SlideShare a Scribd company logo
1 of 3
HAYAT A Z I Z I
Email: hmazizi@msn.com
13532 Canada Goose Court
Clifton, Virginia 20124
(703) 628-2384
I N F O R M A T I O N T E C H N O L O G Y Q U A L I F I C A T I O N S
Established 17+ years of solid record: data system administration; technical & project planning support;
system analysis / reporting; major system security / maintenance, upgrading, implementation; resource
planning, utilization, and maximization; and overseeing directing projects to improve integrity/usefulness
of functional database systems. Experience leading projects from conceptual stages through
sustainment: major multi-site, multi-state hardware installation, upgrade, and system administration.
ď‚· Established myselfas a knowledge leader regardingdevelopingand integratingtechnologysolutions and
managingthese solutions for major companies.
ď‚· Extensive system in supportingthe development of securityplans.
ď‚· Experience in working with security vulnerabilitiesand mitigation.
ď‚· Successfully orchestratingresourcesto efficiently guide projects toward cost goals, completion deadlines,and
functionalityrequirements.
ď‚· Knowledge of Kerberos which authentication protocol works on the basis of 'tickets' to allow nodes communicating
over a non-secure network to prove their identity to one another in a secure manner.
ď‚· Strong and working knowledge of Java.
ď‚· Admin and working knowledge of VMware.
ď‚· Offer skills and abilities for accomplishing user/networkobjectivesfor implementing, expanding, and improving
integrityand usabilityof complex client/server base systems and internal software technical support.
ď‚· Demonstrated and provided leadership asan executive team member to:
- Separate realityfrom misinformation in termsof the IT opportunities.
- Substantiate feasibility, achievabilityand sustainabilityofIT projects and initiatives.
- Discuss 21st Centurytechnology pathsand long-term planningto provide a competitive advantage.
PROFESSIONAL EXPERIENCE
ManTech International Corporation, Fairfax,
VA…………………………………………………………………………………………….04/2015 –Present
System Administrator – SPS GTF – DoD PD2
ď‚· Support the DOD Standard Procurement System (SPS)
ď‚· Able to manage Active Directory
ď‚· Utilizingbest practice of Government SecurityRegulations
 Client maintenance –Responsible to maintain all client equipment within guideline ofthe environment to meet
mission objectives.
ď‚· Maintainingproceduresand requirementswhile evaluatingthese itemsand suggestingimprovementsor
modification of existingprocedures.
ď‚· Functional testingof all components, to include functional review, design reviews, and other test related
activities.
ASRCFederal, Sterling, VA………………………………………………………………………………………………………...….11/14 –02/15
System Analyst – Drug and Enforcement Administration - Department of Justice
ď‚· Knowledge of current enterprise technologies; such as virtualization, programming, web services, LDAP, PKI.
 Supported clients’tasks in the certificate registration and identity vettingprocess.
ď‚· Brought seven yearsof experience with certification and accreditation (C&A) to this effort.
ď‚· Provide Tier 3 client support
o Skilled in Checkpoint firewalls in supporting flexible and extensible securitysolutions.
o Familiaritywith Oracle Database 11G
SQL scripting
o Working/knowledge of Oracle Image and Process Management (IPM).
o Strong knowledge of WebLogic.
VERIZON BUSINESS, Ashburn, VA .............................................................................................................................5/09 – 10/2014
Network Security Engineer/Identity and Access Management Eng - Department of Homeland Security
(6/12-10/14)
ď‚· UtilizingTenable Nessus/vulnerabilityscanning (SecurityCenter)- NessusAgentsare lightweight programs
installed locally on a host –vulnerabilityEngineer Agentsreceive scanninginstructionsfrom a central Nessus
Manager server, perform scans locally and report vulnerability, compliance and system resultsback to the
central server.
ď‚· Enhanced the teamsKnowledge Management process by providing contributionsto current enterprise
technologies which included content to related topics: virtualization, programming, web services, LDAP, PKI –
technology capabilitiesenhancement, and overall IT securityand compliance for thisnational defense and
securityprovider.
ď‚· Abilityto complete assigned tasks with minimal supervision from Managements.
ď‚· Configuration and security policies, and monitoring system status while giving your employees access to corporate
applications on the devices that they choose.
ď‚· Utilizing Nagios formonitoring and reporting to ensure systems, applications and services processes are
functioning properly. In the event of a failure, Nagios can alert technical staff of the problem, allowing
them to begin remediation processes before outages affectbusiness processes, end-users, or customers.
ď‚· Providing Technical Support for a broad range of applicationsas theyintegrate with RSA for authentication.
