Post Job Free
Sign in

Cyber Security Aws Cloud

Location:
Grand Prairie, TX
Posted:
January 28, 2025

Contact this candidate

Resume:

Ivo James

US Citizen with Security Clearance

214-***-****

********@*******.***

Summary

Senior Cyber Security Specialist Engineer over 15+ year in IT. In the Past Seven 7 plus years, I have gained significant experience in AWS Cloud Environment. I am highly dedicated, performance-driven and self-motivated person.

I have experience in AWS Cloud Architect/Engineer. Worked on both Linux \ Windows environments.

Able to work with minimal supervision or as part of a team with proficiency in cloud orchestration, security, identity & access management, monitoring and event management, governance & compliance, application delivery, data protection, image and patch management.

Ready and willing to give more to my team, ready to learn new technologies, adapt to new environments and new team.

Use Teraform to Deploy Code and Application,

Experience in operating and monitoring AWS instances. Experience with Splunk Enterprise Security (Splunk ES).

Monitor API on various applications.

ETL Experiences to Extract and Transform data.

Splunk Experiences to create index searches.

Worked on AWS Cloud and Data Migration.

Create and manage user using IAM in AWS.

Experience providing SIEM, security analytics platform, and Log Management Tools including Splunk, QRadar, Fore scout, IDS/IPS; and guiding SOC team with forensic and malware analysis, virus exploitation, and mitigation techniques.

Use ARM in Cloud Environment and Network support.

Deployment of Cloud service including Jenkins and Nexus on Docker using Terraform.

Use Power shell to Create Automation and configuration changes in Windows Environment

Over the past, I have a tactful and analytical mind, proactive, have good communication and leadership skills, a team player, pay keen attention to details, open to learning new technologies, good at documentation, also good at multitasking. I have also earned the reputation of a fast learner from my leads and teammates.

Apart from being computer literate, I am a AWS Certified Solutions Architect, AWS DevOps Certified Engineer, AWS Certified Security Specialist and electronic Engineering Technology Bachelor Degree.

With these qualities and abilities, I strongly believe that I have the potentials of learning and contributing more innovative ideas to the company’s portfolio which will eventually leads to greater results involving all stakeholders.

I am really looking forward to this job opportunity as I consider my profile strong enough to bestow me a chance to prove my potentials. Please, review my enclosed resume.

Use SentinelOne EDR for threat intelligence.

Use Crowd Strike EDR to detect to detect and contain abnormalities on end points.

Use Windows Defender to quarantine malicious task on end point.

Maintain ongoing review and monitoring of SIEM alerts (Splunk) and SOAR alerts.

Use Akamai WAF to protect application from malicious traffic.

Managed McAfee ePolicy Orchestrator applications and implementing upgrades & policy management. He is also able to identify potential online security risks and take the necessary measures.

Ivo has hands on experience in Governance Framework, Security, Compliance and risk management. Including privacy, controls etc with security skills like ITS Security Frameworks, such as NIST 800-53, ISO27001, PCI, and DSS.

Expertise with monitoring SIEM Tool like, Iron Port, Fire Power, Fire Eye, Cisco Source Fire, Cisco Snot, MacAfee Web Proxy, MacAfee DLP Manager to eradicate, drop and stripped IOC.

Working knowledge of API Security (Apigee, SoapUI Pro), Terraform, Kubernetes, Imperva WAF, AWS Cloud Security, Container Security (Aqua, Twistlock).

Worked on Splunk ES (SIEM) that enable organizations to detect, respond and prevent these threats by providing valuable context and visual insights to help you make faster and smarter security decisions.

Used Ticketing tools like HP Service Desk, Remedy and Service Now to document and track all Intrusion.

Use MacAfee Web Proxy to block, Malicious Hashes, Links, Domains, IP’s and report to US Cert.

View and monitor Palo Alto logs for drop packages, attacks and intrusions.

Education:

Bachelor’s Degree in Electronic Engineering Technology, DeVry University 1990 - 1993

Certifications:

PMP Certified

AWS Certified Architect

AWS Certified DevOps

AWS Certified Security Specialist

Certified Ethical Hacker (CEH)

Certified Security Plus +

Microsoft Certified (MSCE)

Certified A+ ComTIA

CISM

Oracle DBA Certified

CCNA Certified

Oracle Business Intelligence 11g Certified (OBIEE Certified Developer)

Oracle 11g Certified Database Administrator, Oracle BI ERP Certified,

MSQL Certified Database Administrator

Splunk Enterprise Security Certified Admin

Core Qualifications

US Security Clearance Public Trust Holder.

