SlideShare a Scribd company logo
1 of 1
1.Acts as Application Administrator Code Release , program management
2.Maintain effective automated data processing operation’s by developing required computer
programs, scripts, and routines using UNIX OS shell programming techniques and or commercial
products.
3.Preforms real time systemmonitoring and provide timely emergency response to prevent
interruptions and or restore automated production scheduling requirements.
4. Supports planning and coordination between operations and database administration, Application
administrators and users/clients related to automated production scheduling.
5. Ensure/implement the rigorous application of information Security Assurance policies, principles,
and practices in the delivery of systems,Applications and/orServices (Hardware & Softeare).
2. Certification holder information:
a. Berkley Atkisson
b. Certification ID number: COMP001020104313
c. Certification held: Security+
d. Daytime phone number: 757-631-6021
e. Unclass. email: Berkley.Atkisson@nexweb.org

More Related Content

Similar to it_experience

DIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements DocumentDIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements DocumentNicole Gaehle, MSIST
 
3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment QuestionnairePriyanka Aash
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire Vijay Νavgire
 
Albert G Info systems resume
Albert G Info systems resumeAlbert G Info systems resume
Albert G Info systems resumeAlbert Gonzales
 
Cyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comCyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comPrescottLunt386
 
Information Security Officer Internet Resume Leon Blum Copy
Information Security Officer  Internet Resume Leon Blum   CopyInformation Security Officer  Internet Resume Leon Blum   Copy
Information Security Officer Internet Resume Leon Blum CopyLblum1234
 
Business Case - SSD.pptx
Business Case - SSD.pptxBusiness Case - SSD.pptx
Business Case - SSD.pptxPritam Yadav
 
Resume_Mr Herbert A Thompson 10_16_2015
Resume_Mr  Herbert A Thompson 10_16_2015Resume_Mr  Herbert A Thompson 10_16_2015
Resume_Mr Herbert A Thompson 10_16_2015Herbert Thompson
 
Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder
 
Coronis - NYP Innovation Challenge Submission
Coronis - NYP Innovation Challenge SubmissionCoronis - NYP Innovation Challenge Submission
Coronis - NYP Innovation Challenge Submissionjohnkx
 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldArun Prabhakar
 
Final Presentation
Final PresentationFinal Presentation
Final Presentationchris odle
 
Job description of information officer
Job description of information officerJob description of information officer
Job description of information officerAli Khan
 
Mohammad Sohail - Document Controller
Mohammad Sohail - Document ControllerMohammad Sohail - Document Controller
Mohammad Sohail - Document ControllerMohammed Sohail
 
Case Study 1 (Autosaved)
Case Study 1 (Autosaved)Case Study 1 (Autosaved)
Case Study 1 (Autosaved)Makia Lucas
 
RFC 2196 Site Security Handbook
RFC 2196 Site Security HandbookRFC 2196 Site Security Handbook
RFC 2196 Site Security HandbookDavid Sweigert
 
LISTA DE CHECKLIST DE NORMATIVA HIPAA-ISO 27001
LISTA DE CHECKLIST DE NORMATIVA HIPAA-ISO 27001LISTA DE CHECKLIST DE NORMATIVA HIPAA-ISO 27001
LISTA DE CHECKLIST DE NORMATIVA HIPAA-ISO 27001CarlosMartinSantos1
 

Similar to it_experience (20)

DIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements DocumentDIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements Document
 
3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire
 
Albert G Info systems resume
Albert G Info systems resumeAlbert G Info systems resume
Albert G Info systems resume
 
bnewman resume (2)
bnewman resume (2)bnewman resume (2)
bnewman resume (2)
 
Cyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comCyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.com
 
Information Security Officer Internet Resume Leon Blum Copy
Information Security Officer  Internet Resume Leon Blum   CopyInformation Security Officer  Internet Resume Leon Blum   Copy
Information Security Officer Internet Resume Leon Blum Copy
 
Business Case - SSD.pptx
Business Case - SSD.pptxBusiness Case - SSD.pptx
Business Case - SSD.pptx
 
Resume_Mr Herbert A Thompson 10_16_2015
Resume_Mr  Herbert A Thompson 10_16_2015Resume_Mr  Herbert A Thompson 10_16_2015
Resume_Mr Herbert A Thompson 10_16_2015
 
Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17
 
Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1
 
Coronis - NYP Innovation Challenge Submission
Coronis - NYP Innovation Challenge SubmissionCoronis - NYP Innovation Challenge Submission
Coronis - NYP Innovation Challenge Submission
 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps World
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
Job description of information officer
Job description of information officerJob description of information officer
Job description of information officer
 
Mohammad Sohail - Document Controller
Mohammad Sohail - Document ControllerMohammad Sohail - Document Controller
Mohammad Sohail - Document Controller
 
Case Study 1 (Autosaved)
Case Study 1 (Autosaved)Case Study 1 (Autosaved)
Case Study 1 (Autosaved)
 
johndemunnik_MAY2016
johndemunnik_MAY2016johndemunnik_MAY2016
johndemunnik_MAY2016
 
RFC 2196 Site Security Handbook
RFC 2196 Site Security HandbookRFC 2196 Site Security Handbook
RFC 2196 Site Security Handbook
 
LISTA DE CHECKLIST DE NORMATIVA HIPAA-ISO 27001
LISTA DE CHECKLIST DE NORMATIVA HIPAA-ISO 27001LISTA DE CHECKLIST DE NORMATIVA HIPAA-ISO 27001
LISTA DE CHECKLIST DE NORMATIVA HIPAA-ISO 27001
 

it_experience

  • 1. 1.Acts as Application Administrator Code Release , program management 2.Maintain effective automated data processing operation’s by developing required computer programs, scripts, and routines using UNIX OS shell programming techniques and or commercial products. 3.Preforms real time systemmonitoring and provide timely emergency response to prevent interruptions and or restore automated production scheduling requirements. 4. Supports planning and coordination between operations and database administration, Application administrators and users/clients related to automated production scheduling. 5. Ensure/implement the rigorous application of information Security Assurance policies, principles, and practices in the delivery of systems,Applications and/orServices (Hardware & Softeare). 2. Certification holder information: a. Berkley Atkisson b. Certification ID number: COMP001020104313 c. Certification held: Security+ d. Daytime phone number: 757-631-6021 e. Unclass. email: Berkley.Atkisson@nexweb.org