ď‚· Remote Desktop, map network drives and so Hybrid Images, most customizations I had to apply post-deployment
using Group Policy or scripts to configure Windows Firewall, enable on.
 Working knowledge of Active Directory……..
ď‚· Experience usingMS Office applications to create reports from data (Excel, PowerPoint, and Word).
ď‚· Manage, maintain, and configure securitynetwork such as Firewalls, VP
ď‚· N devices, Logging Systems, Security Provisioning Systems.
ď‚· As a VulnerabilityManagement Analyst assistingother membersand managementswith the configuration and
operation of vulnerabilityscanningtools and createsreportingwhich communicatesthe resultsand
recommended remediation actions.As analyst use the security expertise todeliver accurate reportsin a
manner that can be understood by technical and none technical audience.
ď‚· Management of Red Hat Enterprise 5 and 6
ď‚· Installation, configuration and administration of Enterprise Linux and Unix Systems
ď‚· Build red hat VMs on Vcenter
ď‚· Strong working knowledge of two-way Authentication. Makingsure to provide end users inquiriesbytwo-way
authentication best practices.(Somethingyou have and somethingyou know).
ď‚· Making sure that users can securely access the applications they require with a single identity using any device.
ď‚· Knowledge of TCP/IPand other common networkingconcepts.
SSL Administrator / Identity and Access Management (5/09-6/12)
ď‚· Identityand Access management
ď‚· Very Strong and hands on PKI as part of the IDM management.
ď‚· Work closely to group charged with monitoring uptime and efficiency of production application
ď‚· Established a record of planning, team development and technical excellence in overseeinginformation
technology functions and buildingsecure infrastructure acrossmultiple ITdomains. Assisted in
administeringdatabase organizations,standards, controls, procedures, and documentation. Provided
thought-leadership towardsbuildinga secure infrastructure acrossmultiple ITdomains.
ď‚· Working knowledge of UNIXin order to find out the storage, usage, server up & down status and ect.
ď‚· Developed data extractionsand reportsfrom requests/ requirementsstated byclients; used database, report
writer, data mart, or specialized applicationsto generate reportsor analyses.
ď‚· Facilitated communication between technologyteamsand other departmentson issue statusand resolution.
ď‚· Documented customer interactionsin the ticketing system following policies, proceduresand processes and
follow up on everyreported issue.
ď‚· Leveraged myextensive knowledge of the Internet Domain name registration industryand the organizations
that shape the Internet industry.
ď‚· Limited knowledge of SAN (Storage Area Network) enterprise-level storage networkof several hard drives.
ď‚· Provided basictechnical consultation on current and proposed systemsto other organizations.
APPTIX LL, Herndon, VA ..................................................................................................................................................10/08 - 2/09
Application / Database Support Specialist
ď‚· Provided first level technical support and incident management for clientele's desktop technologiesand
internet presence.
ď‚· Responsible for receiving, enteringtroubleshooting, prioritizing, escalating, and updatingall incidents
involving hardware, software, applications, networkingor productson the IT standardslist.
ď‚· Resolved ITincidentsas appropriate; such first-call resolution minimized the impact and cost of IT Problemsto
the company and increasespersonal productivity for customers.
ď‚· Recognized for using superior problem solving, interpersonal and technical skills and the proven abilityto
research and solve complex technical problems.
ď‚· Developed an extensive experience with SharePoint, Intel-based desktop technologies and respondingto
customers’ inquiryin a timelymanner.
ď‚· Leveraged my knowledge of industrybest practicesfor e-mail privacyand regulatorycompliance, routing,
filtering, monitoring, tiered storage, backup, and disaster recovery.
ď‚· Served as company liaison on all customer support, software development, and Quality Assurance team issues.
Prior Positions: Application Analyst II QUADRA MED, Reston, VA
Application Engineer II ORCC, Chantilly, VA
Technical Web Support II NETWORK SOLUTIONS
Technical Support / Help Desk EXOSTAR
EDUCATION
NORTHERN VIRGINIA COMMUNITY COLLEGE, Manassas, VA
A.S. Cyber Security forthcoming 6/16
STRAYER UNIVERSITY, Newton, VA
B.S. Information Systems 9/07
NORTHERN VIRGINIA COMMUNITY COLLEGE, Annandale, VA
A.S. General Studies 6/93
Professional Certifications: ITIL Certification, Security+ Certification, Candidate for Network+ Certification &
Candidate for CEH and CISSP Certifications.
ď‚· Hardware/ Software & Technical Experience: Communication/Diagnostic Skills, Information Technology, VPN,
Technical/Help Desk Support, Microsoft Office, Nigos Monitoring System & Thruk Monitoring System, MS Exchange,
Microsoft Lync and ect.

