John Whitney has over 25 years of experience in IT and information security. He is currently a Security Analyst at Edward Jones Investments where he has been the Symantec Endpoint Protection Manager (SEPM) Administrator for three years. In this role, he is responsible for maintaining SEPM across production, test, and development environments. Previously, he held security roles at other companies where he administered security tools like firewalls, antivirus software, and intrusion detection systems. He has a Master's degree in Information Security and Assurance and several security certifications.
Venkatesh Eganti has over 5 years of experience in IT support and administration. He has extensive knowledge of Windows operating systems, networking, virtualization, security, and project management. He is proficient in technologies like Active Directory, Exchange, firewalls, and VPNs. Currently working as an IT Executive, his responsibilities include server support, network security maintenance, and troubleshooting desktop issues for users.
Jesse Hinton is a senior systems administrator and network engineer with over 20 years of experience seeking a new position. He has a TS/SCI clearance and experience maintaining secure enterprise networks for the Department of Justice and Department of Defense. His skills include systems configuration, asset management, information assurance, and project management on various platforms including Windows and UNIX.
Sriram R is seeking a position as a Windows Administrator with over 4 years of experience administering Windows systems from Windows 2000 to Windows 2012 Server. He has extensive experience with technologies including Active Directory, DNS, WINS, Microsoft Exchange, TCP/IP, networking, and fiber optics. Currently he works as a System Administrator for Inspace Technologies Chennai where he installs and troubleshoots issues with Linux, Windows servers, Outlook, antivirus software, and other applications.
The document provides an introduction to system administration. It discusses what system administration entails, including managing computers, hardware, software, operating systems, applications, networks, and users. It outlines the duties of a system administrator, such as applying updates, installing/configuring hardware/software, managing user accounts, performing backups and troubleshooting issues. It also describes the duties of a datacenter engineer, which involves server installation, monitoring, maintenance and issue resolution. The document discusses different types of administrators and users as well as operating systems that support system administration like Windows, Unix and Linux.
System administration involves tasks like maintaining computer systems and networks, setting up user accounts, monitoring performance and security, updating software, and troubleshooting issues. It requires broad technical knowledge as well as skills in areas like communication, problem solving, and planning for future needs of systems and users. While computer systems and the roles of system administrators have become more complex over time, the core goals remain ensuring systems and networks are operational, secure, and meeting the needs of users.
Beyond the Scan: The Value Proposition of Vulnerability AssessmentDamon Small
油
Vulnerability Assessment is, by some, regarded as one of the least sexy capabilities in information security. However, it is the presenters view that it is also a key component of any successful infosec program, and one that is often overlooked. Doing so serves an injustice to the organization and results in many missed opportunities to help ensure success in protecting critical information assets. The presenter will explore how Vulnerability Assessment can be leveraged Beyond the Scan and provide tangible value to not only the security team, but the entire business that it supports.
This document provides a summary of John "Michael" Rzepkowski's professional experience, including over 26 years of experience as a network systems administrator, engineer, and technical lead. He has supported numerous customers using various operating systems and software. Currently, he is the integration technical lead supporting all Booz Allen SCIF spaces in Northern Virginia.
Steve Nuccio Jr. is an IT professional with over 20 years of experience in information security, compliance, and systems administration. He has a B.S. in Computer Information Systems from Tulane University and has held several leadership roles managing security programs, vulnerability testing, disaster recovery, and technical operations at companies including Service Corporation International and Investor's Trust, Inc. He has a proven track record of implementing security best practices, frameworks, and tools to ensure regulatory compliance.
This document discusses implementing a secure software development lifecycle (SDLC) to improve application security. It outlines why the traditional approach of only involving security experts does not work. Instead, it proposes integrating security practices throughout each phase of the development process, including requirements, design, implementation, verification, and release. This includes training developers, conducting threat modeling and security testing, using security tools in continuous integration, and analyzing results to address issues early. The goal is to reduce security defects over time by changing developer mindsets and integrating security as applications are built.
The document discusses the career of a system administrator. Key responsibilities include setting up and maintaining network accounts, installing and updating software, monitoring system and network performance, implementing security policies, and troubleshooting hardware and software issues. A bachelor's degree is required, with professional certifications and sometimes a master's degree preferred. Salaries typically range from $56,000 to $70,000 annually. The career offers a variety of tasks and control over network operations.
