Curriculum Vitae Systems Network Engineer
Full Name : MOHAMMED MAJEED
E-Mail : *********@*****.***
Contact Number : 009**-*****-****
Marital status : Married
Gender : Male
Nationality : Indian
Job Title : Systems Network Engineer
Present Experience : Energy Recovery Systems Company Ltd Jeddah Saudi Arabia
As IT Systems Network Manager
From June 2014 Till the Date.
Previous Experience : Saudi German Hospital Group
Jeddah Saudi Arabia
As Senior Systems Engineer
From August 2010 to 2014
Reason of living : Better Career Opportunity ( End of Contract ) Holding of an Iqama : Transferable
Driving License : Validate Driving License ( SAUDI ARABIA ) Present Location : Jeddah ( Saudi Arabia )
Personal Summary :
A Information Technology (IT) aware and highly motivated professional successful Systems Network Administrator with a proven track record in driving Information Technology (IT) forward whilst delivering high Information Technology Infrastructure Environment. A consistent track record of improving efficiency, Ability to manage daily operations, and planning. Human resources to ensure maximum efficiency. Mark enjoys and thrives working on User focused environment and is currently looking for a suitable as a System Network Administrator Position in the career field of Information Technology.
2 5 P a g e
Job Description :
Responsible for designing organizing modifying and supporting a company’s of the mission. Configuring Servers, Unified threat management (UTM) Firewalls, Network Routers, Switches. An operating system computer hardware, Email, Web, and Cloud Computing Resources Application system software etc. Maintain good documentation of configuration and procedure clearly identified values implemented to support it.
Primary Responsibilities:
Plan for network security: address all security requirements and issues in selecting network and server and deployment including the management policy, technical training and outsourcing requirements and address security.
Design physical and environmental security: e.g. put critical assets such as network communication lines, servers, switches, firewalls and file servers in server room or a secured area.
Use private IP addressing scheme for internal networks: to prevent internal network from access by external network.
Design network security model by zoning i.e. segregation of network according to security requirements, e.g. the office network is totally isolated from the Internet, or the company servers and computers are located behind the firewall, or set up a demilitarized zone (DMZ) network. Unsecured or unmanaged systems should not be allowed to make connection to internal network.
Configure firewalls and network routers: harden the firewall and router by limiting the administrative access to specified locations, closing unnecessary network services for incoming and outgoing traffic or using encrypted communication channel for administration.
Configure servers: e.g. secure the server operating system by uninstalling unnecessary services and software, patch the system timely and disable unused accounts.
Secure the application: by means of installing security patch, hardening the configuration of the applications or running the application with a least privilege account.
Filter virus and malicious code: anti-virus software with up-to-date signature should be installed in desktop and network servers to prevent the spread of virus / worm.
Manage accounts and access privileges: e.g. access rights should be granted on an as- needed basis and should be reviewed regularly.
Log security events and review regularly: Logging and auditing functions should be provided to record network connection, especially for unauthorized access attempt. The log should be reviewed regularly.
Develop a standard building of secure desktop: design a secured workstation configuration as the standard build of the company and make image backup of the build and replicate to the company desktops.
Develop backup and recovery strategies.
Develop security management procedure: e.g. security log monitoring procedure, change management procedure or patch management procedure.
Maintain good documentation of configuration and procedure.
Train the office staff: training should be given to network/security administrator and supporting staff as well as users to ensure that they follow the security best practice and follow security policies.
3 5 P a g e
Perform Exclusive hands-on Widow’s Servers Environment.
Deploy and Manage Windows Servers
Configuration Active Directory Domain Services (AD DS) Administration
Configure Domain Name System (DNS)
Configure a Dynamic Host Configuration Protocol (DHCP)
Configure local storage on a server and FTP, Cloud.
Configure Print Server file and print services
Configure Group Policy
Configure server virtualization using Hyper-V
Manage user desktops systems with Group Policy
Manage user and service accounts
Configure Active Directory Domain Services (AD DS)
Maintain and troubleshoot, and Remote Access Policy
Install, configure, and troubleshoot the network policy server (NPS)
Implement network access protection (NAP)
Maintain Optimize file services Windows Server
Configure update management Windows Server
Monitor Windows Server auditing for computers and users. Perform Exclusive hands-on Exchange Server Environment.
