From: route@monster.com
Sent: Monday,
October 24, 2016 10:31 AM
To: hg@apeironinc.com
Subject: Please
review this candidate for: DNS Secret
This resume has been forwarded to
you at the request of Monster User xapeix03
|
|||||||
|
|||||||
|
|
|
||||||
|
||||||
John Jordan, CRISC,
CSIM, ITIL, ISO 27000, MCT, PMP, Six Sigma
jjordanjr@jigits.com 952-929-1800
SUMMARY Certified IT Executive, Executive Architect and
Master Instructor with over 24 years of experience in projects concerning
Advanced Infrastructure Solutions (including Server Consolidations and
Deployment/Migration Strategies), Business Intelligence, E-Commerce
Integration, Project Management, Software Solutions, Security Solutions, and
Training. Has expertise in Auditing & Assessment, Access
& Identity Management, Application, Host & Network Security,
Business, Process & System Integration, Budget, ROI & TCO Analysis,
Governance, Risk & Compliance (GRC), Intellectual Property/Trade Secret
Protection, Physical Security Assessment & Remediation, Project
Management, Risk Management, Security Architecture Strategy & Deployment,
Team Building & Staff Development, Vendor & Contract Negotiations.
Has exceptional aptitude for inventing, grasping and applying new concepts to
increase productivity. Strong customer services skills. Also, he has
demonstrated leadership abilities. Excellent track record for creating more
efficient teams, improving accountability and reducing cost. · Security
Architecture Strategy - Developed strategic vision of deploying security
controls for organizational governance, physical, secure network (enterprise
PKI, IPS/IDS), secure host, and secure application (OWASP)
technologies. Designed and deployed BCP, DR, COOP, and ensure maximum
system uptime. Has the ability to look at enterprise architecture across all
four domains: § Business
Architecture: Business Requirements & Rules, Organization
Structure, Mission/Vision, Business Process Design & Modeling § Data
Architecture: Data Integration & Architecture, Enterprise
Application Integration Components, Process Alignment Information/Data,
Enterprise Reporting, Content Management & Business Intelligence, Data
Modeling & Quality Management § Application
Integration: Enterprise Application Integration Components, Process
Alignment, SOA (including abstraction, reusability, autonomy, statelessness
& composability) § Technical/Infrastructure:
Server, Database, Networks, Security, Storage, Telecom, Desktop, Middleware,
Other hardware · Auditing
& Assessment - As Project Manager, Executive Architect and/or SME,
wrote security plans & managed remediation projects for protection of trade
secrets/intellectual property. Created security technology roadmaps. · Governance,
Risk & Compliance - Instituted policies and procedures to ensure compliance
with PCI, Basel, CMMI, CoBIT, DFAR, DITSCAP (predecessor of DIACAP), FEMA
426, FEMA 428, FIPS (including FIPS 140-3,199, 200, etc.), FISMA, FFIEC, GIG,
GLBA, GISRA, HIPAA, HITRUST, ITIL, ISO 27000, NIST 800-53, PMI, SAS-70,
SSAE-16, SOX, WCO, and other IT audit requirements. · Project
Management - Delivered projects on-time and within budget by defining
& implementing a comprehensive set of changes that result in improvements
to human performance, business process and technology to an organization. · Risk
Management - Directed the planning business process around security
controls to mitigate the risk to critical functions, intellectual property
loss, security breaches and business disasters. ·
Industries worked include Banking/Finance,
Education, Energy, Federal Government, Healthcare/Insurance, IT Consulting,
Telecommunications, etc. ·
Companies worked include American Express, IBM,
DuPont, Chemours, Honeywell, Sony, Wells Fargo, ITT Technical Institute,
Strayer University, Alcohol, Tobacco & Firearms, Department of Defense
(USDoD), Department of Treasury, NASA, Social Security Administration, State
of Minnesota, Carefirst (BCBS DC & MD), Several Insurance Agencies,
Accenture, Microsoft, MCI - UUNET, Americatel – Teligent. EXPERIENCE HIGHLIGHTS & ACCOMPLISHMENTS IBM2014 -
Present Global
Security Program Manager/Information Security Advisor As
Global Security Program Manager and Senior Information Security Advisor,
provided advice and guidance of information security industry best practices