Durgesh Deorukhakar is seeking a middle level position in network and system administration. He has 9 years of experience managing large scale engineering systems and applications. He is proficient in network administration, system installation and configuration, user management, and security policy creation. He has expertise in network security design, configuration, deployment, administration, and troubleshooting complex security systems.
Carlos Mendoza is a dedicated technology professional with over 20 years of experience in systems administration, engineering, and support roles. He has extensive expertise in managing Linux, UNIX, and virtualized environments, as well as implementing solutions, streamlining processes, and providing strategic technical support. Mendoza is currently pursuing additional certifications to expand his skills in areas like Agile project management.
The document provides a summary of Octavius Walton's qualifications and experience including over 13 years in quality assurance/test engineering and security, with a focus on web application security testing, wireless penetration testing, and managing security compliance. He has multiple security certifications and has worked for Oracle, Strategic Security, and SAIC performing roles such as principal QA engineer, security intern, systems test engineer, and network administrator.
The document is a resume for B Prakash seeking a middle or junior level management position involving network and system administration or technical support. It summarizes his professional experience of over 2 years in system administration, desktop and networking support. It details his core competencies, organizational experience with his current employer HCL Infotech including key responsibilities, and previous experience with GKC Projects.
System Administration: Introduction to system administrationKhang-Ling Loh
油
This document provides an overview of system administration, including the knowledge and skills required, typical duties, and various professional certification programs. System administration involves maintaining and operating computer systems and networks, with duties like monitoring security, managing user accounts, performing backups, and troubleshooting issues. Key knowledge areas include operating systems, applications, hardware/software troubleshooting, networking, security, programming, problem solving, and teamwork. Popular certification programs discussed are Linux Professional Institute (LPI), Ubuntu, Oracle, Solaris, IBM, HP, and Cisco, with information on exam requirements and costs.
This document is a resume for Larry L. Leon summarizing his qualifications for a Senior Desktop Support position. It outlines over 15 years of experience in network administration, hardware/software installation, user support, and special projects. He is certified in Microsoft, A+, and Hubble Premise Wiring and has experience supporting over 6,500 workstations at his current employer, Edwards Lifesciences, involving technologies like Exchange, Office 365, SCCM, and Citrix. Previous employers include Choc Children's Hospital and Spireon, Inc. where he provided technical support and assistance to users.
Secure by Design - Security Design Principles for the Rest of UsEoin Woods
油
Security is an ever more important topic for system designers. As our world becomes digital, todays safely-hidden back office system is tomorrows public API, open to anyone on the Internet with a hacking tool and time on their hands. So the days of hoping that security is someone elses problem are over.
The security community has developed a well understood set of principles used to build systems that are secure (or at least securable) by design, but this topic often isnt included in the training of software developers, assuming that its only relevant to security specialists.
In this talk, we will briefly discuss why security needs to be addressed as part of architecture work and then introduce a set of proven principles for the architecture of secure systems, explaining each in the context of mainstream system design, rather than in the specialised language of security engineering.
This version of the talk was presented at GOTO London in October 2016.
Dustin Ibanez is seeking a network security, engineering, administration or management position. He has over 15 years of experience in the United States Navy and as a civilian IT technician. His experience includes managing networks, servers, workstations, backups and security for both military and commercial clients. He has numerous technical certifications and specialized training.
John Demunnik is an enthusiastic cyber network defender and security specialist seeking a new position. He has over 10 years of experience in cybersecurity, including performing vulnerability scans and compliance checks, malware analysis, and network monitoring and defense. He is certified in CISSP, GIAC, ITIL, and various technical areas. He has held prior roles providing cybersecurity support for military and government organizations.
This document provides a summary of qualifications for Mary Jhun Macayana, including 8 years of systems and security administration experience along with experience in hardware support, software development, and security. It details technical skills in operating systems like AIX, Linux, Solaris, and HP-UX as well as capabilities in troubleshooting, upgrading, patching, and securing various platforms. Work experience is outlined for positions at Fuji Xerox, JPMorgan Chase, and Smart Communications providing systems administration, patch management, security administration, and support across various operating systems. Education is listed as a Bachelor of Science in Computer Engineering from Polytechnic University of the Philippines along with various technical trainings. Character references are also provided.
This document provides a summary of Brian N. Simon's qualifications and experience for a Network Technician position. It outlines his computer skills including networking, security, troubleshooting, and various operating systems. It also lists his IT certifications and work history in data center technician roles performing tasks such as hardware installation, cabling, monitoring systems, and customer support.
