Friday, March 30, 2012

Computer Security Resume

A computer security person's job description is similar to that of a networking security officer. However, the difference is that computer security personnel also perform security checks on computers, which are not necessarily network related. Functions such as data management, data security, prevention of illegal usage of computer resources, etc. are part of the job description of an individual working in the computer security department. They also have to prepare and convey computer-related fair usage policies and guidelines to employees. A person applying for this job needs to be skilled in computer security troubleshooting and in the solutions of those problems. These skills and any relevant job experience in the field need to be mentioned on a computer security resume.



Anthony D. Deshields
2221 Sycamore Lake Road
Green Bay, WI 54303
Phone: 920-421-7319
Email ID: anthony.d.deshields@mail.com
SUMMARY OF QUALIFICATION:
A very understanding and organized engineer with the knowledge of new technologies and latest trends in computer. A totally reliable and skilled personnel for computer security.
SKILLS:
  • In-depth knowledge of computer hardware, software, programming and applications.
  • Great skill in electronics such as switching, broadcasting, operation and transmission etc.
  • Also familiar with chips, processors, electronic devices.
  • Remarkably good communication skills.
  • Sound knowledge of law and legal codes.
WORK EXPERIENCE:
Taron Tech, Englewood, NJ
Computer Security Specialist, 2007-presnt
  • Deploy programs to prevent the computer files from unauthorized access and accidental loss.
  • Keep a track of computer virus, spy ware etc. to update the antivirus.
  • Responsible for the meeting with the client and evaluation of their satisfaction.
  • Erect firewall and encrypt the data to be transmission to safe confidential report.
Fine-one, Hazlet, NJ
Computer Security Specialist, 2005-2007
  • Maintenance of the programs to preserve the data.
  • Encryption of the data to prevent from accidental and unauthorized modification.
  • Execute test of data and perform risk assessment.
  • Ensure the functioning of data processing activities.

0 comments:

Post a Comment