More Related Content

What's hot

Arun Kumar Resume
Arun Kumar ResumeArun Kumar Resume
Arun Kumar ResumeArun Kumar C B
 
Dinesh Chandra CV
Dinesh Chandra CVDinesh Chandra CV
Dinesh Chandra CVDinesh Chandra
 
Satheesh.G_IDM
Satheesh.G_IDMSatheesh.G_IDM
Satheesh.G_IDMsatheesh64
 
A Pragmatic Approach to Identity and Access Management
A Pragmatic Approach to Identity and Access ManagementA Pragmatic Approach to Identity and Access Management
A Pragmatic Approach to Identity and Access Managementhankgruenberg
 
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerProlifics
 
George_Thomas Varghese_Resume_2016
George_Thomas Varghese_Resume_2016George_Thomas Varghese_Resume_2016
George_Thomas Varghese_Resume_2016George Thomas Varghese
 
Prasanna Prabhu CV Aprili
Prasanna Prabhu CV ApriliPrasanna Prabhu CV Aprili
Prasanna Prabhu CV ApriliPrasanna Prabhu
 
Shakil_SAP_Security resume
Shakil_SAP_Security resumeShakil_SAP_Security resume
Shakil_SAP_Security resumeSHAKIL TIRMIZI
 
TP Security CV
TP Security CVTP Security CV
TP Security CVvtprasad
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introductionwardell henley
 
Identity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingIdentity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingJohn Bauer
 
Robert donald resume iam 1
Robert donald resume iam 1Robert donald resume iam 1
Robert donald resume iam 1Robert Donald
 
CV_ViralMewada
CV_ViralMewadaCV_ViralMewada
CV_ViralMewadaViral Mewada
 
2004 10 21 Rbac At Mazda Horst Walther
2004 10 21 Rbac At Mazda Horst Walther2004 10 21 Rbac At Mazda Horst Walther
2004 10 21 Rbac At Mazda Horst WaltherCardinaleWay Mazda
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsAlain Huet
 
IT Global Certification
IT Global CertificationIT Global Certification
IT Global CertificationSuresh Patel
 

What's hot (20)

Arun Kumar Resume
Arun Kumar ResumeArun Kumar Resume
Arun Kumar Resume
 
Saipraveen_Cirrculum_Vitae
Saipraveen_Cirrculum_VitaeSaipraveen_Cirrculum_Vitae
Saipraveen_Cirrculum_Vitae
 
Dinesh Chandra CV
Dinesh Chandra CVDinesh Chandra CV
Dinesh Chandra CV
 
Deepak_Sharma
Deepak_SharmaDeepak_Sharma
Deepak_Sharma
 
Satheesh.G_IDM
Satheesh.G_IDMSatheesh.G_IDM
Satheesh.G_IDM
 
A Pragmatic Approach to Identity and Access Management
A Pragmatic Approach to Identity and Access ManagementA Pragmatic Approach to Identity and Access Management
A Pragmatic Approach to Identity and Access Management
 
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
 
George_Thomas Varghese_Resume_2016
George_Thomas Varghese_Resume_2016George_Thomas Varghese_Resume_2016
George_Thomas Varghese_Resume_2016
 
sdonellan2016
sdonellan2016sdonellan2016
sdonellan2016
 
Prasanna Prabhu CV Aprili
Prasanna Prabhu CV ApriliPrasanna Prabhu CV Aprili
Prasanna Prabhu CV Aprili
 
Shakil_SAP_Security resume
Shakil_SAP_Security resumeShakil_SAP_Security resume
Shakil_SAP_Security resume
 
TP Security CV
TP Security CVTP Security CV
TP Security CV
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
 
Identity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingIdentity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud Computing
 
Robert donald resume iam 1
Robert donald resume iam 1Robert donald resume iam 1
Robert donald resume iam 1
 
