Vincent Chan's curriculum vitae provides information about his professional experience including positions at China Construction Bank, Development Bank of Singapore, and Citigroup. He has over 20 years of experience in network engineering, cyber security, and project management. His areas of expertise include data center design, network infrastructure, voice systems, firewall security, and banking application software development.
Irfan Ur Rehman has over 10 years of experience in information technology and information security, including expertise in networking, firewalls, routing protocols, and risk management. He is currently serving as the Head of Juniper Solutions at Access Communication Solutions, where he is responsible for designing infrastructure solutions and providing technical support to customers. Previously, he worked at Tameer Microfinance Bank as a Senior Manager of Information Security, developing security policies and procedures to comply with standards. He has skills in areas like project management, team leadership, and strategic planning.
Jad ABOU MALHAM has over 8 years of experience in IT operations, infrastructure management, network security, ERP administration and project management. He currently works as the Group IT Manager for Boulos Group of Companies in Lagos, Nigeria, where he designed and implemented a new IT infrastructure. He has expertise in areas such as virtualization, backup solutions, Active Directory and network security. Previously, he worked as a Customer Engineer for QuanTech (IBM) in Lebanon, where he installed and configured VMware environments and backup solutions for several organizations. He holds certifications from Microsoft, VMware and IBM.
This document contains the resume of Grace Adedotun-Ogundeji, an IT professional with over 10 years of experience managing networks and systems in multi-vendor environments. She has qualifications in ITIL, CCNA, and is currently studying for an MSc in Cyber Security. Her experience includes roles as an IT Support Engineer, 3rd Line IT Support Technician, Systems Administrator, and Unix Systems Administrator. She has skills in Windows, Linux, networking, security, and more. Her objective is to work as a Chief Information Security Officer, leading information security planning and response.
Andrew Noma has over 20 years of experience in IT network management and security in the payments processing industry. He holds a Master's degree in Information Systems and ITIL v3 certification. As Senior Director of Global Network Engineering at Visa, Inc., he has led efforts to optimize networks and reduce costs, saving over $12 million in one year through telecommunications negotiations. He has extensive experience managing large IT budgets, network engineering projects, and global vendor relationships.
The document provides information on an Information Security Audit Consultant with over 8 years of experience in information security audits, risk assessments, network security, and compliance audits. The consultant has technical skills in networking, security administration, and project management and security certifications including CISSP, CISA, and CEH. Previous work experience includes security roles in telecom, finance, and other industries.
Chi Roland Awah Evina is a Cameroonian IT professional seeking a position that utilizes his skills in networking, systems administration, and project management. He has over 8 years of experience in roles such as Network Technician and IT Manager. His education includes certifications in Microsoft Server administration, CompTIA A+ and N+, and Linux administration. He is proficient in technologies like Windows Server, Active Directory, VMware, and networking hardware. References are available from his past manager and lecturer.
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)Rui Miguel Feio
Have you ever thought the perils of smart home devices? In this presentation we discuss the Internet of Things (IoT) and the concept of Bring Your Own Device (BYOD) and the security challenges and risks they can be to companies, systems, and ultimately to the mainframe.
Irfan Ur Rehman has over 10 years of experience in information technology and information security, including expertise in networking, firewalls, routing protocols, and risk management. He is currently serving as the Head of Juniper Solutions at Access Communication Solutions, where he is responsible for designing infrastructure solutions and providing technical support to customers. Previously, he worked at Tameer Microfinance Bank as a Senior Manager of Information Security, developing security policies and procedures to comply with standards. He has skills in areas like project management, team leadership, and strategic planning.
Jad ABOU MALHAM has over 8 years of experience in IT operations, infrastructure management, network security, ERP administration and project management. He currently works as the Group IT Manager for Boulos Group of Companies in Lagos, Nigeria, where he designed and implemented a new IT infrastructure. He has expertise in areas such as virtualization, backup solutions, Active Directory and network security. Previously, he worked as a Customer Engineer for QuanTech (IBM) in Lebanon, where he installed and configured VMware environments and backup solutions for several organizations. He holds certifications from Microsoft, VMware and IBM.
This document contains the resume of Grace Adedotun-Ogundeji, an IT professional with over 10 years of experience managing networks and systems in multi-vendor environments. She has qualifications in ITIL, CCNA, and is currently studying for an MSc in Cyber Security. Her experience includes roles as an IT Support Engineer, 3rd Line IT Support Technician, Systems Administrator, and Unix Systems Administrator. She has skills in Windows, Linux, networking, security, and more. Her objective is to work as a Chief Information Security Officer, leading information security planning and response.
