A Typical Remote suport Helpdesk , VMware and remote desktop support via remote.
Go-2-IT –Group September 2008- present (Employed as L.W.E.) For Dell/HP/IBM Connect Regional Vendor. IT Field. Consultant Repair or service Leased computer systems , in stall office environments, Installed servers And satisfied any other Contractual per project requirements
Our online information security master’s program will give you a tremendous advantage in this highly competitive field. The M.S. in Information Security and Assurance will prepare you with the necessary skills for the protection of networks, communication, and data, as well as the knowledge base for planning, implementing, and managing enterprise level security and system integrity. You will become an expert IT security and assurance manager.
Executive Summary :Highly Motivated Network Security Analyst, Competent Network Administrator & Engineer, excellent customer service skills, dynamic individual, can motivate teams to complete complex projects using my tenacity, drive for excellence, leadership abilities, & motivation skills to exceed my employer’s expectations & achieve ultimate success. Project management, asset management, logistics & operations, Windows Unix/Linux Mac & integration of mixed environments. Windows or Unix/Linux (BSD including Mac OS 10) various types of routers Cisco (GUI/Basic Cisco admin.) or Nortel Microsoft Office, Corel, Open Office. Intermediate Spanish & Italian, basic Japanese. I also know enough to spot common mistakes with auditing tools for Security Threats hidden within Source code base. My Specializations are: Network Administration and Security Windows/Unix, Hardware ,Routers Generalist Functionality : Websites (lesser web development) , SQL Server Administration (lesser admin password resets audits backups permitting the main DBA to work on more important tasks) some Very simple scripting / very simplistic programming I also Adapt quickly to software I have never used before , and Gain profligacy often in minuets to hours depended on complexity .
Information technology , Information security, Linux, Windows, Network Administration , Computer Forensics