Post Job Free
Sign in

System Network Engineer / IT Systems Support Engineer

Location:
Jeddah, Makkah Region, Saudi Arabia
Posted:
June 03, 2019

Contact this candidate

Resume:

* * * * * e

Curriculum Vitae Systems Network Engineer

Full Name : MOHAMMED MAJEED

E-Mail : *********@*****.***

Contact Number : 009**-*****-****

Marital status : Married

Gender : Male

Nationality : Indian

Job Title : Systems Network Engineer

Present Experience : Energy Recovery Systems Company Ltd Jeddah Saudi Arabia

As IT Systems Network Manager

From June 2014 Till the Date.

Previous Experience : Saudi German Hospital Group

Jeddah Saudi Arabia

As Senior Systems Engineer

From August 2010 to 2014

Reason of living : Better Career Opportunity ( End of Contract ) Holding of an Iqama : Transferable

Driving License : Validate Driving License ( SAUDI ARABIA ) Present Location : Jeddah ( Saudi Arabia )

Personal Summary :

A Information Technology (IT) aware and highly motivated professional successful Systems Network Administrator with a proven track record in driving Information Technology (IT) forward whilst delivering high Information Technology Infrastructure Environment. A consistent track record of improving efficiency, Ability to manage daily operations, and planning. Human resources to ensure maximum efficiency. Mark enjoys and thrives working on User focused environment and is currently looking for a suitable as a System Network Administrator Position in the career field of Information Technology.

2 5 P a g e

Job Description :

Responsible for designing organizing modifying and supporting a company’s of the mission. Configuring Servers, Unified threat management (UTM) Firewalls, Network Routers, Switches. An operating system computer hardware, Email, Web, and Cloud Computing Resources Application system software etc. Maintain good documentation of configuration and procedure clearly identified values implemented to support it.

Primary Responsibilities:

Plan for network security: address all security requirements and issues in selecting network and server and deployment including the management policy, technical training and outsourcing requirements and address security.

Design physical and environmental security: e.g. put critical assets such as network communication lines, servers, switches, firewalls and file servers in server room or a secured area.

Use private IP addressing scheme for internal networks: to prevent internal network from access by external network.

Design network security model by zoning i.e. segregation of network according to security requirements, e.g. the office network is totally isolated from the Internet, or the company servers and computers are located behind the firewall, or set up a demilitarized zone (DMZ) network. Unsecured or unmanaged systems should not be allowed to make connection to internal network.

Configure firewalls and network routers: harden the firewall and router by limiting the administrative access to specified locations, closing unnecessary network services for incoming and outgoing traffic or using encrypted communication channel for administration.

Configure servers: e.g. secure the server operating system by uninstalling unnecessary services and software, patch the system timely and disable unused accounts.

Secure the application: by means of installing security patch, hardening the configuration of the applications or running the application with a least privilege account.

Filter virus and malicious code: anti-virus software with up-to-date signature should be installed in desktop and network servers to prevent the spread of virus / worm.

Manage accounts and access privileges: e.g. access rights should be granted on an as- needed basis and should be reviewed regularly.

Log security events and review regularly: Logging and auditing functions should be provided to record network connection, especially for unauthorized access attempt. The log should be reviewed regularly.

Develop a standard building of secure desktop: design a secured workstation configuration as the standard build of the company and make image backup of the build and replicate to the company desktops.

Develop backup and recovery strategies.

Develop security management procedure: e.g. security log monitoring procedure, change management procedure or patch management procedure.

Maintain good documentation of configuration and procedure.

Train the office staff: training should be given to network/security administrator and supporting staff as well as users to ensure that they follow the security best practice and follow security policies.

3 5 P a g e

Perform Exclusive hands-on Widow’s Servers Environment.

Deploy and Manage Windows Servers

Configuration Active Directory Domain Services (AD DS) Administration

Configure Domain Name System (DNS)

Configure a Dynamic Host Configuration Protocol (DHCP)

Configure local storage on a server and FTP, Cloud.

Configure Print Server file and print services

Configure Group Policy

Configure server virtualization using Hyper-V

Manage user desktops systems with Group Policy

Manage user and service accounts

Configure Active Directory Domain Services (AD DS)

Maintain and troubleshoot, and Remote Access Policy

Install, configure, and troubleshoot the network policy server (NPS)

Implement network access protection (NAP)

Maintain Optimize file services Windows Server

Configure update management Windows Server

Monitor Windows Server auditing for computers and users. Perform Exclusive hands-on Exchange Server Environment.

