SlideShare une entreprise Scribd logo
1  sur  3
HAYAT A Z I Z I
Email: hmazizi@msn.com
13532 Canada Goose Court
Clifton, Virginia 20124
(703) 628-2384
I N F O R M A T I O N T E C H N O L O G Y Q U A L I F I C A T I O N S
Established 17+ years of solid record: data system administration; technical & project planning support;
system analysis / reporting; major system security / maintenance, upgrading, implementation; resource
planning, utilization, and maximization; and overseeing directing projects to improve integrity/usefulness
of functional database systems. Experience leading projects from conceptual stages through
sustainment: major multi-site, multi-state hardware installation, upgrade, and system administration.
 Established myselfas a knowledge leader regardingdevelopingand integratingtechnologysolutions and
managingthese solutions for major companies.
 Extensive system in supportingthe development of securityplans.
 Experience in working with security vulnerabilitiesand mitigation.
 Successfully orchestratingresourcesto efficiently guide projects toward cost goals, completion deadlines,and
functionalityrequirements.
 Knowledge of Kerberos which authentication protocol works on the basis of 'tickets' to allow nodes communicating
over a non-secure network to prove their identity to one another in a secure manner.
 Strong and working knowledge of Java.
 Admin and working knowledge of VMware.
 Offer skills and abilities for accomplishing user/networkobjectivesfor implementing, expanding, and improving
integrityand usabilityof complex client/server base systems and internal software technical support.
 Demonstrated and provided leadership asan executive team member to:
- Separate realityfrom misinformation in termsof the IT opportunities.
- Substantiate feasibility, achievabilityand sustainabilityofIT projects and initiatives.
- Discuss 21st Centurytechnology pathsand long-term planningto provide a competitive advantage.
PROFESSIONAL EXPERIENCE
ManTech International Corporation, Fairfax,
VA…………………………………………………………………………………………….04/2015 –Present
System Administrator – SPS GTF – DoD PD2
 Support the DOD Standard Procurement System (SPS)
 Able to manage Active Directory
 Utilizingbest practice of Government SecurityRegulations
 Client maintenance –Responsible to maintain all client equipment within guideline ofthe environment to meet
mission objectives.
 Maintainingproceduresand requirementswhile evaluatingthese itemsand suggestingimprovementsor
modification of existingprocedures.
 Functional testingof all components, to include functional review, design reviews, and other test related
activities.
ASRCFederal, Sterling, VA………………………………………………………………………………………………………...….11/14 –02/15
System Analyst – Drug and Enforcement Administration - Department of Justice
 Knowledge of current enterprise technologies; such as virtualization, programming, web services, LDAP, PKI.
 Supported clients’tasks in the certificate registration and identity vettingprocess.
 Brought seven yearsof experience with certification and accreditation (C&A) to this effort.
 Provide Tier 3 client support
o Skilled in Checkpoint firewalls in supporting flexible and extensible securitysolutions.
o Familiaritywith Oracle Database 11G
SQL scripting
o Working/knowledge of Oracle Image and Process Management (IPM).
o Strong knowledge of WebLogic.
VERIZON BUSINESS, Ashburn, VA .............................................................................................................................5/09 – 10/2014
Network Security Engineer/Identity and Access Management Eng - Department of Homeland Security
(6/12-10/14)
 UtilizingTenable Nessus/vulnerabilityscanning (SecurityCenter)- NessusAgentsare lightweight programs
installed locally on a host –vulnerabilityEngineer Agentsreceive scanninginstructionsfrom a central Nessus
Manager server, perform scans locally and report vulnerability, compliance and system resultsback to the
central server.
 Enhanced the teamsKnowledge Management process by providing contributionsto current enterprise
technologies which included content to related topics: virtualization, programming, web services, LDAP, PKI –
technology capabilitiesenhancement, and overall IT securityand compliance for thisnational defense and
securityprovider.
 Abilityto complete assigned tasks with minimal supervision from Managements.
 Configuration and security policies, and monitoring system status while giving your employees access to corporate
applications on the devices that they choose.
 Utilizing Nagios formonitoring and reporting to ensure systems, applications and services processes are
functioning properly. In the event of a failure, Nagios can alert technical staff of the problem, allowing
them to begin remediation processes before outages affectbusiness processes, end-users, or customers.
 Providing Technical Support for a broad range of applicationsas theyintegrate with RSA for authentication.
