Karim Abotchi
**** ************ *** *****, ******** 48103
Tel: 734-***-**** Email: acp1wn@r.postjobfree.com
Security Technologies:
Retina Network Security Scanner; SSH; SSL; Digital Certificates; Anti-Virus Tools (Norton, Symantec, Kaspersky, Trend Micro etc.), SIEM, BYOD
Systems:
Unix-Based Systems (Solaris, Linux, BSD); Mac,Windows (all)
Networking:
LANs, WANs, VPNs, Routers, Firewalls, TCP/IP
Software:
MS Office (Word, Excel, Outlook, Access, PowerPoint), Visual, Project, Microsoft Dynamics CRM, SharePoint, Kali Linux, ArcGIS, Man fact, Moodle, Splunk, Spice works, ED-Express, ED-Connect, Zimbra, Centrify, Advance IP Scanner, PRTG, Manage engine,Solarwinds, Alien vault, Log Rhythm, Event Sentry, Rescuva, Veeam, Stellar Phoenix ...etc.
EDUCATION
ITT-Tech, Canton, Michigan
Bachelor in Information Systems Cyber Security, 2014
ITT-Tech, Canton, Michigan
Associate in Computer network Systems, 2012
Henry Ford Community College
Associate in Computer Information System, 2010
SKILLS:
Bilingual: Excellent oral and written Speak French and English
MS Office: Word, Excel, PowerPoint and Outlook
Problem Solving Skills, Organizational Skills
Ability to communicate with all levels of the organization
Ability to work efficiently under stress
Ability to work both independently and in a team-oriented environment
Highly motivated, with a positive "Can-do" attitude
Hands-on attitude to all aspects of the day to day operation
Network & System Security
Risk Management
Vulnerability Assessments
Authentication & Access Control
System Monitoring
Regulatory Compliance
System Integration Planning
Multitier Network Architectures
Good understanding and knowledge of:
Windows XP, windows 7, Windows Vista, Window 8-8.1
Active Directory(Windows Server 2003, 2008&R2, 2012&R2
Gmail / Google Apps
Malware removal(Malwarebytes, Trend Micro, Eset, MSE, AVG, Super, Avira, Spybot, Ad-ware, Avast)
Must be flexible and willing to adapt quickly due to priority changes
Scheduling flexibility( Available24x7 helpdesk)
PROFESSIONAL EXPERIENCE:
LTI Information Technology, Ann Arbor, Michigan April 2013- Current
Network Technician
Discerption- Under general supervision, identify, troubleshoot and resolve problems encountered by District-wide users of various servers, the mainframe, desktop systems, District network Internet and other computer technology; troubleshoot and solve local-area network problems; provide technical support to end-users regarding computer hardware and software; install, test, certify and troubleshoot networking cabling systems; install configured network equipment; provides technical expertise to end-users regarding optimal set-up for software, hardware and network use; install, configure, monitor and troubleshoot a wide range of network and data communications software and hardware; train users in various software applications and network-related procedures; provide work direction for student assistants; and perform related work as required.
Application Monitoring
At LTI information technology I applied my knowledge to asses systems management, Application Performance Management (APM) is the monitoring and management of performance and availability of software applications. APM strives to detect and diagnose application performance problems to maintain an expected level of service.
UNDERSTANDING OF MONITORING PRINCIPLES
Monitoring and evaluation should refer back to existing baseline data or begin with a baseline study
Monitoring and evaluation are closely linked to, and should reflect the methodology of, the initial project appraisal
Monitoring is an integral part of program implementation
Monitoring should be linked to the specific program objectives that were defined through the appraisal and program planning process
Monitoring information should be used in decision-making
Evaluation should follow a specific methodology designed to gather information about program success
Monitoring and evaluation should respect principles of participation and involve all program stakeholders, including program implementers, beneficiaries (program users),
Monitoring and evaluation should respect and protect the rights, welfare, and confidentiality of all those involved in the program
SPLUNK
- 2yrs of experience using Splunk. Self-trained using CBT-Nuggets, splunk is a good software that enables organizations to monitor, search, analyze, visualize and act on massive streams of real-time and historical machine data, from any source, format or location.
