Andrianina Rakotondrafahitra has over 10 years of experience as a senior lead system and network administrator providing support for designing, implementing, deploying, maintaining and monitoring systems and networks to ensure high availability. They have experience with a wide range of technologies including Windows and Linux servers, virtualization, networking, security, and backup solutions.
View slides from Chris Conlon's presentation about securing MySQL - including an intro to SSL, and performance statistics for MySQL SSL usage.
To learn more about yaSSL products or the CyaSSL embedded SSL library, visit www.wolfssl.com.
Why trade performance for flexibility when you can program your network with new protocols and capabilities at wire speed?
In this workshop learn how ASICs are made, why flexible silicon is critical to the future of networking and what you can do with Cisco’s next-generation UADP 2.0.
Resources:
Watch the related TechWiseTV episode: http://bit.ly/2fiqH1f
Watch the TechWiseTV: New Era in Networking playlist: http://bit.ly/2jpoRjB
wolfSSL, author of the open source CyaSSL embedded SSL library has made significant progress in 2013 towards bringing the community a more usable, feature-rich, and better supported library for use in an ever-growing range of embedded platforms and environments. This talk will provide an overview of technical progress in the last year and news on the current state of wolfSSL. Details on what's new include the addition of new crypto ciphers and algorithms, better hardware cryptography support, more flexible abstraction layers, a JNI wrapper, new platform support, and better development tool integration. www.wolfssl.com
View slides from Chris Conlon's presentation about securing MySQL - including an intro to SSL, and performance statistics for MySQL SSL usage.
To learn more about yaSSL products or the CyaSSL embedded SSL library, visit www.wolfssl.com.
Why trade performance for flexibility when you can program your network with new protocols and capabilities at wire speed?
In this workshop learn how ASICs are made, why flexible silicon is critical to the future of networking and what you can do with Cisco’s next-generation UADP 2.0.
Resources:
Watch the related TechWiseTV episode: http://bit.ly/2fiqH1f
Watch the TechWiseTV: New Era in Networking playlist: http://bit.ly/2jpoRjB
wolfSSL, author of the open source CyaSSL embedded SSL library has made significant progress in 2013 towards bringing the community a more usable, feature-rich, and better supported library for use in an ever-growing range of embedded platforms and environments. This talk will provide an overview of technical progress in the last year and news on the current state of wolfSSL. Details on what's new include the addition of new crypto ciphers and algorithms, better hardware cryptography support, more flexible abstraction layers, a JNI wrapper, new platform support, and better development tool integration. www.wolfssl.com
Holistic Security for OpenStack CloudsMajor Hayden
Nothing clears out a conference room faster than a discussion around information security. Securing complex computer systems, such as OpenStack clouds, is extremely difficult. To make matters worse, attackers can make many mistakes without consequences. A defender’s single mistake could lead to a breach.
Don't let fear rule the discussion around security.
Operators need a simple and scalable method for securing OpenStack clouds. That starts with grouping components into compartments and then looking at how those compartments interact with each other. Those interactions form the backbone of security policies and technical controls.
In this vendor-neutral talk, Major Hayden, principal architect at Rackspace, will break down the complexity of securing OpenStack clouds using real-world scenarios. Attendees will learn how to:
Divide OpenStack deployments into compartments
Analyze the interactions between each component
Develop security policies and apply technical controls
UCS Automation through the use of API's and UCS PowerToolCisco Canada
Join our Cisco Systems Management experts as they cover managing Cisco UCS Manager and Standalone C-series servers with PowerShell utilizing UCS PowerTool. This session will detail how Cisco UCS PowerTool utilizes the Cisco UCS XML API which provides an interface for Cisco UCS hardware inventory, monitoring, alerting, and automation of Cisco UCS using PowerShell. Real world examples detailing programmatic bare metal deployment and ongoing systems monitoring and management of Cisco UCS using Cisco UCS PowerTool will be demonstrated.
A Migration Imperative With Windows 10 Enterprise-Grade SecurityInsight
Microsoft Windows 10 delivers a familiar user experience along with major advancements that address key demands of IT professionals such as security and speed. Learn more about the security features of Windows 10 and how migration is becoming vital to businesses.
Presentación - Cisco ASA with FirePOWER ServicesOscar Romano
En la medida que más empresas mueven sus modelos de negocio hacia la movilidad, la nube e Internet de las cosas, sus soluciones de seguridad deben ser más dinámicas y escalables. Sin embargo, hasta la fecha, la mayoría de las soluciones de seguridad no han seguido el ritmo de cambio y no han podido adaptarse a las nuevas amenazas y ataques. Hoy, las soluciones de seguridad están basadas en un modelo binario de “bien vs mal”, el cual carece de la visibilidad necesaria para entender el contexto. El 16 de septiembre, Cisco dio a conocer su más reciente paso en esta dirección.