Data Guard, Cloud Trail

Able to identify potential online security risks and take the necessary measures.

Adept at preparing detailed training procedures.

Install and Configure AWS instances.

Train young SOC users on eradicating Phishing email and IOC.

Five or more years with Azure/AWS/Public Cloud

Three or more years in Security, Compliance and risk management, including privacy, controls, etc.

Security Skills with ITS Security Frameworks such as NIST, ISO 27001, PCI, DSS

Expertise with monitoring tools such as Data Dog, Cloudwatch, Splunk and Nessus,etc.

Solid understanding of various security software applications

Advance knowledge in Symantec

Implementation of medium scale Splunk ES architectures

Install and setup Cylance Smart Anti-Virus

Strong work ethic that includes solid attendance record and frequent overtime

Excellent internal and external communications skills

Able to work with diverse team on shore or offshore.

Knowledge with Database, Application, BI Tools and Security measures.

Extensive knowledge of all common business-related IT functions

Experienced Professional as an IT Security Professional in IT Infrastructure, DLP, Vulnerability, Risk security, GRC, SOC Analyst, SIEM, Information Security, and Cyber Security.

Professional Experience

Lead Cyber Security Cloud Architect /AWS Engineer March 2022 – Present

Apex Systems / DTCC

Ability to setup and manage monitoring systems in AWS using CloudWatch and integrated with SNS for notifications for system and performance changes.

Use Teraform to deploy AWS Code and Applications.

Use Check Marx to integration CI/CD Pipeline in AWS platform.

Experience with AWS Connection with customer contact center to resolve customer inquiries.

Use Code build and Code deployed in CI/CD Pipeline.

Monitor API on application to view performance.

Use ARM in Cloud Environment and Network support.

Use Power shell to Create Automation and configuration changes in Windows Environment .

Migration of Splunk clusters in various AWS accounts to integrate with Palo Alto Networks Cortex XSOAR and XDR.

Generated Shell Scripts to install Splunk ES Forwarders on all servers and configure with common Configuration Files such as Bootstrap scripts, Outputs.conf and Inputs.conf files.

Worked on Cloud Formation/Terraform (IaC) scripts to automate the infrastructure on AWS

Built serverless architecture with Lambda integrated with SNS, CloudWatch logs and other AWS services.

Leveraged automated DevOps tools deployment and Blue-green deployment patterns and strategies.

Leverage highly available Applications across availability zones and regions.

Highly implemented fault tolerant, highly available, self-healing and scalable systems in AWS.

Manage and configure Azure security center to manage security threat in Azure.

Developed baseline VPC and Network design including leveraging VPN connectivity and Direct Connect

leverage IAM best practices and role-based access control.

Experience with EC2, S3, Load balancers and Lambda.

Hands on experience on Terraform (IaC) a tool for building, changing, and versioning infrastructure safely and efficiently.

Worked with Terraform key features such as Infrastructure as code, Execution plans, Resource Graphs, Change Automation.

Experience with CloudWatch and CloudTrail for monitoring.

Experience with AWS Services including automation services (Lambda, JSON, Yamal etc…).

Experience with DevOps Pipelines and GitHub Repos.

Use Kerber nates and Jenkins for Infrastructure as code in deployment.

Use CI/CD Pipeline for code deployment.

Use Kubernetes and Jenkins for code deployment.

Architectural understanding and expertise of cloud and hybrid cloud infrastructure.

Experience with Cyber Ark.

I have implemented Cyber Ark with PAM. PAM stands for Privilege Access Management. I used it with users that needed advance privilege to access applications.

Use Splunk and QRadar for threat hunting by investigating source IP, destination IP and using Wire Shark to check for abnormality.

Conduct internal and external security audits based on standard cybersecurity frameworks from ISO 27002, COBIT, NIST, OWASP and Cloud Security Alliance.

I user Cyber Ark to create group and grant access to those groups to access application.

I have Onboard/Offboard users in Active Directory using Cyber Ark.

Use Python, Yamal, Java, Bash, Ansible and SQL.

Add monitoring support for all features used in Splunk ES by the team

Worked tickets and issues in Qradar.

