Professional with over 6 years of experience in IT, specializing in network security and system administration. Proven expertise in designing, implementing, and managing both small and enterprise-level networks. Strong track record of troubleshooting critical network issues, ensuring minimal downtime and optimal performance. Effective collaborator with cross-functional teams, consistently delivering projects on time and enhancing operational efficiency.
Verified service turn-up through OSS tools while coordinating with NOC for escalations.
Conducted real-time testing with field technicians or customer IT teams to confirm delivery.
Investigated issues related to failed activations and incorrect provisioning in back-end systems.
6+ years of experience in the IT field., Design, implementation, configuration, troubleshooting of small and enterprise-size networks and security, Exemplary relationship management, Very Good communication skills with the ability to network with other department members and clients, Consistency and dedication in performance
Windows 10, Windows 8.1, Windows 7, LINUX (Red hat Linux (9.0), Backtrack, Kali Linux, Ubuntu, Fedora, Linux mint, Parrot OS, and other platforms), VMware Workstation 10, Microsoft Hypervisor, Virtual box, MS Office, Microsoft Outlook, Network performance monitoring systems, Implementing firewalls and VPN, Cisco switching & Routing, Backing up complete user data/mirror imaging, Stress testing networks, Penetration testing networks and security audits, Enforcing firewalls and monitoring network performance, Linux terminal commands, Windows commands, Windows system troubleshooting
I have developed an application on my interest in VPN used in cloud computing as all know Cloud Storage is a service where data is remotely maintained, managed, and backed up. The service is available to users over a network. The provider company makes them available to the user online by keeping the uploaded files on an external server. As the cloud provides many features it has some drawbacks too. However, while the features are useful for providing basic computation and storage resources, they fail to provide security. Security is a top concern among organizations evaluating cloud service providers. My paper describes providing a secured line to customers using a VPN.
I hereby declare that the information given in the application is true, complete, and correct to the best of my knowledge.