CISSP, SENIOR SYSTEMS SECURITY SOLUTIONS ARCHITECT

SENIOR SYSTEMS SECURITY SOLUTIONS ARCHITECT

Enterprising strategic leader with outstanding technical skills in cloud, data, optical, radio, satellite, software, and wireless networks consisting of architecture, development, design, engineering, prototyping, implementation, project management, security, and systems.

  • Successfully lead highly technical, mission critical, enterprise level large scaled projects that exceeded business, technical, and security requirements.
  • Successfully skilled at analysis, development, and detailed design work for requirements consisting of use cases (misuse), sequence scenarios, sequence diagrams, subroutine examples, prototyping, prototyping development, behavioral analysis, detailed design requirements documentation (e.g. Conops, et cetera), Service Oriented Architecture (SOA), Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), implementation strategies, design constraints, verification of strategies, correlating requirements (Risk/Business matrixes) while maintaining the “big picture.”
  • Proponent of change management processes and facilitating business cases, risk management & analysis process, security plans, trade-off analysis, secure software development lifecycles (SDLC) processes, information systems security engineering processes (ISSE), polices/procedures and information classifications to creatively solve complex business objectives and to place businesses in a forward position for current and future requirements.
  • Strong verbal and listening skills with the proven ability to communicate technically complex concepts to a wide audience utilizing both verbal and written presentations.
  • Demonstrates exceptional leadership skills along with substantial communication skills that place a strong emphasis on teamwork.
  • Successfully created Open System Layer Modular Network designs that support Service Oriented Architecture (SOA), n-tier architectures, Net-Centricity, Life Cycle Management, technology insertion and refresh, Commercial off the Shelf (COTS), Government off the Shelf (GOTS), and/or reusable Non-Development Items (NDI).
  • Successfully incorporated expert testimony, evidence (e.g. assessments, et cetera), authentication and chain-of-custody processes, trial preparation, exhibits, et cetera for litigation matters.
  • Holistic security approach to every project and is considered a subject matter expert (SME) in various domains.

Industry Standards and Protocols

  • Architecture, development, designs, prototype development, policies, assessments, lifecycles, implementation, certification and accreditation, risk management, investigation, behavioral analysis, certificate analysis, and any other form of security tasks all tasks were required to comply with the following standards, guidelines, and protocols and not necessarily limited to the following:
    • IEEE, IETF, NIST, FISMA, DISA, STIGS, ISO/IEC, ICS, FIPS, ISSE, SDLC, PKI, TPM, IETF, DOD, DOJ, SOA, CJCSI, DIACAP/DITSCAP, HIPAA, HITECH, PCI, PII, PFI, SOX, GLBA, XMPP, SSL/TLS, OAuth, Rest, et cetera and not including various types of open source standards, guidelines, and protocols.

 

Security Software Architecture/Engineering

  • Successfully architected, designed, developed, code developed, engineered, prototyping, implemented and lead security architect for security systems solutions for software infrastructures that included, but not limited to, OS (Windows/UNIX platforms), source code/manage code (C/C++, C#, UNIX, LINUX, XML, HTML, PHP, CSC, JAVA, Visual Basic, .NET, Pascal), Databases (Relational, RDF, MySQL), VMware, Applications, Web Applications, Open Source (Open ID, OAuth, OpenSSL, XMPP, OpenVPN), Interfaces (REST, Python, JSON, .NET, FLASH), Storage Area Networks, Access Controls (Active Directory, LDAP, RADIUS), Identity Management (policies, rules, protocols), security analysis of source code, packets (OSI layer 1-7), digital signatures and compared with standard x.509 (certificates), incompatibility analysis and resolutions. Penetration, vulnerability, custom attacks, sniffing, and any other form of testing required (White/Black Box).  Created and provided risk management & analysis, security plans, information classification, questionnaires, trade-off studies, intellectual property analysis, and licensing analysis et cetera.

