BeyondTrust Implementation Engineer BeyondTrust PRA / PSSplunkWindows Server 2022...
BeyondTrust Implementation Engineer
Implementation and Integration of BeyondTrust PRA and PS in the Internal Lab. As part of an internal project a PRA and PS environment was established to serve as a lab for training and hands-on practice. The goal of this project was to integrate and configure both BeyondTrust tools for privileged access management and password safe in a controlled, secure test environment. The lab provided a space for testing and refining configurations, ultimately enhancing the skills of the USO team in these key areas. The setup included the configuration of group policies, session policies, and failover (High Availability) to ensure robust access management and uninterrupted service. Additionally, we implemented API use cases, Jump Policies, and workflows to streamline privileged access requests and improve the management of access rights. Integration with the security provider (AD/Entra ID) and the establishment of SSO with Okta ensured a seamless user experience and centralized authentication. Specific to Password Safe (PS), the integration involved connecting PS with existing systems, enabling the automated discovery and onboarding of assets to ensure efficient credential management. We also configured Smart Rules to define dynamic access controls based on defined criteria and set up platforms and JumpHosts for secure access to critical systems. The onboarding process covered operating systems, databases, and applications, ensuring full system integration into the overall security architecture. The lab is now a valuable resource for the USO team, allowing them to practice real-world configurations and gain hands-on experience with privileged access management and password safe security tools, which will contribute to improved implementations and support future security initiatives.
Implemented BeyondTrust PRA and PS for privileged access management and password security.
Integrated PRA and PS tools to streamline privileged access and password management across various systems.
Configured Group Policies to manage user access and security settings.
Set up Session Policies to control access based on user roles and security requirements.
Configured Failover (High Availability) to ensure continuous service availability.
Set up the Integration Client for automating backups.
Installed and configured the Middleware Engine to manage communication between integrated tools and systems (SIEM for advanced session monitoring)
Configured Endpoint Credential Manager (ECM) to manage and secure credentials across endpoints (Integration with Password Safe).
Defined and configured API use cases for streamlined integrations and automation.
Established Account Policies to define security controls for user accounts and privileged access.
Set up Jump Policies to manage access to systems through JumpHosts for secure remote management.
Created and configured Workflows for automating access management processes.
Configured Vendor Access through a Self-Registration Page to enable secure third-party access to the network.
Integrated Security Provider (AD/Entra ID) for centralized identity and access management and MFA enablement.
Implemented Single Sign-On (SSO) with Okta to streamline user authentication across systems.
Integrated Password Safe (PS) to securely store and manage privileged credentials.
Enabled Automated Discovery and Onboarding functionalities for easy asset and credential management.
Configured Smart Rules to define dynamic access controls and improve security posture.
Set up Platforms and JumpHosts for secure access to critical systems.
Onboarding of operating systems, databases, and applications into the system for comprehensive security coverage.
BeyondTrust PRA / PSSplunkWindows Server 2022SQL ServerPostmanActive
DirectoryVM WareAzureEntra IDOkta
BeyondTrust PRA / PS (internal Project and Training)
1 Jahr
2024-03 - 2025-02
developing an IT infrastructure
Senior Cyber Security Architect / Consultant SailpointServiceNowIBM Qradar and Splunk...
Senior Cyber Security Architect / Consultant
A government-affiliated or security-critical organization faced the challenge of developing an IT infrastructure with multi-level security requirements while ensuring the protection of sensitive data across various classification levels. The project aimed to design and integrate security architecture into existing systems while maintaining compliance with the organization's cybersecurity guidelines. Secure configuration management processes were implemented, and information security, cybersecurity architecture, and system security engineering requirements were documented and monitored throughout the acquisition lifecycle. Critical business functions were prioritized in collaboration with stakeholders to align security measures effectively. Security reviews were conducted to identify gaps, and a comprehensive security risk management plan was developed. New system implementations and interfaces were evaluated for their impact on the existing security posture and documented accordingly. The project also included a comprehensive monitoring and threat-hunting solution, establishing a Security Operations Center (SOC) with multiple monitoring and log analysis levels (Blue Team). Ultimately, the project resulted in a robust security architecture that met regulatory requirements while enabling proactive threat detection and mitigation.