ASA Firepower NGFW Update and Deployment ScenariosCisco Canada
This session will focus on typical deployment scenarios for the Adaptive Security Appliance family running FirePower Services. Also, a feature overview and comparison of the ASA with Firepower services and the new Firepower Threat Defense (FTD) image will be included with updates on the new Firepower hardware platform. Deployment use cases will include Internet Edge, various segmentation scenarios, and VPN. A configuration walk-through and accepted best practices will be covered. This session is designed for existing ASA customers and targets the security and network engineer. They will learn the benefit of a FirePower NGFW in network edge and Internet use cases
Behind the Curtain: Exposing Advanced ThreatsCisco Canada
Today's advanced threats hide in plain sight, patiently waiting to strike, challenging security teams to track their progress across their network and endpoints. Meanwhile, executive and board-level reporting requirements are increasing as leadership demands in-depth answers that are unavailable from today’s block/allow security tools. With 55% of organizations unable to identify the origin of their last security breach, it’s time to stop relying on tools that define security based on what they see ‘out there’ and instead hunt for threats by tracking files, file relationships, and both endpoint and network behavior ‘in here’—inside your environment. In the first part of this interactive session, learn how Cisco’s Advanced Malware Protection (AMP) solutions use big data analytics to compare a real-time, dynamic history of your environment to the global threat landscape, automatically uncovering and blocking advanced threats before they strike. Then watch workflow examples demonstrating how your security team can use this advanced visibility and control to dramatically improve their efficiency and finally deliver the business 100% confidence answers.
Holistic Security for OpenStack CloudsMajor Hayden
Nothing clears out a conference room faster than a discussion around information security. Securing complex computer systems, such as OpenStack clouds, is extremely difficult. To make matters worse, attackers can make many mistakes without consequences. A defender’s single mistake could lead to a breach.
Don't let fear rule the discussion around security.
Operators need a simple and scalable method for securing OpenStack clouds. That starts with grouping components into compartments and then looking at how those compartments interact with each other. Those interactions form the backbone of security policies and technical controls.
In this vendor-neutral talk, Major Hayden, principal architect at Rackspace, will break down the complexity of securing OpenStack clouds using real-world scenarios. Attendees will learn how to:
Divide OpenStack deployments into compartments
Analyze the interactions between each component
Develop security policies and apply technical controls
UCS Automation through the use of API's and UCS PowerToolCisco Canada
Join our Cisco Systems Management experts as they cover managing Cisco UCS Manager and Standalone C-series servers with PowerShell utilizing UCS PowerTool. This session will detail how Cisco UCS PowerTool utilizes the Cisco UCS XML API which provides an interface for Cisco UCS hardware inventory, monitoring, alerting, and automation of Cisco UCS using PowerShell. Real world examples detailing programmatic bare metal deployment and ongoing systems monitoring and management of Cisco UCS using Cisco UCS PowerTool will be demonstrated.
A Migration Imperative With Windows 10 Enterprise-Grade SecurityInsight
Microsoft Windows 10 delivers a familiar user experience along with major advancements that address key demands of IT professionals such as security and speed. Learn more about the security features of Windows 10 and how migration is becoming vital to businesses.
Presentación - Cisco ASA with FirePOWER ServicesOscar Romano
En la medida que más empresas mueven sus modelos de negocio hacia la movilidad, la nube e Internet de las cosas, sus soluciones de seguridad deben ser más dinámicas y escalables. Sin embargo, hasta la fecha, la mayoría de las soluciones de seguridad no han seguido el ritmo de cambio y no han podido adaptarse a las nuevas amenazas y ataques. Hoy, las soluciones de seguridad están basadas en un modelo binario de “bien vs mal”, el cual carece de la visibilidad necesaria para entender el contexto. El 16 de septiembre, Cisco dio a conocer su más reciente paso en esta dirección.