 Remote Desktop, map network drives and so Hybrid Images, most customizations I had to apply post-deployment
using Group Policy or scripts to configure Windows Firewall, enable on.
 Working knowledge of Active Directory……..
 Experience usingMS Office applications to create reports from data (Excel, PowerPoint, and Word).
 Manage, maintain, and configure securitynetwork such as Firewalls, VP
 N devices, Logging Systems, Security Provisioning Systems.
 As a VulnerabilityManagement Analyst assistingother membersand managementswith the configuration and
operation of vulnerabilityscanningtools and createsreportingwhich communicatesthe resultsand
recommended remediation actions.As analyst use the security expertise todeliver accurate reportsin a
manner that can be understood by technical and none technical audience.
 Management of Red Hat Enterprise 5 and 6
 Installation, configuration and administration of Enterprise Linux and Unix Systems
 Build red hat VMs on Vcenter
 Strong working knowledge of two-way Authentication. Makingsure to provide end users inquiriesbytwo-way
authentication best practices.(Somethingyou have and somethingyou know).
 Making sure that users can securely access the applications they require with a single identity using any device.
 Knowledge of TCP/IPand other common networkingconcepts.
SSL Administrator / Identity and Access Management (5/09-6/12)
 Identityand Access management
 Very Strong and hands on PKI as part of the IDM management.
 Work closely to group charged with monitoring uptime and efficiency of production application
 Established a record of planning, team development and technical excellence in overseeinginformation
technology functions and buildingsecure infrastructure acrossmultiple ITdomains. Assisted in
administeringdatabase organizations,standards, controls, procedures, and documentation. Provided
thought-leadership towardsbuildinga secure infrastructure acrossmultiple ITdomains.
 Working knowledge of UNIXin order to find out the storage, usage, server up & down status and ect.
 Developed data extractionsand reportsfrom requests/ requirementsstated byclients; used database, report
writer, data mart, or specialized applicationsto generate reportsor analyses.
 Facilitated communication between technologyteamsand other departmentson issue statusand resolution.
 Documented customer interactionsin the ticketing system following policies, proceduresand processes and
follow up on everyreported issue.
 Leveraged myextensive knowledge of the Internet Domain name registration industryand the organizations
that shape the Internet industry.
 Limited knowledge of SAN (Storage Area Network) enterprise-level storage networkof several hard drives.
 Provided basictechnical consultation on current and proposed systemsto other organizations.
APPTIX LL, Herndon, VA ..................................................................................................................................................10/08 - 2/09
Application / Database Support Specialist
 Provided first level technical support and incident management for clientele's desktop technologiesand
internet presence.
 Responsible for receiving, enteringtroubleshooting, prioritizing, escalating, and updatingall incidents
involving hardware, software, applications, networkingor productson the IT standardslist.
 Resolved ITincidentsas appropriate; such first-call resolution minimized the impact and cost of IT Problemsto
the company and increasespersonal productivity for customers.
 Recognized for using superior problem solving, interpersonal and technical skills and the proven abilityto
research and solve complex technical problems.
 Developed an extensive experience with SharePoint, Intel-based desktop technologies and respondingto
customers’ inquiryin a timelymanner.
 Leveraged my knowledge of industrybest practicesfor e-mail privacyand regulatorycompliance, routing,
filtering, monitoring, tiered storage, backup, and disaster recovery.
 Served as company liaison on all customer support, software development, and Quality Assurance team issues.
Prior Positions: Application Analyst II QUADRA MED, Reston, VA
Application Engineer II ORCC, Chantilly, VA
Technical Web Support II NETWORK SOLUTIONS
Technical Support / Help Desk EXOSTAR
EDUCATION
NORTHERN VIRGINIA COMMUNITY COLLEGE, Manassas, VA
A.S. Cyber Security forthcoming 6/16
STRAYER UNIVERSITY, Newton, VA
B.S. Information Systems 9/07
NORTHERN VIRGINIA COMMUNITY COLLEGE, Annandale, VA
A.S. General Studies 6/93
Professional Certifications: ITIL Certification, Security+ Certification, Candidate for Network+ Certification &
Candidate for CEH and CISSP Certifications.
 Hardware/ Software & Technical Experience: Communication/Diagnostic Skills, Information Technology, VPN,
Technical/Help Desk Support, Microsoft Office, Nigos Monitoring System & Thruk Monitoring System, MS Exchange,
Microsoft Lync and ect.

