• Monitored use of data files and regulated access to protect secure information.
• Researched and developed new computer forensic tools.
• Recommend improvements in security systems and procedures.
• Monitored computer virus reports determining when to update virus protection systems.
• Monitored social media and online sources for industry trends.
• Research on what are the domain of Cyber Security
• Create the Syllabus for Cyber Security to train to team
• Shelf leaning on the topic of Ethical hacking (CEH) and Network Defense (CND)
• Conduct awareness training on Cyber Security
• Installed and configured network security solutions such as VPNs, Firewalls and intrusion detection and mitigation tools.
• Analyzed existing network and application architectures, presenting findings on possible enhancements and improvements to senior decision makers.
• Managed purchasing and installation of networking equipment such as core routers and switches.
• Improved network operation by incorporating new technologies into existing designs.
• Led planning and technical design activities for routine operations and special projects.
• Established and monitored key performance metrics to verify consistent compliance with important networking standards.
• Configured, tested and maintained LAN/WAN components and connections.
• Recommended network security standards and upgrades to management.
Phasellus non convallis dolor. Integer tempor hendrerit arcu at bibendum. Sed ac ante non metus vehicula congue quis eget eros.
Proin lacus massa, eleifend sed fermentum in, dignissim vel metus. Nunc accumsan leo nec felis porttitor, ultricies faucibus purus mollis.
Integer suscipit condimentum aliquet. Nam quis risus metus. Nullam faucibus quam eget arcu pretium tincidunt. Nam libero dui.
Vivamus et dui a massa venenatis fringilla. Proin lacus massa, eleifend sed fermentum in, dignissim vel metus. Nunc accumsan leo nec felis porttitor.