SlideShare a Scribd company logo
1 of 3
1 of 3 Urooj Pasha
UROOJ PASHA
51/40 Philip Hodgins Str eet WRI GHT ACT 2611 | 0425 216 82 3 | pasha45@hotmail.com
C A R E E R O V E R V I E W
An NV1 (Secret) cleared Senior Cyber Security Analyst with 9+ years of experience. I have proven success in
managing, monitoring, configuring and maintaining the security of LANs and WANs on large Networks. I am
currently employed as a full-time Senior-Level Cyber Security Analyst for Telstra.
Q U A L I F I C A T I O N S
• July 1999 – June 2001 Graduate Diploma in Information Systems
University of Canberra, ACT Australia
• Sep 1996 – June 1998 Master of Business Administration (Finance)
Peshawar University, Peshawar, Pakistan
• Sep 1994 – June 1996 Bachelor of Business Administration (Accounting)
Peshawar University, Peshawar, Pakistan
• Sep 2004 – May 2005 Certificate IV in Client Support
Computer Power Institute of Technology, ACT
C E R T I F I C A T I O N S
• Certified Information Systems Security (CISSP) in progress
• Certified Ethical Hacker (CEH)
• Cisco Certified Network Associate (CCNA)
• Microsoft Certified Professional (MCP)
D A T E P O S I T I O N S O R G A N I S A T I O N S
Apr 10 – Current Senior Security Analyst Telstra
Nov 12 – Apr 13 Acting Team Leader Telstra
Nov 08 – Apr 10 Gateway Admin Fujitsu Department of Defence
Nov 07 – Nov 08 Anti Virus Admin Fujitsu Department of Defence
Feb 06 – Nov 07 Desktop Analyst KAZ Department of Defence
Jun 05 – Feb 06 Service Desk Analyst Teletech International
K E Y C O M P E T E N C I E S
• IDS/IPS – Security Monitoring • ArcSight – IDS Monitoring
• McAfee – Antivirus • Arbor Peakflow – Denial of Service
• Net forensics - IDS Monitoring • Huntsman Tier 3 – IPS Monitoring
• Mime Sweeper – Email filtering • Content Keeper – Content filtering
• Endace Security Manager – Packet Analysis • Windows/UNIX Platforms
• OSI Model – TCP/IP • Splunk – IDS Monitoring
• ITIL • Wireshark – Packet Analysis
• Postfix – Mail Transfer Agent • Tripwire
• Nagios/Cacti/Tivoli – Monitoring Tools • SNORT
• Trend Micro - Antivirus • Phishing/SpamNoc
2 of 3 Urooj Pasha
E M P L O Y M E N T H I S T O R Y
April 2010- Current – Telstra PTY LTD
Senior Security Analyst - Permanent (Full time)
• Monitoring 2nd
and 3r d
level Security Incidents and data forensics for internal Telstra platforms
utilising industry standard SIEM and technologies such as ArcSight, Splunk, Netforensics and SNORT
for Intrusion Detection Analysis.
• Supporting Telstra’s host based Denial of Service product using Arbor Peakflow to ensure maximum
availability of customer’s network infrastructure by monitoring and fault resolution of security
triggered network attacks and behaviour anomalies.
• Investigating any actually or potential information security incidents.
• Participation in pilot program for Telstra’s cloud computing product using Tier-3 Huntsman for in
depth analysis of host based infrastructure supporting both Telstra’s internal core and customer
facing network appliances.
• Ensuring consistent and professional communication with internal and external clients and
stakeholders.
• Assurance support for Government Data Networks utilising Cisco technologies providing fault
management and troubleshooting of onsite Telstra installed routers and switches.
• Monitoring and fault management of Telstra’s Government data centre products utilising Windows
and UNIX technologies.
• ITIL compliant fault management utilising core record management systems such as Remedy,
InfraEnterprise and Amdocs, ensuring accurate data exchange between Telstra’s internal support
groups and key external vendor partners.
• Monitoring Antivirus, Anti Phishing and Anti Spam support for Telstra’s internal network.
• Assisting in creation of reports for internal and external clients and stakeholders.
Nov 2012- April 2013– Telstra PTY LTD
Acting Team Leader -
• Monitored the workflow and assigning each team member duties every morning.
• Attended operation meetings to provide Daily Security Activities to the General Manager and
improving business processes.
