Oliver Tagalog, IT Engineer

Oliver Tagalog

IT Engineer

MITSUBISHI ELEVATORS

Location
Saudi Arabia - Jeddah
Education
Diploma, Education And IT
Experience
11 years, 1 Months

Share My Profile

Block User


Work Experience

Total years of experience :11 years, 1 Months

IT Engineer at MITSUBISHI ELEVATORS
  • Saudi Arabia - Riyadh
  • My current job since April 2020

SECURITY SKILLS FOR PROVIDING ROBUST INFRASTRUCTURE.

=Look for malicious traffic using IDS and IPS ( SNORT )
=Identifying suspicious network activity using ( SNORT )
=Managing IDS/IPS SNORT SERVER
=Identifying know attack patterns, ping and sweeps
=Monitor packet in the network using WIRESHARK
=KALI/Backtrack for Pentester
=Ettercap for filtering packets and icmp request
=Monitoring dnsspoof and arp spoofing in the network
=Cain and Abel for checking the network robust
=Backtrack meterpreter dumping hashes, for encrypted password to decrypt
( Windows Environment for Security purposes )
= Risk Management Analysis
= Security Policies Development
= Implement a systematic and structured information risk assessment process by quarterly vulnerability assessments
= Identified potential threats and vulnerabilities for business process, associated data in the evaluation of risk associated with the project by completing Threat Risk Assessment (TRA)
=Identified legal and regulatory requirements (PHIPA) and organizational policies and practices related to
Designed, established and performed security audit for the entire organization.
= Created Corporate IT Policy, Security policies and procedures and implemented Change Control Management policies and procedures.
= Analyze system security logs.
= Implement Internet access control and content-filtering.
= Analyze and designed a Corporate Backup Strategy for Head Office and Regional Offices
in expanded corporate INTRANET/EXTRANET infrastructure.
= Created, implemented and maintained Corporate IT Policy, Security policies and procedures, Change Control Management policies and procedures and Corporate Incident Reporting process that was used as a basis for decision-making and reports to senior management.
= Performed risk assessment and reviews on quarterly basis.
= Conduct a performance system security audit on monthly basis.
= Analyze, designed and recommended a corporate Disaster Recovery Plan.
= Analyzed system security logs, including firewall logs and intrusion detection logs.
= Deployed Intrusion-Detection System (IDS).
= Conduct a full Security Threat & Risk Assessment for the al regions
= developed information security classification framework to help information assets safeguarded
= - Establish and implement overall Information Security Compliance Reporting Strategy.
= Establish the Information Security Risk Assessment Framework.
= KALI/ Backtrack Research, evaluation and implementation of new projects and solutions,
= enthusiasts on Vulnerability and Risk analysis, security solutions design, penetration testing.
=KALI/ Backtrack meterpreter dumping keystroke, monitor system services, and planting services .EXE for backdoor to the accomplish system. ( Windows Environment for Security purposes )
= Empowering and educate the end-users not to disclose corporate information to obviate the social engineering attack.





CISCO ROUTING PROTOCOLS CONFIGURATION

Ripv2, OSPF, EIGRP, IGRP, ISIS,
FRAME RELAY full mess and point to point,
Managing traffic, IP, port by ACL,
VLAN, VTP, Chap, PPP, NAT, PAT

SYSTEM ADMINISTRATOR at Mitsubishi Elevator and Escalator
  • Saudi Arabia - Riyadh
  • April 2009 to April 2020