08252016 John D Resume ITIL PMP CISSP CSM CISA1jjdoylecomcast
油
John Doyle is a highly experienced cybersecurity professional and project manager with over 30 years of experience. He has expertise in network infrastructure, security engineering, project management, and cybersecurity compliance. He is proficient in risk management frameworks and security standards from NIST and has led several large cybersecurity projects.
Daniel Kefer from 1&1 Internet AG presented on 1&1's secure software development lifecycle (SDLC). He began by introducing himself and 1&1. He then discussed the motivation for a secure SDLC, noting the higher costs of fixing bugs later in development. Kefer outlined the common approaches to application security as intuitive, reactive, or proactive. 1&1 aims to take the proactive approach through their SDLC methodology. He described their methodology, including classifying systems based on risk level and assigning different security requirements at each level across both the development lifecycle and technical categories. Kefer finished by discussing 1&1's plans to expand usage and continuous improvement of their SDLC methodology.
Locking down server and workstation operating systemsBen Rothke
油
The document discusses approaches to securing systems when rapid patching is not possible. It recommends implementing network segmentation, monitoring technologies, and user access controls to shield vulnerable systems that cannot be patched quickly. While patching is important, it is not a panacea, and targeted attacks use other vectors beyond exploiting unpatched vulnerabilities. A proactive application security program integrated into the development lifecycle can help mitigate issues before exploits are found. When patching is truly not possible, additional defenses like host-based IPS, firewalls, and encryption should be used to minimize risk.
This document provides a summary of qualifications for Mary Jhun Macayana, including 7 years of systems and security administration experience along with hardware and software development skills. She has experience with AIX, Linux, Solaris, HP-UX and various security tools. Her professional experience includes roles at Fuji Xerox, JPMorgan Chase, and Smart Communications where she performed tasks such as patch management, system upgrades, security hardening, and troubleshooting. She has a Bachelor's degree in Computer Engineering from Polytechnic University of the Philippines and has attended various technical trainings.
Complete coverage of CISSP 7th Chapter - Security Operations. I have made sure to cover all topics from three books in this presentation. For corrections, clarifications, please feel free to reach me.
Edward Copeland has over 25 years of experience in information technology, including 19 years working on Naval IT programs. He has held positions as a senior systems engineer, systems administrator, and field engineer. Copeland has an associate's degree in computer science and holds several IT certifications, including Microsoft Certified Professional. He is a 10-point preference eligible veteran with an honorable discharge from the U.S. Army after 20 years of active duty service.
This document contains the resume of Grace Adedotun-Ogundeji, an IT professional with over 10 years of experience managing networks and systems in multi-vendor environments. She has qualifications in ITIL, CCNA, and is currently studying for an MSc in Cyber Security. Her experience includes roles as an IT Support Engineer, 3rd Line IT Support Technician, Systems Administrator, and Unix Systems Administrator. She has skills in Windows, Linux, networking, security, and more. Her objective is to work as a Chief Information Security Officer, leading information security planning and response.
Felicia Pearson has over 15 years of experience in IT security, including network and systems security, regulatory adherence, cryptography, and risk assessment. She has held positions at Lockheed Martin and CSC providing UNIX/Linux administration, troubleshooting, disaster recovery planning, and security implementation for DOD customers. Her background includes areas such as secure protocols, encryption, log analysis, and technical documentation writing. She has a BA in Computer Information Management and an MS in Managing Computer Information Technology.
This document discusses implementing a secure software development lifecycle (SDLC) to improve application security. It outlines why the traditional approach of only involving security experts does not work. Instead, it proposes integrating security practices throughout each phase of the development process, including requirements, design, implementation, verification, and release. This includes training developers, conducting threat modeling and security testing, using security tools in continuous integration, and analyzing results to address issues early. The goal is to reduce security defects over time by changing developer mindsets and integrating security as applications are built.
The document discusses the career of a system administrator. Key responsibilities include setting up and maintaining network accounts, installing and updating software, monitoring system and network performance, implementing security policies, and troubleshooting hardware and software issues. A bachelor's degree is required, with professional certifications and sometimes a master's degree preferred. Salaries typically range from $56,000 to $70,000 annually. The career offers a variety of tasks and control over network operations.