CV_ViralMewada
CV_ViralMewadaCV_ViralMewada
CV_ViralMewada
 
2004 10 21 Rbac At Mazda Horst Walther
2004 10 21 Rbac At Mazda Horst Walther2004 10 21 Rbac At Mazda Horst Walther
2004 10 21 Rbac At Mazda Horst Walther
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling concepts
 
BAKKIYA_4YR
BAKKIYA_4YRBAKKIYA_4YR
BAKKIYA_4YR
 
IT Global Certification
IT Global CertificationIT Global Certification
IT Global Certification
 

Similar to Hayat resume 1

Hayat Resume-1
Hayat Resume-1Hayat Resume-1
Hayat Resume-1Hayat Azizi
 
Gregory yee _resume
Gregory yee _resumeGregory yee _resume
Gregory yee _resumeGreg Yee
 
Torben Verdich Condensed TS-SCI
Torben Verdich Condensed TS-SCITorben Verdich Condensed TS-SCI
Torben Verdich Condensed TS-SCITorben Verdich, MCITP
 
Syed Siraj - Telecom_Infrastructure Manager
Syed Siraj - Telecom_Infrastructure ManagerSyed Siraj - Telecom_Infrastructure Manager
Syed Siraj - Telecom_Infrastructure ManagerSiraj Syed
 
Christian baki resume
Christian baki resumeChristian baki resume
Christian baki resumeChristian Baki
 
Jesse Hinton Resume
Jesse Hinton ResumeJesse Hinton Resume
Jesse Hinton ResumeJesse Hinton
 
Resume Juan Torres PR
Resume Juan Torres PRResume Juan Torres PR
Resume Juan Torres PRJuan Morales
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoringTony Kenny
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoringTony Kenny
 
Amit Chaubey
Amit ChaubeyAmit Chaubey
Amit ChaubeyAmit Chaubey
 
MGomez_Resume_2016-17
MGomez_Resume_2016-17MGomez_Resume_2016-17
MGomez_Resume_2016-17Miguel Gomez
 

Similar to Hayat resume 1 (20)

Hayat Resume-1
Hayat Resume-1Hayat Resume-1
Hayat Resume-1
 
628577
628577628577
628577
 
Gregory yee _resume
Gregory yee _resumeGregory yee _resume
Gregory yee _resume
 
Shawn McKennon
Shawn McKennonShawn McKennon
Shawn McKennon
 
Torben Verdich Condensed TS-SCI
Torben Verdich Condensed TS-SCITorben Verdich Condensed TS-SCI
Torben Verdich Condensed TS-SCI
 
Torben Verdich Resume TS-SCI
Torben Verdich Resume TS-SCITorben Verdich Resume TS-SCI
Torben Verdich Resume TS-SCI
 
_RESUME_
_RESUME__RESUME_
_RESUME_
 
Syed Siraj - Telecom_Infrastructure Manager
Syed Siraj - Telecom_Infrastructure ManagerSyed Siraj - Telecom_Infrastructure Manager
Syed Siraj - Telecom_Infrastructure Manager
 
Christian baki resume
Christian baki resumeChristian baki resume
Christian baki resume
 
Jesse Hinton Resume
Jesse Hinton ResumeJesse Hinton Resume
Jesse Hinton Resume
 
Resume-Mandar
Resume-MandarResume-Mandar
Resume-Mandar
 
Resume Juan Torres PR
Resume Juan Torres PRResume Juan Torres PR
Resume Juan Torres PR
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoring
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoring
 
Amit Chaubey
Amit ChaubeyAmit Chaubey
Amit Chaubey
 
Ganesh cv
Ganesh cvGanesh cv
Ganesh cv
 
ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
 
MGomez_Resume_2016-17
MGomez_Resume_2016-17MGomez_Resume_2016-17
MGomez_Resume_2016-17
 
Ilyasuddin_Sayed
Ilyasuddin_SayedIlyasuddin_Sayed
Ilyasuddin_Sayed
 
Richard Warmack
Richard WarmackRichard Warmack
Richard Warmack
 

Recently uploaded

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo GarcĂ­a Lavilla
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Recently uploaded (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Hayat resume 1