CORE SUMMARIES OF EXPERIENCE WITHIN AREAS OF RESPONSIBILITIES AND KNOWLEDGE

§ Windows Server Active Directory 2003/2008/2012/2016/2019 (Domain Controller),
DHCP Server, DNS Server, FTP server,
§ MS Exchange Server 2007/2010/2013/2016, IIS Administration 5/6/7/8
§ Baracuda spam firewall/web filter,
§ Cyberoam CR 100ia, Citrix Server, ISA server 2006/MS forefront TMG 2010.
§ Working in LINUX SERVER Administration ( REDHAT / CENTOS / FEDORA/ UBUNTO (BACKTRACK) )
§ Experience and administering FMS, CACTI, MRTG, for traffic monitoring
§ Administering WOWZA Video Server.
§ Experience on administering a LlNUX MAIL SERVER/ IMAP (squirrelmail )
§ CENTOS 6 /7 IPTABLES IP and PORT security monitoring.
§ LINUX SAMBA Server, Snort, Ettercap, Apache, Tomcat for Linux environment.
§ Experience in handling Cisco 2800/9141/1841 series / Catalyst 2960series
§ AVAYA G7 PABX Administration, CCTV, Data Center local loop.
§ Knowledge and experience on Cisco routing protocols OSPF, RIPv2, EIGRP, IGRP, VLAN, VTP, ACL, PPP CHAP, ISDN, FRAM RELAY, ISIS.
§ Experience on monitoring a crippled bandwidth, high latency that cause by DDOS attack to all servers, while responsive analytic coordination with PROLEXIC.
§ Provide a comprehensive network cabling in DATA CENTER.
§ Monitor malicious signatures of traffic and packets in the network using SNORT.
§ Motivated and enthusiast in LINUX, WINDOWS, NETWORK and Security environment to mitigate, the latest security threats and gaps within the infrastructure.
§ Basic knowledge in PHP/MYSQL/PERL/ RUBY/PYTHON / SHELL scripting.
§ Empowering and educate the end-users not to disclose corporate information to obviate the social engineering attack from intruders.

LINUX SERVERS ADMINISTRATION
*Samba (Domain Controller / BACKUP DATA ), iptables, fpsence,
DHCP, Wowza (video server ),
*Tomcat, Apache, FTP, Vhost, Dovecot, IMAP
*MySQL, BIND DNS, SVN, Postfix, Squirrelmail
WINDOW SERVERS ADMINISTRATION
*Active Directory, Exchange Server 2007/2013/2016, DNS, DHCP, IIS, FTP, ISA 2006/MS forefront TMG 2010,
NETWORK and COMMNUNICATION ADMINISTRATION
1.CISCO 8141/2600/2800 and AVAYA G700 PABX
2.CISCO CATALYST 2960G SERIES
3.CISCO 1941 /1841
4.CYBERROAM IA


SECURITY SKILLS FOR PROVIDING ROBUST INFRASTRUCTURE.

=Look for malicious traffic using IDS and IPS ( SNORT )
=Identifying suspicious network activity using ( SNORT )
=Managing IDS/IPS SNORT SERVER
=Identifying know attack patterns, ping and sweeps
=Monitor packet in the network using WIRESHARK
=KALI/Backtrack for Pentester
=Ettercap for filtering packets and icmp request
= Created, implemented and maintained Corporate IT Policy, Security policies and procedures, Change Control Management policies and procedures and Corporate Incident Reporting process that was used as a basis for decision-making and reports to senior management.

= KALI/ Backtrack Research, evaluation and implementation of new projects and solutions,
= enthusiasts on Vulnerability and Risk analysis, security solutions design, penetration testing.
=KALI/ Backtrack meterpreter dumping keystroke, monitor system services, and planting services .EXE for backdoor to the accomplish system. ( Windows Environment for Security purposes )
= Empowering and educate the end-users not to disclose corporate information to obviate the social engineering attack.

CISCO ROUTING PROTOCOLS CONFIGURATION

Ripv2, OSPF, EIGRP, IGRP, ISIS,
FRAME RELAY full mess and point to point,
Managing traffic, IP, port by ACL,
VLAN, VTP, Chap, PPP, NAT, PAT

Education

Diploma, Education And IT
  • at PHILIPPINES SCIENCE AND TECHNOLOGY CENTER
  • April 2000

Specialties & Skills

Networks
IT Security
Windows Server
Linux Server