I am a Network and Network Security engineer with 17 years of hands-on technical experience. I work full time as a Network Security Consultant for a large insurance company. I have a Bachelor of Science in Applied Information Technology, an MBA, and CISSP ( Certified Information Systems Security Professional) & CEH (Certified Ethical Hacker) certifications.
I have 15 years of professional IT experience in Desktop Support, helpdesk, Active Directory, Server Administration, Information Security. Higher me to get the job done.
An IT & commercial banking professional with more than 35 years managerial experience. My experience encompasses IT Management, Project/Program Management, retail banking, internal audit in the banking industry. I have extensive hands on experience in almost all functional areas of IT & auditing. I am highly proficient in using microsoft office. I am an MBA & MSc(Statistics) and also hold the following certifications: PMP, CISSP, CISA, CISM, CIA, CQA, CAIIB, ITIL & ISO 27001 Lead Auditor. I have experiance of managing data center, system acquisition, development and deploymentusing well known standard methodologies, I have rolled out PMO, successfully managed complex projects. I have in depth experience of developing IT startegy, enterprise architecture, and developing policy/procedures (for IT , IS security and retail banking operations). Have expertise in outsourcing - RFP, RFQ, requirement management, contract negotiations etc.
Enter info here....
My technical experience and interests as a system engineer and system architect focus on Linux and Open Source...
I have strong technical skills in IT security, Unix/Linux, OS X, and scripting/programming. Most importantly, I have a natural aptitude for diving deep into complex problems and pulling together a solution. Ive participated in a lot of projects and investigations spanning a lot of technologies. I know how to stitch things together into a coherent picture. This is also the approach I take when trying to solve everyday security challenges. Get the overview, understand the constraints (legacy app, low budget, etc.), assess the risks, put together a plan for solving it, then get it done.
database programming, Information Security, Certification and Accreditations, sports & fitness motivation,
Information security professional with more than 6 years of experience in Security Incident management, vulnerability management, risk management, telecom/network security. All aspect of information Security (Technical, Operational & Management).
I am Microsoft and Cisco certified.
I am based in the U.S., and I carry appropriate "Errors and Omissions" insurance related to security consulting. You wouldn't hire someone to repair your roof without insurance, why would you hire a security professional without insurance. Prior experience includes working as a security consultant focused on health care, working as the most senior technical ansecurity professional at a health insurance company, and building scalable web applications used by Fortune 10 companies.
Technically sophisticated computer professional with ¿hands-on¿ information security and networking expertise. Able to formulate and implement advanced technology and business solutions to meet a diversity of needs. Known for excellent malware and risk analysis, problem solving, communication and leadership skills.
Existing IT Director with 13 years of advanced experience in all areas of IT management and administration. Covering many areas, such as network management, collaboration systems, voice over IP systems deployment and management, global support desk deployment and management, global network consolidation and support, integrations and acquisition/divestiture based planning and implementation, etc supporting many environments and architecting many global systems and processes. Management of security.
Over 15 years experience in Information Security profession, I am very passionate about security and have a long career of notable successes. During my career I've worked with variety of business sizes and government agencies. I've published information security articles and have presented at multiple security conferences.
IT Infrastructure Design and Management. 4+ years in designing, deployments and Managing IT Infrastructures. CCNA, CCNP certified, MCTS Certified.Extensive Knowledge and Hands On experience on Linux. A competent & result-oriented professional offering 4+ of rigorous experience, with excellent understanding of IT Infrastructure, specializing in Systems and Network Infrastructure Design/implementations and Management and determined to carve a niche in the field of Systems and IT Infrastructure Management, Currently spearheading as Tech Support Consultant with Allscripts India. Extensive experience in Network administration, troubleshooting and repair. Designed, installed, configured and maintained complex routed LAN and WAN networks. Supervised permanent and contract personnel. Excellent communication skills with the ability to interface at all levels. Reliable as a fully contributing, responsible, disciplined, hardworking and accountable member of task/project teams.
