IT Security Engineer
Rabiya Co-operation
Total years of experience :12 years, 5 Months
Responsible for managing IT operations for colleagues across multiple locations, including remote teams. I ensured smooth functioning of the office network, resolved hardware issues, and facilitated hardware orders for desktop/laptop systems, printers, and phones. I have experience in troubleshooting and providing support to ensure uninterrupted operations.
Prioritize creating a welcoming environment for new employees. I have developed comprehensive onboarding programs that include providing necessary IT equipment, setting up accounts and access, and conducting personalized training sessions. I also make sure to be available for any questions or concerns, fostering a supportive atmosphere that helps new employees feel comfortable and integrated into the team.
Managed licenses and Software-as-a-Service (SaaS) subscriptions for our organization. This involved tracking license usage, coordinating renewals, and ensuring compliance with vendor agreements. I also evaluated and implemented new SaaS solutions based on business needs and budgetary considerations.
I have a strong track record of efficiently managing daily IT requests and providing timely support to employees. I prioritize responsiveness and clear communication to ensure that issues are addressed promptly. I also educate employees on self- help resources and encourage knowledge sharing to empower them with basic troubleshooting skills
Installing and configuration Active Directory - RODC- Additional -Domain Controller )
Create user and configure permission
Fix issue logon and share folder for user
Configuration printer and share
Configuration outlook and active syng
Conducted security assessments on a virtual network infrastructure, identifying and documenting potential risks and vulnerabilities. Critically evaluate and assess data security risk within an organization /systems. Identify and recommend decisive actions to bridge security gaps and improve security. Performed an assessment of current theoretical and methodological approaches to concepts and philosophies of offensive and defensive information operations. Apply flexibly and creatively different types of information operations based on the proposed scenario. Critically demonstrate self-direction and creativity in managing the security of an information environment at the strategic, tactical and operational levels, effectively developing information security policies. Use initiative to autonomously conduct and manage a risk assessment of a complex and unpredictable environment. Maintained and updated incident response plans and procedures, ensuring a prompt and effective response to cybersecurity incidents. Staying updated with emerging cybersecurity threats, technologies, and trends, evaluating their impact on the university's security posture
URL removed due to policy violation. Please contact support for further information.