Durgesh Deorukhakar is seeking a middle level position in network and system administration. He has 9 years of experience managing large scale engineering systems and applications. He is proficient in network administration, system installation and configuration, user management, and security policy creation. He has expertise in network security design, configuration, deployment, administration, and troubleshooting complex security systems.
Carlos Mendoza is a dedicated technology professional with over 20 years of experience in systems administration, engineering, and support roles. He has extensive expertise in managing Linux, UNIX, and virtualized environments, as well as implementing solutions, streamlining processes, and providing strategic technical support. Mendoza is currently pursuing additional certifications to expand his skills in areas like Agile project management.
The document provides a summary of Octavius Walton's qualifications and experience including over 13 years in quality assurance/test engineering and security, with a focus on web application security testing, wireless penetration testing, and managing security compliance. He has multiple security certifications and has worked for Oracle, Strategic Security, and SAIC performing roles such as principal QA engineer, security intern, systems test engineer, and network administrator.
The document is a resume for B Prakash seeking a middle or junior level management position involving network and system administration or technical support. It summarizes his professional experience of over 2 years in system administration, desktop and networking support. It details his core competencies, organizational experience with his current employer HCL Infotech including key responsibilities, and previous experience with GKC Projects.
System Administration: Introduction to system administrationKhang-Ling Loh
油
This document provides an overview of system administration, including the knowledge and skills required, typical duties, and various professional certification programs. System administration involves maintaining and operating computer systems and networks, with duties like monitoring security, managing user accounts, performing backups, and troubleshooting issues. Key knowledge areas include operating systems, applications, hardware/software troubleshooting, networking, security, programming, problem solving, and teamwork. Popular certification programs discussed are Linux Professional Institute (LPI), Ubuntu, Oracle, Solaris, IBM, HP, and Cisco, with information on exam requirements and costs.
This document is a resume for Larry L. Leon summarizing his qualifications for a Senior Desktop Support position. It outlines over 15 years of experience in network administration, hardware/software installation, user support, and special projects. He is certified in Microsoft, A+, and Hubble Premise Wiring and has experience supporting over 6,500 workstations at his current employer, Edwards Lifesciences, involving technologies like Exchange, Office 365, SCCM, and Citrix. Previous employers include Choc Children's Hospital and Spireon, Inc. where he provided technical support and assistance to users.
Secure by Design - Security Design Principles for the Rest of UsEoin Woods
油
Security is an ever more important topic for system designers. As our world becomes digital, todays safely-hidden back office system is tomorrows public API, open to anyone on the Internet with a hacking tool and time on their hands. So the days of hoping that security is someone elses problem are over.
The security community has developed a well understood set of principles used to build systems that are secure (or at least securable) by design, but this topic often isnt included in the training of software developers, assuming that its only relevant to security specialists.
In this talk, we will briefly discuss why security needs to be addressed as part of architecture work and then introduce a set of proven principles for the architecture of secure systems, explaining each in the context of mainstream system design, rather than in the specialised language of security engineering.
This version of the talk was presented at GOTO London in October 2016.
Dustin Ibanez is seeking a network security, engineering, administration or management position. He has over 15 years of experience in the United States Navy and as a civilian IT technician. His experience includes managing networks, servers, workstations, backups and security for both military and commercial clients. He has numerous technical certifications and specialized training.
John Demunnik is an enthusiastic cyber network defender and security specialist seeking a new position. He has over 10 years of experience in cybersecurity, including performing vulnerability scans and compliance checks, malware analysis, and network monitoring and defense. He is certified in CISSP, GIAC, ITIL, and various technical areas. He has held prior roles providing cybersecurity support for military and government organizations.
This document provides a summary of qualifications for Mary Jhun Macayana, including 8 years of systems and security administration experience along with experience in hardware support, software development, and security. It details technical skills in operating systems like AIX, Linux, Solaris, and HP-UX as well as capabilities in troubleshooting, upgrading, patching, and securing various platforms. Work experience is outlined for positions at Fuji Xerox, JPMorgan Chase, and Smart Communications providing systems administration, patch management, security administration, and support across various operating systems. Education is listed as a Bachelor of Science in Computer Engineering from Polytechnic University of the Philippines along with various technical trainings. Character references are also provided.
This document provides a summary of Brian N. Simon's qualifications and experience for a Network Technician position. It outlines his computer skills including networking, security, troubleshooting, and various operating systems. It also lists his IT certifications and work history in data center technician roles performing tasks such as hardware installation, cabling, monitoring systems, and customer support.