Implemented AWS Organization to centrally manage multiple AWS accounts including consolidated billing and policy-based restrictions.

Worked with CloudFormation/Terraform (IaC) for automating VPC’s, ELB’s, EC2, Security Group’s, SQS queues, S3 buckets, and continuing to replace the rest of our infrastructure

Configured CI/CD Pipelines using Jenkins connected to GitHub and build environments (Dev, stage & Prod).

Knowledge in DevOps Code Deployment with Anisable and System Manager.

Experience working with large data set and tools such as Spark, Spark, Pandas, Hadoop, Cloudera and Databricks.

Worked with Terraform to create AWS components like EC2, IAM, VPC, ELB, Security groups.

Use WAF to protect Web Application.

Work Ticket in Qradar to resolve alert.

Work on Stealth watch to resolve alert.

Worked on Crowdstrike.

View Issues on Armis Dashboard.

Open cases in Resilient.

Worked on Akamal Portal.

Work Issues on Symantec Cloud.

Work on 365 Microsoft Defender.

Created and configured management reports and dashboards in Splunk ES for application log monitoring

Closed Ticket in Service Now.

Worked on Riverbed Steel Center.

Managing Ticket SLO for Service

Now, Jira and EMS Tickets.

Provide cyber security protections for Cellular, Wireless, & Cloud applications

Ensure that security documents are up to date in accordance with security thresholds.

Perform Vulnerability scanning daily to look for threats.

Perform Static Application Security Testing.

Worked on Iron Port and Fire Eye NX and EX.

Create Indexes in Splunk.

Performed Cyber Forensics services in support to SOC requirements/Mission.

Use Rust is great for building things like operating systems and file systems.

Use SIEM to monitor live event threats, Intrusion and Cyber-attacks. Open Incident tickets with Hewlett Packard.

Write Python script for automation.

Configured Pub/Sub to send logs from Google Cloud (GCP) to IMB QRADAR and Splunk using Terraform.

Use OWASP as a guide for developing security framework, process and procedure.

Respond to security alerts/Incident/events with documenting and pasting evidence on the ticket.

Perform Incident response in SOC process in an environment.

22nd Century Technologies May 2017 – March 2022

Lead Cyber Security Incident Response Specialist /AWS Engineer

Leverage highly available Applications across availability zones and regions.

Installation and configuration of Splunk ES product at different environments. Configured Splunk Searching and Reporting modules, Knowledge Objects, Administration, Add-On's, Dashboards, Clustering and Forwarder Management.

Setup and manage monitoring systems in AWS using CloudWatch and integrated with SNS for notifications for system and performance changes.

Worked with Terraform (IaC) for automating VPC’s, EC2, ELB’s, security group’s, S3 bucket etc services automated on multiple environments

FISMA, and FedRAMP, as well as agency regulations, with risk assessment and planning services.

Highly implemented fault tolerant, highly available, self-healing and scalable systems in AWS.

Developed baseline VPC and Network design including leveraging VPN connectivity and Direct Connect

Built serverless architecture with Lambda integrated with SNS, CloudWatch logs and other AWS services.

Leveraged automated DevOps tools deployment and Blue-green deployment patterns and strategies.

Configured CI/CD Pipelines using Jenkins connected to GitHub and build environments (Dev, stage & Prod.

leverage IAM best practices and role-based access control.

Worked on Splunk Phantom SOAR Proof of Value (POV) project and created regex-based parser to parser logs and configuring different connectors.

Leveraged Cyber Ark with Priviliged Access Management Account. All Privileged account is identified and setup in PAM.

Provide regular support guidance to Splunk ES project teams on complex solution and issue resolution

Involved in AWS EC2/VPC/S3/SQS/SNS based on automation Terraform, Ansible, Python, Bash Scripts.

Developed Cyber Security GRC Standards on NIST Framework, HITRUST, HIPPA, GDPR and CCPA, and NISPOM regulations and insured their proper implementation to reduce the risk of vulnerability to IT assets.

Cloud-Computing FISMA/FedRAMP architecture initiatives

Implemented AWS Organization to centrally manage multiple AWS accounts including consolidated billing and policy-based restrictions.

Implemented Control Tower Preventive and Detective guardrails and leveraged Account Factory, integrated with Lambda for new AWS account creation and setup.

Setup Ansible control and slave nodes and developed playbooks to automation configuration of servers across environments.