  • 1. HAYAT A Z I Z I Email: hmazizi@msn.com 13532 Canada Goose Court Clifton, Virginia 20124 (703) 628-2384 I N F O R M A T I O N T E C H N O L O G Y Q U A L I F I C A T I O N S Established 17+ years of solid record: data system administration; technical & project planning support; system analysis / reporting; major system security / maintenance, upgrading, implementation; resource planning, utilization, and maximization; and overseeing directing projects to improve integrity/usefulness of functional database systems. Experience leading projects from conceptual stages through sustainment: major multi-site, multi-state hardware installation, upgrade, and system administration. ď‚· Established myselfas a knowledge leader regardingdevelopingand integratingtechnologysolutions and managingthese solutions for major companies. ď‚· Extensive system in supportingthe development of securityplans. ď‚· Experience in working with security vulnerabilitiesand mitigation. ď‚· Successfully orchestratingresourcesto efficiently guide projects toward cost goals, completion deadlines,and functionalityrequirements. ď‚· Knowledge of Kerberos which authentication protocol works on the basis of 'tickets' to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. ď‚· Strong and working knowledge of Java. ď‚· Admin and working knowledge of VMware. ď‚· Offer skills and abilities for accomplishing user/networkobjectivesfor implementing, expanding, and improving integrityand usabilityof complex client/server base systems and internal software technical support. ď‚· Demonstrated and provided leadership asan executive team member to: - Separate realityfrom misinformation in termsof the IT opportunities. - Substantiate feasibility, achievabilityand sustainabilityofIT projects and initiatives. - Discuss 21st Centurytechnology pathsand long-term planningto provide a competitive advantage. PROFESSIONAL EXPERIENCE ManTech International Corporation, Fairfax, VA…………………………………………………………………………………………….04/2015 –Present System Administrator – SPS GTF – DoD PD2 ď‚· Support the DOD Standard Procurement System (SPS) ď‚· Able to manage Active Directory ď‚· Utilizingbest practice of Government SecurityRegulations ď‚· Client maintenance –Responsible to maintain all client equipment within guideline ofthe environment to meet mission objectives. ď‚· Maintainingproceduresand requirementswhile evaluatingthese itemsand suggestingimprovementsor modification of existingprocedures. ď‚· Functional testingof all components, to include functional review, design reviews, and other test related activities. ASRCFederal, Sterling, VA………………………………………………………………………………………………………...….11/14 –02/15 System Analyst – Drug and Enforcement Administration - Department of Justice ď‚· Knowledge of current enterprise technologies; such as virtualization, programming, web services, LDAP, PKI. ď‚· Supported clients’tasks in the certificate registration and identity vettingprocess. ď‚· Brought seven yearsof experience with certification and accreditation (C&A) to this effort. ď‚· Provide Tier 3 client support o Skilled in Checkpoint firewalls in supporting flexible and extensible securitysolutions. o Familiaritywith Oracle Database 11G SQL scripting o Working/knowledge of Oracle Image and Process Management (IPM). o Strong knowledge of WebLogic. VERIZON BUSINESS, Ashburn, VA .............................................................................................................................5/09 – 10/2014
  • 2. Network Security Engineer/Identity and Access Management Eng - Department of Homeland Security (6/12-10/14) ď‚· UtilizingTenable Nessus/vulnerabilityscanning (SecurityCenter)- NessusAgentsare lightweight programs installed locally on a host –vulnerabilityEngineer Agentsreceive scanninginstructionsfrom a central Nessus Manager server, perform scans locally and report vulnerability, compliance and system resultsback to the central server. ď‚· Enhanced the teamsKnowledge Management process by providing contributionsto current enterprise technologies which included content to related topics: virtualization, programming, web services, LDAP, PKI – technology capabilitiesenhancement, and overall IT securityand compliance for thisnational defense and securityprovider. ď‚· Abilityto complete assigned tasks with minimal supervision from Managements. ď‚· Configuration and security policies, and monitoring system status while giving your employees access to corporate applications on the devices that they choose. ď‚· Utilizing Nagios formonitoring and reporting to ensure systems, applications and services processes are functioning properly. In the event of a failure, Nagios can alert technical staff of the problem, allowing them to begin remediation processes before outages affectbusiness processes, end-users, or customers. ď‚· Providing Technical Support for a broad range of applicationsas theyintegrate with RSA for authentication. ď‚· Remote Desktop, map network drives and