 

Security Network Architecture/Engineering

  • Successfully developed, engineered, implemented (executed equipment configurations), project managed, and lead architect for security systems solutions for network infrastructures that consisted of cloud, data, wireless, video, SANS, VMware and voice networks that complied with requirements that included but not limited to the following:
    • VoIP, Voice over ATM, QoS, Internet (single/multiple ISPs), LAN/WAN, VPN, TCP/IP, UDP, BGP, EIGRP, MPLS, VLANS, SMP, RADIUS, TAXACS/+OSFP, EAPS, DNS, POP3, SSH, SSL, SMTP, HTTP/HTTPS, XMPP, FTP, RTP (Real-time Transport Protocols), H.323, SIP (Session Initiation Protocol) “Skinny” SCCP (Skinny Client Control Protocol), MGCP (Media Gateway Control Protocol) ISDN, SS7, PSTN, 3G, Layer-2  (SPANNING TREE (IEEE 802.1d), RIP, IPSec, encryption protocols, network security (IDS/IPS, Firewalls), correlation devices, and fiber-optics (Metro-Ethernet), Metropolitan Area Networks (MAN) along with Time Division Multiplexing (DS0, DS1, DS3, OC-03, OC-12, OC-48, OC-192, DWDM, WDM), SDSL Concentrators, frame relay, digital cross-connects, satellite systems, and various radios networks.
    • Wireless LAN (IEEE 802.11a, b, g, n) networks that created hot spots (4.9 GHz) and prepared the way for Session Initiation Protocol (SIP).  Microwave (analog/digital) Line of Sight (LoS) and Non-Line of Sight (NoS) networks.  Base Station Controllers (BSC) for cellular sites.
    • Deployed network security devices such as intrusion detection/prevention systems, firewalls, crypto (PKC/PKI, SSL, RSA, IPSec, VPN, and AES), event correlation devices and strategically placed network analyzers to assist in investigations of security threats.  Created and provided risk management & analysis, security plans, information classification, questionnaires, digital signatures “certificate” analysis, trade-off studies, intellectual property analysis, licensing analysis, disaster recover business continuity, configuration management, quality assurance, change control, and business cases documentation to justify new designs that incorporate all security analysis results that directly comply with customers’ current and future requirements.  Penetration, vulnerability, custom attacks, sniffing, and any other form of testing required (White/Black Box).

 

 

 

 

Professional Experience

Global Network Security Architecture, Inc. ~ 04/08 to Present

Senior Systems Security Solutions Architect

Contract Position for Client Riverside Wesley United Methodist Church

During this contract an over-all company security assessment including applications, intellectual property, products, website and networks was performed.  I successfully a created new architecture (wired/wireless) with cloud development (LAMP ~ Linux, Apache, MySQL, and PHP design/development/implementation/testing) and implemented countermeasures for current and foreseeable future vulnerabilities and exploits.  I lead the team that implemented the new design, recommended solutions, security controls, mechanisms, and policies.  As part of developing, designing and implementing this new system and website, the technologies included, but not limited to, confidential source code development,  PKI (SSL/TLS), access controls, custom web applications (HTML5, flash, php, csc, Linux, et cetera), detail review of source code, interface review, implementation, assessment, QA testing, and security testing.

 

Contract Position for Client Nationwide Insurance, Inc.

During this contract, I successfully conducted various assessments for data loss claims.  These efforts included, but not limited to, interviews, evidence gathering, authentication of evidence, preserving chain of custody, reviewing and validating said evidence, analyzing evidence and data, providing expert opinions as to what caused complete loss or corruption of data whether it related to various causes such as human error, virus/malware, hardware, power, or such as acts of God (e.g. lightning strikes).  Further, DLP (data loss prevention) technical techniques, process, and procedures were provided to ensure that the client did not suffer a complete loss of data in the subsequent future.  Forensic processes were created as part of the assessments so that expert testimony (if required), evidence (e.g. assessments, et cetera), authentication and chain-of-custody processes, trial preparation, exhibits, et cetera may be used for litigation matters for each client engagement.