Utilize the machine data generated by your IT systems to glean useful operational analytics and actionable intelligence across your IT operations
Reduce IT costs and complexity
Improve and maximize employee productivity
SITESCOPE
Learned HP SiteScope while attending school. It is agentless monitoring software focused on monitoring the availability and performance of distributed IT infrastructures, including Servers, Network devices and services, Applications and application components, operating systems and various IT enterprise components.
SERVER, MAINFRAME AND PC ENVIRONMENTS
Network Technician with extensive experience in analysing, setting and securing networks.
Negotiate and draft direct and indirect procurement contracts and non-disclosure, service and manufacturing and
Under general supervision, identify, troubleshoot and resolve problems encountered
Users of various servers, the mainframe, desktop systems, network Internet and other computer technology
Troubleshoot and solve local-area network problems; provide technical support to end-users
Install computer hardware and software; test, certify and troubleshoot networking cabling
Install configured network equipment; provides technical expertise to end-users regarding optimal set-up for software, hardware and network use
install, configure, monitor and troubleshoot a wide range of network and data communications software and hardware
Train users in various software applications and network-related procedures; provide work direction for student assistants; and perform related work as required.
MANUFACTURING ENVIRONMENT
While working for LTI-IT I had the privilege to work with some clients within the manufacturing environment. The Automation Division of GEFIT has been developing a huge number of projects for more than 40 years. Gefit expertise range over the most different branches, yet the areas where it has reached the excellence as the years go by, can be summed up in these four:
Automotive
Heat Exchangers
Compressors
Electrics
RESPONSIBILITIES
Front-end user support, analysis and resolution of computer/network issues
Troubleshooting and repair of workstations for LTI-IT clients
Responding to support requests
Infrastructure build and repair
Desktop Helpdesk Tickets(OTRS)
Optimizes computer usage by researching and recommending enhancements to system capabilities and performance.
Access Control
Application Security
Business Continuity and Disaster Recovery Planning
Cryptography
Information Security and Risk Management
Legal, Regulations, Compliance and Investigations
Operations Security
Physical (Environmental) Security
Security Architecture and Design
Telecommunications and Network Security
Dominos Farm, Ann Arbor, Michigan May 2008– Apr 2010
Concierge
Clean building floors by sweeping, mopping, scrubbing, or vacuuming them.
Gather and empty trash.
Service, clean, and supply restrooms.
Clean and polish furniture and fixtures.
Clean windows, glass partitions, and mirrors, using soapy water or other cleaners, sponges, and squeegees.
Dust furniture, walls, machines, and equipment.
.
Hello Faz Pizzeria, Ann Arbor, Michigan 2006 – 2008
Delivery/ Pizza specialist
Operate all equipment.
Stock ingredients from delivery area to storage, work area, walk-in cooler.
Prepare product.
Receive and process telephone orders.
Take inventory and complete associated paperwork.
Clean equipment and facility daily.
Deco Net Niamey, Niger 2004 - 2005
Information Specialist
Identifies client requirements by establishing personal rapport with potential and actual clients and other persons in a position to understand service requirements.
Collects data by identifying sources of information; designing survey and collection methods.
Organizes information by studying, analyzing, interpreting, and classifying data.
Resolves retrieval problems by altering design to meet requirements.
Prepares reports by collecting, analyzing, and summarizing information.
Prepares reference for users by writing operating instructions.
Maintains historical records by documenting system changes and revisions.
Maintains client confidence and protects operations by keeping information confidential.
Maintains professional and technical knowledge by attending educational workshops; reviewing professional publications; establishing personal networks; participating in professional societies.
Contributes to team effort by accomplishing related results as needed.
Establishes and revises database by conferring with analysts and programmers to code and retrieve data.
Maintains database by entering data.
Sameco Niamey, Niger 2002 – 2004
Network Administrator
Consulting with clients to specify system requirements and design solutions
Budgeting for equipment and assembly costs
Assembling new systems
Maintaining existing software and hardware and upgrading any which has become obsolete
Working in tandem with IT support personnel
Providing network administration and support.