ASA Firepower NGFW Update and Deployment ScenariosCisco Canada
This session will focus on typical deployment scenarios for the Adaptive Security Appliance family running FirePower Services. Also, a feature overview and comparison of the ASA with Firepower services and the new Firepower Threat Defense (FTD) image will be included with updates on the new Firepower hardware platform. Deployment use cases will include Internet Edge, various segmentation scenarios, and VPN. A configuration walk-through and accepted best practices will be covered. This session is designed for existing ASA customers and targets the security and network engineer. They will learn the benefit of a FirePower NGFW in network edge and Internet use cases
Behind the Curtain: Exposing Advanced ThreatsCisco Canada
Today's advanced threats hide in plain sight, patiently waiting to strike, challenging security teams to track their progress across their network and endpoints. Meanwhile, executive and board-level reporting requirements are increasing as leadership demands in-depth answers that are unavailable from today’s block/allow security tools. With 55% of organizations unable to identify the origin of their last security breach, it’s time to stop relying on tools that define security based on what they see ‘out there’ and instead hunt for threats by tracking files, file relationships, and both endpoint and network behavior ‘in here’—inside your environment. In the first part of this interactive session, learn how Cisco’s Advanced Malware Protection (AMP) solutions use big data analytics to compare a real-time, dynamic history of your environment to the global threat landscape, automatically uncovering and blocking advanced threats before they strike. Then watch workflow examples demonstrating how your security team can use this advanced visibility and control to dramatically improve their efficiency and finally deliver the business 100% confidence answers.
Resume for Network Engineer, Network Security, IT Management L2 / L3 Deepak Kumar
A technology adaptable and innovation-oriented Network Engineer, seeking a challenging career where knowledge and solution-oriented skills may significantly contribute to the organization’s development and progress with more than 6 years of experience of Networks & Systems.
PROFESSIONAL SUMMARY AS:
Good analytical and troubleshooting abilities.
On premise and cloud Creating and managing windows Server DHCP / DNS /Remote Access in Network.
Installed and maintained company’s Network Firewall & Network Security.
Installed and maintained company’s VoIP/PABX Phone Server.
On premise and cloud Developing & Managing Mail Server ZIMBRA & Microsoft Exchange.
Recommended computer products and applications to improve productivity.
Responsible for performing a wide range of network administration duties including installations, debugging, maintenance and upgrades.
Experience in Administration and maintenance of Microsoft Windows Server 2008/2012/2016/2019.
Maintenance of Local Area Network, Firewalls & Routers.
Azure Cloud- Managing, creating, Load balancing, Virtual Network and etc.
Syed
Sharique
Azure Cloud
& Systems Administrator
1. ANDRIANINA RAKOTONDRAFAHITRA
: 240 449 9150
: andriprofid@gmail.com
: 9986 ForestViewPLGaithersburg20886 USA
SYSTEM AND NETWORK ENGINEER
SUMMARY
As a SENIOR LEAD ON SYSTEM AND NETWORK ADMINISTRATOR, I provide support for
designing, implementing, deploying, maintaining and monitoring system and network to ensure
highest level of system availability for the organization.
I exercise this responsibility more than ten years and most of the projects that I lead are
successful. This could only be achieved by using a wide range of research and problem solving
skills. Since working on IT environments, I have been working on many different projects and
gaining a lot more experience including, network equipment , server administration ,site surveys,
router, firewall, switch installations, WiMAX network technology, Cisco infrastructure
deployment, mail server deployment, Virtualization and cloud server.
EXPERIENCES
Current position: SYSTEM and NETWORK ADMINISTRATOR (NSGI)
NATIONAL DEMOCRATIC INSTITUT NDI (02 years)
SYSTEM AND NETWORK ADMINISTRATOR: Ministry Of Health (10 years)
SERVER ADMINISTRATOR
❏ Maintain administration Microsoft Windows and Linux servers
❏ Provide technical support, maintenance, and configuration of servers to support business units
in day-to-day operations.
2. ❏ Ensure completeness and integrity of data backup systems within Microsoft, Seagate, Symantec
tools
❏ Administration of Windows Server Active Directory.
❏ Maintain administration of 200 Virtual Server using Microsoft Hyper-V, VMware, Virtual box
❏ Provide administration and security of all physical and virtual server using Microsoft Forefront
and Linux services such as Iptables and/or Ipfire
❏ Troubleshoot any server-related and user devices problems or issues as necessary.
❏ Organize, verify and follow the update for all the Microsoft or Linux Client Server
❏ Secure the information and manage the traffic and information event with Alien vault (SIEM)
❏ Troubleshoot certificate and email encryption (PKI)
NETWORK & SYSTEM ADMINISTRATOR
❏ Configure and install various network devices and services (e.g., routers, switches, firewalls,
load balancers, VPN, QoS)
❏ Assist and drive investigation of new technology.
❏ Ensure the integrity of high availability network infrastructure in order to provide maximum
performance for the users
❏ Keep company’s computer network up to date and running smoothly
❏ Protect the network against malicious program
❏ Resolve potential networking issue such as configuration, performance, credential, permission
and right TCP/IP and security problem.