Sydney-based Web Developer and Security Consultant focussing on securing PHP/MySQL servers running Wordpress & Joomla sites.
Over Eight years¿ experience in the areas of information technology, security, governance, risk, compliance & IT Audit. Have vast experience of project management by working on a broad range of projects across various industry segments. Worked on various projects in terms of e-commerce system development, their security compliance. Experienced in developing contingency plan and Disaster recovery plans and procedures. Experienced in making policies align or implementation of systems/process according to the industries best practices like CoBIT, ISO 270001, and PCI DSS etc.
Highly skilled security professional with over than 4 years of in-depth ethical hacking, exploitation, security analysis and information security experience and knowledge Supporting a team of security professionals providing real-time threat management through analyzing various types of event sources detecting suspicious behaviors within a complex managed security services environment, for the assurance of proper prioritisation, incident assignment, and adherence to customer SLAs. In addition of professional security services project delivery for clients, services including penetration testing, vulnerability assessments, architecture security review, wireless security testing, web application security
IS Consultant is a leading organisation providing services in Information System for last 7 years. we mainly work in IT infrastructure, Security, Surveillance, Management, Compliance and business solutions. our clients are from SMB to Enterprise and Manufacturing to Banking sectors. IS Consultant is not limited to Pakistan only we have completed projects in UAE, Saudi Arabia, and Afghanistan. Our team consists of industries leading certified professionals like Cisco, Juniper, Fortinet, Microsoft, Symantec, Kaspersky, McAfee etc. we have a prove record of on time delivery with international standards
S.M.O.K.E. TECHNOLOGIES is an exceptional technology & Business Solution company providing IT Solutions, Services, Products and Training &Consultancy. We also provides custom integration and software development services for all types of identity management applications such as Voice and other Application integration methodologies with Ease of Access & Cost Effectively. We are also the partners of VMWARE, TREND MICRO, IBM, MICROSOFT, JUNIPER NETWORKS and GOOGLE in Rajasthan INDIA.
I have a diverse set of skills that would benefit any employer. With the willingness to learn and become efficient in what I do, things get done quickly and accurately. My educations extends beyond the Masters degree in Cybersecurity. Hiring me, you will not go wrong.
15 Years Of Hands-On Experience: In the development, implementation and management of complex Enterprise Cyber Security-Information Systems Security Programs, Information Assurance Risk Management Programs and Counterespionage-Insider Threat Defense Programs for the DoD, National Level Intelligence Centers, U.S Government Agencies, State Governments, large and small businesses. Leadership Skills: Recognized as a seasoned security professional, who provides a practical approach to the security of data, information systems and risk management that meets both the needs and constraints of the organization. I have a proven track record of achievement, regardless of the technical, non-technical and political challenges within an organization. Demonstrated team player, with the ability to successfully initiate, lead and manage individuals and multiple projects, from inception to completion.
I am a DevOps IT Professional with strong experience in application development and operations support. I can deliver quality application/product emphasizing on security at all layers. I am certified professional in CISSP, CISA, CISM, SCJP and PMP. With more than 15 years of experience, I can assure that my clients will get a quality work on time and within budget(even if it's low). I have implemented major Identity & Access Management infrastructure using leading vendors like CA, Novell and even custom developed Java applications.
Audit and policy designing based on ISO27001 standards. Conducted compliance audit and prepared the internal audit checklist Policy. Conducted Risk Assessments, Vulnerability analysis and Penetration testing Conducted Security Audits Designing and testing the operational procedures for disaster recovery, ISO27001 documentation for operational procedure of security products. Soc Compliance & Data Loss prevention
Tim Mather is a long-time information security practitioner, having also served in senior roles at Splunk as CISO, RSA Security at Chief Security Strategist, Symantec as CISO, VeriSign, and Apple. He specializes in building information security teams, and implementing effective enterprise information security programs. Tim has co-authored two books on information security: Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (O'Reilly) and The Executive Guide to Information Security: Threats, Challenges, and Solutions (Addison-Wesley). Tim is a CISSP, CISA, and CISM. He holds Masters Degrees in Information Assurance from Brandeis, National Security Studies from Georgetown University, and International Policy Studies from Monterey Institute of International Studies. He holds a Bachelors Degree in Political Economics from the University of California at Berkeley. Tim has extensive public speaking experience at major information security conferences.