to IBM and commercial accounts support teams. Acted as chief
information security officer and focal for IBM enterprise customer
accounts. Acted as executive security architect in design &
deployment of advanced enterprise information security solutions of physical,
infrastructure (network, server, etc.), application, and other related
systems. § Acted as primary
IBM security focal and liaison for global security review for assigned IBM
enterprise customers. Participated in security risk control board and
set policy and guidance for corporate security of IBM customers industry
based information security best practices per ISO 27002:2013. This
includes working with CISO/Global Security Organizations to develop standards
and best practices across security domains. Acted as the final
escalation focal for IBM customer IT security guidance for assigned enterprise
accounts. § Acted as
program lead and primary focal for various security control and risk
management departments including global corporate SOX programs, security
vulnerability, government control programs (IRS, DHS, US DoD, US Dept of
State, NATO, United Nations, etc.), PCI-DSS, etc., for IBM enterprise
customers. §
Acted as portfolio, program, and project manager for
multiple business enterprise initiatives for IBM customers. These
initiatives include, but are limited to project workstreams concerning IT
infrastructure, mobile, network hardware devices and appliances (routers,
switchers, load balancers, firewalls, IDS, etc), application, virtualization,
call center, IP telephony, end-user desktop deployment, data center
migration/upgrades/consolidations (on & off-premise), cloud computing,
multi-tier storage & SAN, and physical & facilities infrastructures.
This includes working with PMO and other Global Enterprise Organizations to
develop standards and best practices across enterprise domains. §
Produced and updated detailed project plans (As Microsoft
Certified Trainer, have expert skill in MS Project, MS Word, MS Excel,
etc.). Managed budgets greater than $15 million (per NDA cannot give
exact dollar amounts). Managed project teams
greater than 1000 resources on a global scale (ranging six continents).
§ Manage and
architect implementations of policy, risk, vendor, incident, and compliance
management, and related business process implementations utilizing RSA Archer
SmartSuite framework, IBM Virtual Security Operations Center (vSOC),
etc. Utilized RSA Archer, IBM GRC tools, etc., for security risk
control management, artifact gathering and repository, GRC reporting, etc.,
for IBM enterprise customers. § Managed
multiple deployments and system integration of IBM Virtual Security
Operations Center (vSOC) with SiteProtector, Tivoli Endpoint Manager (TEM),
QRadar; Splunk, QualysGuard, Nessus, Rapid7, etc. for security vulnerability
management (SVM) for IBM enterprise customers. Managed SVM deployments
for IBM assigned enterprise customers from inception to full deployment to
steady-state operations. § Ensured
effective project implementation and utilize productive reports from the
creation of WBS with the use of project management system to monitor the
status of all purchases, invoicing and delivery up to the closure of the
project. Prepare monthly spend estimates compiled from department
forecasts which align with General Accepted Accounting Practices
(GAAP). Performed project costing related reporting to the team and
management’s review on a monthly basis to ensure that expenditures are kept
within the project budget. Provided cost control and planning advice to the
internal project management team (and external program independent
validators) as and when required. Utilized most PM governance methods
including waterfall, agile, etc. § Performed
security audits, assessment and lead remediation efforts to implement
information security best practices for enterprise critical and supporting
systems for per ISO 27002:2013. This includes deploying application,
platform, system and physical security measures and controls; implemented
risk management, incident, and communication plans for critical web,
application, database, host server & network systems for business and technical
stakeholders; aided in redundancy (server, VM and network infrastructure high
availability) and contingency planning (via DR, COOP & BCP plans).