Designed secured, cost optimized, highly available and fault tolerant infrastructure in AWS.

Architected and configured Dev/Stage/QA environments in AWS (VPC, subnets, security groups, EC2 instances, load balancer, RDS, Redis, Route53, IAM etc.)

Implemented security best practices in AWS including multi factor authentication, access key rotation, role-based permissions, enforced strong password policy, configured security groups and NACLs, S3 bucket policies and ACLs, etc.

Review and govern other engineers Terraform IaC code to provision Ancestry cloud resources in AWS.

Involved in standardizing Splunk Phantom SOAR POV deployment, configuration and maintenance across UNIX and Windows platforms.

Configured RDS instances using Cloud formations and terraform.

As part of SIEM, monitored notable events through Splunk ES Enterprise Security.

Architecting for FedRAMP High and NIST Workloads in AWS GovCloud (US).

Developed and implemented online security procedures.

Worked on AWS and manage users and groups in IAM.

User Nexus and Tunable. IO for Vulnerability.

Worked on Azure Security Center to reduce alerts in Azure.

Use Akamai WAF to protect application from malicious traffic.

Use Dark Track for threat hunting.

Create S3 Buckets for Standard Storage.

Monitor Services using Cloud Watch in AWS.

Monitor API calls using Guard Duty.

Experienced in using FedRamp to categorize cloud services into three impact levels: Low, Moderate, and High.

Install Patch in Both Linux, AIX, Red Hat and Windows.

Use One logon to configure and setup user in the right group.

Use Check Max for CD/ID Pipeline. Making sure all application is configured in Check Max.

Create and develop phyton scripts for automation.

Fix configuration issues with IAM.

Use SIEM to monitor live event threats, Intrusion and Cyber-attacks. Open Incident tickets with Hewlett Packard.

Respond to security alerts/Incident/events with documenting and pasting evidence on the ticket.

Perform Incident response in SOC process in an environment.

Work as a Security Operation lead, Train and guide Junior Security Operation Center (SOC).

Use Cisco Iron Port EX for Investigating Phishing email and pursing Enterprise Service Now, Remedy to resolve, document and track issues.

Write new Sentinel policies, and automated Policy tests, to enforce InfoSec (Information Security team) guidelines to govern development teams’ IaC code across the enterprise.

Did Production Support on application and endpoint.

Use Splunk Enterprise to validate intrusion and create Visualization graphs for managers, director for Organization and create reports.

Building Cloud Infrastructure as code using tools such as Terraform or Cloud formation.

AWS Scanning and remediating Teneble.io and Cloudsploit.

Expert in Office 365.

Maintained and managed assigned systems, Splunk ES related issues and administrators.

Provided a standardized framework for assessing the security posture of cloud services using FedRamp.

Block and drop Phishing email to eliminate threats.

Cloud computer Ing in both AWS and Azure.

Used MacAfee Web Proxy to block malicious sites.

Implementing McAfee upgrades and management policies.

Grant Web Request Access to uses to do their daily task base on company guidelines.

Four years with Azure/AWS/Public Cloud

Working on AWS cloud infrastructure doing vulnerability, penetration testing and authorization.

Worked with management to update security manuals and address current concerns.

Configure and setup Palo Alto Firewalls to block attacks and drop intrusions.

Use SD Elements improves risk assessment across SDLC process.

Use SD Elements automates software security requirements across development life cycle.

Updated security software to prevent database security threats.

Ability to create and utilize AWS Cloud Formation/Terraform templates to automate creation of AWS images.

Drive and evaluate the monthly FedRAMP ConMon processes.

Use Wire Shark to scan and look at network traffic and packages for vulnerability.

Use Net Sparker to scan for Website vulnerability to detect Cross Site Scripting.

Implemented system recovery procedures to minimize losses should an attack occur.

Managing Ticket SLO for Service Now, Jira and EMS Tickets.

Provide cyber security protections for Cellular, Wireless, & Cloud applications

Ensure that security documents are up to date in accordance with security thresholds.

Perform Vulnerability scanning daily to look for threats.

Perform Static Application Security Testing.

Write Terraform IaC code to provision Ancestry cloud resources in AWS.

Use tools for dynamic scan like Web Spider, App Scan and Web Inspect for application scanning.

Use OWASP as a guide for developing security frame work, process and procedure.

Use Nessus for Vulnerability scanning, penetration testing and monitoring.

