propel any organization into a seamless Data problem resolution era through use of Cloud Computing.
Add work experience to your profile. (optional)
• Desktop and Laptop Audit for 800 users island wide to ascertain if units meet basic requirements for O365 and related apps installation. Checked bandwidth and local network flow to ascertain if network meets Microsoft’s standard for ease of O365 operation.
• Helped train staff in proper use of O365 and related Apps making them ready for migration.
• Assisted with the migration from Lotus Notes to O365 through use of Systools
• Worked as the point-man to detect errors or issues after Migration was completed for each Branch and Business Unit. Report or resolve any migration issues such as: missing emails, missing signatures, lost hyperlinks, email storage false negatives and false positives.
• Point-man for deploying Office 365 Pro Plus and Office 2016 to all branches; this included traveling to branches and doing installs and software configurations.
• Resolved after installation issues of O365 such as: Incompatibilities with Peachtree, Visio, and Projects.
• Installed and configured Power-Bi and SharePoint.
• Configured some aspects of SharePoint to interface with Excel, Word, and Explorer.
• Documented information about audited units, network issues related to O365 operation, applied break fixes where possible and made the Audit Report real-time available via Microsoft Teams and SharePoint to all Managers in IT.
• Worked with O365 Compliance and Security team to mitigate intrusion and any cybercrime related threats.
• Assisted in managing all O365 Users and Groups
• Configured Cisco RV042 – 4- port VPN Router for clients
• Implemented a Unified Threat Management System or SIEM
• Configured and ran vulnerability scans, prepare vulnerability reports
• Calculated risk scores and prepare Security Vulnerability Report for each client
• Segmented client network and setup failover for dual ISP
• Peachtree and QuickBooks Installation and Support
• Managed Windows 7, 8 & 10 systems
• Managed Server 2012 R2, Hyper-V and Vmware Esxi
• Implemented and Managed OSSIM AlienVault
• Conducted vulnerability and risk assessments and maintained up-to-date threat intelligence.
• Advised on legal compliance and regulatory issues.
• Headed Incident Response – implemented counter measures against attackers and recovered systems.
• Aided in Fortigate Firewall implementation. Managed Fortigate Firewall
• Managed Autonomous Network of Windows and Linux Systems
• Trained staff in Cyber-awareness especially social engineering
• Managed O365 Admin Centre
Add work certification to your profile. (optional)
• Confidentiality
• Network Security
• DevSecOps
• Encryption
• Cert url: https://www.youracclaim.com/badges/2eaf71f6-59e7-42bd-af16-1460e7a84fa1/public_url
• Cybersecurity Fundamentals
• Network Security
• Computer Forensics
• Cybersecurity Risk Management
• Cert url: https://credentials.edx.org/credentials/fbd2d537581748cdb56b0026d30d28c3
• Cascading Style Sheets (CSS3)
• HTML5 and XHTML
• Web Development Teams
• Website Development Process
• Website Publishing and Maintenance
• WordPress
• Agile Principles
• Techniques for Agile BAs
• Backlog Management
• Agile Concepts for Business Analysts
• Certificate No: AQf9R5RT–YzJvGgI3UrpvVnGBSr and AUWxL6P7GrefA1NDszLqXhbRuCzE
• Cloud Storage and Networking
• Cloud CPU and Databases
• Building the Architecture
• Microservices and Complex Serverless Architecture
• High Performance Data Transfer
• Certificate Ids: Ac4AMaHF5HHuog0aFbClZcTesz3e and AWsaqvGHDOhaIniU7I-ZuB5MAtZb
• Computer Forensics Fundamentals
• Linux/Unix Acquisition
• Unix/Linux File System
• Unix/Linux Forensics Analysis
• Windows Acquisition
• Windows File Systems and Registry
• Windows Forensics Analysis
• Steganography
• Cert url: https://courses.edx.org/certificates/d04a5b9bbcb0434786c62623af283612
• The Evolving Risk Landscape
• Risk Management 1
• Risk Management 2
• Security Metrics 1
• Security Metrics 2
• Data Driven Security 1 and 2
• Special Topics
• Cert url – https://courses.edx.org/certificates/ddd52725c36a421fb896e9f9547e9b62
• Computing security concepts and problems
• Cryptography
• Networking
• System Administration
• Detection and Prevention
• Malware and Forensics
• Cert url: https://courses.edx.org/certificates/73ef06d17b0b4ea99f27651d0294a62e
• Packet Sniffing
• Password Cracking
• Port Scanning
• Exploits and Exploiting
• Access Control Lists
• Snort
• DHCP, DNS, and Switch Attacks Mitigation
• Man-In-The-Middle Attacks and Mitigation
• Cert url – https://courses.edx.org/certificates/5463436729e848a5a8974ca0d3c65461
We will review the reports from both freelancer and employer to give the best decision. It will take 3-5 business days for reviewing after receiving two reports.