08252016 John D Resume ITIL PMP CISSP CSM CISA1jjdoylecomcast
油
John Doyle is a highly experienced cybersecurity professional and project manager with over 30 years of experience. He has expertise in network infrastructure, security engineering, project management, and cybersecurity compliance. He is proficient in risk management frameworks and security standards from NIST and has led several large cybersecurity projects.
Daniel Kefer from 1&1 Internet AG presented on 1&1's secure software development lifecycle (SDLC). He began by introducing himself and 1&1. He then discussed the motivation for a secure SDLC, noting the higher costs of fixing bugs later in development. Kefer outlined the common approaches to application security as intuitive, reactive, or proactive. 1&1 aims to take the proactive approach through their SDLC methodology. He described their methodology, including classifying systems based on risk level and assigning different security requirements at each level across both the development lifecycle and technical categories. Kefer finished by discussing 1&1's plans to expand usage and continuous improvement of their SDLC methodology.
Locking down server and workstation operating systemsBen Rothke
油
The document discusses approaches to securing systems when rapid patching is not possible. It recommends implementing network segmentation, monitoring technologies, and user access controls to shield vulnerable systems that cannot be patched quickly. While patching is important, it is not a panacea, and targeted attacks use other vectors beyond exploiting unpatched vulnerabilities. A proactive application security program integrated into the development lifecycle can help mitigate issues before exploits are found. When patching is truly not possible, additional defenses like host-based IPS, firewalls, and encryption should be used to minimize risk.
This document provides a summary of qualifications for Mary Jhun Macayana, including 7 years of systems and security administration experience along with hardware and software development skills. She has experience with AIX, Linux, Solaris, HP-UX and various security tools. Her professional experience includes roles at Fuji Xerox, JPMorgan Chase, and Smart Communications where she performed tasks such as patch management, system upgrades, security hardening, and troubleshooting. She has a Bachelor's degree in Computer Engineering from Polytechnic University of the Philippines and has attended various technical trainings.
Complete coverage of CISSP 7th Chapter - Security Operations. I have made sure to cover all topics from three books in this presentation. For corrections, clarifications, please feel free to reach me.
Edward Copeland has over 25 years of experience in information technology, including 19 years working on Naval IT programs. He has held positions as a senior systems engineer, systems administrator, and field engineer. Copeland has an associate's degree in computer science and holds several IT certifications, including Microsoft Certified Professional. He is a 10-point preference eligible veteran with an honorable discharge from the U.S. Army after 20 years of active duty service.
This document contains the resume of Grace Adedotun-Ogundeji, an IT professional with over 10 years of experience managing networks and systems in multi-vendor environments. She has qualifications in ITIL, CCNA, and is currently studying for an MSc in Cyber Security. Her experience includes roles as an IT Support Engineer, 3rd Line IT Support Technician, Systems Administrator, and Unix Systems Administrator. She has skills in Windows, Linux, networking, security, and more. Her objective is to work as a Chief Information Security Officer, leading information security planning and response.
Felicia Pearson has over 15 years of experience in IT security, including network and systems security, regulatory adherence, cryptography, and risk assessment. She has held positions at Lockheed Martin and CSC providing UNIX/Linux administration, troubleshooting, disaster recovery planning, and security implementation for DOD customers. Her background includes areas such as secure protocols, encryption, log analysis, and technical documentation writing. She has a BA in Computer Information Management and an MS in Managing Computer Information Technology.
Lionel Deliz is a technical professional with over 20 years of experience in IT systems and infrastructure. He has extensive experience managing Windows server environments, virtualization software, networking equipment, and security tools. His background includes roles as a System Engineer and Network Administrator. He is proficient in technologies such as Active Directory, Exchange, SQL Server, VMware, and configuration management and monitoring tools from Microsoft and BMC.
This document is a resume for Grace Adedotun-Ogundeji, an IT professional with over 10 years of experience managing networks and systems. She has qualifications in ITIL, CCNA, and is currently studying for an MSc in Cyber Security. Her skills include Windows, Linux, networking, security, and systems administration. She is seeking a role utilizing her experience in areas such as information security, compliance, and incident response.
