||Resumes 61 - 70 of 177|
REEMON AWEKM **** *. ********* ***, ***#** El Cajon, CA 92020 firstname.lastname@example.org 619-***-**** CAREER OBJECTIVE Goal oriented and competent student eager to obtain a position where my strong academic background in IT combined with hands-on...
- 2019 Feb 28
Missouri City, TX
... Interactive Medical Group, Houston, TX (December 2016 to August 2017) Consultant Helped develop a solution for Startup -MSO which integrated technology such as telemedicine, LTE, Cloud, Cyber Security and mobile devices with Private medical ...
- 2019 Feb 21
... Utilizing SEIM/SIMS, Splunk for detecting cyber-attacks and insider threats, and gathering log data from systems and devices and run queries on that data to find issues and debug problems. Working with Network devices- routers, switches, hubs, and ...
- 2019 Feb 13
... Worked in close partnership with the Cyber Security teams to establish tight coalition with all ITSM process transforms Exceeded financial targets of the program and delivered cost savings that were significantly above expectations while keeping the ...
- 2018 Nov 24
... customers (Application teams and Business requestors) to understand their network connectivity requirements, gathering information necessary to define appropriate solutions consistent with HPE’s IT strategy and Cyber Security policy governance. ...
- 2018 Nov 04
... Member, International Cyber Threat Task Force (ICTTF) and the United States Cyber Threat Task Force (USCTTF), 2011-Present. Member, Orange County Private Sector Terrorism Response Group, 2009-2015. Member, City of San Marcos (Calif) Community ...
- 2018 Oct 29
... 2019: ACIR, CDR, CMVR, CSMR, PRC, and ECRE SKILLS • Microsoft Word • Microsoft Excel • Microsoft PowerPoint • Typing 45 wpm • 10-Key • ADP Payroll System • Cyber Recruiter • Kenexa/Taleo POSITIONS/INDUSTRIES RECRUITED • Accounting • Industrial/Mfg. ...
- 2018 Oct 08
... COMPUTER SKILLS AND COURSES ●Programming Languages: Java/Python ●Computer Science Principals, Microsoft, Blender 3D, Unity Game Engine, Adobe Photo Shop, Adobe Premiere ●Cyber Security Operations ●Information Technology Fundamentals (Hardware, ...
- 2018 Sep 27
... Wireless Networks oThe concept of this course is learning the difference of each network and its usage in the computer Applied Cyber Security oThis course provides the knowledge of cyber security of in terms of network vulnerability, cyber threats, ...
- 2018 Sep 04
PELUMI TAIWO Cell: +* (***) *** – **** Email: email@example.com SUMMARY Performance-driven Cyber-Security Professional with over three years of IT experience with special expertise in FISMA compliance, Security Training, developing security ...
- 2018 Aug 26