Andrew Noma has over 20 years of experience in IT network management and security in the payments processing industry. He holds a Master's degree in Information Systems and ITIL v3 certification. As Senior Director of Global Network Engineering at Visa, Inc., he has led efforts to optimize networks and reduce costs, saving over $12 million in one year through telecommunications negotiations. He has extensive experience managing large IT budgets, network engineering projects, and global vendor relationships.
The document provides information on an Information Security Audit Consultant with over 8 years of experience in information security audits, risk assessments, network security, and compliance audits. The consultant has technical skills in networking, security administration, and project management and security certifications including CISSP, CISA, and CEH. Previous work experience includes security roles in telecom, finance, and other industries.
Chi Roland Awah Evina is a Cameroonian IT professional seeking a position that utilizes his skills in networking, systems administration, and project management. He has over 8 years of experience in roles such as Network Technician and IT Manager. His education includes certifications in Microsoft Server administration, CompTIA A+ and N+, and Linux administration. He is proficient in technologies like Windows Server, Active Directory, VMware, and networking hardware. References are available from his past manager and lecturer.
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)Rui Miguel Feio
Have you ever thought the perils of smart home devices? In this presentation we discuss the Internet of Things (IoT) and the concept of Bring Your Own Device (BYOD) and the security challenges and risks they can be to companies, systems, and ultimately to the mainframe.
This document discusses the challenges of managing global IT projects through two case studies of HSBC banking projects. It outlines the critical success factors, such as having clear roles and responsibilities, multi-site monitoring procedures, effective communication, and avoiding scope creep. The project manager plays a key role in overseeing the complexities of coordinating teams across countries and ensuring common goals while allowing for regional customization.
This document contains the resume of Abdulla Amin AlMudharreb, an experienced IT professional seeking a leadership role managing IT operations or service delivery. He has over 16 years of experience in IT infrastructure management, application development, and IT service delivery for government departments in Dubai. His experience includes roles managing networking, technical support teams, and currently as Head of Section of Administrative Affairs and Technical Support at the Financial Audit Department in Dubai, where he oversees IT services and administration for the department.
Rothke effective data destruction practicesBen Rothke
This document discusses effective practices for ensuring data destruction when decommissioning digital media. It emphasizes the importance of having a formal sanitization process and policy to mitigate risks from failed data removal. The types of media sanitization are described as clearing, purging and destroying data, with purging providing protection against laboratory attacks. Both software and hardware-based methods are outlined, including the benefits of secure erase for purging and degaussing for data destruction. Regulations and standards that inform policies are also referenced.
The document discusses insider threats and cybersecurity. It notes that the biggest threat companies face is from insiders like employees and vendors. While doing nothing on cybersecurity risks costly data breaches and fines, companies should implement regular employee training, vet vendors thoroughly, and create a risk management plan to address vulnerabilities. The presentation provides tools to assess risks like DREAD and STRIDE models and recommends prioritizing the highest impact risks with mitigation strategies and an incident response plan.
How to Protect Your Mainframe from Hackers (v1.0)Rui Miguel Feio
This presentation addresses the requirements to protect the mainframe system from hackers. Common problems that need to be addressed, risks and mentalities that need to adapt to the new security realities.
Skeletons in the Closet: Securing Inherited ApplicationsDenim Group
Many security officers worry less about the security of new applications being built and more about the security of hundreds of applications they inherited. What applications represent the biggest risk? What attributes make them more or less risky? What are the most cost-effective courses of action given budget constraints in today’s business environment? This interactive workshop will help participants understand how to attack this problem and create a risk-based approach to managing the security of an existing application portfolio using tools like the OWASP ASVS model. The session will decompose an example application to determine how to conduct a bottom-up risk profile for future risk comparison against other applications. The audience will also participate in an exercise comparing different applications to better understand the ranking process. The audience will leave with a framework, action plan and basic understanding of the risk-ranking process that they can immediately apply to their work environment.
This presentation focuses on how security officers or development leaders can apply a disciplined approach to building internal consensus to build secure software. A five-step process will be laid out that will enable a manager to characterize the landscape, secure management buy-in, baseline the existing risks, set modest goals and attempt to achieve them, and sustain the initiative. Emphasis will be on actionable steps that successful managers have used to drive the adoption of secure software strategies in large organizations.