I have over 13 years experience in building, managing, and assessing cyber security programs in both an operations environment and in a consulting capacity with a variety of US Government and state agencies and with private sector companies. I have built best-in-class cyber programs, and provide practical, implementable advice and guidance for securing systems and information and managing risk. I understand the challenges with regard to information system security and risk management, and can offer creative solutions that are tailored toward your corporate or government mission and business needs.
Certified information security professional with experience in Windows Active Directory system administration, server configuration, maintenance, and troubleshooting. LAN/WAN networking design, implementation, and administration skills. Thorough knowledge of all Microsoft, Mac, and Linux desktop operating systems. System implementation and migration specialist.
Highly driven, quick learner with strong consultative and technology management skills. Excels at analyzing complex situations and creating new insights to improve business processes and maximize use of technology. Thinks strategically, plans clear goals and delivers high-value results. Specialties:Certified Information Systems Security Professional - CISSP, Professional Engineer - PE, IT Leadership, Project Management, Technology Architecture and Integration, Strategic Planning, Forecasting and Budgeting, Organizational Management Design, Emerging Technologies, Contract Negotiation, Business Process Improvement
I am a Linux engineer with 10 years of working experience and having (5 years) experience in host based IT security with regards to vulnerability assessment, remediation, patch management, and audit.
Highly-motivated and resourceful IT Management Professional with a record of developing and supporting successful IT teams, projects and solutions incorporating a wide range of technologies. Consistently recognized as able to improve organizational effectiveness and efficiency through leadership that aligns the business processes and IT security organization to realize cost savings, accelerate performance, and sustain strategic flexibility.
i am good understanding and hard working person
I am a Software Engineer with more than seven years of experience in software development and maintenance. I have done Masters in info security. Have hands on experience of maintaining various network security devices. Pentesting using backtrack and metasploit. I have a flair for writing technical documents and research papers. I am well read and can write essays / articles about various topics not limited to technical subjects only. For interested clients free sample of writing will be provided on topics of their choice. Have worked as Oracle DBA / developer and possess good command over Oracle Forms and Reports 6i/11g and Oracle Apex.
St Augustine's Fastest Growing Computer Repair and IT Company! 24x7x365 Network Monitoring! 24x7x365 Remote & Phone Support! Never let your company's server see any down time again! Keep you business' important data safe! Call for a free consultation today (904)342-2947.
Network and Security Engineer with over 9 years of experience in installation, configuration, administration and troubleshooting of LAN/WAN; Wide experience in Network Security system, advance knowledge in design, installation, configuration and maintenance of Firewalls, Routers, Switches (CISCO and JUNIPER). Good knowledge in Routing (Configuring and troubleshooting of IP RIP, EIGRP, OSPF, Policy based routing, Redistribution etc.) Switching (Vlan, Trunking, Aggregation, STP, MSTP, VPLS, MPLS), Security ( Firewalls, IPS, Access Control, VPN, Vulnerability assessment, Filtering, secure IOS/ Junos, DDOS and Reconnaissance attack prevention), Application Services ( CSICO and ACE Load Balancers) CCNA CCNP CCIE Written JNCIA FWW
Innovate as our name presents we have a passion for providing information security to our clients innovatively. We believe in innovation as our world is developing drastically everyday with new and highly efficient technologies coming to the board. We cannot rely on our old and obsolete methods of securing and developing projects due to upgraded efficiency of people with unpleasant ideas. Moreover there are technologies developed and used by various government and intelligence agencies which are highly efficient, but highly un-affordable for corporates.
