Abdul Wahid
Details
Business Administration with Management Information Systems
Montclair State University
1995 : 1999
NVR, Inc.
Senior Information Security Analyst
Serve as a technical lead and subject matter expert to implement, support and manage global network infrastructure security programs. Manage and maintain programs to drive security policy compliance, ensure availability and optimal performance of security programs and present weekly and monthly metrics to stakeholders. Technical liaison between stakeholders and application developers to translate security requirements into deliverables using Agile tools and methodologies. Collaborate and work closely with extended global support teams/vendors/CSIRT/business units to investigate anomalies, security incidents, troubleshoot issues, and to conduct training and education.
2014 : 2017
IBM Corporation
Network Security Consultant
Technical team lead and technical focal for the Manhattan branch offices. Provided comprehensive IT technical and security support for onsite/offsite corporate events and to the highest level of IBM executive offices - including the office of the CEO, the corporate office and the boardroom. Worked independently without management supervision and entrusted with management of confidential systems, devices and data for the corporate office, the boardroom and senior executives.
Accomplishments :
● Conducted incident handling, root cause analysis, troubleshoot and responded to all IT incidents and service requests for senior level executive offices' while minimizing down time.
● Implemented IBM internal security standards for all executive offices' and provided IT security consultation and implementation of a variety of security controls to minimize risk and exposure.
● Ensured security compliance by implementing workstation/mobile device security controls, asset registration, patch management, complex password authentication, system hardening and security updates.
● Implemented OS/data/device encryption, PKI digital certificates, data backup strategies, secure disposal of workstations and smart phones.
● Secured nonstandard workstations and BYOD mobile devices according to internal security policy requirements.
● Established end-user security awareness training for senior executives and staff before the formal development of mandatory security awareness training program, leading to a drastic reduction in security incidents and system down time.
● Provided technical leadership, assistance and coordination to the on-site IT team. Mentored colleagues, shared knowledge and provided guidance for acquiring industry knowledge and technical and cyber security skills.
● Acted as technical liaison between vendors and contractors to implement new technologies, upgrades or to resolve internal network issues.
2004 : 2014
IBM Corporation
Executive IT Specialist & Technical Lead
Provided remote and on-site IT technical support to large branch office for variety of hardware, platforms and software. Engaged in implementation of new mobile technologies and upgrades to the local area network and executive home residences. Managed service request tickets from end user population and ensured timely and accurate resolution and documentation in ticketing system.
2000 : 2004
IBM
Systems Integration Engineer
Skills
microsoft word, strategic planning, healthcare, social media, Leadership, data entry, public speaking, higher education, teaching, microsoft excel, time management, student affairs, community outreach, microsoft powerpoint, hp quicktest professional (qtp), software development life cycle (sdlc), shell scripting, scrum, red hat linux, vim, perl, net framework, nunit, selenium testing, junit, team foundation server (tfs), visual studio, c, Virtualization, VPN, Integration, Operating Systems, Computer Security, CISSP, ITIL, IT Management, Technical Support, Active Directory, Windows Server, Incident Management, Troubleshooting, VMware, IT Service Management, AIX, Unix, Cisco IOS configuration, Cyber-security, Agile Methodologies, network security, Technical Writing, networking, disaster recovery, business analysis, penetration testing, it strategy, system administration, computer hardware, Linux, Hardware
About
Attention all marketers and salespeople: before you hit 'send' or dial my number, please take note that my inbox and voicemail are sacred spaces reserved for only the most valuable and relevant communications. In other words, if you're not offering a unicorn or a pot of gold, don't bother. But if you still want to reach me, don't bother with the unsolicited emails or phone calls. Instead, take a hint from the old saying 'if you want something done right, do it yourself.' I'll be the one making the calls, thank you very much. #InitiativeTakersWelcome #NoColdCalls #NoSpam #QualityOverQuantity
Signed,
Courtesy of ChatGPT
----------------------------------------------------------------------------------------------------------------------
Experienced and vigilant information security professional possessing expertise with diverse technologies and security solutions throughout the enterprise. Highly experienced in leading and managing security programs, providing security consultation, implementing security controls and enforcing security policy compliance. Outstanding team leader with strong analytical and problem solving skills, capable of working independently or as part of a team. Excellent customer service skills in both verbal and written communication and ability to interact with technical and non-technical users.
Professional certifications include Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker V8 (CEH), Comptia Security+, Comptia Network+. Throughout my career colleagues and customers have consulted me as a trusted technical resource and complimented me for my outstanding technical comprehension.
As a cyber security professional I am committed to continuous learning in topics such as:
Ethical hacking ● Vulnerability and Threat Research ● Risk Analysis and Mitigation ● Forensics ● Penetration testing ● Information and Security compliance ● Linux ● Internet Of Things ● Cloud Computing
Specialties include: Agile Methodologies ● Information security ● Network, mobile and systems security ● Technical Documentation ● Team and Project Leadership ● Business Analysis ● End User Awareness Training ● Metrics and Report Generation ● Integration and Troubleshooting ● Technical support and research ● Implementing Security Policies and Compliance