Contenu connexe

Tendances

Satheesh.G_IDM
Satheesh.G_IDMSatheesh.G_IDM
Satheesh.G_IDMsatheesh64
 
A Pragmatic Approach to Identity and Access Management
A Pragmatic Approach to Identity and Access ManagementA Pragmatic Approach to Identity and Access Management
A Pragmatic Approach to Identity and Access Managementhankgruenberg
 
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerProlifics
 
Prasanna Prabhu CV Aprili
Prasanna Prabhu CV ApriliPrasanna Prabhu CV Aprili
Prasanna Prabhu CV ApriliPrasanna Prabhu
 
Shakil_SAP_Security resume
Shakil_SAP_Security resumeShakil_SAP_Security resume
Shakil_SAP_Security resumeSHAKIL TIRMIZI
 
TP Security CV
TP Security CVTP Security CV
TP Security CVvtprasad
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introductionwardell henley
 
Identity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingIdentity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingJohn Bauer
 
Robert donald resume iam 1
Robert donald resume iam 1Robert donald resume iam 1
Robert donald resume iam 1Robert Donald
 
2004 10 21 Rbac At Mazda Horst Walther
2004 10 21 Rbac At Mazda Horst Walther2004 10 21 Rbac At Mazda Horst Walther
2004 10 21 Rbac At Mazda Horst WaltherCardinaleWay Mazda
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsAlain Huet
 
IT Global Certification
IT Global CertificationIT Global Certification
IT Global CertificationSuresh Patel
 

Tendances (20)

Arun Kumar Resume
Arun Kumar ResumeArun Kumar Resume
Arun Kumar Resume
 
Saipraveen_Cirrculum_Vitae
Saipraveen_Cirrculum_VitaeSaipraveen_Cirrculum_Vitae
Saipraveen_Cirrculum_Vitae
 
Dinesh Chandra CV
Dinesh Chandra CVDinesh Chandra CV
Dinesh Chandra CV
 
Deepak_Sharma
Deepak_SharmaDeepak_Sharma
Deepak_Sharma
 
Satheesh.G_IDM
Satheesh.G_IDMSatheesh.G_IDM
Satheesh.G_IDM
 
A Pragmatic Approach to Identity and Access Management
A Pragmatic Approach to Identity and Access ManagementA Pragmatic Approach to Identity and Access Management
A Pragmatic Approach to Identity and Access Management
 
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
 
George_Thomas Varghese_Resume_2016
George_Thomas Varghese_Resume_2016George_Thomas Varghese_Resume_2016
George_Thomas Varghese_Resume_2016
 
sdonellan2016
sdonellan2016sdonellan2016
sdonellan2016
 
Prasanna Prabhu CV Aprili
Prasanna Prabhu CV ApriliPrasanna Prabhu CV Aprili
Prasanna Prabhu CV Aprili
 
Shakil_SAP_Security resume
Shakil_SAP_Security resumeShakil_SAP_Security resume
Shakil_SAP_Security resume
 
TP Security CV
TP Security CVTP Security CV
TP Security CV
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
 
Identity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingIdentity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud Computing
 
Robert donald resume iam 1
Robert donald resume iam 1Robert donald resume iam 1
Robert donald resume iam 1
 
CV_ViralMewada
CV_ViralMewadaCV_ViralMewada
CV_ViralMewada
 
2004 10 21 Rbac At Mazda Horst Walther
2004 10 21 Rbac At Mazda Horst Walther2004 10 21 Rbac At Mazda Horst Walther
2004 10 21 Rbac At Mazda Horst Walther
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling concepts
 
BAKKIYA_4YR
BAKKIYA_4YRBAKKIYA_4YR
BAKKIYA_4YR
 
IT Global Certification
IT Global CertificationIT Global Certification
IT Global Certification
 

Similaire à Hayat resume 1

Similaire à Hayat resume 1 (20)

Hayat Resume-1
Hayat Resume-1Hayat Resume-1
Hayat Resume-1
 
628577
628577628577
628577
 
Gregory yee _resume
Gregory yee _resumeGregory yee _resume
Gregory yee _resume
 
Shawn McKennon
Shawn McKennonShawn McKennon
Shawn McKennon
 
Torben Verdich Condensed TS-SCI
Torben Verdich Condensed TS-SCITorben Verdich Condensed TS-SCI
Torben Verdich Condensed TS-SCI
 
Torben Verdich Resume TS-SCI
Torben Verdich Resume TS-SCITorben Verdich Resume TS-SCI
Torben Verdich Resume TS-SCI
 
_RESUME_
_RESUME__RESUME_
_RESUME_
 
Syed Siraj - Telecom_Infrastructure Manager
Syed Siraj - Telecom_Infrastructure ManagerSyed Siraj - Telecom_Infrastructure Manager
Syed Siraj - Telecom_Infrastructure Manager
 
Christian baki resume
Christian baki resumeChristian baki resume
Christian baki resume
 