• Delivered Power point presentations for the above mentioned meetings
• Looked after the Roster and took calls outside business hours and each time someone was not
available to work I would shift staff to fill the gap.
• Created Monthly Reports and generally dealing with all the queries for Reporting.
• Managed workflow and would report to the manager.
Nov 2008- Mar 2010 – Department of Defence HMAS Harman, KAZ PTY LTD & Fujitsu PTY LTD
Network Security Administrator (Gateway) - Permanent (Full time) Contractor
• Assisted with development, implementation and maintenance of IT security solutions including
firewalls, antivirus solution, and intrusion detection/prevention systems.
• Managed the information System Security Request form for account creation and deletion.
• Investigated, resolved or escalated Network Security Operations related outages or service
degradations.
• Provided a client access to a blocked site by using Content Keeper and effectively manage Internet
resources.
• Documented Procedures, Knowledge Base Articles and Network Diagrams if they correct and up-to-
date.
• Kept our database up to date use Tier 3 to gather information on the emails that are sent and
received around the Defence Network.
3 of 3 Urooj Pasha
Nov 2007- Nov 2008 – Department of Defence HMAS Harman, KAZ PTY LTD
Network Security Administrator (Anti Virus) - Permanent (Full time) Contractor
• Maintained and troubleshoot Antivirus Software on multiple Australian Defence Networks.
• Provided training to the new Employees on Antivirus in a Network Environment to get them ready to
be able to do their day to day work.
• Confirmed daily if Antivirus Pattern files are up-to-date on all Defence servers/hosts.
• Installed and updated relevant Antivirus software on all servers.
• Updated the knowledge database, so that the department is able to use it as an accurate
knowledge base.
Achievements
• Written acknowledgment from the Senior Executive Officer regarding the significant increase in
skill levels of those personnel who participated in the training program.
• Significant product improvements initiated during the course of the training program.
Feb 2006- Nov 2007 – Department of Defence Deakin, KAZ PTY LTD
Desktop Support - Permanent (Full time) Contractor
• Maintained, troubleshoot, and repaired desktop computers, laptop/notebook computers, printers,
peripheral hardware and software.
• Provided first level IT technical support for customers in Defence Restricted Network environment.
• Configured and installed operating systems, desktop applications, and network software
• Troubleshoot research, diagnose and resolve technical issues surrounding Windows NT, 2000 and XP.
• Supported a wide range of Microsoft Products, Applications and Lotus Notes.
• Received and accurately record IT incidents and requests reported by the clients, if necessary
assigned incidents to appropriate areas for action.
Jul 2005- Feb 2006 - Teletech International PTY LTD, Canberra
Help Desk Permanent (Full time)
• Served as the initial point of contact for resolution of desktop country wide for Telstra
environment.
• Troubleshoot research, diagnose, document, and resolve technical issues surrounding Windows 98,
Windows 2000, Windows NT, Windows ME, Windows XP, Internet Explorer, Microsoft Outlook and
Microsoft Outlook Express for Dial up and Broadband connections.
• Organised technical meetings and presentation with network support department also provided
training to the new employees.
• Provided technical advises on hardware problems which included Dialup and Broadband modems
and other computer related hardware problems.
S O F T S K I L L S a n d A T T R I B U T E S
• Excellent communication skills, both written and oral.
• Strong analytical approach to solving problems with high attention to detail.
• Outstanding interpersonal skills – dedicated to meeting customer needs.
• Motivated by teamwork and collaboration – sharing of knowledge.
• Committed to leadership and mentoring of junior staff.
L A N G U A G E S
English, Urdu, Pashto and Hindi
R E F R E E S
Available on Request

