More Related Content
Similar to Specific devices and used applications (20)
Specific devices and used applications
- 1. Specificdevicesandusedapplications:
- CiscoASA and PIXFirewalls - Advancedsetup,configurationandadministration;
- CiscoRouters - Advancedconfiguration(VPN,IPSLA,TACACS+Auth,Multi AreaOSPF,etc);
- CiscoCatalystSwitches - Advancedconfiguration(VLANs,IEEE802.1x Auth);
- CiscoIPS - Configurationandadministration; - MicrosoftWindows2000, 2003, 2008 Servers
Installationandadministrationof Active Directory,GPO,MicrosoftCertificationAuthority,IIS,DNS;
- ProxyserversonLinux - Installation,configurationandadministration(Squid,Dansguardian);
- NetworkSecurity - Monitoringzerodayandothervulnerabilities,creatingPCIDSSreportand
removal of potential vulnerabilities;
- WebapplicationFirewalls - ConfigurationandAdministration;
- Site toSite,Remote AccessVPN ConfigurationonCiscoRoutersandCiscoFirewalls;
- SyslogServers - Installation,configurationandadministration;
- Zenoss - SNMP & WMI monitoringsolution- Installation,configurationandadministration;
- OTRS TicketingSoftware - administration;
- VmWare ESX serversandVirtualization - Installation,configurationandadministration;
- PenetrationTestingof the entire LAN - Detectingandremoval of Vulnerabilities,GeneratingPCI-DSS
compliantReport;
- PCI-DSSProcedures; - ISO27000 Procedures;
- CiscoASDM(Adaptive SecurityDevice Manager);
- WorkingwithаccesslistsandNAT (NetworkAddressTranslation);
- IssuingcertificatesforVPN connectionsforcomputersinthe network;
- MicrosoftWindowsServer2003 and2012;
- workingwithRemote DesktopConnectionandVNC;
- usingWindowsServerUpdate Services(WSUS) forupdate distributionissuedforWindows
productsfor the company’scomputers;
- continuousupdatingof the Linux serversinthe company;
- workingwithGFIEventsManager onthe Syslogserverforcollectingvariousdatalogs,monitoring,
archiving,managingandmakingspecial datalogreports;
- workingwithZenossplatformfor surveillance of availability,configurationandperformancesof the
networkdevices,plusnotificationsaboutundesirable events;
- ACS(AccessControl Server);
- SymantecEndpointProtectionManager;
- ThreatSentry;
- 2. - IBOConsole;
- FileZilla;
- makinga routine reportaboutthe file integrityinthe systems,mostcurrentsoftware securityrisks
and dailymonitoringof networkdevices;