Results-driven, tech-savvy, cross-functional, creative, security-minded, initiative-taking Information technology (IT) professional qualified in LAN and WAN environments. Strategically managing real-time data working with APIs, GUI/CLI interfaces and network commands. Analyzes Data by qualifying, parsing, interpreting, and reporting while promoting the principles of the CIA Triad, lease privilege. Leveraging methodology and values such as Agile TIA Triad within the SCRUM framework, the linear sequential development process of waterfall, and hybrid project management.
Protecting networks against unauthorized access, suspicious network practices, uses and attacks., Designing and developing code that protects applications and devices against unauthorized access in networks and unsecure practices., Protect sensitive cloud-based data used in infrastructure and organizations in the cloud environment., Use of preventative measures to protect endpoint devices using tools, methodologies, and practices.