More Related Content

What's hot

Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...
Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...
Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...Digital Bond
 
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...Luigi Delgrosso
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network SecurityAditiPatni3
 
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014 Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014 Unisys Corporation
 
DNS Measurement Activity on ITB 2010
DNS Measurement Activity on ITB 2010DNS Measurement Activity on ITB 2010
DNS Measurement Activity on ITB 2010Affan Basalamah
 
CNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking OverviewCNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking OverviewSam Bowne
 
Information Assurance And Security - Chapter 2 - Lesson 4
Information Assurance And Security - Chapter 2 - Lesson 4Information Assurance And Security - Chapter 2 - Lesson 4
Information Assurance And Security - Chapter 2 - Lesson 4MLG College of Learning, Inc
 
Hem infotech company profile
Hem infotech  company profileHem infotech  company profile
Hem infotech company profileHem Infotech
 
Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Dan Morrill
 
Man in the Cloud Attacks
Man in the Cloud AttacksMan in the Cloud Attacks
Man in the Cloud AttacksImperva
 
Nana Owusu resume today
Nana Owusu resume todayNana Owusu resume today
Nana Owusu resume todayNana Owusu
 
Metkel Habte Resume
Metkel Habte ResumeMetkel Habte Resume
Metkel Habte ResumeMetkel Habte
 
Career Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamCareer Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamMohammed Adam
 
Network Security
Network SecurityNetwork Security
Network SecurityManoj Singh
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
Rose_Casey%20Resume.
Rose_Casey%20Resume.Rose_Casey%20Resume.
Rose_Casey%20Resume.Casey Rose
 
Domains of network security
Domains of network securityDomains of network security
Domains of network securityKeithThai1
 

What's hot (20)

Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...
Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...
Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...
 
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network Security
 
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014 Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
 
Abdulrahman c.v
Abdulrahman c.vAbdulrahman c.v
Abdulrahman c.v
 
DNS Measurement Activity on ITB 2010
DNS Measurement Activity on ITB 2010DNS Measurement Activity on ITB 2010
DNS Measurement Activity on ITB 2010
 
CNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking OverviewCNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking Overview
 
Information Assurance And Security - Chapter 2 - Lesson 4
Information Assurance And Security - Chapter 2 - Lesson 4Information Assurance And Security - Chapter 2 - Lesson 4
Information Assurance And Security - Chapter 2 - Lesson 4
 
Hem infotech company profile
Hem infotech  company profileHem infotech  company profile
Hem infotech company profile
 
Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)
 
Man in the Cloud Attacks
Man in the Cloud AttacksMan in the Cloud Attacks
Man in the Cloud Attacks
 
Nana Owusu resume today
Nana Owusu resume todayNana Owusu resume today
Nana Owusu resume today
 
Metkel Habte Resume
Metkel Habte ResumeMetkel Habte Resume
Metkel Habte Resume
 
Career Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamCareer Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed Adam
 
Darryl T. Smith Resume (1)
Darryl T. Smith Resume (1)Darryl T. Smith Resume (1)
Darryl T. Smith Resume (1)
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Rose_Casey%20Resume.
Rose_Casey%20Resume.Rose_Casey%20Resume.
Rose_Casey%20Resume.
 
Domains of network security
Domains of network securityDomains of network security
Domains of network security
 
Network Security Topic 1 intro
Network Security Topic 1 introNetwork Security Topic 1 intro
Network Security Topic 1 intro
 

Viewers also liked

Cartilla pronied
Cartilla proniedCartilla pronied
Cartilla proniedJAM VASSAN
 
Implementacion de la norma ohsas 18001 en las empresas
Implementacion de la norma ohsas 18001 en las empresasImplementacion de la norma ohsas 18001 en las empresas
Implementacion de la norma ohsas 18001 en las empresassamuel beitia
 
Chewing TV Final
Chewing TV FinalChewing TV Final
Chewing TV Finalnarae kim
 
Question 4 evaluation
Question 4 evaluationQuestion 4 evaluation
Question 4 evaluationjessicak1997
 
Gumse if you dare
Gumse if you dareGumse if you dare
Gumse if you dareIsa Machado
 
Presentación Compañia EPI-USE Iberia
Presentación Compañia EPI-USE IberiaPresentación Compañia EPI-USE Iberia
Presentación Compañia EPI-USE Iberiasergio_martinez
 
Regione Lombardia _ Progetto Minibond - Avviso rivolto alle imprese
Regione Lombardia _ Progetto Minibond - Avviso rivolto alle impreseRegione Lombardia _ Progetto Minibond - Avviso rivolto alle imprese
Regione Lombardia _ Progetto Minibond - Avviso rivolto alle impreseGuido Alberto Micci
 
Going Beyond the Library
Going Beyond the LibraryGoing Beyond the Library
Going Beyond the LibraryNatalie Clewell
 
Why does Norauto use the easyRECrue interviewing platform to recruit ?
Why does Norauto use the easyRECrue interviewing platform to recruit ?Why does Norauto use the easyRECrue interviewing platform to recruit ?
Why does Norauto use the easyRECrue interviewing platform to recruit ?EASYRECRUE
 