Created security plans, policies and procedures for enterprise customers. § Aided in
the design and development of security management program for several
organizations. Worked in collaboration with several vendors and
subcontractors in defining, establishing, monitoring, and optimizing security
and service quality and service levels of services agreed by the
customer. Oversaw projects and teams in deployment of security and
service level management programs (this includes defining capacity,
availability, business continuity, change, problem, incident, access &
identity, security vulnerability, emergency response, organizational GRC,
etc.) § Provided
guidance and advice for security management per information technology
industry best practices to ensure compliance with Basel, CMMI, CoBIT, DFAR,
DITSCAP (predecessor of DIACAP), FEMA 426, FEMA 428, FIPS (including
FIPS 140-3,199, 200, etc.), FISMA, GIG, GLBA, GISRA, HIPAA, HITRUST,
ITIL, ITAR, ISO 27000, NIST 800-53, PMI, PCI, SAS-70, SSAE-16, SOX, WCO, and
other governance risk compliance requirements. § Acted as an
ITAR Certified Program Manager for an IBM enterprise customer account
(International Traffic in Arms Regulations (ITAR) is a federal government
regulations for transportation of military equipment that is directly
monitored by the US Dept of State and indirectly monitored by several of
federal and international government agencies (including US DoD, NATO, United
Nations, etc.). All businesses, equipment and personnel that work
within an ITAR compliance area of a company must be certified per federal
requirements). As ITAR Certified Program Manager, directly oversaw all
ITAR compliance activity of assigned IBM enterprise account. Directly
overseeing design, deployment, migrations and upgrades of various systems
(organizational, physical, network, host infrastructure, application,
database, etc.) for ITAR compliance for enterprise customer. § Lead
matrixed teams of architects, project managers, system engineers, developers
and technologists to successfully deliver significant change in a large-scale
globalized enterprise environment. This includes crafting RACI for
governance initiatives, hosting status meetings, setting agendas, and
providing meeting minutes, perform process discovery and documentation, issue
resolution and problem solving; plan, forecast, allocate resources, and
conduct performance measurement and scheduling, while integrating the results
into ongoing operations. § Provided
reporting and decision support for senior leadership (senior directors, VP
and above, C-level executives, board of directors, etc.) concerning security
and operational risk. § Deliverables
included, but were not limited to documented security management, service
management and other operational risk compliance structure including: -
Coordinate documentation and definition
of all services (standard offerings as well as “exceptions”), identification
of application, business & system owners, service targets and related
changes for threat incident and emergency response plans for enterprise
customers. -
Coordinate efforts to mature existing
processes (incident, change), and start on processes we need (request,
problem, configuration management, continuous improvement). Set up
process in moving processes from CMMI level 1 (infancy process maturity) to
CMMI level 5 (dynamic automation process maturity). -
Coordinate the documentation of work
processes (how we do it), tools, and methodologies. Coordinate the
identification of timing/estimates/expected completion times. Identify
metrics to measure service delivery. -
Meet with key stakeholders either weekly
or monthly (depending on LOB) to identify, monitor and craft recommendations
for security risk management issues. Designed and implemented
remediation activities. -
Generate a list of process owners and
coordinate the definition of KPIs for each process. -
Help identify gaps in service and advice
on methods to close gaps. -
Ensured timely artifact collection and
maintenance of compliance activity. Jigits,
LLC2010
- Present Program
Manager/Chief Consultant Managed
an information technology service provider company. Coordinated with
corporate executives, 3rd party vendors, and governmental entities on
improving service processes and quality for lean manufacturing and project
delivery. -Client
– Honeywell · Acted as a
Sr. Program Manager and Scrum Master for the development and deployment of
systems supporting confidential premier product line. These Support
systems include mobile, hardware device, manufacturing, IT infrastructure,
API and monitoring, information worker collaboration, application,
virtualization, and multi-tier storage & SAN solutions. · Accomplishments
includes streamlining delivery of major infrastructure systems including
storage area network solution which was originally slated for over one year
timeline delivery to within one month. Also designed and deployed
QA/UAT multi-environment, QA staging and PROD data center virtualization
environment solutions that were originally slated for over multi-year
timeline delivery to within two months under extreme project
constraints. Save organization millions of dollars in project delivery.
Managed multiple projects & workflows simultaneously. · Managed
creation and deployment of public, private & hybrid clouds for multi-tier
application system. Managed release paths for system integration and updates
of multiple data centers for global inter, intra, & extranet
operations. Crafted solutions for high availability system solutions. · Oversaw
large infrastructure & application development, complex projects that
have interactions with several groups/channels and have extensive experience
in cross-matrix projects. Built strong project teams and keep them motivated
under extreme project constraints. · Took full
responsibility for keeping project cost and schedule on track. Utilize
project management tools/techniques (e.g. PERT charts, critical path method,
earned value) to track and manage project costs and schedules.