Cybersecurity Design & Integration ? Develop and implement security architectures for systems with multi-level security and classified data processing, particularly for government organizations.
Security Documentation ? Define and track information security, cybersecurity architecture, and system security engineering requirements throughout the acquisition lifecycle.
Architectural Compliance ? Ensure that all acquired or developed systems align with the organization's cybersecurity architecture guidelines.
Business Function Prioritization ? Identify and prioritize critical business functions in collaboration with stakeholders.
Security Assessments ? Conduct security reviews, identify gaps in security architecture, and develop a risk management plan.
Impact Analysis ? Evaluate and document how new systems or interfaces affect the organization's security posture.
Security Design Evaluation ? Assess security architectures and designs to ensure they meet the required security standards.
Security Control Implementation ? Define and document security controls for information systems and networks.
Monitoring & Threat Hunting ? Develop and implement solutions for continuous monitoring, log analysis, and threat hunting, including SOC (Blue Team) operations.
SailpointServiceNowIBM Qradar and SplunkCiscoNutanixNetwrix
Finance Sector
2 Jahre
2022-04 - 2024-03
strategic and comprehensive information security and IT risk management program
Information Security ManagerServiceNowManage EngineIBM QRadar...
Information Security Manager
The company needed a strategic and comprehensive information security and IT risk management program to effectively identify and mitigate security risks. A unified security management framework was developed and implemented, establishing clear guidelines for all technology projects, systems, and services. Risk assessments were conducted in close collaboration with business units, integrating security measures into corporate processes. Additionally, cybersecurity awareness was strengthened through targeted training and awareness campaigns. The security organization was provided with clear leadership structures and a sustainable governance model. As a result, consistent application of security standards was achieved, and strategic IT planning was made future-proof.
Develop, implement and monitor a strategic, comprehensive enterprise information security and IT risk management program.
Work directly with the business units to facilitate risk assessment and risk management processes.
Develop and enhance an information security management framework.
Understand and interact with related disciplines through committees to ensure consistency. application of policies and standards across all technology projects, systems, and services.
Provide leadership to the enterprise?s information security organization.
Partner with business stakeholders across the company to raise awareness of risk management concerns.
Assist with the overall business technology planning, providing a current knowledge and future vision of technology and systems.
effective security monitoring and vulnerability management program
Senior Information Security Analyst LogRhythmMcAfeeNetwrix...
Senior Information Security Analyst
The company needed an effective security monitoring and vulnerability management program to detect and respond to threats in a timely manner. A centralized security monitoring system was implemented to analyze and process security events from multiple sources. Security policies and standard procedures were reviewed, updated, and documented to ensure a consistent security strategy. Additionally, security solutions such as intrusion detection, log management, and vulnerability scanning were configured and regularly maintained. Vulnerability assessments and audits helped identify, prioritize, and mitigate security gaps. IT teams and end users were trained to recognize and report security incidents more effectively. These measures significantly improved the company's security posture and resilience against cyber threats.
Security Monitoring & Incident Response ? Monitor, analyze, and respond to security alerts, incidents, and vulnerability reports from sources such as SIEM, vulnerability scans, and alerts.
Documentation & Procedure Management ? Document InfoSec activities and assist with the creation and maintenance of standard operating procedures.
Policy Review & Updates ? Review and update information security policies and procedures.
System Configuration & Maintenance ? Configure, maintain, and ensure the operational status of information security systems, including log collection, security scanning, intrusion detection, and other related systems.
Vulnerability Management ? Review and triage vulnerability alerts, provide analysis, suggest mitigations, track remediation, and manage scheduled scans while identifying gaps and expanding scan coverage.