Gathering Business Requirements

Identifying Additional Requirements

Plan a Configuration Manager Hierarchy

Service Level Management

Analyzing the Current Messaging Environment

Designing the Network Infrastructure

Designing the Active Directory Infrastructure

Designing the DNS Infrastructure

Planning Exchange Server Administration

Install and deploy Exchange Server 2010, 2013.

Configure Mailbox servers and Mailbox server components.

Manage recipient objects.

Configure the Client Access server role.

Manage message transport.

Configure the secure flow of messages between the Exchange Server organization and the Internet.

Implement a high availability solution for Mailbox servers and other server roles.

Plan and implement backup and restore for the server roles.

Plan and configure messaging policy and compliance.

Configure Exchange Server permissions and security for internal and external access.

Monitor and maintain the messaging system.

Transition an Exchange Server 2007, 2010 Organization to Exchange Server 2013.

Configure the Unified Messaging server role and Unified Messaging components.

Implement High Availability across multiple sites and implement Federated Sharing.

Exchange Server is designed to deliver security, performance and improved administration and management capabilities; attributes our largest on-premises customers expect from Exchange.

4 5 P a g e

Perform Exclusive hands-on (UTM) Unified threat management Firewalls Environment. A UTM or firewall is essential for an organization securely access company data when they are off- premises and using a wide range of Internet-connected devices. The users do not have consistent access to company resources onsite and offsite. Files are not accessible after a network user steps outside the office. As a result, network users are saving company data on their mobile devices or sending it through email. They use a PC to email data from work, and they can email data to the office from their laptops when they are working remotely. Sometimes after work hours, users need to work on files or access data from a variety of devices, such as tablets, pads, or laptops; however, users are unable to use their line-of-business applications when they are offsite. UTM or Firewall Series Intrusion Detection and Prevention System (IDS/IPS) strongly enhances network security by providing complete and comprehensive real-time network protection against thousands of network based threats, vulnerabilities, exploits, and exposures in operating systems, applications, and databases to prevent network attacks such as:

Access control attempts and privilege escalations

SQL injections and arbitrary code executions

Cross-Site Scripting and buffer overflows

Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks

Directory traversal and probing and scanning attempts

Backdoor attacks, Trojans, rootkits, viruses, worms, and spyware The UTM Firewall Series is able to identify and block advanced evasion attempts and obfuscation techniques that are used by attackers to circumvent and trick traditional intrusion prevention systems. The IPS can also be used in combination with SSL Inspection. As part of the UTM or Firewall Energize Updates subscription, automatic signature updates are delivered on a regular schedule or on an emergency basis to ensure that the UTM Firewall Series is constantly up-to-date.

The UTM Firewall Series provides advanced attack and threat Endpoint protection features such as:

Stream segmentation and packet anomaly protection

TCP split handshake protection

IP and RPC defragmentation

FTP evasion protection

URL and HTML decoding

Windows endpoint protection with

Antivirus and device control

On-access, on-demand or scheduled scanning for malware, viruses, spyware and Trojans

Live Protection Antivirus provides real-time, in-the cloud lookups for the latest threat intelligence

HIPS with suspicious behavior detection

Web protection with malicious site protection

Auto server discovery scans attached

networks and identifies web servers

Integrated load balancer spreads visitors across multiple servers

Download scanning

5 5 P a g e

PROFESSIONAL INFORMATION :

Overall Experience :

19 Years of work-related skill, knowledge, Experience Information Technology

Job Training : Microsoft Certified IT Professional ( MCITP ) HP-UX 11i System Administration ( CSA )

Cisco Certified Network Associate ( CCNA )

Red Hat Certified Engineer ( RHCE )

Oracle 10g Certification Oracle Certified Professional (OCP) Certified Professional : Microsoft Certified IT Professional ( MCITP ) Cisco Certified Network Associate ( CCNA )

HP-UX 11i Certified System Administration ( CSA )

Oracle 10g Certification Oracle Certified Professional(OCP) Education : MBA ( Information Technology )

Language’s Knowing : English, Arabic, Urdu, Telugu, Fluent Contact Address : MOHAMMED MAJEED

H.NO. 8-9-77/C Inside Fort ( Bagh )

KHAMMAM ( TS ) INDIA

Reference Address :

Mr. Suhail Kayello

General Manager,

Energy Recovery Systems Company Ltd

Jeddah ( Saudi Arabia. )



Contact this candidate