I strongly believe in Trust, Communication and Satisfaction Core security experience of 6 years: Web Application/Network/Mobile Penetration Testing Wordpress/Joomla Security and Malware Analysis/Removal Ethical Hacking Security Consulting iPhone/Android/Blackberry/J2ME Mobile Security Testing Security Code Review (.NET, JAVA, PHP) Vulnerability Assessment of Network Devices/Databases/Web Server/Application Server Wireless Security Process and procedure documentation PCIDSS Consulting and Preparedness Blog: http://nileshkapoor.blogspot.in Freelance Experience and Reviews: https://www.odesk.com/users/~01ce293178b4498996 Author of Security Testing Handbook for Banking Applications published by IT Governance, UK Certified Ethical Hacker (CEH) Conducted security assessment of 200+ applications including E-commerce application, Wordpress apps, client-server apps, android apps, Internet Banking application, Trading application, Financial Applications
Tharaka is an experienced Security and Risk management Officer and executive-level expert on information and security technical implementations, information security architecture, information security and infrastructure resilience, risk management and information security compliance. Mr. Tharaka has demonstrated executive-level expertise and success in implementing, operating, managing and continuously improving information and security posture in client business. His risk management accomplishments include implementing information security policy and procedures, vulnerability reduction programs, information security operations, identity management systems, information and infrastructure resilience capabilities, information security configuration and vulnerability management, and information security professionalization programs.
Je suis français d'origine mais j'exerce au Québec !
I have over 17 years of experience in IT and possess expertise in a variety of areas, including system administration, information security, and software development. This broad range of experience allows me to better see the big picture, which helps me to deliver solutions that not only work on paper, but in the real world, too.
S.M.O.K.E. TECHNOLOGIES is an exceptional technology & Business Solution company providing IT Solutions, Services, Products and Training &Consultancy. We also provides custom integration and software development services for all types of identity management applications such as Voice and other Application integration methodologies with Ease of Access & Cost Effectively. We are also the partners of VMWARE, TREND MICRO, IBM, MICROSOFT, JUNIPER NETWORKS and GOOGLE in India
Information Technology (IT) Consultant specializing in the area of Sarbanes-Oxley (SOX) controls, IT Controls, Operational Risk and CyberSecurity.
I posses a proven ability to implement, install, configuration, maintain and support, troubleshoot, administer, control and own IT security operations and Information management, of computer based security information systems, as well as having .NET programming and analytic mind,an eye for detail and able to multitask under pressure. An excellent communicator that relate well with people at all levels.
A lean and dynamic organization that provides technology solutions and services in Software Development, Server Administration, Networks and Technology Security that maximize on innovations and quality to deliver low cost solutions that are scalable and fullfill business requirements.
We are a group of highly motivated and experienced IT infrastructure experts, with the highest level of certifications with more than a decade of experience in the respective areas like Networking, Security, Windows, Linux, Datacenter Center Operations, Virtualization - Proprietary and OpenSource, Databases, Unified Communications, Wireless communications, creating High & Low level Design and architect the most complex environments. We do consulting for small, medium and large scale companies with scope ranging from helping design the infrastructure to doing assessment of your existing environment or to configuring or troubleshooting a single device or a complete environment.
Technical Writer capable of writing articles, brochures, manuals, business plans, project SOW and all types of material.
University of Belgrade, Faculty of Organizational science, Information systems EXPERIENCE: -IT planning and coordination -IT budget planning -Business continuity and disaster Recovery -Incident management -Operational change management -AIX system installation, configuration and maintenance -Network and telecommunications -Design and administration Cisco devices oVPN and network security oVoice over IP (3CX PBX software) -Server virtualization oHMC - IBM pSeries oVMware ESX - for Windows and Linux oAV protection software - installation and administration Projects: oEstablish Disaster Recovery site - project manager (PM) oSMS customer notification and queries - PM omPayment project (mobile phone payment solution) - team member (TM) oVoice over IP (3CX PBX software) - TM oISO 27001 certification - TM oImplementation Ebanking (corporate and retail) TM oPayment system implementation - TM oSMS customer notification and queries - PM oOn line card authorization -PM
Seasoned information security leader with established record of optimizing the confidentiality, integrity and availability of organizations
20 years experience designing, installing and troubleshooting telecommunications and network systems (including wireless and VoIP) to meet the functional objectives of the business. Collaborates in the design of the telecommunications and network architecture, designs the telecommunications and network infrastructure, and plans and designs LAN/WAN/wireless/VoIP/Video solutions. Perform capacity and resource planning, assessing network risks and contingency planning. Responsible for the implementation and maintenance of telecommunications network management software; researching, analyzing and implementing software patches or hardware changes to fix any telecommunications or network deficiencies.