Implemented, Agile, SCRUM, Six-Sigma, Waterfall, ITIL and other best practice
frameworks. Managed multiple global teams spanning continents NA, SA
& EMEA. · Hardware/Software
include but limited to: SAP, MS Azure, VMware, vCloud Public, Private
& Hybrid, Cisco UCS Nexus Switches, Cisco UCS Servers, HP & Compaq
Server, Cisco ASA Firewalls, Cisco ACE load balancers, Cisco CSS load
balancers, EMC VNX SAN, Dell Equalogic SAN, Windows Server 2008, 2008 R2
& 2012, SQL Server 2008, 2008 R2, 2012, IIS, 3Scale, Opower, Jmeter,
JIRA, .NET, Openstack, Red Hat Linux, Microsoft Voice Recognition products,
Wi-Fi product, thermostats, mobile OS, .NET, API., energy monitoring, etc. -Client
– Wells Fargo · Acted as an
Operational Risk Consultant/ Information Security Auditor for Wells Fargo
Security & Risk Team. Lead and conducted information security
reviews & assessments and aided drafting security remediation plans for
technical, managerial, and operational functions of WF business partners and
various 3rd party vendors throughout the United States.
Produced risk assessment reports for strategic security and business risk
planning and analysis for compliance with internal policies and the Office of
the Comptroller of the Currency (OCC) regulations. · Performed
detailed technical audits of multi-tier web-based applications, network
architecture, and DMZ designs. Performed operational risk assessment and
communicate relevant information to senior management. · Instituted
policies and procedures to ensure compliance with PCI-DSS 2.0, Basel (I &
II), CMMI, CoBIT, FEMA 426, FEMA 428, FIPS, FISMA, FFIEC, HIPAA,
HITRUST, GLBA, ITIL, ISO 17799, ISO 27000, ISO 27001, SAS-70, SSAE-16, BS
17779, NIST 800-53, PMI, SOX, WCO, and other governance, risk and control
frameworks. · Hardware/Software
include but limited to: Windows, Unix, Linux, Mainframe, .NET, Java,
Oracle, SQL Server, VMWare, STAMP, various security tools including NMAP,
Ethereal, Snort, Splunk, Appscan, Fortify, Nessus, dig, CA Spectrum, Tivoli,
InterMapper, OPNET, Trustwave, Solarwinds, NetIQ, HP Openview, Tclmon,
Syslogs, various Microsoft tools (Network Monitor, Event Logs, Sysinternals,
etc.), WhatsUpGold, PRTG, KACE, Spiceworks, etc. -Client
– Microsoft · Acted as
Sr. Program Manager, Speaker, Technical Writer and Subject Matter Expert
(SME) for Microsoft learning solutions throughout the United States and
Canada. Projects include project full-lifecycle (from initiation to
closing) of official courseware design & development of Infrastructure
Optimization (IO), Windows Server 2000, 2003 2008, SQL Server 2000 &
2005, Group Policy, Active Directory and IT security best practices. IBM(American
Express Account)2005-2009 Principal
Consultant (System Administrator, Architect & Project Manager roles) Served
as Project Lead for several programs and projects and collaborated with
top-level executive and key stakeholders on IT security, application
development, network infrastructure, cloud computing, server consolidations,
data center migrations, server steady-state operations, EMC SAN migration,
CDN deployment, virtualization, disaster recovery, executive reporting, and
Windows OS migration. Performed high level system engineering and system support
for multi-tiered web distributed applications for over 25,000 + servers.
Functioned as a key member of the IT security, mid-range optimization, server
support and business continuity/disaster recovery committees. § Managed
several infrastructure and security projects values of $1M+ via a matrixed
team. Challenged by tight deadlines and steep budget cuts.