Use NIST for FISMA as a guide line to setup Enterprise Systems to meet Government standards.

Perform gap remediation and workflows in both application and infrastructure.

Information Security Subject Matter expert.

Migration of Splunk clusters in various AWS accounts to single AWS account rehydration of Splunk SOAR on AWS environment.

Provided support on ongoing compliance activities and monitored different regulations and GRC standards like HIPAA, FedRAMP, and NIST.

Verizon Corporation, Irving Texas Nov 2015 – May 2017

Lead Cyber Security Cloud Architect Specialist /AWS Engineer

Monitoring Business Process and apply security measures in both retail sector and business sector.

Perform Incident response workflow.

Cloud Implementation on Application services.

Perform Static Application Security Testing.

Grant Web Request Access to users to do their jobs per company guide lines.

Configure application to communicate using cryptography to prevent MITM attack.

Use McAfee DLP Manager for Data Loss Prevention.

Monitor and scanning Azure cloud account for gaps and weaknesses.

Analysis determines if an email was successfully delivered, quarantined or had a malicious attachment stripped

Manage security infrastructure configuration files, logs, and other artifacts to perform

Root cause analysis when there is issue.

Perform Incident response in SOC process in an environment.

Use Cisco Iron Port for investigating phishing email and pursing phishing email to eliminate threats.

Perform Data Loss Prevention using McAfee DLP Manager to prevent company data from getting out of the organization.

Perform Vulnerability scanning daily to look for threats.

Provide strong information security leadership and cross-functional communication with various IT teams.

Reviewed system access data and monitored database access.

Use security Kill Chain Process for Monitoring and eradicating incident.

Use Splunk Enterprise Manager to view IOC, Threats and Incident and eradicating them.

Perform gap remediation and workflows in vulnerability scan.

Use Net Sparker to scan for Website vulnerability to detect Cross Site Scripting.

Use Nessus and Splunk for Vulnerability scanning, penetration testing and monitoring.

Review and update Incident Response Plan.

Perform Dynamic Application Security Testing.

Worked with management to update security manuals and address current concerns.

Maintain strong relationships with security tool vendors to stay on top of new functionalities and find ways to add value with existing tools

Updated cyber security protocol and developed effective training procedures.

Identify information security requirements by evaluating business strategies and requirements; researching information security standards; conducting vulnerability and risk assessments; studying architecture/platform.

Educated management on how to prevent or minimize cyber security attacks.

Perform Security scan on Web Applications and Mobile application Security.

Perform Penetration testing to look for open ports.

Deloitte Consulting, Orlando, Florida Oct 2014 – Oct 2015

Senior Cyber Security Specialist Engineer

Compiled daily database reports to identify possible vulnerabilities.

Use Volatility Suite for analyzing memory forensics on Windows, Linux and Mac.

Use Hacker Combat forensic analysis tools to scan endpoint and host devices on the network.

Use Sys Log and Event Analyzer to monitor and read logs.

Setting up services in cloud infrastructure.

Use McAfee DLP Manager for Data Loss Prevention.

Static and Dynamic malware analysis tool configure for static and dynamic scan.

Identifying and analyzing what has happened during an incident, including the impact and threat.

Providing a single point of contact for reporting security incidents and issues.

Use SIEM tools to monitor, analyzing and eradicating security incidents.

Use Security Wizard Dry for Network forensics scan and detection.

Use kill Chain process to eradicate incident and contain IOC on Network, Application and End Point.

Use NIST 800 as a guide to setup Enterprise Systems to meet Government Security Control standards.

Use Volatility Suite for analyzing memory forensics on Windows, Linux and Mac.

Use Hacker Combat forensic analysis tools to scan endpoint and host devices on the network.

Use Sys Log and Event Analyzer to monitor and read logs.

Static and Dynamic malware analysis tool configure for static and dynamic scan.

Use FISMA 800-60 to categorize information systems to Low, Medium or High.

Use Iron Port, Fire Eye, Fire Power for Monitoring Networks, Applications, Endpoints and Splunk for reporting.

Perform Data Loss Prevention using McAfee DLP Manager

Ensured compliance with internal and external email safety standards.

Perform gap remediation and workflows.

Use Nessus and Splunk for Vulnerability scanning, Penetration testing and monitoring.

Liaison between the security groups, business owners, clients and system managers.

Perform penetration testing looking open ports and application vulnerabilities to set measures.