Find out how EMLYON uses pre-recorded video interviews to select its candidates?
Find out how EMLYON uses pre-recorded video interviews to select its candidates?Find out how EMLYON uses pre-recorded video interviews to select its candidates?
Find out how EMLYON uses pre-recorded video interviews to select its candidates?EASYRECRUE
 
SOLID DISPERSION TECHNIQUE
SOLID DISPERSION TECHNIQUESOLID DISPERSION TECHNIQUE
SOLID DISPERSION TECHNIQUERahul Pandit
 

Viewers also liked (14)

Cartilla pronied
Cartilla proniedCartilla pronied
Cartilla pronied
 
Implementacion de la norma ohsas 18001 en las empresas
Implementacion de la norma ohsas 18001 en las empresasImplementacion de la norma ohsas 18001 en las empresas
Implementacion de la norma ohsas 18001 en las empresas
 
Chewing TV Final
Chewing TV FinalChewing TV Final
Chewing TV Final
 
Question 4 evaluation
Question 4 evaluationQuestion 4 evaluation
Question 4 evaluation
 
Gumse if you dare
Gumse if you dareGumse if you dare
Gumse if you dare
 
Social Media
Social MediaSocial Media
Social Media
 
Presentación Compañia EPI-USE Iberia
Presentación Compañia EPI-USE IberiaPresentación Compañia EPI-USE Iberia
Presentación Compañia EPI-USE Iberia
 
Regione Lombardia _ Progetto Minibond - Avviso rivolto alle imprese
Regione Lombardia _ Progetto Minibond - Avviso rivolto alle impreseRegione Lombardia _ Progetto Minibond - Avviso rivolto alle imprese
Regione Lombardia _ Progetto Minibond - Avviso rivolto alle imprese
 
4
44
4
 
Going Beyond the Library
Going Beyond the LibraryGoing Beyond the Library
Going Beyond the Library
 
2
22
2
 
Why does Norauto use the easyRECrue interviewing platform to recruit ?
Why does Norauto use the easyRECrue interviewing platform to recruit ?Why does Norauto use the easyRECrue interviewing platform to recruit ?
Why does Norauto use the easyRECrue interviewing platform to recruit ?
 
Find out how EMLYON uses pre-recorded video interviews to select its candidates?
Find out how EMLYON uses pre-recorded video interviews to select its candidates?Find out how EMLYON uses pre-recorded video interviews to select its candidates?
Find out how EMLYON uses pre-recorded video interviews to select its candidates?
 
SOLID DISPERSION TECHNIQUE
SOLID DISPERSION TECHNIQUESOLID DISPERSION TECHNIQUE
SOLID DISPERSION TECHNIQUE
 

Similar to Urooj's Resume May16

Similar to Urooj's Resume May16 (20)

hg
hghg
hg
 
Stacey Rhodes-Resume
Stacey Rhodes-ResumeStacey Rhodes-Resume
Stacey Rhodes-Resume
 
Stacey Rhodes-Resume
Stacey Rhodes-ResumeStacey Rhodes-Resume
Stacey Rhodes-Resume
 
Stacey Rhodes-Current Resume
Stacey Rhodes-Current ResumeStacey Rhodes-Current Resume
Stacey Rhodes-Current Resume
 
Pantoja Ismael Resume feb 2016 v2
Pantoja Ismael Resume feb  2016 v2Pantoja Ismael Resume feb  2016 v2
Pantoja Ismael Resume feb 2016 v2
 
Kevin Wilhite 2015-Resume
Kevin Wilhite 2015-ResumeKevin Wilhite 2015-Resume
Kevin Wilhite 2015-Resume
 
RICHARD XOCHIHUA CNS (3) - Short Copy
RICHARD XOCHIHUA CNS (3) - Short CopyRICHARD XOCHIHUA CNS (3) - Short Copy
RICHARD XOCHIHUA CNS (3) - Short Copy
 
CV_TKT_v1_Current
CV_TKT_v1_CurrentCV_TKT_v1_Current
CV_TKT_v1_Current
 
GraceCV
GraceCVGraceCV
GraceCV
 
resume(alvin traquena 2016)-phil
resume(alvin traquena 2016)-philresume(alvin traquena 2016)-phil
resume(alvin traquena 2016)-phil
 
Aaron_Duplechien_Resume (3).docx
Aaron_Duplechien_Resume (3).docxAaron_Duplechien_Resume (3).docx
Aaron_Duplechien_Resume (3).docx
 
