Post Job Free
Sign in

Support Specialist It

Location:
Detroit, MI
Posted:
March 09, 2023

Contact this candidate

Resume:

Boban Dimovski

Canton, MI 734-***-**** *******@*****.***

Eager to learn new processes, programs, and procedures quickly to maximize contributions to the user, team, and business success.

Quality-driven and self-motivated with a superior work ethic and dynamic nature.

EDUCATION

Walsh College, Troy, MI

Bachelor of Science in Information Technology (Concentration: Cybersecurity) March-2023

Oakland Community College, Farmington, MI

Associate in Information Technology Support June-2021

TECHNICAL SKILLS

SIEM, Splunk, Reverse engineering, Malware Analysis, Cloud Security, Python Scripting, Risk Analysis, Active Directory, VMware, Kali Linux, Windows Servers, Firewalls, VPN, DHCP/DNS.

CERTIFICATIONS

Cisco Academy, Introduction to Cybersecurity 2019-Present

Cybersecurity Essentials 2019-Present

Mobility Fundamentals Series: Wireless Technology and Standards 2019-Present

PROFESSIONAL EXPERIENCE

Global Information Technology May 2022-Present

IT Support Specialist

Provide Tier 1 support to staff and student end-users via telephone, email, and in-person.

Migrating and upgrading computers from Windows 7/10 to Windows 11.

Troubleshooting Windows OS issues and fixing them.

Updating all computers. Cleaning temp files, cache, cookies, java, and performing a gpupdate.

Installing and uninstalling various software applications

Cleaning up disk space on C-drive

Set up and configured new employee workstations, including all hardware, software, and peripheral devices.

Assisted teachers with computer problems and other technologies such as projectors, printers, and scanners.

Updated software version with patches and new installations to close security loopholes and protect users.

PROJECTS

FTK Hashing and Registry

Demonstrate converting forensic file types.

Demonstrate Windows Registry Hive Forensic Analysis capabilities.

Memory Acquisition and Analysis

Acquire memory from a live system.

Extract Memory Contents from a live system.

Employ Volatility to obtain:

oSystem Profile

oProcess List

oProcess Tree

oNetwork Connections

oFile Scan

oFile Extractions

oUser Issued Commands

oRegistry Hive

oSIDs

Navigate and utilize tools to review SQLite databases used with Internet browsers.

Metasploit-EternalBlue

Adapt privilege escalation attacks.

Adapt establishing a foothold approaches.

Build remote harvesting techniques.



Contact this candidate