Jesse Hinton Resume
Jesse Hinton ResumeJesse Hinton Resume
Jesse Hinton Resume
 
Resume-Mandar
Resume-MandarResume-Mandar
Resume-Mandar
 
Resume Juan Torres PR
Resume Juan Torres PRResume Juan Torres PR
Resume Juan Torres PR
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoring
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoring
 
Amit Chaubey
Amit ChaubeyAmit Chaubey
Amit Chaubey
 
Ganesh cv
Ganesh cvGanesh cv
Ganesh cv
 
ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
 
MGomez_Resume_2016-17
MGomez_Resume_2016-17MGomez_Resume_2016-17
MGomez_Resume_2016-17
 
Ilyasuddin_Sayed
Ilyasuddin_SayedIlyasuddin_Sayed
Ilyasuddin_Sayed
 
Richard Warmack
Richard WarmackRichard Warmack
Richard Warmack
 

Dernier

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Dernier (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

Hayat resume 1

  • 1. HAYAT A Z I Z I Email: hmazizi@msn.com 13532 Canada Goose Court Clifton, Virginia 20124 (703) 628-2384 I N F O R M A T I O N T E C H N O L O G Y Q U A L I F I C A T I O N S Established 17+ years of solid record: data system administration; technical & project planning support; system analysis / reporting; major system security / maintenance, upgrading, implementation; resource planning, utilization, and maximization; and overseeing directing projects to improve integrity/usefulness of functional database systems. Experience leading projects from conceptual stages through sustainment: major multi-site, multi-state hardware installation, upgrade, and system administration.  Established myselfas a knowledge leader regardingdevelopingand integratingtechnologysolutions and managingthese solutions for major companies.  Extensive system in supportingthe development of securityplans.  Experience in working with security vulnerabilitiesand mitigation.  Successfully orchestratingresourcesto efficiently guide projects toward cost goals, completion deadlines,and functionalityrequirements.  Knowledge of Kerberos which authentication protocol works on the basis of 'tickets' to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.  Strong and working knowledge of Java.  Admin and working knowledge of VMware.  Offer skills and abilities for accomplishing user/networkobjectivesfor implementing, expanding, and improving integrityand usabilityof complex client/server base systems and internal software technical support.  Demonstrated and provided leadership asan executive team member to: - Separate realityfrom misinformation in termsof the IT opportunities. - Substantiate feasibility, achievabilityand sustainabilityofIT projects and initiatives. - Discuss 21st Centurytechnology pathsand long-term planningto provide a competitive advantage. PROFESSIONAL EXPERIENCE ManTech International Corporation, Fairfax, VA…………………………………………………………………………………………….04/2015 –Present System Administrator – SPS GTF – DoD PD2  Support the DOD Standard Procurement System (SPS)  Able to manage Active Directory  Utilizingbest practice of Government SecurityRegulations  Client maintenance –Responsible to maintain all client equipment within guideline ofthe environment to meet mission objectives.  Maintainingproceduresand requirementswhile evaluatingthese itemsand suggestingimprovementsor modification of existingprocedures.  Functional testingof all components, to include functional review, design reviews, and other test related activities. ASRCFederal, Sterling, VA………………………………………………………………………………………………………...….11/14 –02/15 System Analyst – Drug and Enforcement Administration - Department of Justice  Knowledge of current enterprise technologies; such as virtualization, programming, web services, LDAP, PKI.  Supported clients’tasks in the certificate registration and identity vettingprocess.  Brought seven yearsof experience with certification and accreditation (C&A) to this effort.  Provide Tier 3 client support o Skilled in Checkpoint firewalls in supporting flexible and extensible securitysolutions. o Familiaritywith Oracle Database 11G SQL scripting o Working/knowledge of Oracle Image and Process Management (IPM). o Strong knowledge of WebLogic. VERIZON BUSINESS, Ashburn, VA .............................................................................................................................5/09 – 10/2014
  • 2. Network Security Engineer/Identity and Access Management Eng - Department of Homeland Security (6/12-10/14)  UtilizingTenable Nessus/vulnerabilityscanning (SecurityCenter)- NessusAgentsare lightweight programs installed locally on a host –vulnerabilityEngineer Agentsreceive scanninginstructionsfrom a central Nessus Manager server, perform scans locally and report vulnerability, compliance and system resultsback to the central server.  Enhanced the teamsKnowledge Management process by providing contributionsto current enterprise technologies which included content to related topics: virtualization, programming, web services, LDAP, PKI – technology capabilitiesenhancement, and overall IT securityand compliance for thisnational defense and securityprovider.  Abilityto complete assigned tasks with minimal supervision from Managements.  Configuration and security policies, and monitoring system status while giving your employees access to corporate applications on the devices that they choose.  