0% found this document useful (0 votes)
28 views3 pages

Redacted RESUME MAR 2022

This document provides a personal summary and qualifications for an IT professional. It includes certifications in CompTIA Security+ and CIPM, as well as skills in areas such as Linux, databases, cloud technologies and security. The professional experience section outlines roles providing IT support, penetration testing, application support and technical solutions architecture. Achievements include upgrading an AML compliance solution to the cloud and implementing desktop imaging and workflow solutions.

Uploaded by

glis test
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views3 pages

Redacted RESUME MAR 2022

This document provides a personal summary and qualifications for an IT professional. It includes certifications in CompTIA Security+ and CIPM, as well as skills in areas such as Linux, databases, cloud technologies and security. The professional experience section outlines roles providing IT support, penetration testing, application support and technical solutions architecture. Achievements include upgrading an AML compliance solution to the cloud and implementing desktop imaging and workflow solutions.

Uploaded by

glis test
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

PERSONAL SUMMARY CERTIFICATIONS

CompTIA Security+ 2022


A multi-skilled Information Technology Enthusiast with comprehensive
experience in designing and maintaining Enterprise computer system KEY SKILLS & COMPETENCIES
TECHNOLOGY ADMINISTRATION:
infrastructures. Extensively trained in various domains ranging from IT
 Red Hat Enterprise Linux
Administration to Information Security, Privacy and Project Management.
Proficient in providing excellent client focused IT support with an analytic and  Burp Suite

systematic approach to problem resolution.  Oracle DB & WebLogic


 Microsoft SQL Database
PROFESSIONAL EXPERIENCE  MS Windows Server
 iSeries/As400
INDEPENDENT IT CONSULTANT,  Microsoft365 SharePoint
IT CONSULTANT May 2021 – Present
 Euronet ITM - ABM Systems
Provide technical support services to SMB enterprises including designing and
 Citrix/XenApp Application
implementing IT infrastructure solutions and supporting desktop hardware and
and Desktop Virtualization
software.

VIRTUALLY TESTING FOUNDATION, Remote Internship PROFESSIONAL TRAINING


 OWASP Top10 2021
PENETRATION TESTING INTERN October 2021 – December 2021
Penetration Testing
Performed penetration testing on OWASP Top 10 vulnerabilities for assigned
web applications. Utilized Burp Suite, Kali Linux and other cyber security  Certified Information Privacy

technologies to intercept and exploit HTML Injection, Clickjacking, Cross Site Manager (CIPM)
Scripting and SQL Injection vulnerabilities. Researched mitigations and wrote  Azure Cloud Administration
penetration testing reports with recommended remediation steps.  Certified Ethical Hacker (CEH)
 Certified Information Security
APPLICATION SUPPORT ANALYST April 2018 – January 2021 Professional (CISSP)
Provide Level 3 support to Enterprise Financial applications ensuring the
 Project Management
efficient delivery of services. Define requirements, design and implement
 Red Hat Enterprise Linux
solutions to deliver transformative business processes.
 VMware vSphere
ACHIEVEMENTS:
Upgraded Anti Money Laundering (AML) Compliance Solution:  Oracle Database Admin.

 Provided Project Management services to migrate and upgrade the AML


 IBM iSeries Admin.
 MS SQL Database Admin.
Compliance solution from on-premises to an Azure cloud infrastructure.
 Coordinated multiple teams spanning external business consultants,
cloud infrastructure, Cybersecurity, software development, compliance PERSONAL SKILLS
 Customer Focused
& risk.
 Problem Analysis
 Successfully spearheaded the migration, upgrade, testing, and
 Problem Resolution
implementation of the solution allowing the business to improve fraud
 Determination/Focus
detection rates and achieve greater compliance with government
regulators.  Attention to detail

ACADEMIC QUALIFICATIONS
BSc Computer Science
University of the West Indies
(INCOMPLETE)
TECHNICAL SOLUTIONS ARCHITECT May 2009 – March 2018
Designing and implementing technical solutions that enhance productivity and
efficiency, including providing technical architecture consultancy on
infrastructure deployments and major projects.
ACHIEVEMENTS:
 Implementation and management of Enterprise Internet Banking
infrastructure:
- Utilized Red Hat Enterprise Linux, Oracle Database and WebLogic
Application server as the backbone of the solution with integration to an
iSeries/AS400 based core banking system.
- Implemented CIS Security Baselines for Linux and Windows operating
systems ensuring confidentiality, integrity and availability of the
infrastructure
- Maintained the infrastructure’s security and performance thus allowing
the business to increase its digital footprint and customer base while
reducing costly in-branch traffic.
 Implementation of a Desktop Imaging/cloning solution:
- Utilized open-source technologies (CentOS & FOG) to reduce the cost
and improve the efficiency of the desktop deployment process for the
service delivery team.
 Implementation and infrastructure management of BPM Workflow
Solutions:
- Designed, implemented, and managed the infrastructure of solutions
that digitally transformed the customer onboarding process.

SYSTEMS ADMINISTRATOR 2005 - 2009


 Configure, document, monitor & troubleshoot all networked systems;
including but not limited to, Windows, Linux and iSeries Servers, PBX &
Network systems.
 Monitor network for critical security violations and malware activity;
identify sources, take corrective action and report on findings.
 Implement, test and monitor backup and recovery strategies for all
networked systems
 Maintain Windows Active Directory and domain including user
management and security
 Perform preventative maintenance activities to ensure consistent
reliable operations of all systems

You might also like