Security Audits & Reviews ? Perform regular audits and reviews of servers, network devices, endpoints, applications, and databases to document gaps in security controls.
Incident Diagnosis & Support ? Assist the service desk in diagnosing potential security incidents, troubleshoot issues related to security controls, and help educate IT staff and end users on security best practices and policies.
Security Initiative Support ? Support the success of proposed and existing information security initiatives.
LogRhythmMcAfeeNetwrixWindowsCisco
Finance Sector
4 Jahre 8 Monate
2013-09 - 2018-04
ensuring effective coordination
Team Leader Network EngineerPalo Alto NetworkingKemp TechnologiesCisco...
Team Leader Network Engineer
The project aimed to enhance network operations and performance by leading a network team, ensuring effective coordination, and optimizing network infrastructure. A robust network environment was designed and implemented, with clear system configurations and standards documented for consistency and performance. The team focused on troubleshooting network issues, scheduling regular upgrades, and collaborating with network architects to maximize performance and minimize outages. Security measures were established to protect the network system, including defining and monitoring access policies. Additionally, continuous education and participation in professional networks helped maintain an elevated level of expertise within the team. Regular reporting and project management ensured operational status was communicated, and goals were achieved in line with organizational needs.
Team Leadership ? Lead the network team, organize their duties, and monitor performance.
Network Environment Design ? Establish network environment by designing system configurations, directing system installations, and enforcing system standards.
Network Performance Optimization ? Maximize network performance by monitoring performance, troubleshooting network issues, scheduling upgrades, and collaborating with network architects.
Network Security ? Secure the network system by establishing and enforcing policies and defining access controls.
Continuous Learning ? Update job knowledge through educational opportunities, reading professional publications, maintaining personal networks, and participating in professional organizations.
Mission Accomplishment ? Complete related results to fulfill information systems and organizational goals.
Reporting & Project Management ? Report on network operational status by gathering and prioritizing information and managing projects.
administration and maintenance of critical IT systems
Network and System Administrator Cisco networkingWindows ServersWSUS...
Network and System Administrator
In this internal role, I was responsible for the administration and maintenance of critical IT systems across the organization. This included managing Active Directory, MS Exchange, VPN connections with Cisco routers, DNS, DHCP, and file servers, as well as configuring DFS for site-to-site replication. I conducted regular system updates through WSUS Server and verified antivirus updates to ensure security. I performed daily, weekly, and monthly backups, ensuring that backup tapes were securely stored. My role also involved diagnosing and troubleshooting hardware and software issues in a network environment, as well as providing end-user support. Additionally, I assisted users in securing the confidentiality of their data and prepared hardware and software specifications based on the IT department?s needs.
System Administration & Maintenance ? Administer and maintain Active Directory, MS Exchange, TMG, VPN connections with Cisco Routers, site replication, DNS, DHCP, File and Print servers, and configure DFS for replication between sites.
System Updates & Antivirus ? Ensure system updates are applied via WSUS Server and verify antivirus updates for security.
Backup Management ? Perform daily, weekly, and monthly backups, ensuring backup tapes are stored securely.
Troubleshooting & Issue Resolution ? Monitor, diagnose, troubleshoot, and resolve hardware and software issues within a network environment.
End-User Support ? Provide support to end-users, assisting with technical issues and ensuring smooth operation.
Data Security ? Help users secure the confidentiality of their data through best practices and guidance.
Hardware & Software Specifications ? Prepare hardware and software specifications based on the IT department?s needs.
managing and maintaining the organization's IT infrastructure
Network and System Administrator Cisco networkingWindows ServersActive Directory...
Network and System Administrator
In this internal role, I was responsible for managing and maintaining the organization's IT infrastructure, ensuring all systems operated efficiently and securely. I administered key systems such as Active Directory, MS Exchange, VPN connections, DNS, DHCP, and file servers, as well as configuring DFS for replication between different sites. Regular system updates were conducted through WSUS Server, while antivirus software was kept up to date to maintain security. I was also in charge of performing regular backups and ensuring the safe storage of backup tapes. Additionally, I monitored and resolved hardware and software issues, provided end-user support, and helped users secure the confidentiality of their data. As part of my duties, I also prepared hardware and software specifications to meet the IT department?s requirements.