 

Contract Position for Client Gladius Insurance Services, LLC

During this contract, I successfully conducted an over-all company security assessment including applications, intellectual property, proprietary products, networks, and websites.  These efforts included interviews with key individuals, review of company intellectual property, review of company proprietary products, networks (wired/wireless), and websites.  I successfully created and implemented a new architecture (SOA) that included a multi-site network (wired/wireless) design and moving a significant amount of services to the Cloud (LAMP ~ web services, websites, exchange services, Linux, Apache, MySQL, and PHP design/development/implementation/testing et cetera) with incorporating a cost benefit analysis as part of the security assessment of the new design.  This cost benefit analysis was essential in the new design decisions to ensure that new infrastructure was PCI and PII compliant it further provided for less hardware and software maintenance support, lowered replacement cost of equipment, and provided for current security standards (Federal and State law), cloud support, disaster recovery, increase reliability, availability and the ability to scale to meet future software, hardware and security standards.  As part of developing, designing and implementing this new system, the technologies included, but not limited to, confidential source code development,  PKI (SSL/TLS), access controls, event correlation, custom web applications (HTML5, flash, php, csc, Linux, et cetera), custom database (MySQL) web site development that included animation, (dreamweaver, flash, photoshop, illustrator), policy creation, detail review of source code, interface review, implementation, assessment, QA testing, and security testing (White/Black Box).  Forensic processes were created as part of the assessments so that expert testimony (if required), evidence (e.g. assessments, et cetera), authentication and chain-of-custody processes, trial preparation, exhibits, et cetera for litigation matters.

Contract Position for Client Eastman Kodak, Inc.

During this contract, I successfully developed system security designs that includes, but not limited to, confidential source code development,  open source code development (OAuth, OpenID, OpenSSL, OpenVPN), event correlation, access controls, custom PKI, Obfuscation, custom cryptography, custom authentication process, custom access controls, custom web applications, cloud development, custom databases (relational and RDF), XMPP and other types of custom applications.  These efforts includes and were not limited to, sequence and use/misuse case drawings, sample cryptographic code (subroutines) creation, creation of new cryptographic mechanisms for various functions (symmetric, asymmetric ciphers, hashes, et cetera), various forms of development of custom PKI, SSL/TLS, customized database security design, open source and customized creation of an authentication process with enhanced security, prototype creation, and other custom security designs. This contract included various security assessments, accreditation and certification, requirements documentation to be generated, design documentation to be generated (Sequence, sample subroutines, use-case, et cetera), generated API documentation, exportation law analysis and review, policy creation, detail review of source code, interface review (C#, C++, REST, Python, JSON, et cetera), code testing review (functional and security), implementation assessment, penetration and vulnerability testing and assessments, mitigation analysis, and recommendations (web, applications, routers, switches, firewalls, IDS, event correlation, remote access), QA testing, security testing (white/black box testing ~ penetration, vulnerability, custom attacks based upon design) and recommended tools and trade-offs.

 

Contract Position for Client Daley Tax Professionals, Inc.

This contract is to conduct an over-all company security assessment including applications, intellectual property, products and networks.  These efforts included interviews with key individuals, review of company intellectual property, review of company products.  I successfully created current multi-site network design with cloud development and performed an interim security assessment of the existing networks and make recommendations to implement countermeasures for current vulnerabilities.  I successfully created a new SSLVPN Infrastructure design and implementation using current standards and analyze customized implementation for a full security assessment.  Analyze and prepared recommended solutions for Windows Server 2008 incapability issues with several custom applications that utilize Visual Basic, Sequel, FoxPro, and Java.  I also prepared interim security solutions for the customer’s applications, intellectual property, products, cloud services, networks, policies, business continuity, and disaster recovery.  I lead the team that implemented the new design, recommended solutions, security controls, mechanisms, and policies.  As part of developing, designing and implementing this new system, the technologies included, but not limited to, confidential source code development (LAMP ~ web services, websites, exchange services, Linux, Apache, MySQL, and PHP design/development/implementation/testing et cetera), PKI (SSL/TLS), access controls, event correlation, custom web applications (HTML5, flash, php, csc, Linux, et cetera), custom database (MySQL), policy creation, detail review of source code, interface review, implementation, assessment, QA testing, and security testing (White/Black Box).  Forensic processes were created as part of the assessments so that expert testimony (if required), evidence (e.g. assessments, et cetera), authentication and chain-of-custody processes, trial preparation, exhibits, et cetera for litigation matters.