Full time freelance IT security consultant, working from my home office in Toronto, Canada. Past experience includes C,C++,Perl,.NET, SQL, ITIL. Highly proficient in Linux/Unix platform. Had 9 years+ corporate experience in IT industry.
Hire me to perform the following services for you: Build / enhance your company
Trained to be a professional information security manager with vast knowledge in almost all the information security domains pertaining People, Process and Technology. skill full in Operating Systems like (windows Architecture & Security, Linux Architecture & Security, Obuntu, Backtrack), Technical Skills in (Network security, Access Control, Cryptography, wireless communication & Telephony, Cloud Computing & Virtualization, Web Application Security, Database Security), information Processing, Compliance and Business Assurance like (ISO 27001, PCI-DSS, CoBiT, FISMA, Basel ll Compliance, SAS 70, COSO, HIPPA, OCTAVE, ITIL, Risk Management, Business Continuity & Disaster Recovery, Cyber Crime Investigation & Forensics, Computer Audit & Assurance, Operations Security, Security Incident Management, Physical & Enviromental Security, Cyber Laws and Enterprise Security Architecture). Other technical tools hands on are Wireshark & True Crypt.
IT Professional with side knowledge in IT Security, Networking, Databases, Operating Systems and Embedded Systems.
Professional Network Administrator with 12+ years experience in the planning, design, and implementation of network technologies. Background includes hands-on experience with multi-platform, LAN/WAN environments.Demonstrated record of success in troubleshooting computers, increasing efficiency and optimizing the access and utilization of shared information Specialist in extending technology services from corporate headquarters to field operations. Professionally certified in a wide range of networking technologies
IT KnowledgeBase specializes in network security analysis and disaster recovery services for Microsoft, Citrix, Cisco, VMware, RedHat Linux & Wireless networking environments. If you are looking to have a security audit performed on your network, or have a proper data protection & recovery plan in place for your organization's data drop ITKB a line! ITKB can provide the following services: *Security Audits *Network Security Configuration *Disaster Recovery Services *Network Design
Experienced Business Continuity and Disaster Recovery Expert.
Before I get into how I can help solve your most difficult IT problems, I'd like to state the #1 value that I add--I LISTEN. Clearly understanding and communicating with my clients is the most critical task that I have. With over 20 years of software development experience in both the Federal and commercial sectors, I have the knowledge and expertise to deliver technology solutions that exceed expectations. I hold over 10 certifications, have a MS in Technology Innovation, and provide instruction in all areas of Information Technology I am the perpetual student in the areas of Solution Architecture, Information Security, and Software Development. Being well read and staying current with emerging technologies is critical to delivering cutting edge, future ready solutions that incorporate industry best practices. If you are seeking an expert to provide you IT solutions, then I'd ask you to consider me for your future work.
Masters of Science in Computer Science with experience 10+ years in all aspects of communications, network and system engineering. Specializing in IT security.
Established track record with 6 plus years of experience in helping organizations to efficiently use their networks; ensuring that the design of an organization's computer site allows all of the components, including computers, the network and software, to fit together and work properly. Also monitor and adjust the performance of existing networks and continually survey the current computer site to determine future network needs; as well as troubleshoot problems reported by users and by automated network monitoring systems and make recommendations for enhancements in the implementation of future servers and networks
SOFTWARE DEVELOPMENT We transform your business idea for precision and accuracy. Use one that is predesigned for you or let us customize one for you e-COMMERCE & PAYMENT SOL Online commerce is not limited to Amazon and E-bay. There
Providing network and security solutions that requires planning, implementation, troubleshoot and maintain complete network infrastructure of the enterprise customers.