Grace cv2
Grace cv2Grace cv2
Grace cv2
 
GraceCV2
GraceCV2GraceCV2
GraceCV2
 
Joselito Asejo
Joselito AsejoJoselito Asejo
Joselito Asejo
 
System%20security%20Engineer%20#1 (2)
System%20security%20Engineer%20#1 (2)System%20security%20Engineer%20#1 (2)
System%20security%20Engineer%20#1 (2)
 
Faraz_Mansoor_IT_Support_CV_2013
Faraz_Mansoor_IT_Support_CV_2013Faraz_Mansoor_IT_Support_CV_2013
Faraz_Mansoor_IT_Support_CV_2013
 
Gerome_Ray_Delos_Reyes
Gerome_Ray_Delos_ReyesGerome_Ray_Delos_Reyes
Gerome_Ray_Delos_Reyes
 
Peter Sproull Resume July 2016
Peter Sproull Resume July 2016 Peter Sproull Resume July 2016
Peter Sproull Resume July 2016
 
Arin_Adcox_Resume Current
Arin_Adcox_Resume CurrentArin_Adcox_Resume Current
Arin_Adcox_Resume Current
 
Resume
ResumeResume
Resume
 

Urooj's Resume May16

  • 1. 1 of 3 Urooj Pasha UROOJ PASHA 51/40 Philip Hodgins Str eet WRI GHT ACT 2611 | 0425 216 82 3 | pasha45@hotmail.com C A R E E R O V E R V I E W An NV1 (Secret) cleared Senior Cyber Security Analyst with 9+ years of experience. I have proven success in managing, monitoring, configuring and maintaining the security of LANs and WANs on large Networks. I am currently employed as a full-time Senior-Level Cyber Security Analyst for Telstra. Q U A L I F I C A T I O N S • July 1999 – June 2001 Graduate Diploma in Information Systems University of Canberra, ACT Australia • Sep 1996 – June 1998 Master of Business Administration (Finance) Peshawar University, Peshawar, Pakistan • Sep 1994 – June 1996 Bachelor of Business Administration (Accounting) Peshawar University, Peshawar, Pakistan • Sep 2004 – May 2005 Certificate IV in Client Support Computer Power Institute of Technology, ACT C E R T I F I C A T I O N S • Certified Information Systems Security (CISSP) in progress • Certified Ethical Hacker (CEH) • Cisco Certified Network Associate (CCNA) • Microsoft Certified Professional (MCP) D A T E P O S I T I O N S O R G A N I S A T I O N S Apr 10 – Current Senior Security Analyst Telstra Nov 12 – Apr 13 Acting Team Leader Telstra Nov 08 – Apr 10 Gateway Admin Fujitsu Department of Defence Nov 07 – Nov 08 Anti Virus Admin Fujitsu Department of Defence Feb 06 – Nov 07 Desktop Analyst KAZ Department of Defence Jun 05 – Feb 06 Service Desk Analyst Teletech International K E Y C O M P E T E N C I E S • IDS/IPS – Security Monitoring • ArcSight – IDS Monitoring • McAfee – Antivirus • Arbor Peakflow – Denial of Service • Net forensics - IDS Monitoring • Huntsman Tier 3 – IPS Monitoring • Mime Sweeper – Email filtering • Content Keeper – Content filtering • Endace Security Manager – Packet Analysis • Windows/UNIX Platforms • OSI Model – TCP/IP • Splunk – IDS Monitoring • ITIL • Wireshark – Packet Analysis • Postfix – Mail Transfer Agent • Tripwire • Nagios/Cacti/Tivoli – Monitoring Tools • SNORT • Trend Micro - Antivirus • Phishing/SpamNoc
  • 2. 2 of 3 Urooj Pasha E M P L O Y M E N T H I S T O R Y April 2010- Current – Telstra PTY LTD Senior Security Analyst - Permanent (Full time) • Monitoring 2nd and 3r d level Security Incidents and data forensics for internal Telstra platforms utilising industry standard SIEM and technologies such as ArcSight, Splunk, Netforensics and SNORT for Intrusion Detection Analysis. • Supporting Telstra’s host based Denial of Service product using Arbor Peakflow to ensure maximum availability of customer’s network infrastructure by monitoring and fault resolution of security triggered network attacks and behaviour anomalies. • Investigating any actually or potential information security incidents. • Participation in pilot program for Telstra’s cloud computing product using Tier-3 Huntsman for in depth analysis of host based infrastructure supporting both Telstra’s internal core and customer facing network appliances. • Ensuring consistent and professional communication with internal and external clients and stakeholders. • Assurance support for Government Data Networks utilising Cisco technologies providing fault management and troubleshooting of onsite Telstra installed routers and switches. • Monitoring and fault management of Telstra’s Government data centre products utilising Windows and UNIX technologies. • ITIL compliant fault management utilising core record management systems such as Remedy, InfraEnterprise and Amdocs, ensuring accurate data exchange between Telstra’s internal support groups and key external vendor partners. • Monitoring Antivirus, Anti Phishing and Anti Spam support for