Perform Security scan on Web Applications and Mobile application Security.

Worked with management to update security manuals and address current concerns

Perform Vulnerability scanning daily to look for threats.

Perform Static Application Security Testing.

Monitor and test system password compliance.

Recommended software updates and security patches.

Perform Static Application Security Testing.

Perform Dynamic Application Security Testing.

Meridian Technology Contract to Portland Power and Gas, Portland, Oregon May 2014 – Oct 2014

Cyber Security Specialist

Perform Incident response in SOC process in an environment.

Perform Two Factor Authentications (2FA).

Perform Incident response in a SOC environment.

Performa Patch & Vulnerability Management using Nessus and Teneble.IO

Performed comprehensive investigations of cyber security breaches.

Purchased new security software, test and made update, removing all default setting and eliminating security threats.

Perform Vulnerability scanning daily to look for threats.

Perform penetration testing with various Applications.

Use FISMA 800-60 to categorize information systems to Low, Medium or High.

Authentication and Authorization.

Use Net Sparker to scan for Website vulnerability to detect Cross Site Scripting.

Implemented system recovery procedures to minimize losses should an attack occur.

Managing Ticket SLO for Service Now, Jira and EMS Tickets.

University of Texas Dallas, Dallas, Texas Aug 2012 – Feb 2014

Cyber Security Specialist,

Reviewed system access data and monitored database access.

Perform gap remediation and workflows.

Monitor Windows Endpoint, Linux and AIX Servers

Worked with management to update security manuals and address current concerns.

Working on Cloud Compeering in both Azure and AWAS monitoring S3 Buckets.

Updated cyber security protocol and developed effective training procedures.

Identify information security requirements by evaluating business strategies and requirements; researching information. Security standards; conducting vulnerability and risk assessments; studying architecture/platform.

Use Nessus and Splunk for Vulnerability scanning, Penetration testing and monitoring.

Monitoring Business Process and apply security measures in both retail sector and business sector.

Perform Incident response workflow.

Perform Penetration testing to look for look for vulnerability.

Perform Dynamic Application Security Testing.

Perform Vulnerability scanning daily to look for threats.

Two Factor Authentication (2FA)

Perform Static Application Security Testing.

Authentication and Authorization.

Prevent Data loss and maintaining CIA Concepts.

Sprint, Irving, Texas July 2009 – Aug 2012

Oracle Business Intelligence Developer

Worked closely with the business users and managers to make sure that business requirements are correctly translated into database schemas and ultimately into the application.

Identified various source systems to better understand business needs. Design ETL to load data from data warehouse, Oracle, MySQL, SQL Server and TeraData to meet business needs. Advance knowledge and concepts on Essbase architecture.

Setup Star Schema/Snowflake schema. Design Fact and Dimensions tables, Design Physical and logical data model mapping layer.

Interacted with end users and developers to validate the data model. Work in a call center environment to capture data to build the physical layer and create aliases. OBIEE metadata (RPD) design and development - including design and definition of logical tables, physical sources, dimensions, columns and aggregation rules.

Design and develop repository for various groups and projects in Sales, Marketing, Finance, HR and call center environment.

Requirement validation of the reports and drill downs with business users. Analysis of existing OLTP system and Identification of required dimensions and facts from the Database. Creation and Customization of the OBIEE Repository (Physical, Business and Presentation layer).

Responsible for creating users and maintaining visibility privileges using Analytics administration on the repository side.

Manage cache management, Repository migration, data level and object level security in OBIEE Analytics.

Sprint, Irving Texas Mar 2000 – Jul 2002

Oracle Database Administrator

Create and monitor 10+ plus MySQL Databases in Solaris, Linux using MySQL Workbench to monitor databases.

MySQL installed on various versions.

Database changes and implementations follow strict Change management process.

Install patch and maintain all Oracle software.

Configure, Install and Troubleshoot RAC environment.

Write PL/SQL script to pull detail information on production performance issues using explain plans.

Monitor and configure RAC services and check alerts logs on the primary and standby database for error.

Tune Oracle instance components including MySQL, SQL and PL/SQL.

Design and implement backup and recovery systems.

Implement Oracle failover technology Data Guard.

Experience with OLTP, dimensional database design and code implementation.

Work closely with the Developers in resolving performance issues and implementing process.

Proactive personal with a proven track record of delivering responsibilities and task.



Contact this candidate