Profile of Andre Cole

Andre Cole Cybersecurity Associate
12 years experience 0 projects worked Jamaica
$3,500.00 /hr $0 earned
Data EntryNetwork SecurityNetworkingRisk ManagementWordPress

Experienced IT Professional with a demonstrated history of working in the information technology and services industry. Skilled in Computer and Network Repairs, Network Security, and Cybersecurity. Possesses outstanding Customer Service skills, initiative, interpersonal skills, strong problem-solving techniques, and an intense degree of creativity. Works well under pressure and has no need of supervision. Results-oriented Professional with a MicroMasters in Cybersecurity from RITx. Strongly believes that Digital Transformation is the engine that will propel any organization into a seamless Data problem resolution era through use of Cloud Computing.

Work History (0)

  • There are no activities yet.

Work Experiences

  • Digital Transformation Officer/Technical Support Specialist (Project-based)

    Victoria Mutual Building Society

    August 2018 - December 2018

    • Desktop and Laptop Audit for 800 users island wide to ascertain if units meet basic requirements for O365 and related apps installation. Checked bandwidth and local network flow to ascertain if network meets Microsoft’s standard for ease of O365 operation.
    • Helped train staff in proper use of O365 and related Apps making them ready for migration.
    • Assisted with the migration from Lotus Notes to O365 through use of Systools
    • Worked as the point-man to detect errors or issues after Migration was completed for each Branch and Business Unit. Report or resolve any migration issues such as: missing emails, missing signatures, lost hyperlinks, email storage false negatives and false positives.
    • Point-man for deploying Office 365 Pro Plus and Office 2016 to all branches; this included traveling to branches and doing installs and software configurations.
    • Resolved after installation issues of O365 such as: Incompatibilities with Peachtree, Visio, and Projects.
    • Installed and configured Power-Bi and SharePoint.
    • Configured some aspects of SharePoint to interface with Excel, Word, and Explorer.
    • Documented information about audited units, network issues related to O365 operation, applied break fixes where possible and made the Audit Report real-time available via Microsoft Teams and SharePoint to all Managers in IT.
    • Worked with O365 Compliance and Security team to mitigate intrusion and any cybercrime related threats.
    • Assisted in managing all O365 Users and Groups

  • Freelance IT Consultant

    SW Consultant & Higher Ground MSSP

    January 2019 - July 2019

    • Configured Cisco RV042 – 4- port VPN Router for clients
    • Implemented a Unified Threat Management System or SIEM
    • Configured and ran vulnerability scans, prepare vulnerability reports
    • Calculated risk scores and prepare Security Vulnerability Report for each client
    • Segmented client network and setup failover for dual ISP
    • Peachtree and QuickBooks Installation and Support
    • Managed Windows 7, 8 & 10 systems
    • Managed Server 2012 R2, Hyper-V and Vmware Esxi

  • IT Support Officer


    July 2019 - July 2020

    • Implemented and Managed OSSIM AlienVault
    • Conducted vulnerability and risk assessments and maintained up-to-date threat intelligence.
    • Advised on legal compliance and regulatory issues.
    • Headed Incident Response – implemented counter measures against attackers and recovered systems.
    • Aided in Fortigate Firewall implementation. Managed Fortigate Firewall
    • Managed Autonomous Network of Windows and Linux Systems
    • Trained staff in Cyber-awareness especially social engineering
    • Managed O365 Admin Centre


  • Cybersecurity Ess


    September 2020 - November 2020

    • Confidentiality
    • Network Security
    • DevSecOps
    • Encryption
    • Cert url:

  • MicroMasters Cybersecurity

    Rochester Institute of Technology

    February 2018 - March 2019

    • Cybersecurity Fundamentals
    • Network Security
    • Computer Forensics
    • Cybersecurity Risk Management
    • Cert url:

  • Web Design and Development

    Vector Technology Institute

    August 2016 - October 2016

    • Cascading Style Sheets (CSS3)
    • HTML5 and XHTML
    • Web Development Teams
    • Website Development Process
    • Website Publishing and Maintenance
    • WordPress

  • Agile Requirements

    IIBA Business Analysis Body

    July 2020 - August 2020

    • Agile Principles
    • Techniques for Agile BAs
    • Backlog Management
    • Agile Concepts for Business Analysts
    • Certificate No: AQf9R5RT–YzJvGgI3UrpvVnGBSr and AUWxL6P7GrefA1NDszLqXhbRuCzE

  • Cloud Architecture


    July 2020 - August 2020

    • Cloud Storage and Networking
    • Cloud CPU and Databases
    • Building the Architecture
    • Microservices and Complex Serverless Architecture
    • High Performance Data Transfer
    • Certificate Ids: Ac4AMaHF5HHuog0aFbClZcTesz3e and AWsaqvGHDOhaIniU7I-ZuB5MAtZb

  • Computer Forensics

    Rochester Institute of Technology

    September 2018 - December 2018

    • Computer Forensics Fundamentals
    • Linux/Unix Acquisition
    • Unix/Linux File System
    • Unix/Linux Forensics Analysis
    • Windows Acquisition
    • Windows File Systems and Registry
    • Windows Forensics Analysis
    • Steganography
    • Cert url:

  • Risk Management

    Rochester Institute of Technology

    June 2018 - August 2018

    • The Evolving Risk Landscape
    • Risk Management 1
    • Risk Management 2
    • Security Metrics 1
    • Security Metrics 2
    • Data Driven Security 1 and 2
    • Special Topics
    • Cert url –

  • Cybersecurity

    Rochester Institute of Technology

    February 2018 - May 2018

    • Computing security concepts and problems
    • Cryptography
    • Networking
    • System Administration
    • Detection and Prevention
    • Malware and Forensics
    • Cert url:

  • Network Security

    Rochester Institute of Technology

    June 2018 - August 2018

    • Packet Sniffing
    • Password Cracking
    • Port Scanning
    • Exploits and Exploiting
    • Access Control Lists
    • Snort
    • DHCP, DNS, and Switch Attacks Mitigation
    • Man-In-The-Middle Attacks and Mitigation
    • Cert url –