Here are few of the successes I have achieved: IT Operating Executive: Managing complex internal IT organizations. As a datacenter manager for a classified project I led a team of several system and network administrators. I have managed, system upgrades to transition into a state-of-the-art Windows and Solaris environment. Information Security Officer: Managing the Information Security process and the implementation of technology to support these processes. I was the first contractor to be elected chairperson of the Bureau of Labor Statistics Tactical Security/Response Committee. Experienced Technical Project Manager: Managed 17 projects that covered Information Security vulnerabilities. My leadership and technical ability on a team that was severely understaffed passed on a cost saving of $650,000 by not having to hire 2 additional consultants. I have repeatedly outperformed in the face of start-ups, turnaround and growth challenges.
preScure will help you manage the WordPress security. We are in the business of WordPress security for about 5 years and now this service has turned into a product by itself. Our dedicated team can help you fix your hacked / infected WordPress site.
i'm networking expert in deployment, designing networking and security infastructure.
Over 17 Years in the areas of IT Infrastructure Management, Information Security Management, Project Management, Service Delivery, Data Centre Operations Management, MIS Reporting, etc.
Manage Network, Network Security and network cable
I am a self-starter, highly motivated individual with a wealth of experience, capable of working with limited or no supervision. My work spans real-time, embedded systems and organic, server-based applications with web interfaces, addressing the full lifecycle of software development. I am ideally suited for highly complex tasks requiring innovative solutions. My experience spans the use of numerous technologies, and within several industries. These have enabled me to assimilate information rapidly and become productive with a minimum of lead time. Whatever your software development needs are, &quot;I'm your man&quot;, as the expression goes. I hold a current secret security clearance for any work involving classified information.
IS AN ARTIST,SOCIAL WORKER,STUDENT UNION LEADER,MIG33 MERCHANT AND GLOBAL CHATTING MEMBER .CHATTING IS BEST NEPAL
I enjoy writing for pretty much anything. I can give examples of my latest pieces on request.
Bachelor degree in Computer Science. 20 years of IT experience, among which 13 years focused in Information Security. Expert in SIEM technology. Deployed, managed and supported QRadar and ArcSight. Integrated SIEM with Windows, Linux, networking and security devices. Expert in Firewall and VPN technology. Deployed, managed, integrated and supported CheckPoint, Cisco, Juniper and Palo Alto products. Expert in IPS, NGFW, two-factor authentication systems, email security, endpoint security and other technologies. Certifications: CISSP, CISA, SANS GCIH, CCSE+, JNCIS, CCNA, MCSE, TippingPoint TCSE, FireEye System Engineer, Q1Labs QRadar Certified System Engineer, Riverbed RCSP, RSA RCSE
Sinaptica Security is an argentinian full-service information security firm. We specialize in security assessments, compliance audits and penetration tests, using our extensive knowledge of best practices to help our customers to protect their computer systems against threats on the Internet.
IT Security is a function of all business, not a road block. I have 15 years of experience in assessing, documenting and training organizations in the requirements of Administrative and Industrial Control Systems. My work includes developing dynamic Business Impact Assessments to be used to help guide management in their Disaster Recovery Planning
Senior MIS/ICT Consultant with extensive experience at different levels of project and program management including overall responsibility for providing business solutions. having Master certificate in IT/IS project Management in additional of his CPM Certified Project Manager & CIPM Certified International Project Manager certificates. My information technology career experience for the last 10 years as an IT Manager in Telecom Group include a huge managerial roles experience in the IT and Telecommunication project management fields. Also, strong project management and budgetary skills, excellent architectural knowledge, and works well with both ICT staff and non-ICT managers. My experience includes applications development, infrastructure management, telecommunications and program office management.
