The company's cloud solutions addresses the growing
security and compliance complexities and risks that are amplified by the dissolving boundaries between internal and
external information technology infrastructures and
web environments, the rapid adoption of cloud computing and the proliferation of geographically dispersed information technology assets.
Their resumes indicate such skills as performing
web application
security assessments for clients» internal and
external applications, as per OWASP, CVE, WASC, NIST methodologies and PCI - DSS compliance; and performing vulnerability assessments and penetration testing assessments for client networks or infrastructure.
• Installed, configured, and managed multiple
web sites supporting global trading, e-commerce, e-treasury, and business credit in technical environment encompassing Solaris2.6 through 2.10, HP - UX 10.20 and 11.00, AIX 4.2.5 - 5.0 operating systems • Managed DNS, DHCP, NIS, NIS +, FTP, HP OpenView, LDAP, and Apache
web administration • Streamlined the business credit process by developing a communication system between the proxy server, IBM Mainframe, and Apache
web server using Jet 3270 Emulator • Applied Veritas Volume Manager to provide High Availability (HA) and NFS fail over using the Veritas cluster for numerous Sun E250 - E15K and HP Superdome 9000 servers • Administered backup and recovery using LEGATO backup solution • Performed hardware and software upgrades and built new Sun and HP servers to incorporate Oracle and Sybase RDBMS • Migrated ADSM backup to Veritas Netback up and Autosys 3.4 running on AIX3.3.3 to Autosys 3.5 running on Solaris 2.7 • Employed EMC software for HA and automatic fail over and managed BMC software to monitor operation, development, and administration • Supported HSBC's branch banking on an RS 6000 platform running AIX • Optimized data
security through close cooperation between Network Administration, Unix System Administration, NT Administration, DBA, and Backup and Recovery Administration teams • Implemented policies and procedures to streamline operations and minimize system downtime • Built a 128 - bit RSA encrypted proxy server for internal and
external customers, which increased transaction
security • Installed and configured Aix and Sun Solaris Operating systems on IBM and Sun Servers.