Banner Image

All Services

Other

IT Networks and System Management

Installation, maintenance and monitoring of security tools to protect systems and data. Vulnerability scanning for network devices, applications and databases to identify vulnerabilities. Assessing and analyzing security incidents and escalating incidents by following incident plan. Identifying threats by using standards and procedures for appropriate response. information security tools and services to identify events for appropriate response. Risk, vulnerability and security assessments of applications, databases, servers and supporting network technologies, such as routers, switches and access points. Solving information security system problems and issues in a timely and accurate manner. Monitoring of activities and events to detect, classify and counter anomalous behavior in timely manner. Corrective action for development and remediation plans for identified issues, risks or vulnerabilities. Providing escalation support for security incidents and remediate these issues. Security controls assessment before hardware/software is migrated to production. Defining access control privileges, structures and resources. Identification of abnormalities and violations reporting. Assessing current situations and improvements in security trends and requirements. Identifying security violations and inefficiencies by periodic audits. Maintaining security controls by implementing upgrades. Preparing performance reports and communicating system status. Providing quality service by following organization standards. Attending educational workshops for gaining technical knowledge. Team effort for completion of tasks. Networks and Systems Designing, Configuration, installation and management of LAN / WAN hardware and software infrastructure. Implementation, and maintenance of on-premises network infrastructure. Managing security appliance to control Internet access including Cisco Routing, Switching, IronPort, Websense, Blue Coat and Surf Control. Server and network hardware rack and stack in data center and connections to network. Managing data connectivity through MPLS and SD-WAN. Managing Network access policies, NMS, IDS, IPS, Web Filtering. Designing and implementation of security policies framework for networks and systems. Modernization of firewalls and applications security and robustness. Network performance analysis, tuning, troubleshooting network problems. Installation and configuration of services on Windows Server 2016, 2012 R2, 2008 R2, and 2003. Installation and configuration of Squid, Cacti, PHP My Admin, MySql. Installation configuration and management of Domain Controllers, Active Directory Services, RODCs, Creation of Users and Groups, security policies (GPOs) on users and systems in domain, Access controls, permissions and restrictions, creation of Network Profiles and with Quota restrictions. Installation, configuration and management of Additional Domains

About

$15/hr Ongoing

Download Resume

Installation, maintenance and monitoring of security tools to protect systems and data. Vulnerability scanning for network devices, applications and databases to identify vulnerabilities. Assessing and analyzing security incidents and escalating incidents by following incident plan. Identifying threats by using standards and procedures for appropriate response. information security tools and services to identify events for appropriate response. Risk, vulnerability and security assessments of applications, databases, servers and supporting network technologies, such as routers, switches and access points. Solving information security system problems and issues in a timely and accurate manner. Monitoring of activities and events to detect, classify and counter anomalous behavior in timely manner. Corrective action for development and remediation plans for identified issues, risks or vulnerabilities. Providing escalation support for security incidents and remediate these issues. Security controls assessment before hardware/software is migrated to production. Defining access control privileges, structures and resources. Identification of abnormalities and violations reporting. Assessing current situations and improvements in security trends and requirements. Identifying security violations and inefficiencies by periodic audits. Maintaining security controls by implementing upgrades. Preparing performance reports and communicating system status. Providing quality service by following organization standards. Attending educational workshops for gaining technical knowledge. Team effort for completion of tasks. Networks and Systems Designing, Configuration, installation and management of LAN / WAN hardware and software infrastructure. Implementation, and maintenance of on-premises network infrastructure. Managing security appliance to control Internet access including Cisco Routing, Switching, IronPort, Websense, Blue Coat and Surf Control. Server and network hardware rack and stack in data center and connections to network. Managing data connectivity through MPLS and SD-WAN. Managing Network access policies, NMS, IDS, IPS, Web Filtering. Designing and implementation of security policies framework for networks and systems. Modernization of firewalls and applications security and robustness. Network performance analysis, tuning, troubleshooting network problems. Installation and configuration of services on Windows Server 2016, 2012 R2, 2008 R2, and 2003. Installation and configuration of Squid, Cacti, PHP My Admin, MySql. Installation configuration and management of Domain Controllers, Active Directory Services, RODCs, Creation of Users and Groups, security policies (GPOs) on users and systems in domain, Access controls, permissions and restrictions, creation of Network Profiles and with Quota restrictions. Installation, configuration and management of Additional Domains

Skills & Expertise

Computer EngineerInformation TechnologyIT SecurityIT Security OperationsManagementNetworkingSystem Administration

0 Reviews

This Freelancer has not received any feedback.