Stepped into several roles including release manager and lead system
administrator throughout the SLDC project lifecycle. Acted as the key project
enabler and achieved high level of customer satisfaction. § Primary
technical POC for Global Steady State Intel Services (GLSSIS) disaster
recovery (DR) and business continuity for American Express global server
environment. § Provided
technical consultation on several IBM enterprise accounts including the Xcel
Energy account. § Managed
project logistics & activities, resource management, risk assessment
& mitigation, and project tracking and reporting to key stakeholders and
upper management of IBM and American Express. Aided in defining key
performance goal (KPG), key performance indicators (KPI), service level
agreements (SLA), etc. for several programs, projects and operational
teams. Created work breakdown structures (WBS) and maintained critical
path for project completion. Created customized solutions that quickly
identify & address major vulnerabilities, measure & maintain
compliance efforts to reduce those vulnerabilities, lower the tremendous cost
of meeting countless mandates, created controls, gain clear visibility into
vulnerabilities (lower ROI) and measure compliance status. § Lead
matrixed teams of architects, system engineers, developers and technologists
to successfully deliver significant change in a large-scale globalized
enterprise environment. Ensure the infrastructure adheres to the
requirements for availability, stability, and efficiency. Utilized IT
framework and governance best practices including standards from Agile,
SCRUM, RUP, SDLC, PMI, CMMI, ISO 20000, ISO 27001, Zachman, ITIL, CoBIT, MSF,
MOF, Six Sigma, TOGAF, Kimball Data Warehousing, etc. Aided in
providing forecasting and resource allocation with regard to IT projects.
Player/Coach contributions at all levels in IT environment. Coordinated project
deployments with vendor partners for smooth deployments and ongoing
operations. Worked with multiple vendors for program transformation and
project streamlining. § Provided
technical documentation utilizing Microsoft Word, Project, Visio, PowerPoint,
etc. § Collaborated
with business units in designing and deploying customized business
applications. This includes setting up designing, deploying and
maintaining application frameworks and their built-in services, API’s
including J2EE, COM+, Jboss, Openstack, .NET, etc.; general application
security API’s and protocols: GSS-API, MS CryptoAPI, PAM, Kerberos, DCE
Security Service, SSL/TLS, SAML, S/MIME, PKCS API’s, or others; built-in
functions and services of application infrastructure components: Oracle, DB2/UDB,
MS IIS, MS BizTalk Server, Hyperion, Cognos, Microstrategy, Oracle
Financials, MS Integration Server, SharePoint, IBM WebSphere, iPlanet
Directory, MS Active Directory, Citrix, TomCat, Apache, IIS, SQL Server, Sun
LDAP, IBM MQ Series, MSMQ, MS Exchange, etc.; Utilized storage management
utilities including; Tivoli Storage Manager (TSM), Tivoli Storage
Productivity Center (TPC), EMC PowerPath, Symantec Veritas, etc.,
server/client operating systems including Windows XP, 2000, 2003, & 2008;
AIX, Solaris, Red Hat Linux, z/OS, AS/400, VMWare, Platespin, etc.; network
infrastructure and security functionality including Cisco (via AT&T)
switches, routers, firewalls, LB, IDS/IPS, SEM/SIEM, VPN’s, etc.; incident
response including creation of tiger CERT teams; aiding setting up
patch management, configuration management, physical security. DPRA2003-2004 Security
Architect/Project Manager §
Project managed the design and deployment of CFAST
2.0. Also, collaborated in the design and architect of CFAST version 2.0
(CFAST is the war planning and deployment ERP application currently used by
the US military and NATO). Created security controls, policies,
standard operating procedures (SOP) and systems for multiple applications
that exceed compliance standards for both corporate and NSA and US DOD