Our Name-SIPL Our name represents our Strength : SIPL stands for "Sun Infosystems Pvt Ltd"
Trojan Horse Security is headquartered in Washington DC, just down the street from the White House. We are specialists in corporate security and pride ourselves in only employing the very best consultants in the world. All of our consultants have over 10 years experience and are industry leaders. have worked for a major consultancy in a senior role. Trojan Horse Security Team members have backgrounds in the Secret Service Presidential Detail, State Department Diplomatic Security Bureau, and tier one Special Operations SEAL Team Six. Having had the responsibility of protecting vital infrastructures and world leaders We never hire anyone junior or mid-level. In fact, Trojan Horse Security was established because the founders saw their old consultancy firms sending out junior consultants with minimal or no experience and charging their clients for senior level resources THS serves all sizes of companies from the Fortune 500 to SMEs. www.TrojanHorseSecurity.com
I have worked on the network security side of the house for the past 8 years. In the past 5 years I have become a key member of a fortune 500 companies network security team. I was previously a Systems Administrator on Windows and have been using various flavors of Unix/Linux for the past 15 years. I'm very professional, no job is to big, no company is to small. I enjoy what I do and I'm very passionate about my job. I am not happy unless the customer is completely satisfied with the work performed.
I have solid SAS background.
Twelve+ (12+) years of extensive hands-on technical and Project-Management experience to develop and support IT infrastructure, Data Networks, Video Conferencing solutions, software and servers deployment at enterprise level with expertise in design, implementation, development and enhancement of Data-Center, LAN, WAN, VSAT, RF, video conferencing and wireless based networks and its management. CCNA, CCNP, CCIE, MCSE 2003, MCITP 2008, MCSE 2012, IBM Lotus Notes Certified
Solutions-oriented IT Network and Security Engineer with notable success directing a broad range of IT initiatives while participating in planning and implementation of information-security and IP service solutions.
4+ years of experience in training.Which include the domians like Microsoft(MCSE,MCTS,MCITP) Cisco(CCNA) Linux Security(CHECKPOINT,PIX) CEH Management Informations System Organizational Ttheory and Behaviour MS-SQL 2005&2008
Know anyone that really enjoys what they do? Well that's me. Head down, working hard on trying to secure our environment and do the right thing. I live and breathe for IT Security. What I enjoy: Leading competent and talented individuals, challenges, complexity, variety, troubleshooting, risk assessments, securing architecture, managing or leading projects, and increasing my knowledge. CISSP and GCWN certified. Specialties: IT Security, Network Architecture, Process Improvement, Expert product deployment/implementation.
Competent, confident, client-oriented information technology professional with considerable experience augmented by a post-graduate level education in Computing Science and refined by specialized, industry-related training. Flexible and focused, with statistically unique analytical problem-solving ability. Exceptional knowledge of and experience in hardware, software, and applications for defense, transportation, oil and gas, and service industry. Significant business understanding, coupled with hardware, and software engineering analysis expertise including design, draft of technical blueprints, development and enterprise deployment.
Multifaceted, pragmatic and driven professional that will utilize excellent technical skills and a passion for analyzing client requirements in the design and implementation of strategic solutions to complex technical issues. Hold over 30 years of ongoing IT experience in both independent and collaborative work environments. Expert in Unix and Linux. Worked as Solution Architect, Instructor, System Administrator, Unix Team Leader, System Analyst, Technical Consultant and Software Engineer. 10 years experience as a university instructor, teaching online classes in Unix, Linux and Information Systems to undergraduate and graduate students. Excellent interpersonal skills, with extensive experience teaching and presenting to all levels of staff and management.
Information Security & Risk Management Expert
Ph.D. candidate in computer information systems. CISSP, CCNA, FCNSA 12 years Linux SysAdmin
I am a Industry certified (CISSP, GSEC) Information Security Specialist who specializes in Vulnerability assessments and Penetration Testing. I have worked with Ivy League Universities, government agencies and private organizations. I have been formally trained in Network defense and Offense, Malware Analysis and Intrusion Detection. I have also worked with clients to provide Risk Assessments for various applications, 3rd party vendors and systems design.
