Certified Information Systems Security Professional (CISSP) with six years of experience and expertise in designing,
implementing, and troubleshooting network infrastructure and security. Proven record of evaluating system vulnerability
in order to recommend security improvements
as well as
improve efficiency while aligning business processes with network
design and infrastructure. Superior capacity to solve complex problems involving a wide variety of information systems,
work independently on large-scale
projects, and thrive under pressure in fast-pace environments while directing multiple
projects from concept to implementation.
Core Competencies include:
System Architecture Design
Configuration Management
Linux Administration
Information
Assurance
Hardware Installation
Project Management
Vulnerability Evaluation
System Troubleshooting
Technical Writing
C L E A R A N C E A N D C E R T I F I C A T I O N S
Certified Information Systems Security Professional (CISSP)
CompTIA Security + Certification
Microsoft Certified Systems Engineer (MCSE)
Microsoft Certified Professional + Internet (MCP + Internet)
P R O F E S S I O N A L E X P E R I E N C E
CACI, Andover, MA
IT Security Specialist
Manage system information security architecture, design, installation, operational planning,
and risk remediation
activities on more than 15 servers/systems worldwide for various government clients, ensuring all systems
installed according to schedule.
Conduct risk assessments and collaborate with clients to provide recommendations regarding
critical
infrastructure and network security operations enhancements.
Develop Continuity of Operations (COOP) and Disaster Recovery (DR) operations and conduct evaluation of
COOP and DR during annual incident response training.
Provide up to ten on-site server maintenance visits on a monthly basis, troubleshooting
various technical
problems and performing operating system administration with Linux-based computer systems.
Ensure information assurance by transmitting secure data between classified systems; perform ethical hacking,
to enhance system security documentation; create required system compliance reports and information requests.
YASİN QULUZADA