This resume is for Grace Adedotun-Ogundeji, an IT professional with over 10 years of experience in networking, servers, desktop support, and security. She has a MSc in Cyber Security in progress and certifications in ITIL and CCNA. Her experience includes managing servers, desktops, networking infrastructure, and security updates. She is currently studying cyber security and her role will include information security policies, compliance, incident response, and audits.
Abdul Mateen is a senior cloud specialist with over 16 years of experience in systems management, architecture, operations, and technical support. He currently manages internal and external cloud infrastructure and support teams as a manager at Hitachi Consulting. Previously, he held roles at Cisco Systems and Microsoft, where he gained expertise in technologies like Cisco UCS, VMware, and Microsoft systems. He has a proven record of delivering solutions to complex challenges and mentoring teams.
This document provides a summary of Nana Owusu's experience and qualifications. She has over 10 years of experience in information technology, including networking, Linux, Windows administration, help desk support, and security. Her skills include Microsoft servers, Active Directory, security tools, and various operating systems. She has certifications in ethical hacking, security, and CompTIA exams. Her work history includes positions as an Information Assurance Analyst and Help Desk Analyst, where she performed tasks such as vulnerability scanning, incident response, and technical support.
The document provides a summary of Darrell Williams' experience as an IT professional with over 20 years of experience in IT administration, server administration, tier 2 support, customer training, data security, and management. He has extensive experience working with Windows servers, VMware, Office 365, Exchange, and managing both desktop and server environments.
The document provides a summary of Darrell Williams' experience as an IT professional with over 20 years of experience in IT administration, server administration, tier 2 support, customer training, data security, and management. He has extensive experience working with Windows servers, VMware, Office 365, and Exchange. Currently he works as an IT administrator for a manufacturing company where he manages servers, workstations, backups, and other systems.
This document summarizes the skills and experience of Swapnil Kunjir as a System Administrator. It outlines his 5+ years of experience in system administration, active directory administration, and technical support. It also lists his areas of expertise including system administration, networking, technical support, and his roles and accomplishments on various projects for clients like Tata Consultancy Services and Vodafone India. It provides details of his technical skills and qualifications.
Faisal Mukhtar is a PEC Registered Engineer seeking a challenging position in IT that allows him to utilize his skills and experience in network and system engineering. He has over 10 years of experience in various IT roles, including as an IT Analyst, Senior BTU Infrastructure & Systems engineer, Systems Engineer, and Assistant System Administrator. His experience includes administration of servers, storage, networking equipment, virtualization technologies, and enterprise applications.
This document is a resume for Logesh Kumar, who has over 6 years of experience in technical troubleshooting, desktop and server administration, and infrastructure support. He is currently a manager of technical support operations at Telebuy Skyshop, where he is responsible for managing the technical support team, implementing projects, and coordinating with vendors. Prior to his current role, he held positions including assistant manager of IT support and team leader of IT support. His skills and experience include networking, firewall administration, virtualization, database administration, and troubleshooting various operating systems.
This document summarizes the experience and qualifications of Samran Pasha. Pasha has over 8 years of experience in Windows system administration and is proficient in installing, configuring, and administering Windows 2003/2008 servers. He is certified as an MCTS and has experience managing Active Directory, DNS, DHCP, and backups. Pasha is currently an IT Engineer at Tesco in Bangalore, where he is responsible for third-level server support and administration.
This document is a resume for Alen Lonic. It summarizes his experience as an IT Operations Manager at ProHealthcare in Lake Success, NY, and prior roles including Systems Engineer at Citigroup in New York City and Network Security Analyst at Time Warner Cable in Jamaica, NY. The resume highlights his over 15 years of experience in IT operations management, project management, help desk support, network administration, server maintenance, and technical support. It also lists his areas of expertise, education including an Associate's degree in Information Technology and MCSE certification, and contact information.
Daniel Rhodes has over 17 years of experience in IT and business roles. He currently works as a Test Engineer Lead for Innovation Solutions, where he leads a team that tests applications and documents results. Previously he was a Project Team Lead for SAIC, managing agile development processes and performing testing. He has extensive experience in project management, software deployment, and customer support roles in industries including defense contracting, technology, and brewing.
Franklin E. Johnston is a versatile systems engineer with extensive experience supporting medium to large enterprise systems. He has strong technical skills across operating systems, databases, programming languages, and applications. Johnston is known for taking ownership of the systems and users he supports and is willing to take on additional responsibilities as needed. He works well independently and as part of a team.