standards. Performed security risk analysis and assessment, risk planning and
implementation, and risk mitigation and monitoring of various systems for US
DOD and NSA compliance for DITSCAP and DCAA reviews. Develop action plans
and/or recommend alternate solutions to resolve exceptions to standard
operating procedures. §
Architect and deployed CFAST v2.0 as a high-level security
cloud that further secured CFAST V2 within the SIPRNET. This included
creating intrusion detection (IDS, honeypots, firewalls, etc.), disaster
recovery strategies, risk management, security audits, etc., methodologies
and controls. Utilized Network Sniffing and Vulnerability Assessment
and Penetration Technologies (Network General Sniffer, Ethereal, OPNET,
SNORT, Nmap, Nessus, etc.), PKI; Encryption; Digital Certificates and their
use, Anti-Virus; Anti-Spyware; VPNs; SSL; IPSec, TCP/IP; DNS; DHCP; LDAP;
Active Directory, Multi-Factor Authentication Mechanisms, IP Packet Routing
& Switching; IP Packet Analysis, Edge Firewalls, Application Layer,
Stateful Packet Inspection, and WAF. §
Implemented security frameworks standards from PMI, ISO
9000 & 17799 (pre-cursor of ISO 27000/27001), ITIL, CMMI, MSF, Six Sigma,
etc. Utilized federal information security governance including DITSCAP
(predecessor of DIACAP), NIST 800.53, various FIPS (FIPS 140, FIPS 199, FIPS
200), FFIEC, FISMA, DoD Global Information Grid (GIG), etc. §
Managed the design and deployment of disaster recovery and
business continuity plans for various US DoD and NATO data sites throughout
the world. ITT
Technical Institute2002 -2003 Adjunct
Professor Taught courses in
Windows OS, Active Directory, Networking, Infrastructure, Security, etc., as
the subject matter for preparing student for real-world experiences in a
university environment. Strayer
University2000 -2002 Adjunct
Professor Taught courses
pertaining to computer technologies. Produced courseware and customized
training techniques as product deliverables. Created course syllabus,
outline, labs, testing materials, etc. for students for various certification
training (MCSE, MCDBA, Network +, etc.) as well as real-world preparation in
a university environment. Taught courseware for risk management and
disaster recovery. EDUCATION & TEACHING EXPERIENCE Bachelor’s
Degree – B.S., Electrical Engineering,
(Concentration in Digital Logic and Design), Howard University, Washington,
DC (1996) Adjunct
Professorships at ITT Technical Institute & Strayer University.
Taught for several organizations throughout the United States and Canada CERTIFICATIONS Project
Management Professional(PMP) Project
Management Certification CompTIA Project +(Project +) Six
Sigma Black Belt(Six Sigma Black Belt) Information
Technology Infrastructure Library Foundations(ITILF) Microsoft
Operations Framework(MOF) Certified
Information Security Manager(CISM) Certified
in Risk and Information Systems Control(CRISC) Information
Security Foundations based on ISO 27000 (ISO 27000) Information
Technology Infrastructure Library Accredited Trainer Microsoft
Operations Framework Accredited Trainer ISO
27000 Accredited Trainer Microsoft
Certified Trainer(MCT) Microsoft
Certified System Engineer (MCSE: Windows NT, 2000, 2003) Microsoft
Certified System Administrator(MCSA: Windows 2000, 2003) Microsoft
Certified Database Administrator(MCDBA: SQL Server 7.0, 2000) Microsoft
Certified Professional + Internet(MCP+I) Microsoft
Certified Technology Specialist(MSTS) Microsoft
Certified Professional(MCP) Microsoft
Certified Internet Technology Professional: Database Administrator
(MCITP: DBA SQL Server 2005) Microsoft
Certified Internet Technology Professional: Enterprise Administrator (MCITP:
EA Windows 2008) Microsoft
Certified Internet Technology Professional: Server Administrator
(MCITP: SA Windows 2008) Citrix
Certified Administrator(CCA) Cisco
Sales Expert for Account Managers – Enterprise Edition(CSE) Certified
Internet Webmaster Certified Instructor(CIW CI) Certified
Internet Webmaster(CIW) VMware
Certified Associate – Cloud(VCA-Cloud) ITAR
