Thursday, March 29, 2012

Network Security Resume

The sample network security professional plans, upgrades and implements various security related equipment. In this case it is dealing with the networks of the computer. He talks to the people in the organization and talks about any problems they are facing. The network security also communicates with them, trains people in this field and conducts meetings from time to time to help the people with network security. All the aspirants of this field will get a lot of help from the sample network resume given below and they will surely get their dream job.



John L. Blankenship
4011 Martha Street
Many Farms,
AZ 86538
Phone no.- 928-781-5774
Email address- JohnLBlankenship@teleworm.com
OBJECTIVE:
Seeking a position in networking and security where I can apply my knowledge and experience.
EDUCATION:
  • Degree in electronic engineering from University of Philadelphia, Philadelphia in 2003
  • Certified in CCNP, CCNA
TECHNICAL SKILLS:
  • OS: Windows NT / 2000 / XP, Linux / UNIX , Cisco IOS
  • Network Hardware: SUN SPARCstation, Cisco Routers/Switches/PIX Firewalls
  • Routing Protocols: RIP, BGP, ISIS,EIGRP
  • LAN/WAN Technologies: Frame Relay, Ethernet, E1/T1/DS1/DS3, X.25, VLAN
  • Security: Access Lists, SSH, 3DES, RAIDIUS/TACACS, PIX, IPSEC
  • Network Management: SENDMAIL / DNS / Apache/ SNMP/ BIND
  • Scripting Languages: PERL/ Shell
WORK EXPERIENCE:
Vigilnet, Dayton Ohio
Network Engineer, 2003-2005
  • Done a project based on students by using specific database system.
  • Supervised Data Mining and Web Technologies for the company.
Cyren, Franklin Ohio
Network and Security Programmer, 2005-2006
  • Responsible for the equipment monitor, data and voice networks.
  • Maintain the security regarding logical and physical access to system.
  • Management of DNS enhancement, emails security, firewall and development of firewall.
  • Implementation of security procedure and polices.
Alfrenone net, Franklin Ohio
Network Security Manager, 2006-present
  • Analyses the system deeply to protect it from virus outbreak and from hacker and cracker attacks.
  • Implement and deploy new technologies for logical and physical security of the system.
  • Analyses of the system to develop new testing technologies for the network.

0 comments:

Post a Comment