Gathering Business Requirements
Identifying Additional Requirements
Plan a Configuration Manager Hierarchy
Service Level Management
Analyzing the Current Messaging Environment
Designing the Network Infrastructure
Designing the Active Directory Infrastructure
Designing the DNS Infrastructure
Planning Exchange Server Administration
Install and deploy Exchange Server 2010, 2013.
Configure Mailbox servers and Mailbox server components.
Manage recipient objects.
Configure the Client Access server role.
Manage message transport.
Configure the secure flow of messages between the Exchange Server organization and the Internet.
Implement a high availability solution for Mailbox servers and other server roles.
Plan and implement backup and restore for the server roles.
Plan and configure messaging policy and compliance.
Configure Exchange Server permissions and security for internal and external access.
Monitor and maintain the messaging system.
Transition an Exchange Server 2007, 2010 Organization to Exchange Server 2013.
Configure the Unified Messaging server role and Unified Messaging components.
Implement High Availability across multiple sites and implement Federated Sharing.
Exchange Server is designed to deliver security, performance and improved administration and management capabilities; attributes our largest on-premises customers expect from Exchange.
4 5 P a g e
Perform Exclusive hands-on (UTM) Unified threat management Firewalls Environment. A UTM or firewall is essential for an organization securely access company data when they are off- premises and using a wide range of Internet-connected devices. The users do not have consistent access to company resources onsite and offsite. Files are not accessible after a network user steps outside the office. As a result, network users are saving company data on their mobile devices or sending it through email. They use a PC to email data from work, and they can email data to the office from their laptops when they are working remotely. Sometimes after work hours, users need to work on files or access data from a variety of devices, such as tablets, pads, or laptops; however, users are unable to use their line-of-business applications when they are offsite. UTM or Firewall Series Intrusion Detection and Prevention System (IDS/IPS) strongly enhances network security by providing complete and comprehensive real-time network protection against thousands of network based threats, vulnerabilities, exploits, and exposures in operating systems, applications, and databases to prevent network attacks such as:
Access control attempts and privilege escalations
SQL injections and arbitrary code executions
Cross-Site Scripting and buffer overflows
Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks
Directory traversal and probing and scanning attempts
Backdoor attacks, Trojans, rootkits, viruses, worms, and spyware The UTM Firewall Series is able to identify and block advanced evasion attempts and obfuscation techniques that are used by attackers to circumvent and trick traditional intrusion prevention systems. The IPS can also be used in combination with SSL Inspection. As part of the UTM or Firewall Energize Updates subscription, automatic signature updates are delivered on a regular schedule or on an emergency basis to ensure that the UTM Firewall Series is constantly up-to-date.
The UTM Firewall Series provides advanced attack and threat Endpoint protection features such as:
Stream segmentation and packet anomaly protection
TCP split handshake protection
IP and RPC defragmentation
FTP evasion protection
URL and HTML decoding
Windows endpoint protection with
Antivirus and device control
On-access, on-demand or scheduled scanning for malware, viruses, spyware and Trojans
Live Protection Antivirus provides real-time, in-the cloud lookups for the latest threat intelligence
HIPS with suspicious behavior detection
Web protection with malicious site protection
Auto server discovery scans attached
networks and identifies web servers
Integrated load balancer spreads visitors across multiple servers
Download scanning
5 5 P a g e
PROFESSIONAL INFORMATION :
Overall Experience :
19 Years of work-related skill, knowledge, Experience Information Technology
Job Training : Microsoft Certified IT Professional ( MCITP ) HP-UX 11i System Administration ( CSA )
Cisco Certified Network Associate ( CCNA )
Red Hat Certified Engineer ( RHCE )
Oracle 10g Certification Oracle Certified Professional (OCP) Certified Professional : Microsoft Certified IT Professional ( MCITP ) Cisco Certified Network Associate ( CCNA )
HP-UX 11i Certified System Administration ( CSA )
Oracle 10g Certification Oracle Certified Professional(OCP) Education : MBA ( Information Technology )
Language’s Knowing : English, Arabic, Urdu, Telugu, Fluent Contact Address : MOHAMMED MAJEED
H.NO. 8-9-77/C Inside Fort ( Bagh )
KHAMMAM ( TS ) INDIA
Reference Address :
Mr. Suhail Kayello
General Manager,
Energy Recovery Systems Company Ltd
Jeddah ( Saudi Arabia. )