 

Contract Position for TekSystem for client, Saint Joseph Health System

This contract is to conduct a network security assessment for networks of several facilities for a health system.  These efforts led to the creation of         an Network DMZ redesign project that span over several states that included the following, project charters, project plans, discovery and depiction of existing network for layers 1 – 7, firewalls, IDS, VPN, load balancers, circuits, SANS, VMware, and Web applications, and standard applications. I created a physical infrastructure of fiber optical network.  Created a high-level depiction of a new network design that provides for complete                diversity, redundancy, load balancing, security, between 3 different geographical state regions.  Conducted an RFP for new Internet connectivity and direct fiber optical network circuits between the regions that would save the health system $500,000 over the course of 3 years that included vendor comparison matrix, a bake-off to compete vendors further, presentations for the board of directors, and any other required duties.

Contract Position for Sun Microsystems, Inc. for client, NComputing

This contract is to conduct an over-all company security assessment including applications, intellectual property, products, and networks.  These efforts included interviews with key individuals, review of company intellectual property, cloud services, review of company products and worldwide networks.  I successfully created current world/site network, world/site network infrastructure, world/site communications network designs along with I performed an interim security assessment of the existing networks and make recommendations to implement countermeasures for current vulnerabilities.  I successfully created a Public Key Infrastructure design using current standards and analyze customer implementation for a full security assessment.  Reviewed and analyze customer’s digital signatures and compared with standard x.509.v3.  This contract included various security assessments, accreditation and certification, requirements documentation to be generated, design documentation to be generated (Sequence, sample subroutines, use-case, et cetera), generated API documentation, exportation law analysis and review, policy creation, detail review of source code, interface review (C#, C++, et cetera), code testing review (functional and security), implementation assessment, penetration and vulnerability testing and assessments, mitigation analysis, and recommendations (web, applications, routers, switches, firewalls, IDS, event correlation, remote access), QA testing, security testing (white/black box testing ~ penetration, vulnerability, custom attacks based upon design) and recommended tools and trade-offs.  Analyze customer’s FPGA processor and product solution for security vulnerability and provided solutions.  I successfully created questionnaires customized to customer environment that included the following Management, Operational, Technical, and Network, Product specific, and Policies questionnaires.  I also prepared interim security solutions for the customer’s applications, intellectual property, cloud services, products, networks, policies, business continuity, and disaster recovery.  Forensic processes were created so that expert testimony (if required), evidence (e.g. assessments, et cetera), authentication and chain-of-custody processes, trial preparation, exhibits, et cetera for litigation matters.

Albin Engineering Services, Inc. – Contract Position for Lockheed Martin onsite at Albuquerque, NM ~ 10/07 to 03/08

(Senior Systems Security Solutions Architect)

Lead Network Architect for all of EDS (all Task Orders) and primarily responsibility was the development and design of Multi-Mission Satellite Operations Center (MMSOC) Ground System Architecture (GSA).  [The next generation AFSCN satellite operation ground system that supports RDT&E, Space Command and Operationally Responsive Space (ORS).]  Responsible for developing Network system and subsystem specification documents, security solutions for network architecture along with use cases and scenario sequence behavior diagrams, interface control document development, prototype development, network/hardware engineering staff mentoring (training and development) and customer liaison.  Lead hardware, Security, and network engineer for system design review (SDR) and preliminary design review (PDR) for the MMSOC GSA system.  .  This contract included various security assessments, accreditation and certification, requirements documentation to be generated, design documentation to be generated (Sequence, sample subroutines, use-case, et cetera), generated API documentation, policy creation, detail review of source code, interface review (C#, C++, et cetera), implementation assessment, penetration and vulnerability testing and assessments, mitigation analysis, and recommendations (web, applications, routers, switches, firewalls, IDS, event correlation, remote access), QA testing, security testing (white/black box testing ~ penetration, vulnerability, custom attacks based upon design) and recommended tools and trade-offs. I was the direct report to Air Force Information Assurance Manager preparing DITSCAP (DIACAP) packaging along with creating risk mitigation assessment documentation of a network design that I had created, for the agency.  I designed a Cross-Domain Solution for Red/Black data issues and a multilevel security solution for enclaves/domain issues [using data guards].  I had to ensure that the network design met with the local Wing’s MAC level.  Other documentation that I created or assisted in creating was Security Management Plans, Data Guards White Papers and Security Composite View.