so Hybrid Images, most customizations I had to apply post-deployment using Group Policy or scripts to configure Windows Firewall, enable on. ď‚· Working knowledge of Active Directory…….. ď‚· Experience usingMS Office applications to create reports from data (Excel, PowerPoint, and Word). ď‚· Manage, maintain, and configure securitynetwork such as Firewalls, VP ď‚· N devices, Logging Systems, Security Provisioning Systems. ď‚· As a VulnerabilityManagement Analyst assistingother membersand managementswith the configuration and operation of vulnerabilityscanningtools and createsreportingwhich communicatesthe resultsand recommended remediation actions.As analyst use the security expertise todeliver accurate reportsin a manner that can be understood by technical and none technical audience. ď‚· Management of Red Hat Enterprise 5 and 6 ď‚· Installation, configuration and administration of Enterprise Linux and Unix Systems ď‚· Build red hat VMs on Vcenter ď‚· Strong working knowledge of two-way Authentication. Makingsure to provide end users inquiriesbytwo-way authentication best practices.(Somethingyou have and somethingyou know). ď‚· Making sure that users can securely access the applications they require with a single identity using any device. ď‚· Knowledge of TCP/IPand other common networkingconcepts. SSL Administrator / Identity and Access Management (5/09-6/12) ď‚· Identityand Access management ď‚· Very Strong and hands on PKI as part of the IDM management. ď‚· Work closely to group charged with monitoring uptime and efficiency of production application ď‚· Established a record of planning, team development and technical excellence in overseeinginformation technology functions and buildingsecure infrastructure acrossmultiple ITdomains. Assisted in administeringdatabase organizations,standards, controls, procedures, and documentation. Provided thought-leadership towardsbuildinga secure infrastructure acrossmultiple ITdomains. ď‚· Working knowledge of UNIXin order to find out the storage, usage, server up & down status and ect. ď‚· Developed data extractionsand reportsfrom requests/ requirementsstated byclients; used database, report writer, data mart, or specialized applicationsto generate reportsor analyses. ď‚· Facilitated communication between technologyteamsand other departmentson issue statusand resolution. ď‚· Documented customer interactionsin the ticketing system following policies, proceduresand processes and follow up on everyreported issue. ď‚· Leveraged myextensive knowledge of the Internet Domain name registration industryand the organizations that shape the Internet industry. ď‚· Limited knowledge of SAN (Storage Area Network) enterprise-level storage networkof several hard drives. ď‚· Provided basictechnical consultation on current and proposed systemsto other organizations. APPTIX LL, Herndon, VA ..................................................................................................................................................10/08 - 2/09 Application / Database Support Specialist ď‚· Provided first level technical support and incident management for clientele's desktop technologiesand internet presence. ď‚· Responsible for receiving, enteringtroubleshooting, prioritizing, escalating, and updatingall incidents involving hardware, software, applications, networkingor productson the IT standardslist. ď‚· Resolved ITincidentsas appropriate; such first-call resolution minimized the impact and cost of IT Problemsto the company and increasespersonal productivity for customers.
  • 3. ď‚· Recognized for using superior problem solving, interpersonal and technical skills and the proven abilityto research and solve complex technical problems. ď‚· Developed an extensive experience with SharePoint, Intel-based desktop technologies and respondingto customers’ inquiryin a timelymanner. ď‚· Leveraged my knowledge of industrybest practicesfor e-mail privacyand regulatorycompliance, routing, filtering, monitoring, tiered storage, backup, and disaster recovery. ď‚· Served as company liaison on all customer support, software development, and Quality Assurance team issues. Prior Positions: Application Analyst II QUADRA MED, Reston, VA Application Engineer II ORCC, Chantilly, VA Technical Web Support II NETWORK SOLUTIONS Technical Support / Help Desk EXOSTAR EDUCATION NORTHERN VIRGINIA COMMUNITY COLLEGE, Manassas, VA A.S. Cyber Security forthcoming 6/16 STRAYER UNIVERSITY, Newton, VA B.S. Information Systems 9/07 NORTHERN VIRGINIA COMMUNITY COLLEGE, Annandale, VA A.S. General Studies 6/93 Professional Certifications: ITIL Certification, Security+ Certification, Candidate for Network+ Certification & Candidate for CEH and CISSP Certifications. ď‚· Hardware/ Software & Technical Experience: Communication/Diagnostic Skills, Information Technology, VPN, Technical/Help Desk Support, Microsoft Office, Nigos Monitoring System & Thruk Monitoring System, MS Exchange, Microsoft Lync and ect.