System Administration & Maintenance ? Managed and maintained Active Directory, MS Exchange, TMG, VPN connections with Cisco Routers, site replication, DNS, DHCP, File and Print servers, and configured DFS for replication between sites.
System Updates & Antivirus ? Ensured system updates were applied using WSUS Server and verified antivirus software updates for security.
Backup Management ? Conducted daily, weekly, and monthly backups and ensured that backup tapes were securely stored.
Troubleshooting & Issue Resolution ? Monitored, diagnosed, troubleshot, and resolved hardware and software issues within the network environment.
End-User Support ? Provided ongoing support for end-users, assisting them with technical issues and ensuring smooth operational functionality.
Data Security ? Assisted users in securing the confidentiality of their data and advised on best security practices.
Hardware & Software Specifications ? Prepared hardware and software specifications tailored to the IT department's needs.
BeyondTrust Password Safe (LABS and Trainings on going)
Certified IT Professional (MCITP) - Server Administrator on Windows Server 2008
ISC2 CC Certified in Cybersecurity
Microsoft Certified Solutions Associate
Microsoft Certified Systems Administrator - Microsoft Windows Server 2003
Nutanix Certified Professional -Multi-Cloud Infrastructure 6
Kompetenzen
Kompetenzen
Top-Skills
Netzwerk/SicherheitFirewallIAMPam
Schwerpunkte
IT-Security
Cyber Security
IAM / PAM
Network Security
Produkte / Standards / Erfahrungen / Methoden
Experience
20+ Years IT
Other experiences
3+ Years CEO / Founder
Internal and External Consultant
Core Qualifications
IT-Security
Identity and Access Management
Privileged Access Management (BeyondTrust)
StrongDM
SIEM (Monitoring)
Information Security Policies and Procedures
Stress Tolerance
Critical Thinking Skills
Incident Management
Anti-Virus
Network Architecture and Administration
Firewall
Process Analysis
Server Administration
Process documentation
Regulatory Requirements
Tools
BeyondTrust
Active Directory
Entra ID
Netwrix
ASA-Firewalls
Palo Alto Networks
Junipers
Kemp Technologies
SAN
LogRhythm
McAfee
StrongDM
LANs/WAN/WLAN
Troubleshooting TCP/IP
Routing and Switching
IBM Qradar
Splunk
Betriebssysteme
Linux
Windows
Datenbanken
Microsoft Server
SQL Server
Einsatzorte
Einsatzorte
Deutschland, Schweiz, Österreich
möglich
Projekte
Projekte
2 Monate
2025-02 - heute
Implementation and Integration
BeyondTrust Implementation Engineer BeyondTrust PRA / PSSplunkWindows Server 2022...
BeyondTrust Implementation Engineer
Implementation and Integration of BeyondTrust PRA and PS in the Internal Lab. As part of an internal project a PRA and PS environment was established to serve as a lab for training and hands-on practice. The goal of this project was to integrate and configure both BeyondTrust tools for privileged access management and password safe in a controlled, secure test environment. The lab provided a space for testing and refining configurations, ultimately enhancing the skills of the USO team in these key areas. The setup included the configuration of group policies, session policies, and failover (High Availability) to ensure robust access management and uninterrupted service. Additionally, we implemented API use cases, Jump Policies, and workflows to streamline privileged access requests and improve the management of access rights. Integration with the security provider (AD/Entra ID) and the establishment of SSO with Okta ensured a seamless user experience and centralized authentication. Specific to Password Safe (PS), the integration involved connecting PS with existing systems, enabling the automated discovery and onboarding of assets to ensure efficient credential management. We also configured Smart Rules to define dynamic access controls based on defined criteria and set up platforms and JumpHosts for secure access to critical systems. The onboarding process covered operating systems, databases, and applications, ensuring full system integration into the overall security architecture. The lab is now a valuable resource for the USO team, allowing them to practice real-world configurations and gain hands-on experience with privileged access management and password safe security tools, which will contribute to improved implementations and support future security initiatives.