I am a software developer with a BS in Computer Science and 13 years of experience. My core areas of expertise include: information security, object-oriented development, web services/SOA, databases, cloud security, and all the underlying technologies that support those concentration areas. I enjoy taking on challenges and I learn new skills quickly. I am a Certified Information System Security Professional (CISSP) and a Certificate of Cloud Security Knowledge (CCSK).
Have a experience of 6+ years in the Information Security Domain with academic back ground upto Masters in Networking and Telecommunications and Engineering in Electroncis.
Information security architect, consultant, manager and enthusiast. Focusing on managed security, security operations center development and research on the field of distributed threats and cyber warfare. I can help with security review of architecture and design, RFP evaluation and consultancy regarding strategic decisions on cyber security.
20+ years writing automation scripts in Unix shells and most recently, in Windows PowerShell for NetApp FAS2040 and FAS2240 filers using the DataOntap PowerShell Toolkit.
V.I.Balaji, CISSP, has over 14 years of information security, information technology, compliance and legal experience. He graduated from Bharathiar University in Coimbatore, Tamilnadu, India with a B.Sc in Sciences. Mr. Balaji spent several years practicing ISO Compliance and regulatory standards related to International requirements focusing primarily on IT networks, security, ISO 9001, ISO 27001, SOX, PCI etc.,
4 yrs SECURITY CISSP Security Consultant Business strategy into security road map;Detailed knowledge PCI / PA-DSSv2 Architect and author of full system design / documentation of PCI Payment application (PA-DSSv2) Security risk assessment/gap analysis/PCI SAQD self assessment. Writing practical policies/processes/training through e.g Incident Response,Vulnerability,Risk management. Defining policy/standards for OS, application stack, IDS, Firewall, WAF, SIEM 10 yrs ARCHITECTURE/DEVELOPMENT Design/Implementing J2EE Jboss clustered SOAP/REST services Advance db design MsSQL/MySQL master/master Application hardening (covering OWASP top 10+) OSSTMMv3 security testing methodology 15 yrs TELECOM - CTI Designing telecom services (Envox/Asterisk/SER/SIP/TDM) from IVR/Complex Call centre ACD/ Predictive dialer services/Voice recording/Conferencing:Full ability to build/deploy/manage to client CPE or cloud servers/SIP providers 4 yrs CLOUD (AWS,RackSpace,Linode) REFERENCES PROVIDED
Experienced digital forensic, data recovery and information security expert with over 30 years of engineering and information technology experience.
System Engineer interested in Computer Sciences with strong knowledge in system administration, security and comunications. Experience and expertise with open source software, experience in the design, implementation and maintenance of high-availability systems. Experience in system security, network TCP/IP administration and troubleshooting skills. Especialidades:Operating Systems: Unix, Linux and Windows UNIX Shell Scripting and Perl Network monitoring: (Nagios, Munin, cacti, Pandora, Splunk, PNP, mrtg) High-availability: Linux Network (Bonding), RAID, HBA, Heartbeat and Mysql Cluster Networking systems: Switches and Routers (Cisco and 3Com). Routing protocols in Cisco Routers and Linux environment with quagga VoIP: H.323 gatekeepers and SIP PBX Security: Firewalls and Network TCP/IP security Databases: Oracle, MySQL, PostgreSQL. SQL-PL/SQL
Over 15+ yrs in IT and have experience in most areas from Windows programming to data networking and voip as well as security and compliance (PCI DSS etc)
Experienced DR professional worked in Big 4 consulting in india
Triple CCIE with 25 years of experience with Data Centers, Networking, WAN, LAN, & Security. Highly accomplished, energetic, enthusiastic, technology leader experienced in managing up to 40 individuals, as well as organizations with annual budgets of up to $7 million. Extensive experience leading complex, large-scale IT organizations that deliver world-class technology services to business operations. Expert in partnering with business executives, introducing disciplined management processes, and systems that reduce costs, improve productivity, and drive service excellence. Proven ability to design and deliver solutions that delight business customers while producing tangible ROI. Proven ability to develop, motivate, and lead high-performance teams. Consulting experience with Fortune 500 companies and expertise in key areas of information technology.