❏ Secure the access to the centralized or sharing resources
IT EXPERT
MICROSOFT ENVIRONMENT SERVER PRODUCT
o Advanced technical knowledge of Windows Server 2008/2008R2/2012/2012R2: install &
configure Active Directory, DNS, DHCP, File Services, and IIS.
o Implement role on server manager (Windows 2012 R2 Server)
o Implement Domaine name server
o Implement Active Directory with group policy
3. o Implement file server and shared folder
o High experience on Managing Data Protection Management (DPM 2010)
Troubleshot inconsistency check
Create backup data protection agent for virtual and physical server
Recover data from DPM
Analyze the efficiency and integrity of the stored backup
o Familiar with Storage Area Network (SAN) technologies
VIRTUALIZATION ENVIRONMENT
o Advanced knowledge on maintenance and troubleshooting with Microsoft Hyper-V
technologies:
o Troubleshoot virtual hard drive for snapshot .avhdx file issue and parent virtual hard
drive .vhdx
o Import and export virtual server
o Expand virtual hard drive size
o Expand virtual server resources
o Advanced maintenance and troubleshoot with VMWARE ESX and ESXi
LINUX
o High experience on network and system administration with Linux product
o Install and optimize system firewall with iptables
o Implement security agent with IPFIRE
o Implement Linux Networking
o Configure and maintain Domain Name Server
SECURITY
o Use various technical methods to safeguard customer data (IDS and Guardian with Ipfire)
o Design network intrusion detection system and implement supporting backup programs.
o Monitor security systems for any signs of hackers or fraudulent activity.
o Implement Ipfire for security purpose (enable red- blue-orange-yellow card, enable IDS
service and IDS log, enable URL Filter, enable geoIP )
o Implement Microsoft forefront service with automatic update
4. CISCO ADMINISTRATION
o familiar with Basic and Complex Cisco administration command
o Conception and Configuration Virtual LAN (VLAN)
o Setting up The Virtual Private Network (VPN)
o Configuring the Static and/or Dynamic Network Translation Address (NAT)
o Conception and Implementation Static Routing, RIP (Routing Information protocol)
VPN
o Implement Open-VPN with double level of authentication (Active Directory and Google
Authenticator)
o Generate authentication code from server
o Reset locked account
o Synchronize time NTP from OpenVpn and NTP server
PKI
o Install certificate for a machine and user outside certificate server
o Install certificate for digital signed message and encrypted e-mail
o Troubleshot encrypted e-mail issue
PBX SERVER
o Implement, manage and administer PBX server with VOIP phone client
o Manage and complete the project PBX phone system
o Troubleshoot VOIP CLIENT phone issue
BACKUP UTILITY
o High experience with Seagate Acronis system backup and recovery
o Backup and RECOVER the image file
VIDEO CONFERENCING
o Plan, manage and complete the project of converting from Windows Messenger Service
to Microsoft Lync 2010 for: instant messaging, video conferencing and remote desktop
sharing
5. CLOUD COMPUTING SERVICE
o Use standard AWS infrastructure features such as Virtual Private Cloud (VPC), Elastic
Compute Cloud (EC2), Elastic Load Balancing, and Auto Scaling from the command line
o Deploy Amazon EC2 instances using command line calls and troubleshoot the most
common problems with instances
o Manage user identity, AWS permissions, and security in the cloud
OTHER
o Supervised IT Specialist, Web Designer and personnel assisting with IT installations.
TECHNOLOGIES
PBX Server, AWS, Alvarion WiMAX, Cisco 1840 and 2600 series routers, switch cisco SG200
50, cisco Catalyst 2900 series XL switches. Tripp-Lite KVM switch port Net gear Ready NAS
Dell Power Vault 124t, MD 3000i Dell PowerEdge R510, 2950, 1950, 2650, R300, R710 Cisco
2900 Series 2911 Router, Cisco Aeronet 802.11a/b/g, APC Power chute down . Software-
Windows Virtual box, Hyper-V, VMware vSphere, VMware Fusion, VMware workstation 10
and vSphere client, Symantec endpoint protection, Citrix Access Gateway and Receiver,
Microsoft SharePoint, Acronis, Ghost File Recovery, Dreamweaver, Photoshop, Illustrator,
SQL, ACCESS, Visual Basic, Oracle OraClient 11G, Microsoft Office, Microsoft Lync for
Windows, and Java., COLTEC VOIP Telephone, , Windows Server 2000, 2003, 2008, 2012,
2012R2. Linux Red hat, fedora, Oracle Linux, Ipfire, Cisco Linksys Wireless G Access Points.
ACADEMIC TRAINING
2009: Training CCNA Cisco administrator (EGILIA Paris)
2007: Training Java development (INATA)
2000: INGENEER DIPLOMA / POLYTECHNIC COLLEGE SCHOOL MADAGASCAR (5
YEARS)