Implemented BeyondTrust PRA and PS for privileged access management and password security.
Integrated PRA and PS tools to streamline privileged access and password management across various systems.
Configured Group Policies to manage user access and security settings.
Set up Session Policies to control access based on user roles and security requirements.
Configured Failover (High Availability) to ensure continuous service availability.
Set up the Integration Client for automating backups.
Installed and configured the Middleware Engine to manage communication between integrated tools and systems (SIEM for advanced session monitoring)
Configured Endpoint Credential Manager (ECM) to manage and secure credentials across endpoints (Integration with Password Safe).
Defined and configured API use cases for streamlined integrations and automation.
Established Account Policies to define security controls for user accounts and privileged access.
Set up Jump Policies to manage access to systems through JumpHosts for secure remote management.
Created and configured Workflows for automating access management processes.
Configured Vendor Access through a Self-Registration Page to enable secure third-party access to the network.
Integrated Security Provider (AD/Entra ID) for centralized identity and access management and MFA enablement.
Implemented Single Sign-On (SSO) with Okta to streamline user authentication across systems.
Integrated Password Safe (PS) to securely store and manage privileged credentials.
Enabled Automated Discovery and Onboarding functionalities for easy asset and credential management.
Configured Smart Rules to define dynamic access controls and improve security posture.
Set up Platforms and JumpHosts for secure access to critical systems.
Onboarding of operating systems, databases, and applications into the system for comprehensive security coverage.
BeyondTrust PRA / PSSplunkWindows Server 2022SQL ServerPostmanActive
DirectoryVM WareAzureEntra IDOkta
BeyondTrust PRA / PS (internal Project and Training)
1 Jahr
2024-03 - 2025-02
developing an IT infrastructure
Senior Cyber Security Architect / Consultant SailpointServiceNowIBM Qradar and Splunk...
Senior Cyber Security Architect / Consultant
A government-affiliated or security-critical organization faced the challenge of developing an IT infrastructure with multi-level security requirements while ensuring the protection of sensitive data across various classification levels. The project aimed to design and integrate security architecture into existing systems while maintaining compliance with the organization's cybersecurity guidelines. Secure configuration management processes were implemented, and information security, cybersecurity architecture, and system security engineering requirements were documented and monitored throughout the acquisition lifecycle. Critical business functions were prioritized in collaboration with stakeholders to align security measures effectively. Security reviews were conducted to identify gaps, and a comprehensive security risk management plan was developed. New system implementations and interfaces were evaluated for their impact on the existing security posture and documented accordingly. The project also included a comprehensive monitoring and threat-hunting solution, establishing a Security Operations Center (SOC) with multiple monitoring and log analysis levels (Blue Team). Ultimately, the project resulted in a robust security architecture that met regulatory requirements while enabling proactive threat detection and mitigation.
Cybersecurity Design & Integration ? Develop and implement security architectures for systems with multi-level security and classified data processing, particularly for government organizations.
Security Documentation ? Define and track information security, cybersecurity architecture, and system security engineering requirements throughout the acquisition lifecycle.
Architectural Compliance ? Ensure that all acquired or developed systems align with the organization's cybersecurity architecture guidelines.
Business Function Prioritization ? Identify and prioritize critical business functions in collaboration with stakeholders.
Security Assessments ? Conduct security reviews, identify gaps in security architecture, and develop a risk management plan.
Impact Analysis ? Evaluate and document how new systems or interfaces affect the organization's security posture.
Security Design Evaluation ? Assess security architectures and designs to ensure they meet the required security standards.
Security Control Implementation ? Define and document security controls for information systems and networks.
