Marcel Li
Details
• Co-Develop and Co-deliver workshops and executive briefings in the areas of Infrastructure Security, Identity Access Management, Governance, and Operations.
• Implement products and solutions for customers on-site and remote.
2019 : Present
InXech Corp
Information Security Engineer
• Work more than 200 hours within 3 months to deliver timely and effective technical assistance and support for incoming queries and issues related to computer systems, software, and hardware.
• Prioritize work orders and develop work schedules to facilitate quick resolutions with a minimal disruption to clients.
• Eager to learn new technology and make workflow recommendations and improve processes.
The Genius Squad is DePaul's premiere support center for all current students which provides free technical service and support for desktops, laptops, phones, tablets, and other personal electronic devices.
2015 : 2015
DePaul University
Genius Squad Specialist
• Monitoring the ticketing system for service requests and following up with the requester and provide first line troubleshooting for users.
• Provide feedback to the team and IT management when opportunities present themselves to better workflow and processes.
• Assist Cyber Security managers with maintaining the TRUCONNECT data security infrastructure for the highest availability to remote user connections, and strictly controlled only to authorized personnel.
TRUCONNECT Remote Monitoring collects data through a condition monitoring unit installed on the asset. The data is then transmitted via a modem to a datacenter. Data is stored in a secured location outside of Konecranes premises.
2010 : 2013
Konecranes
IT Support Specialist
About
Specialized in managing and implementing all facets of CVEs, policies, standards and directives. Excel at providing a comprehensive approach to information security that involves a thorough analysis of any risk, threat, attack, identified vulnerability, mitigation, remediation requirements, and compliancy measure. Well known for subject matter expertise in all facets of cyber security, threat analysis, malware forensics, end user services, automation initiatives, user management, risk assessment and user access control for enterprise environments.
• Possess good knowledge of the kill-chain and how it can be used to enhance cyber security practices.
• Possess good knowledge of TCP/IP troubleshooting, DMZ, ID/PS, and other commonly used network protocols.
• Possess an understanding of pen-testing tools, Burp Suite, Nmap, Metasploit, Wireshark, BeEF.
• Possess an understanding of security standards, NIST SP 800-30/53/57/133, OWASP Top 10, CWE 25.
• Demonstrate the ability to work within a diverse team and engage with internal and external stakeholders.
Display a passion for investigating new trends, techniques and technologies to inform leading edge products