 

County of Riverside – RCIT [Riverside County Information Technology] ~ 08/06 to 08/07

(Senior Systems Security Solutions Architect)

  • Successfully designed, engineered, implemented (executed equipment configurations), project management, and lead architect for security solutions for a network infrastructure called the Capacity Adjustment Project (CAP). This project deploys a new network architecture, which creates a mesh environment, and redundancy (Core/Distribution/Edge/Access separation) and ensures strategic growth for the Internet (Single/multiple ISPs), data centers, VPN, firewalls, IDS, correlation devices (High Tower), network analyzers (Infinistream) and the server farm services.  This design removed spanning tree loops (layer-2) and EIGRP loops (layer3) and deploys an IEEE standard utilizing BGP for efficient performance. [Including – Stub networking and summarization]  This design removed current VMware, Sans, Web Applications, and other standard applications (such as exchange) issues that were occurring.  A fully analysis of customer’s applications was conducted in order to have the new design remove currently experiencing.
  • Successfully designed, engineered, implemented (executed equipment configurations), project manager, and lead architect for security solutions for a network infrastructure called the Enterprise Wireless LAN Solution (EWS) that for deploys a wireless LAN (IEEE 802.11a, b, g, n) that will span the entire County of Riverside along with creating “Hot Spots” (4.9GHz) that prepares the way for Session Initiation Protocol (SIP) and Skinny Client Control Protocol (SCCP “Cisco”).
  • Lead architected, designed, engineered, implemented, and project manager for security solutions for a network infrastructure that consisted of point to point Metro-Ethernet public (5.9GHz) microwave NoS solutions.
  • Prepared and presented in-depth high-level technical presentations, business plans (Return on Investments), project charters, project plans, request for proposals, magnitude of costs, for executives, customers, Executive Technical Committee boards, and peers.
  • Created white papers, business cases, new standards, established and implemented change management procedures.
  • Analyze massive amounts of packet data for security incidences and provide reports to CISO.
  • Prepared risk assessment documentation along with risk mitigation resolution to meet DOJ standards for the Sheriff department.  Prepared internal auditing procedures and reports for CISO.  Also, prepared other risk mitigation/resolution and internal auditing documentation for other departments that had to meet other Federal Agency Standards.
  • Created an Engineering and Implementation lab for proper testing and deployment of equipment within the network.
  • Security duties included, but, not limited to confidential source code security review (C++, C$, Linux, HTML, et cetera) access controls, event correlation, custom web applications reviews, software/hardware interface reviews, policy creation, implementation, assessment, QA testing, and security testing (White/Black Box).

Guidant Corporation – Acquired by Abbott ~ 01/06 to 8/06

(Senior Systems Security Solutions Architect)

Successfully designed, engineered, implemented (executed equipment configurations), project manager, and lead architect for security solutions for a network infrastructure; a campus network, “Metropolitan Area Network” (MAN) that spans a 12 miles fiber optic ring that includes 8 nodes of Cisco 15454 (forming RPR rings), Cisco 6509E (Core/Distribution), (EIGRP & OSPF), Cisco 3750s (access layer) that carried Nortel, Cisco, Avaya, VoIP, video, and data traffic using the latest design techniques for a completely mesh environment.

  • Redesigned to meet new Abbott’s standard using Extreme BD-12 (EAPS & OSPF) instead of Cisco 6509E (EIGRP & OSPF).
  • Designed using Avaya Communications Manager, Avaya Media gateway along with Cisco network equipment, then redesign using Extreme.
  • Prepared and presented in-depth high-level technical presentations, business plans (Return on Investment), project charters, project plans, for executives and peers.
  • Complied with HIPAA and PII requirements by using Cisco Firewalls/IDS and Nortel VPN Concentrators for new designs.
  • Analyzed current applications issues at a packet layer and provided resolutions for source code or applications issues.
  • Prepared internal documentation for auditing for Federal Drug Administration requirements.  Prepared risk assessments and mitigation reports/presentation for engineering design solutions to demonstrate that it met HIPAA and PII requirements.