Monitoring & Threat Hunting ? Develop and implement solutions for continuous monitoring, log analysis, and threat hunting, including SOC (Blue Team) operations.
SailpointServiceNowIBM Qradar and SplunkCiscoNutanixNetwrix
Finance Sector
2 Jahre
2022-04 - 2024-03
strategic and comprehensive information security and IT risk management program
Information Security ManagerServiceNowManage EngineIBM QRadar...
Information Security Manager
The company needed a strategic and comprehensive information security and IT risk management program to effectively identify and mitigate security risks. A unified security management framework was developed and implemented, establishing clear guidelines for all technology projects, systems, and services. Risk assessments were conducted in close collaboration with business units, integrating security measures into corporate processes. Additionally, cybersecurity awareness was strengthened through targeted training and awareness campaigns. The security organization was provided with clear leadership structures and a sustainable governance model. As a result, consistent application of security standards was achieved, and strategic IT planning was made future-proof.
Develop, implement and monitor a strategic, comprehensive enterprise information security and IT risk management program.
Work directly with the business units to facilitate risk assessment and risk management processes.
Develop and enhance an information security management framework.
Understand and interact with related disciplines through committees to ensure consistency. application of policies and standards across all technology projects, systems, and services.
Provide leadership to the enterprise?s information security organization.
Partner with business stakeholders across the company to raise awareness of risk management concerns.
Assist with the overall business technology planning, providing a current knowledge and future vision of technology and systems.
effective security monitoring and vulnerability management program
Senior Information Security Analyst LogRhythmMcAfeeNetwrix...
Senior Information Security Analyst
The company needed an effective security monitoring and vulnerability management program to detect and respond to threats in a timely manner. A centralized security monitoring system was implemented to analyze and process security events from multiple sources. Security policies and standard procedures were reviewed, updated, and documented to ensure a consistent security strategy. Additionally, security solutions such as intrusion detection, log management, and vulnerability scanning were configured and regularly maintained. Vulnerability assessments and audits helped identify, prioritize, and mitigate security gaps. IT teams and end users were trained to recognize and report security incidents more effectively. These measures significantly improved the company's security posture and resilience against cyber threats.
Security Monitoring & Incident Response ? Monitor, analyze, and respond to security alerts, incidents, and vulnerability reports from sources such as SIEM, vulnerability scans, and alerts.
Documentation & Procedure Management ? Document InfoSec activities and assist with the creation and maintenance of standard operating procedures.
Policy Review & Updates ? Review and update information security policies and procedures.
System Configuration & Maintenance ? Configure, maintain, and ensure the operational status of information security systems, including log collection, security scanning, intrusion detection, and other related systems.
Vulnerability Management ? Review and triage vulnerability alerts, provide analysis, suggest mitigations, track remediation, and manage scheduled scans while identifying gaps and expanding scan coverage.
Security Audits & Reviews ? Perform regular audits and reviews of servers, network devices, endpoints, applications, and databases to document gaps in security controls.
Incident Diagnosis & Support ? Assist the service desk in diagnosing potential security incidents, troubleshoot issues related to security controls, and help educate IT staff and end users on security best practices and policies.
Security Initiative Support ? Support the success of proposed and existing information security initiatives.
LogRhythmMcAfeeNetwrixWindowsCisco
Finance Sector
4 Jahre 8 Monate
2013-09 - 2018-04
ensuring effective coordination
Team Leader Network EngineerPalo Alto NetworkingKemp TechnologiesCisco...
Team Leader Network Engineer
The project aimed to enhance network operations and performance by leading a network team, ensuring effective coordination, and optimizing network infrastructure. A robust network environment was designed and implemented, with clear system configurations and standards documented for consistency and performance. The team focused on troubleshooting network issues, scheduling regular upgrades, and collaborating with network architects to maximize performance and minimize outages. Security measures were established to protect the network system, including defining and monitoring access policies. Additionally, continuous education and participation in professional networks helped maintain an elevated level of expertise within the team. Regular reporting and project management ensured operational status was communicated, and goals were achieved in line with organizational needs.
