Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

PETER DAIZY KYOBE, 200 CHARLOTTE DRIVE APT T2 LAUREL

MARYLAND 2072, 443-979-2941, peterkyobe6@gmail.com

Results-oriented IT service specialist with a proven track record of quickly learning new tools
and technologies. I am looking for an opportunity to fill an information technology role within
your company. Dedicated and confident, I studied at My Computer Career Raleigh Campus and
successfully completed my training with a certificate as an IT Professional. Server+, CompTIA+,
Security+, Microsoft MTA, Network Security+ certified. I work as an IT Specialist in various roles
at Cade Consulting. 

Professional Experience:
Cade Linux administrator October 2020 - Present

 Provided systems support for Internal and External Customers on elements of


new and existing compute, storage, network, and cloud platforms that are used
by transportation and transit agencies.
 Assisted with installing, configuring, and administrating physical compute and
storage nodes.
 Assisted with installing, configuring, and administrating Hypervisors (VMware,
Hyper-V) and guest OSs (Windows and Linux).
 Assisted with middleware application installation, configuration, and
administration – MS IIS, MS SQL, and others.
 Provided support on the Intelligent Transportation System software solution –
training will be provided
 Assisted with Amazon AWS infrastructure support, maintenance, and new
deployments.
 Assisted with VM replication, clones, back-ups, monitoring, and troubleshooting.

 Provided troubleshooting of Solaris servers and Linux operating systems to


determine errors and weaknesses in function and resolved all issues.
 Modified the company’s network file system and improved effectiveness by 20%.
 Provided project managers with ROI estimations and cost-saving measures to
assist them in making decisions regarding the implementation of production
servers and other monitoring tools.
Cade Microsoft MTA security specialist June 2021-Present
 confidentiality; integrity; availability; how threat and risk impact principles; principle
of least privilege; social engineering; attack surface analysis; threat modelling
Understand physical security
 site security; computer security; removable devices and drives; access control; mobile
device security; keyloggers Understand Internet security
 browser security settings; secure websites Understand wireless security
 advantages and disadvantages of specific security types; keys; service set identifiers
(SSIDs); MAC filters Understand operating system security (35-40%) Understand user
authentication
 multifactor authentication; physical and virtual smart cards; Remote Authentication
DialIn User Service (RADIUS); biometrics; use Run As to perform administrative tasks
Understand permissions
 file system permissions; share permissions; registry; Active Directory; enable or disable
inheritance; behavior when moving or copying files within the same disk or on another
disk; multiple groups with different permissions; basic permissions and advanced
permissions; take ownership; delegation; inheritance Understand password policies
 password complexity; account lockout; password length; password history; time
between password changes; enforce by using Group Policies; common attack methods;
password reset procedures; protect domain user account passwords Understand audit
policies
 types of auditing; what can be audited; enable auditing; what to audit for specific
purposes; where to save audit information; how to secure audit information Understand
encryption
 Encrypting file system (EFS); how EFS-encrypted folders impact moving/copying files;
BitLocker (To Go); TPM; software-based encryption; MAIL encryption and signing and
other uses; virtual private network (VPN); public key/private key; encryption algorithms;
certificate properties; certificate services; PKI/certificate services infrastructure; token
devices; lock down devices to run only trusted applications Understand malware
 buffer overflow; viruses, polymorphic viruses; worms; Trojan horses; spyware;
ransomware; adware; rootkits; backdoors; zero-day attacks Understand network
security (20–25%) Understand dedicated firewalls
 types of hardware firewalls and their characteristics; when to use a hardware firewall
instead of a software firewall; stateful versus stateless firewall inspection; Security
Compliance Manager; security baselines Understand network isolation
 routing; honeypot; perimeter networks; network address translation (NAT); VPN;
IPsec; server and domain isolation Understand protocol security
 protocol spoofing; IPsec; tunneling; DNSsec; network sniffing; denial-of-service (DoS)
attacks; common attack methods Understand security software (15–20%) Understand
client protection
 antivirus; protect against unwanted software installations; User Account Control
(UAC); keep client operating system and software updated; encrypt offline folders,
software restriction policies; principle of least privilege Understand email protection
 antispam, antivirus, spoofing, phishing, and pharming; client versus server protection;
Sender Policy Framework (SPF) records; PTR records Understand server protection
 separation of services; hardening; keep server updated; secure dynamic Domain Name
System (DNS) updates; disable unsecure authentication protocols; Read-Only Domain
Controllers (RODC)
 Successfully collaborated in integration of a multifaceted network of both Linux
and Windows environments by setting up multi-layered protocols
 Delivered real time troubleshooting consulting services for complex computer
networks at a client’s site
 Install and troubleshoot standard computer networks
 Independently repair individual and isolated PC problems
 Ensure appropriate setting up of compound computer networks by organizing
and coding systems of wires and cables
 Identify computer problems using specific diagnostic and repair tools
 Set up, check and maintain a range of private computing and office network
systems
 Assemble and document all system procedures as guidelines for new employees
and reference materials for computer technicians
 Ensure thorough inventory of computer related supplies is recorded and
maintained
Education:
 Nkumba University Wakiso Bachelor of Education                
 Kampala- Caltec Academy Kampala          
 Uganda Advanced Certificate of Education 

Skills:

 Understand security layers


 Understand operating system security
 Understand network security
 Understand security software
 Familiarity with physical, network, and software security
 Installing firewalls and routers
 Data encryption
 Risk mitigation strategy and threat analysis
 Knowledge of compliance regulations and standards like PCI-DSS, HIPAA, and CCPA
 Ethical hacking and penetration testing
 Administering diverse operating systems like Windows, Linux, or Mac
 Installing and configuring computer hardware and software
 Cloud administration and applications
 Maintaining local area networks (LAN), wide area networks (WAN), storage area
networks (SAN), and virtual private networks (VPNs)
 Troubleshooting
 Helping employees with technical issues
 Administering diverse operating systems like Windows, Linux, or Mac
 Installing and configuring computer hardware and software
 Cloud administration and applications
 Maintaining local area networks (LAN), wide area networks (WAN), storage area
networks (SAN), and virtual private networks (VPNs)
 Troubleshooting
 Configure, install, and upgrade operating systems, including Windows, Apple OS X,
Linux, iOS, Android, and Windows Mobile
 Install and image virtual machines
 Set up and troubleshoot peripheral devices
 Assemble and disassemble computing hardware
 Set up and support basic home and small office networks
 Implement cybersecurity controls appropriate to help desk and technical support
roles
 Troubleshoot and support end-user access to applications and data

Reference: Cade
Sylvie Gatcham : +1 (301) 606 0756

You might also like