Telstra’s internal network. • Assisting in creation of reports for internal and external clients and stakeholders. Nov 2012- April 2013– Telstra PTY LTD Acting Team Leader - • Monitored the workflow and assigning each team member duties every morning. • Attended operation meetings to provide Daily Security Activities to the General Manager and improving business processes. • Delivered Power point presentations for the above mentioned meetings • Looked after the Roster and took calls outside business hours and each time someone was not available to work I would shift staff to fill the gap. • Created Monthly Reports and generally dealing with all the queries for Reporting. • Managed workflow and would report to the manager. Nov 2008- Mar 2010 – Department of Defence HMAS Harman, KAZ PTY LTD & Fujitsu PTY LTD Network Security Administrator (Gateway) - Permanent (Full time) Contractor • Assisted with development, implementation and maintenance of IT security solutions including firewalls, antivirus solution, and intrusion detection/prevention systems. • Managed the information System Security Request form for account creation and deletion. • Investigated, resolved or escalated Network Security Operations related outages or service degradations. • Provided a client access to a blocked site by using Content Keeper and effectively manage Internet resources. • Documented Procedures, Knowledge Base Articles and Network Diagrams if they correct and up-to- date. • Kept our database up to date use Tier 3 to gather information on the emails that are sent and received around the Defence Network.
  • 3. 3 of 3 Urooj Pasha Nov 2007- Nov 2008 – Department of Defence HMAS Harman, KAZ PTY LTD Network Security Administrator (Anti Virus) - Permanent (Full time) Contractor • Maintained and troubleshoot Antivirus Software on multiple Australian Defence Networks. • Provided training to the new Employees on Antivirus in a Network Environment to get them ready to be able to do their day to day work. • Confirmed daily if Antivirus Pattern files are up-to-date on all Defence servers/hosts. • Installed and updated relevant Antivirus software on all servers. • Updated the knowledge database, so that the department is able to use it as an accurate knowledge base. Achievements • Written acknowledgment from the Senior Executive Officer regarding the significant increase in skill levels of those personnel who participated in the training program. • Significant product improvements initiated during the course of the training program. Feb 2006- Nov 2007 – Department of Defence Deakin, KAZ PTY LTD Desktop Support - Permanent (Full time) Contractor • Maintained, troubleshoot, and repaired desktop computers, laptop/notebook computers, printers, peripheral hardware and software. • Provided first level IT technical support for customers in Defence Restricted Network environment. • Configured and installed operating systems, desktop applications, and network software • Troubleshoot research, diagnose and resolve technical issues surrounding Windows NT, 2000 and XP. • Supported a wide range of Microsoft Products, Applications and Lotus Notes. • Received and accurately record IT incidents and requests reported by the clients, if necessary assigned incidents to appropriate areas for action. Jul 2005- Feb 2006 - Teletech International PTY LTD, Canberra Help Desk Permanent (Full time) • Served as the initial point of contact for resolution of desktop country wide for Telstra environment. • Troubleshoot research, diagnose, document, and resolve technical issues surrounding Windows 98, Windows 2000, Windows NT, Windows ME, Windows XP, Internet Explorer, Microsoft Outlook and Microsoft Outlook Express for Dial up and Broadband connections. • Organised technical meetings and presentation with network support department also provided training to the new employees. • Provided technical advises on hardware problems which included Dialup and Broadband modems and other computer related hardware problems. S O F T S K I L L S a n d A T T R I B U T E S • Excellent communication skills, both written and oral. • Strong analytical approach to solving problems with high attention to detail. • Outstanding interpersonal skills – dedicated to meeting customer needs. • Motivated by teamwork and collaboration – sharing of knowledge. • Committed to leadership and mentoring of junior staff. L A N G U A G E S English, Urdu, Pashto and Hindi R E F R E E S Available on Request