Team Leadership ? Lead the network team, organize their duties, and monitor performance.
Network Environment Design ? Establish network environment by designing system configurations, directing system installations, and enforcing system standards.
Network Performance Optimization ? Maximize network performance by monitoring performance, troubleshooting network issues, scheduling upgrades, and collaborating with network architects.
Network Security ? Secure the network system by establishing and enforcing policies and defining access controls.
Continuous Learning ? Update job knowledge through educational opportunities, reading professional publications, maintaining personal networks, and participating in professional organizations.
Mission Accomplishment ? Complete related results to fulfill information systems and organizational goals.
Reporting & Project Management ? Report on network operational status by gathering and prioritizing information and managing projects.
administration and maintenance of critical IT systems
Network and System Administrator Cisco networkingWindows ServersWSUS...
Network and System Administrator
In this internal role, I was responsible for the administration and maintenance of critical IT systems across the organization. This included managing Active Directory, MS Exchange, VPN connections with Cisco routers, DNS, DHCP, and file servers, as well as configuring DFS for site-to-site replication. I conducted regular system updates through WSUS Server and verified antivirus updates to ensure security. I performed daily, weekly, and monthly backups, ensuring that backup tapes were securely stored. My role also involved diagnosing and troubleshooting hardware and software issues in a network environment, as well as providing end-user support. Additionally, I assisted users in securing the confidentiality of their data and prepared hardware and software specifications based on the IT department?s needs.
System Administration & Maintenance ? Administer and maintain Active Directory, MS Exchange, TMG, VPN connections with Cisco Routers, site replication, DNS, DHCP, File and Print servers, and configure DFS for replication between sites.
System Updates & Antivirus ? Ensure system updates are applied via WSUS Server and verify antivirus updates for security.
Backup Management ? Perform daily, weekly, and monthly backups, ensuring backup tapes are stored securely.
Troubleshooting & Issue Resolution ? Monitor, diagnose, troubleshoot, and resolve hardware and software issues within a network environment.
End-User Support ? Provide support to end-users, assisting with technical issues and ensuring smooth operation.
Data Security ? Help users secure the confidentiality of their data through best practices and guidance.
Hardware & Software Specifications ? Prepare hardware and software specifications based on the IT department?s needs.
managing and maintaining the organization's IT infrastructure
Network and System Administrator Cisco networkingWindows ServersActive Directory...
Network and System Administrator
In this internal role, I was responsible for managing and maintaining the organization's IT infrastructure, ensuring all systems operated efficiently and securely. I administered key systems such as Active Directory, MS Exchange, VPN connections, DNS, DHCP, and file servers, as well as configuring DFS for replication between different sites. Regular system updates were conducted through WSUS Server, while antivirus software was kept up to date to maintain security. I was also in charge of performing regular backups and ensuring the safe storage of backup tapes. Additionally, I monitored and resolved hardware and software issues, provided end-user support, and helped users secure the confidentiality of their data. As part of my duties, I also prepared hardware and software specifications to meet the IT department?s requirements.
System Administration & Maintenance ? Managed and maintained Active Directory, MS Exchange, TMG, VPN connections with Cisco Routers, site replication, DNS, DHCP, File and Print servers, and configured DFS for replication between sites.
System Updates & Antivirus ? Ensured system updates were applied using WSUS Server and verified antivirus software updates for security.
Backup Management ? Conducted daily, weekly, and monthly backups and ensured that backup tapes were securely stored.
Troubleshooting & Issue Resolution ? Monitored, diagnosed, troubleshot, and resolved hardware and software issues within the network environment.
End-User Support ? Provided ongoing support for end-users, assisting them with technical issues and ensuring smooth operational functionality.
Data Security ? Assisted users in securing the confidentiality of their data and advised on best security practices.
Hardware & Software Specifications ? Prepared hardware and software specifications tailored to the IT department's needs.