Pacific West Tech – Contract Position for Southern California ~ 01/00 to 8/06

(Senior Systems Security Solutions Architect)

Successfully designed, engineered, implemented (executed equipment configurations), project management, and lead architect for applications, networks, cloud services, and security solutions of infrastructures for information technology, security and telecommunications projects that included on and off site engineering technical support (“Hands On”) in order to analyze and to resolve highly complex technical issues.  I analyzed current applications issues at a packet layer and provided resolutions for source code or applications issues.  Security duties included, but, not limited to confidential source code security review (C++, C$, Linux, UNIX, et cetera) access controls, event correlation, custom web applications reviews, software/hardware interface reviews, policy creation, implementation, assessment, QA testing, and security testing (White/Black Box).  Prepared and presented in-depth high-level technical presentations and solutions along with ROI (Return on Investment) for customer and prospects.  Prepared risk assessment and mitigation reporting along with documentation for internal auditing for several of companies to meeting HIPAA, SOX, PCI, PII, GLBA requirements.  Forensic processes were created so that expert testimony (if required), evidence (e.g. assessments, et cetera), authentication and chain-of-custody processes, trial preparation, exhibits, et cetera for litigation matters for each client engagement.

Norvergence – for Southern California ~ 07/03 to 06/04

(Senior Systems Security Solutions Architect)

Successfully designed, engineered, implemented (executed equipment configurations), project management, and lead architect for applications, networks, cloud services,  and security solutions of infrastructures for information technology, security and telecommunications projects that included on and off site engineering technical support (“Hands On”) in order to analyze and to resolve highly complex technical issues.  I analyzed current applications issues at a packet layer and provided resolutions for source code or applications issues.  Prepared risk assessment and mitigation reporting along with documentation for internal auditing for several of companies to meeting HIPAA, SOX, PCI, PII, GLBA requirements.

Nortel Networks – Contract position for Verizon Wireless onsite all over Southern California ~ 07/00 to 10/02

(Senior Systems Security Solutions Architect)

Senior Engineering Technical Assistance Support (ETAS) that provided application, network and security solutions of network infrastructures that consisted of engineering, security, project management of equipment conversions for both switch facilities and cellular sites during live conversions.  I analyzed current applications issues at a packet layer and provided resolutions for source code or applications issues.  Security duties included, but, not limited to confidential source code security review (C, Linux, UNIX, et cetera) access controls, event correlation, software/hardware interface reviews, policy creation, implementation, assessment, QA testing, and security testing (White/Black Box).  Responsibilities included but not limited to software of the Nortel (MTX) that entailed building trunk groups, routing tables, office tables, backups, replacement of oms, replaced an RTF packet, SPM (Spectrum Peripheral Modules), providing network security, and hardware tasks (DMS-250 w/XACore front/Enet/Passport/DTC/UNIX based).  Additional responsibilities were the Nortel “BSC” (Base Station Controllers/UNIX based) and Cisco Routers/Switches for Internet access (TCP/IP, WAN/LAN, WEP, UPD, MPD, H.323, SS7, ISDN, PSTN 3G, Encryption protocols) and satisfying network security requirements.

Adelphia   Business – Contract   Position (03/00 to 7/00) ICG   Communications, Inc. – Contract   Position (02/99 to 3/00) Five   Star Telecom/ICN Telecom – Contract Position onsite in Seoul Korea (11/98 to   2/99)

Military Experience

United States Army, Fort Detrick, Maryland – Electronic Technician

(E-4:  Held Top Secret Clearance with a Special Background Investigation)

Education

California Southern Law School:

  •   Juris Doctorate
Military Degree:

  •   Microwave System repair
Riverside Community College:

  •   Associates   Degree in Science
 Security   Certificates:

  •   CISSP Certified   327800 – since 2008
  •   Black   Hat – Ultimate Hacking
  •   Hightower   – Cinxi – Correlation Device
  •   Sniffer   University – TCP/IP Network Analysis Certified
  •   ISC2   – Information System Security Engineering Professional (ISSEP) Course   Certified – 2010
 Security   Certificates:

