Core skills:
* Direct experiences with Vulnerability and Scan Tools, anti-virus servers and endpoints,
intrusion detection, firewalls and content filtering, Log Analysis, SIEM and Monitoring Systems
* Knowledge of risk assessment tools, technologies and methodologies
* Experience designing secure networks, systems and application architectures
* Experience planning, researching and developing security policies, standards and procedures
* Professional experience in a system administration role supporting multiple platforms and
applications
* Ability to communicate network security issues to peers and management
* Ability to read and use the results of logs, mobile code, malicious code, and anti-virus.
* Ability to adapt to any environment or condition that may arise during Breaches or Risks.
Technology and Tools used – Cloud Base Solutions and Monitoring (AWS, Velocity, Azure, GCP,
Rackspace or Software Define Networking for on premise virtualization solutions), Qualys,
SIEM,Elastic (ELK), Cloud Strike 6, SafeBreach Hackers’ Playbook, Kali Linux, Trend DSM 9,
Recent Trainings & Certifications
Symantec DCS 6.7, Symantec Endpoint 11-14, McAfee ePolicy Orchestrator 4-5.10, BMC Client
Management 12, Service Now, BMC Remedy 7, MS Office and Office 365, Windows Server
SolarWinds Orion NPM 11, Nagios, MySQL, MS SQL, MS SCCM 2012, WSUS, Qualys Scanner,
Ivanti Security Controls
Language (Python, PHP, NODE.JS, JavaScript, VB, Shell or Bash, PowerShell, Batch Commands)
Experience: 5 - 10 years
A pure WordPress Developer, from Back-End to Front-End, love troubleshooting, optimizing and performance tweaking to maximize server up time and robustness
Experience: Less than 6 months
“They're not only loyal and hardworking, they're super detail oriented!”
- Travis OVAAnswers
Onlinejobs.ph "ID Proof" indicates if "they are who they say they are".
It DOES NOT indicate skill level.
ID Proof scores are 0 - 99 with 99 being the best. It is calculated based on dozens of data points.
It's intended to help employers know who they're talking to is real, and not a fake identity.