Harsha Sarjapura Siddartha has over 5 years of experience in cyber security and information security domains. He has worked as a senior cyber security consultant at PricewaterHouse Coopers implementing data loss prevention solutions and database security management. Previously, he worked as a cyber security analyst at Accenture performing computer forensics, security administration, and infrastructure support. He has certifications in security implementation and auditing and has received several performance awards.
Shane Stevens is seeking an IT role utilizing his experience in Windows OS, Microsoft Server, virtualization, SCCM, Active Directory, Citrix, and remote support tools. He has over 20 years of IT experience including roles as a Systems Engineer, Desktop Support Engineer, and Incident Management Analyst. His experience spans work with Australian Geographic, MIT Services, Datacom Systems, and Telstra. He has qualifications in various Microsoft and IT certifications and seeks to expand his skills in areas like Citrix, VMware, and Powershell.
Saravanan Purushothaman is an experienced IT professional seeking a role that allows him to utilize his skills and talents. He has over 10 years of experience in identity and access management, application support, infrastructure security, and systems administration. Some of his technical skills include HP PACS, ITSM, Pega Systems, TIM, Qualys, IIS, MSSQL, Oracle, Linux, Windows servers, and networking tools. He holds several certifications including RHCE, CCNA, ITIL, and has worked with clients such as HP, Infosys, IBM, and others.
This document is a resume for Brian Burrington summarizing his experience as a senior software tester. It details his roles at Quest Diagnostics and LabOne, where he performed testing, developed test plans, managed deployments, and led a testing team. It lists his responsibilities, skills, and accomplishments in software quality assurance and testing for over 15 years.
1. John Whitney
645 S. Burk St
Gilbert, AZ 85296
602-513-1207
msisa@usa.com
Experienced IS professional looking to add value and vision to a challenging work environment by applying
experience and expertise from 25 + years in IT including 12 years IT Security.
Professional Experience
Edward Jones Investments:
Security Analyst (System Security) 06/2012 to Present
Symantec Endpoint Protection Manager (SEPM) Administrator
Responsibility Summary:
My main responibility is Symantec Endpoint Protection Manager (SEPM, SEP)
Administration/Maintenance (SAV, SEP11.0, 12.1..) for the company.
o Version upgrades (SEP11 to SEP12.1, to 121.2, to 12.1.4, & 12.1.6
o Sonar/CIDS updates.
o Create groups, exceptions, firewall rules, policies, MSLs, to keep the SEPM running effectively.
o Analyize and solve SEP problems, implement fixes.
o Work with Symantec Support to resolve situations as quick as possible.
o Verifying that all clients are being update nightly/
o Vertying that clients are getting scanned once a week, and looking for clients that are having
issues with open files during scanning and then resolving the issue.
o Experience with Group Update Provider (GUP) & LiveUpdate Administrator
o I have work with the server team to virtualize the SEPMs.
o Maintain the SEPM in production, the test lab and the development labs.
o Troubleshoot problems to a suceessful resolution.
Password Vault creating and maintaining.
Managed File Transfers Processing requests.
Encryption Processing
Full Disc Encryption for Desktop/Laptop
I provide excellent Tier 3 support; I have received client service awards for my customer service.
I work with other IS teams
On Call support
Skills:
Experience with Group Update Provider (GUP), SEP service, LiveUpdate Administrator
I have work with the server team to virtualize the SEPMs.
Maintain the SEPM in production, the test lab and the development labs.
I configured the SEPM DB server
Experience with the SEP service
Experience with Symantec LiveUpdate Administrator
Demonstrated experience working with Virtualization
Experience configuring firewalls and providing wireshark traces for analysis.
Very familiarity with SEPM/SEP installations and maintenance.
Have written documents for other team members to follow when issues arrise, as well as provided step-
by-step instructions for the helpdesk to use when assisting the end users.
I have been the SEPM/SEP administrator for three years, I confident that I can meet your needs and more. I
have resolved many issues, some issues I resolved before Symantec support could provide a solution. You
will notice below that when I was a System Admin in Platform services I was responsible for SEP, and then as
a Security Analyst, this was because a decision was made to move SEP to the System Security team, and
they wanted me to continue to support SEP.
2. Systems Administrator (Platform Services) 09/2007 to 06/2012
Responsibility Summary:
Symantec Endpoint Protection administration (SAV, SEP11.0, 12.1..)