  •   CSSLP ~ Passed exam   awaiting certification
  •   Black   Hat – Briefings DC
  •   Sans – Perimeter Protection Wireless Certified
  •   Sniffer   University – Network Analyzer Certified
  •   ISC^2   – Certified Secure Software Lifecycle Professional (CSSLP) Course Certified –   2011
 Corporate Education   and Certificates:

  •   Powerful   communications skills , Crucial   Conversations, Improving   Public Contact Skills

Technical Certificates:

  •   Aruba   – ACMA Certified
  •   Avaya   – IP Office Certification
  •   Cisco   – 15454 MSTP Optical Design, Setup, & Configuration
  •   ISDN/PRI,   Data Transmissions/NEC Radios
  •   Nortel   DMS/MTX Switching/Satellite Switching

 

Technical Skills

Software:

  •   Windows   (Server 2000/2003/2008/2010)
  •   UNIX   (Solaris, Redhat, Linux, Apache et cetera)
  •   Source Code & Manage Code (C/C++, C#, UNIX,   XML, JAVA, Visual Basic, Sequel, .net, Pascal)
  •   VMware, Applications, Web Applications
  •   Storage Area Networks,
  •   Access Controls/Authentication (Active Directory,   LDAP, RADIUS, OAuth, OpenID, et cetera )
  •   Security analysis of source code & custom   cryptographic code
  •   Packets analysis (OSI layer 1-7),
  •   PKI   expert (Digital signatures, certificates, ciphers, et cetera)
  •   OpenSSL,   Bouncy Castle, GNUTLS
Security tools:

  •   Sniffers   – NetScout (Infinistream), Sniffer portable, Wireshark (Pilot), tcpdump,   kismet
  •   Penetration   tools – Core Impact, Metasploit, Backtrack
  •   Vulnerability   Scanners – Nessus, Nmap, GFI, Paros Proxy,
  •   Crackers   – Cain & Able, Air Crack, Pass-the-hash, Hydra, john the ripper, Ophcrack,   et cetera
  •   Obfuscation   tools/Decompilers Spices, Smart Assembly, Dotfuscator, Just Decompile,   DotPeek, Dis#, Reflector
  •   Snort,   Rootkits, Amap, nbtscan, hping, Netcat, backtrack, Ettercap, Nikto, Fiddler, Firebug,   custom attacks et cetera
  •   And   many others not listed here…..
Firewalls/IDS(IPS)/Correlation:

  •   Cisco,   Nortel, Check Point, Lucent, Juniper (ISG, Odyssey, IDP, NetScreen, SRX),   Sonicwall, Sidewinder, Symantec, High Tower, Blue Coat Proxy Appliance, Snort,   et cetera

 

Router/Switches/Wireless:

  •   Nortel   (Passport 2500, 4500, 5000, 8300, 8600, VPN Contivity)
  •   Cisco   (18xx, 19xx, 28xx, 29xx, 37xx, 38xx, 39xx, 45xx, 49xx, 72xx, 65xx, 76xx, 86xx,   220W, 4000, 4400N, et cetera)
  •   Extreme Blackdiamonds;   Juniper (E, J, M, T-Series, et cetera)

Aruba (200, 800, 2400, 6000, et   cetera)

Optical:

  •   Nortel,   Cisco, Lucent, Fujitsu, NEC (OC-3 – OC-48, DWDM, MOR, Metro-Ethernet, CWDM,   WDM, Sonet/DSH)

 

Voice:

  •   Nortel   (DMS [XA-CORE, Supernode/SNS, Enet], [GSM, CDMA, AMPS, TDMA, MTX, BCS, UCS,   VCF], [Meridians, Norstar option 11 & 81])  Communication Managers/Servers (VoIP),   Media Gateways, Lucent (Partner, Merlin, Avaya (VoIP & TDM), Call   Managers, Media Gateways, Nortel  &   Eagle (SS7), Cisco Call Managers (Unity/Servers), Media Gateways
  •   Nortel (Call pilot), Octel, Lucent, Cisco,   Avaya

 

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Namtek or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Namtek shall not be liable for any damages whatsoever arising out of the content or use of this blog.
%d bloggers like this: