Перепост с соседней палаты
Author: Серый Волк [310 views] 2013-02-21 13:01:50
Админы и примкнувшие, а можете плз покритиковать резюме ( не мое)?
Ну и если есть идеи где есть работа то совсем хорошо будет....
Спасибо
Resume
Senior Level IT Security Professional
• B.Sc. in Engineering along with CISSP, CISM, ITIL, MCSE, SCSA and other certifications
• 15+ years of experience as IT seasoned professional in Financial, Semiconductors and Academy Industries
• Proficient in IT projects implementation and developing IT systems security solutions architecture and implementation, roadmaps, policies and procedures, business continuity, disaster recovery, vendors evaluation, systems integration, networking and virtualization as well as hands-on hardware troubleshooting skills
• Highly experienced in Microsoft infrastructure setup, migration and troubleshooting – Windows Servers Active Directory, SQL, IIS, Exchange, DPM, MOM, SCCM, SCOM, SharePoint, Lync
• Highly experienced in the following security domains: application and network security, cryptography, identity and access management, threat and vulnerability management
• Implements cost effective, leading edge security solutions to help achieve organizational goals
• Client focused, collaborates with all stakeholders to achieve operational excellence
• Patient, and methodical, persistent, and prioritizes tasks, copes with a high volume of work in a fast-paced, confidential, deadline-driven environment of ongoing change and diversity
• Adaptable, respected and trusted professional, offering excellent communications skills
Professional Experience
X Fund Services Inc., Toronto, Ontario Sep 2007 – Aug 2012
Senior IT Security Manager
• Maintained and upgraded IT & Security infrastructure across the company with 150 end-users while the company expanded operations and service offering with office locations in Toronto, Geneva, St. Petersburg, Dublin and the Head Office in the Cayman Islands.
• Installed, configured security settings, and managed Windows 2000/2003/2008 R2/2012 servers and Windows XP/7/8 workstations on HP and Dell hardware as per recommendations of various security bulletins
• Performed systems troubleshooting to realign the I.T. operation and service provisions after a SAS 70 audit, securing business role of a company as a certified services provider to the US market
• Compiled and documented the assets, policies and procedures, security, and governance issues as per the business requirements
• Introduced and successfully implemented multi-factor authentication infrastructure, namely biometric authentication in addition to the regular Windows AD authentication as per requirements of the business case
• Implemented PGP PKI for the IT department, introducing encryption and non-repudiation as a part of business cryptography requirements, to ensure a sensitive information transfer between all relevant stakeholders, dealing with authentication, users data and other important aspects on a daily basis, hence securing data while in transit and at rest
• Planned and carried out company network architecture upgrade, enabling the network switches and routers to support up to 1Gbps throughput, introducing VLANs, featuring production/development/VOIP networks data secure separation
• Implemented WAN acceleration using Riverbed Appliances between multiple sites over a secure VPN tunnels between multiple sites
• Introduced, configured and maintained Checkpoint Firewall Appliances to ensure safety of company perimeter and DLP, implemented two layer VPN architecture, using Microsoft RADIUS Servers in addition to Checkpoint users native authentication, enabled easier log management correspondence by associating Windows AD users/workstations to the IPs, mentioned in the Checkpoint Logs
• Prepared documentation for prompt and secure disaster recovery implementation, business continuity and risk management enhancement, all of which have increased the company’s performance and competitiveness.
• Configured and managed VMware vSphere Infrastructure Architecture of more than 100 VMs installed on the HP Proliant Servers featuring ESX and ESXi using vCenter Servers as per security policies of the company.
• Set up and securely migrated company domains infrastructure to Windows 2008 R2 Active Directory level, secured and tested the AD as per Microsoft Security Guidelines
• Upgraded company Exchange Mail Infrastructure to the Exchange 2010 version, while actively using Powershell, maintaining security, integrity and availability of company data, securely PGP encrypted and archived outdated mailboxes to preserve data availability of up to 7 years as required by law
• Installed, configured and managed Microsoft SQL 2005/2008/2012 servers on Windows 2003/2008 R2 servers
• Configured and managed DNS, authorized DHCP and other services on wireless and wired devices, taking into account security of the Active Directory of the company, thus preventing unauthorized systems to gain access inside the perimeter
• Configured Apache and IIS 5.0/6.0/7.0 for Internet and intranet clients’ Web access, developing and implementing secure front-end application access to the company data, dealing with secure ports opening at the Checkpoint firewall level and addressing requests to the back-end SQL 2005/2008 servers to securely access the data, according to change management policies of the company
• Installed and administered Blackberry Enterprise Express Server 5.x along with RIM Blackberry various devices secure configuration, activation, setup and troubleshooting, centralizing the company management of data available to the employees, and their access to it, while in transit or in case, when the device is lost/stolen
• Set up and securely deployed various operating systems to multiple hardware/virtual resources using Acronis/Windows 2008 R2 Server built-in deployment tools, administered users accounts per security policies and procedures of the company
• Managed full array of systems security maintenance tasks, including Host Intrusion Prevention Systems using McAfee, Comodo, ESET business antivirus/anti-malware solutions on Servers/Workstations/Testbed systems, implemented secure and centralized deployment of service pack installations and security patches using WSUS
• Assured security and availability of Dell Equallogic SAN storage for VmWare/Hyper-V VMs by managing access to it over separate dedicated VLAN
• Introduced and performed secure storage consolidation management, installed Windows DPM Servers Infrastructure to ensure timely backups on Fully Disk Encrypted storage using Jetico BestCrypt Volume Encryption
• Conducted penetration security tests using Core Impact framework, bringing to a minimum number of vulnerabilities across the company network, identifying possible security threats and compiling and managing threats and vulnerabilities lists to identify gaps between the current and ideal state of various systems’ security
• Performed evaluations of multiple core vendors and third-party solution providers, in order to create proper recommendations to the upper management regarding effective management of company’s IT budget, minimize unnecessary expenses and ensure external IT knowledge suppliers pricing
• Oversaw hardware and software troubleshooting efforts across the company, as well as controlling access to a securely accessed servers room and performing maintenance in accordance to security policies of the company
• Tracked and resolved security systems deficiencies and availability using Microsoft built-in and Third Party tools
Y Networks Ltd., Toronto, Ontario Dec 2006 – Sep 2007
IT Manager
• Envisioned, introduced, and monitored compliance with organizational security policies and strategic plans
• Performed Disaster Recovery, Key Management, Risk Assessment and Business Continuity Planning
• Coordinated efforts with vendors, performed vendors evaluation as per company requirements
• Tested entire enterprise for security threats and vulnerabilities using tools from Acunetix, NESSUS and WIKTO, managed and addressed the findings
• Presented security suggestions, project updates, and other key data to the executive staff.
• Wrote administrative procedures and took part in performing Business Impact Analysis.
Z Communications Ltd., Tel-Aviv, Israel Nov 1998 – Jul 2006
IT Manager
• Configured and administered MS NT4/2000/2003 Servers, Exchange 5.x/2000 as per security policies and procedures of the company
• Configured and Maintained Sun Solaris 9 systems to serve R&D department daily needs for assuring smoothly running ASIC simulations
• Performed secure Data Backups using Symantec (Veritas) Netbackup and Tape Library Management Tasks
• Maintained security and upgraded firmware of Cisco Catalyst Switches and Routers, managed Cisco PIX 515/525 firewalls, IDS, IPS
• Installed, upgraded and configured and securely deployed Windows 98/XP/2000, MacOS 9 end-user workstations
• Worked closely with end users, provided support and introduced security programs to enhance users ability to withstand social engineering attempts
A Engineering Ltd., Beer-Sheva, Israel Mar 1997 – Nov 1998
IT Security Administrator
• Supported end-users by taking the initiative to discover tailored security solutions on-time and within budget requirements
• Performed hardware repairs, installed operating systems and security applications
• Organized and administered company’s IT security infrastructure
Ben-Gurion University of the Negev, Beer-Sheva, Israel May 1996 – Mar 1997
IT Security Administrator
• Chose and implemented the most appropriate security solutions to secure Mac Workstations on campus
• Tested various security solutions and applications on the UNIX university system environments, including, but not limited to Sun, ULTRIX, AIX, SGI IRIX, reported network security flaws to the Computation Center management
Education & Professional Development
B.Sc. in Engineering – Majoring in Mechatronics 1995 - 2000
Ben-Gurion University of the Negev, Israel
Certifications
2011 (ISC)^2 CISSP - Management Concentration (CISSP-ISSMP)
2008 ISACA Certified Information Security Manager (CISM)
2006 (ISC)^2 Certified Information Systems Security Professional (CISSP)
2006 Information Technology Infrastructure Library IT Service Management (ITIL ITSM)
2006 Sun Certified Systems Administrator on Solaris 8 (SCSA 8)
1999-06 Microsoft Certified System Engineer (MCSE) on Windows NT4, 2000/2003: Security
Technical Proficiencies
Platforms: MS Windows NT 4.0/2000/2003/2008/2012 Server; Windows 95/98/NT/2000/XP/Vista/7/8 Professional ;Sun Solaris; Ultrix; AIX; IRIX; HP-UX; Linux; Mac OS 9/X
Tools: MS Exchange 5.5/2000/2003/2007/2010 Servers, SQL 7.0/2000/2005 Servers, Symantec Enterprise Solutions; GFI Network Essentials; GFI Network Security; DPM; MOM; SMS; Cisco Management Utilities; Checkpoint Dashboard; Veritas Backup Exec; Norton Antivirus Corporate; McAfee Security Center, MS Office 2000/XP/2003/2007/2010/2013;
Hardware: SUN, EMC, Cisco PIX, Cisco Catalyst Switches; Cisco Routers; Intel Switches, 3COM, Nortel BCM, Checkpoint, Riverbed, Dell, IBM, HP,
|
Synchronize |
Thread