Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
35 views2 pages

Network Security & Upgrade Expert

The document describes the experience of a network engineer/security architect. Some of their key responsibilities included running a hardware upgrade initiative which involved negotiating contracts, documenting processes, and verifying configurations. They also implemented a new IPAM/DNS/DHCP solution to better utilize IP addresses and move to a more modern platform. The candidate promoted data security awareness and implemented controls to ensure confidentiality, integrity and availability of corporate data.

Uploaded by

aami6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views2 pages

Network Security & Upgrade Expert

The document describes the experience of a network engineer/security architect. Some of their key responsibilities included running a hardware upgrade initiative which involved negotiating contracts, documenting processes, and verifying configurations. They also implemented a new IPAM/DNS/DHCP solution to better utilize IP addresses and move to a more modern platform. The candidate promoted data security awareness and implemented controls to ensure confidentiality, integrity and availability of corporate data.

Uploaded by

aami6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

1

5
Network Engineer/security Architect
Responsible for running a chain-wide hardware upgrade initiative. This included
negotiating contracts with vendors, documenting the entire process for field
technicians, building and verifying configurations.

 Implemented a new IPAM/DNS/DHCP solution. This allowed the company to better


utilize their IP address space as well as move away from an antiquated DNS/DHCP
platform.

 .

 Promoted data security awareness by developing and maintaining a security-


conscious environment.
 Engineered, designed, and implemented information security controls to ensure the
confidentiality, integrity, and availability of corporate data.(AV, HIDS, NIDS,
Encryption, Firewalls, DLP, etc ).

 .
 Managed the creation and implementation of vulnerability and patch management
using Microsoft WSUS, SCCM 2012, MBSA and BeyondInsight CS Vulnerability
Management System.

 .

 Lead Security resource on IT total outsourcing engagements - Fortune 1000 client


base.
 Presenter and Speaker to C-suite on Cyber/Cloud/IT Security.
 Supported large telecom client move into the USA from regulatory/compliance/billing
effort.
 Developed & Implemented new working model for cross-functional security support
on large/complex deals.

 Provide security recommendations, including Cisco ASA Botnet filter, Cisco


hardware configuration standards, auto-conflict detection, and policy object manager
 Utilized FireMon to accelerate the addition of firewall rules within the new primary
data center

26
Information Security Architect

You might also like