Remote Access
Responsible for applying business and technical knowledge to ensure availability of Edward Jones'
systems, and to provide quality solutions for business and enterprise infrastructure needs.
Design, assemble, configure, install, maintain and performance tune complex infrastructure components
associated to the specific IS department with minimal guidance.
Display detailed understanding of Hardware, Operating Systems, Storage, Replication, and Network
Technologies.
Assist in developing technical requirements
Develop, package, document, test and implement quality infrastructure within targeted due dates.
Debug and correct internal infrastructure problems.
Assist with estimating for assigned deliverables as directed by leader.
Follow the firms System Development Lifecycle Methodology.
Provide first-level support for assigned systems, including rotating assignment to provide 24x7 on-call
coverage and monitoring system logs and messages.
Communicate internally with team and team leader regarding deliverable status.
Skills:
Operating Systems: Windows, ,XP, Linux, Unix
Networking Technologies: LAN, WAN, DNS, TCP/IP
Vendor Components: WebLogic, LDAP, Active Directory, Print Services, Security Concepts, Microsoft
Security Analyst (Perimeter Security) 06/2007 09/2007
Leader: Dave Erler
I was brought on-board to work with Remote Access and assist in other areas within Perimeter Security
such as the proxy server.
Responsibility Summary:
Establish and review security controls and processes to assist management in the protection of
information system resources and associated assets against accidental or unauthorized modification,
destruction or disclosure.
Ensure compliance to published Information Security Policies and standards.
Provide security services that align with business objectives and regulatory requirements.
Technical Skills
Knowledge and understanding of security issues, risks, concepts and terminology.
Knowledgeable of the security aspects of computer platforms and technologies (e.g.,
Linux, UNIX, MVS, Windows, Web, LDAP, DBMS, Network, Firewalls, IDS/IPS, Authentication).
A fundamental understanding of project management and system development lifecycle methodologies is
beneficial.
Working knowledge of applicable programming and scripting languages that support security processes.
Experience using common security products and tools.
Security Analyst, 4/2004 - 07/07/06
Gilltek Systems, Tempe, Arizona
On-site at APS (local power company), responsible for processing day to day requests for IS Security support
including troubleshooting and administering: new accounts; disabling accounts; application, platform, and
database access requests; account moves and renames; global group management; remote access. Work
will include processing email, providing phone support, analyzing customer requests, assessing security
requirements, documenting requests and approvals. I lead the development and project teams for
documenting all processes to meet Sarbanes-Oxley requirements and to establish the appropriate security
controls. All work must be done in accordance with corporate and security access policies and procedures
and established processes and work instructions to comply with audit and regulatory requirements
Skills required for my job is as follows: Working NT, Active Directory, RACF, MS Exchange
4. Security Analyst, 11/1997 - 3/2004
Computer Operator / Production Analyst 4/1988 11/1997
Sierra Health Services, Las Vegas, Nevada
Worked for five years in Security and progressive responsibility in highly technical environments.
Monitored and maintained the McAfees Virus scanning software for the email servers & EPO.
Ensured stringent compliance to internal IS Security policies.
Documented all department procedures for the disaster recovery and SOX.
Maintained working knowledge of the security requirements concerning HIPAA.
Lead person for IDS project, which included the installation of all hardware
component, network and software configurations
Controlled, reported-on setting and maintaining Internet access. (Websense, Bluecoat)
Proactive in maintaining and monitoring security for 200+ servers through collaboration with the SNA
department and regular security audits.
Involved in the deployment and security of several new applications. Performed Security audits on all new
system or software installs.
Administered all domains and software access, which included the maintenance of user accounts, this
included NT/ Active Directory, Oracle, Unix and several others.
Password management and policy adherence.
Maintained and granted remote access via VPN and remote keys.
Assisted in creating a Security policy manual, and help implement these system & physical policies.
Education & Certifications
Master of Science - Information Security and Assurance (MSISA) Western Governors University (WGU)
Salt Lake City, UT.
Bachelor's Degree in IT Management - Western Governors University Salt Lake City, UT.
Endpoint Protection 12.1. Administration.
Endpoint Protection 12.1 Maintain & Troubleshoot.
Certificates: CCENT, CEHv7, CHFI, INFOSEC Professional, NSTISSI No. 4011 & 4012.
MCP & MCSA Windows Server
Essentials of Computer Security (SANS Institute)