Certified Program Manager(ITAR) COMPUTER EXPERIENCE IT
Processes & Frameworks – Agile,
Integrated Methodology Software Development, Prototyping, Spiral, Waterfall,
Incremental, Rapid Application Development (RAD), Object Oriented Development
(OOD), Top-down, Unified Process (UP), Rational Unified Process (RUP), ISO
12207, Six Sigma, DMAIC, DMADV, FMEA, QFD, SIPOC, Governance, Risk,
Compliance (GRC), TOGAF, CoBIT, Ralph Kimball Data Warehousing, DITSCAP,
NIACAP, ISO 17779, ISO 27000, ISO 27001, ISO 27002, ITIL, PMI, Microsoft Operations
Framework (MOF), Microsoft Solutions Framework (MSF), Microsoft
Infrastructure Optimization, CMMI, DFAR, FAR, HIPAA, ISO 20000,
Sarbanes-Oxley (SOX), NIST SP 800-53, FEMA 426, FEMA 428, SDLC, Performance
Tuning, Physical Database Design, Redbrick, Data Modeling, Data
Warehousing, RACF, Cryptography, Enterprise Security methodologies, SAN
Design, Training Documentation Methodologies (more IT processes &
frameworks than listed here) Platforms Windows OS 3.x-7, Windows Server NT-2012,
Windows Home Server, Windows Small Business Server, Windows Essentials,
Windows CE, Windows Mobile, Windows Phone, WinPE, Novell Netware, Open
Enterprise Server, RedHat, Caldera, Linux, OpenSUSE, Xenix, UnixWare, SCO
OpenServer, Chrome OS, Android, JavaFX Mobile, Cisco IOS, IOS-XR,
IronWare, System V, BSD, GNU/Linux, HP-UX, VMS, Domain/OS, , OSE AIX,
NeXTSTEP, Mach, FreeBSD, POSIX, VxWorks, Symbian OS, Palm OS, OS/360, OS/VS,
OS/390, x/OS, DOS/360, OpenSolaris, OS/2, VMware, VMWare ESX, Solaris,
SunOS, Mac OS (more platform experience than listed here) Hardware
- IBM, Macintosh, EMC, EMC Clariion,
EMC Symmetrix, HBA, SAN, tiered storage, tape, Dell, HP, Sun, iMacs,
PowerPCs, iBook, PowerBook, Macintosh, G3, G4, Cisco Switches & Routers
Series 2000/ 3000/4000/5000/6000/7000/8000/9000/10000/11000/12000, various
Alpha, Intel, Motorola processors, Token Ring, Ethernet, Fibre-Channel,
various routers, hubs, switches, 3Com, RAID, various servers &
workstations, clustering technologies, (Microsoft, Solaris, RedHat, Symantec/VERITAS,
EMC, (more hardware experience than listed
here)
Protocols/Interfaces -, LDAP, Active Directory, TCP/IP, IPX/SPX, POP3,
PKI, NTLM, SSL, IPSec, EDI, SOAP, XML, HTML, SHTML, Metadata, JDBC, WAP, WML,
VPN, AppleTalk/Local Talk, NetBIOS, NetBEUI, SMTP, DHCP, SNMP, frame
relay, HTTP, ARP, SAP, RIP, ISDN, ODBC, IEEE 488.3, IEEE 802.x, NTLM, SSL,
IPSec, OSPF, X.25, UDP, NAT, X.400, X.500, ICA, RDP, A3L, NFS, WTLS,
HTTPS, (more protocols and interfaces than mentioned here) Software – SQL Server, Internet Information Server (IIS),
Visual Studio, BizTalk, SMS, ISA Server, Exchange Server, SharePoint
Developer, SharePoint Office, SharePoint Portal Server, Live Communication
Server, MS Lync Server, MS Speech Server, Project Server 2003/2007/2010,
Citrix, Tivoli, HP Openview, Altiris, ActiveWorks, Middleware, WebMethods, MQ
Series, LANsurveyor, Symantec, VERITAS, EMC, Hyperion, DataStage,
Informatica, BEA WebLogic, DB2, IMS DBA, Sybase, Access, COGNOS, Crystal
Reports, ERWIN, ETL, Qwest Suite, MS Expressions, MS FrontPage, Domino, Lotus
Notes, Novell GroupWise, LoadRunner, Rational Requisite Pro, Rational Team
Test, Test Director, WinRunner, Apache Web Server, Remedy, Clarify,
PowerPath, Invista, Metasolv, Telecordia (Bellcore) software, ActiveWorks
(Active Adapters), BEA Weblogic, Siebel, JRUN, HP Openview, Telecom Business
Solutions (TBS), Clarify, Hyperion, EMS XPSurf, Qcom, Netg, Manta, Bellcore,
, Computer Based Training (CBT), Cognos, ERWin, Microstrategy, Infomatica,
Ultimus, Siebel, Vertex Quantum, Myrrdin Powerlease, Informix, SATAN, Troux,
Sybase, DataStage, FoxPro, MySQL, Visual FoxPro, MS BPOS, MS Azure, Iona
Orbix, Microsoft MSMQ Server, MS Integration Server, IBM WebSphere, iPlanet
Directory, MS Active Directory, IBM MQ Series, various security software,
knowledge of all Microsoft products (more software experience than listed
here. 1 |
|
|
|||||||||||||||||||||||||
|
|||||||||||||||||||||||||
|
|