Utilizing Nagios formonitoring and reporting to ensure systems, applications and services processes are functioning properly. In the event of a failure, Nagios can alert technical staff of the problem, allowing them to begin remediation processes before outages affectbusiness processes, end-users, or customers.  Providing Technical Support for a broad range of applicationsas theyintegrate with RSA for authentication.  Remote Desktop, map network drives and so Hybrid Images, most customizations I had to apply post-deployment using Group Policy or scripts to configure Windows Firewall, enable on.  Working knowledge of Active Directory……..  Experience usingMS Office applications to create reports from data (Excel, PowerPoint, and Word).  Manage, maintain, and configure securitynetwork such as Firewalls, VP  N devices, Logging Systems, Security Provisioning Systems.  As a VulnerabilityManagement Analyst assistingother membersand managementswith the configuration and operation of vulnerabilityscanningtools and createsreportingwhich communicatesthe resultsand recommended remediation actions.As analyst use the security expertise todeliver accurate reportsin a manner that can be understood by technical and none technical audience.  Management of Red Hat Enterprise 5 and 6  Installation, configuration and administration of Enterprise Linux and Unix Systems  Build red hat VMs on Vcenter  Strong working knowledge of two-way Authentication. Makingsure to provide end users inquiriesbytwo-way authentication best practices.(Somethingyou have and somethingyou know).  Making sure that users can securely access the applications they require with a single identity using any device.  Knowledge of TCP/IPand other common networkingconcepts. SSL Administrator / Identity and Access Management (5/09-6/12)  Identityand Access management  Very Strong and hands on PKI as part of the IDM management.  Work closely to group charged with monitoring uptime and efficiency of production application  Established a record of planning, team development and technical excellence in overseeinginformation technology functions and buildingsecure infrastructure acrossmultiple ITdomains. Assisted in administeringdatabase organizations,standards, controls, procedures, and documentation. Provided thought-leadership towardsbuildinga secure infrastructure acrossmultiple ITdomains.  Working knowledge of UNIXin order to find out the storage, usage, server up & down status and ect.  Developed data extractionsand reportsfrom requests/ requirementsstated byclients; used database, report writer, data mart, or specialized applicationsto generate reportsor analyses.  Facilitated communication between technologyteamsand other departmentson issue statusand resolution.  Documented customer interactionsin the ticketing system following policies, proceduresand processes and follow up on everyreported issue.  Leveraged myextensive knowledge of the Internet Domain name registration industryand the organizations that shape the Internet industry.  Limited knowledge of SAN (Storage Area Network) enterprise-level storage networkof several hard drives.  Provided basictechnical consultation on current and proposed systemsto other organizations. APPTIX LL, Herndon, VA ..................................................................................................................................................10/08 - 2/09 Application / Database Support Specialist  Provided first level technical support and incident management for clientele's desktop technologiesand internet presence.  Responsible for receiving, enteringtroubleshooting, prioritizing, escalating, and updatingall incidents involving hardware, software, applications, networkingor productson the IT standardslist.  Resolved ITincidentsas appropriate; such first-call resolution minimized the impact and cost of IT Problemsto the company and increasespersonal productivity for customers.
  • 3.  Recognized for using superior problem solving, interpersonal and technical skills and the proven abilityto research and solve complex technical problems.  Developed an extensive experience with SharePoint, Intel-based desktop technologies and respondingto customers’ inquiryin a timelymanner.  Leveraged my knowledge of industrybest practicesfor e-mail privacyand regulatorycompliance, routing, filtering, monitoring, tiered storage, backup, and disaster recovery.  Served as company liaison on all customer support, software development, and Quality Assurance team issues. Prior Positions: Application Analyst II QUADRA MED, Reston, VA Application Engineer II ORCC, Chantilly, VA Technical Web Support II NETWORK SOLUTIONS Technical Support / Help Desk EXOSTAR EDUCATION NORTHERN VIRGINIA COMMUNITY COLLEGE, Manassas, VA A.S. Cyber Security forthcoming 6/16 STRAYER UNIVERSITY, Newton, VA B.S. Information Systems 9/07 NORTHERN VIRGINIA COMMUNITY COLLEGE, Annandale, VA A.S. General Studies 6/93 Professional Certifications: ITIL Certification, Security+ Certification, Candidate for Network+ Certification & Candidate for CEH and CISSP Certifications.  Hardware/ Software & Technical Experience: Communication/Diagnostic Skills, Information Technology, VPN, Technical/Help Desk Support, Microsoft Office, Nigos Monitoring System & Thruk Monitoring System, MS Exchange, Microsoft Lync and ect.