Security Audit on the Mainframe (v1.0 - 2016)Rui Miguel Feio
In this session Rui Miguel Feio will draw on his experience as a mainframe security expert to advise on how to perform a security audit on the mainframe. Rui will address what to consider before, during and after a security audit and the value and importance a company can expect from it.
In a digital age of cloud computing and mobile systems; where cyber security, cyber crime and cyber war are part of the day-to-day vocabulary, how secure is the mainframe? Is it safe to assume that the mainframe is secure by default? Can we ignore the fact that the mainframe is just another platform in the great scheme of things? How vital is the mainframe and the data that it stores for you and your company?
A successful Global Procurement Manager & Information Technology professional with experience in all major technology infrastructures. Currently, Senior Vice President of a major global organization responsible for global technology contract negotiations focusing on infrastructure support services, outsourcing, leasing and purchasing of technology and implementing cost management models.Ability to develop strategies, analyze, plan and implement cost effective business solutions. Manage internal client and external vendor relationships and ensuring system service levels, performance objectives and best of class contracts implemented. Extensive technical background in implementing systems, networks, telecommunications, client/server architecture, mainframe and distributed server computing. A proven professional with excellent results and references.
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2Rui Miguel Feio
What tools are out there today?
How do these tool impact us?
What's the state of mainframe security?
How do we keep up to date?
How do we protect ourselves?
What are IBM and the vendors doing to help us?
The document discusses approaches for ensuring IT security for NGOs with global presences and limited resources. It emphasizes managing security through the lens of people, procedures, and tools. The presentation outlines key premises of information security, such as treating it as a lifestyle rather than an event. It provides suggestions for dealing with challenges like maintaining security on a limited budget and in a global setting. It stresses the importance of having the right people, clear and simple procedures, and tools used to implement security policies.
This document summarizes a presentation about assessing and managing school network security. It discusses the results of vulnerability assessments conducted on 50 school websites, which found over 110 critical vulnerabilities. The top issues were SQL injection, cross-site scripting, and outdated components. Managing security is challenging due to increasing systems, data, and user touchpoints. Trends include taking a security-centric approach across the network and adopting comprehensive managed security services. Key aspects of security management are people, technology, process and having a security operations center for monitoring, alerting and incident response.
This document discusses software optimization strategies and services provided by Connection to help organizations improve productivity and save costs. Connection has experts who can assess an organization's current software environment, identify optimization opportunities, and provide solutions such as modernizing infrastructure, supporting new messaging platforms, and optimizing Microsoft software investments. Their services include application migrations, licensing analysis, and helping customers get the best value from their Microsoft software.
Bevan Lane has over 17 years of experience in information security consulting, auditing, and training. He has delivered training to over 50 clients worldwide and has consulted on more than 10 ISO27001 implementation projects. Currently, he is consulting on three ISO27001 and one PCI compliance project. Previously, he led a team conducting ISO 27001 audits across 25 sites for Shell Oil Company over six years while at PricewaterhouseCoopers.
Mainframe Security - It's not just about your ESM v2.2Rui Miguel Feio
In this session we will be taking a look at some of the other security controls available to help us protect our mainframe systems. Don’t be fooled by the non-mainframe folk who say the mainframe is fine, because it's behind a firewall.
We will discuss and encourage debate around a number of non ESM related security controls that should/must be used to protect our mainframe systems.
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)Rui Miguel Feio
5 ‘myths’ that can put the future of the mainframe at risk. How can the mainframe survive after 50 years of existence? How bright is the future? How secure is the mainframe?
Heather Davies is seeking a position that utilizes her 10+ years of customer service experience and over eight years of banking experience, including five years in commercial loan accounting. She has worked at Wells Fargo Bank for over seven years in roles of increasing responsibility such as Loan Servicing Specialist 4/5 and 6, where her duties included reviewing and interpreting commercial loan documentation, accounting for loans from $50,000 to over $1 billion, and facilitating training. She also has two years of retail management experience. Currently, she is pursuing a Bachelor's degree in Business with an Accounting major and Management minor from Mary Baldwin College.
This document discusses the challenges of managing global IT projects through two case studies of HSBC banking projects. It outlines the critical success factors, such as having clear roles and responsibilities, multi-site monitoring procedures, effective communication, and avoiding scope creep. The project manager plays a key role in overseeing the complexities of coordinating teams across countries and ensuring common goals while allowing for regional customization.
This document contains the resume of Abdulla Amin AlMudharreb, an experienced IT professional seeking a leadership role managing IT operations or service delivery. He has over 16 years of experience in IT infrastructure management, application development, and IT service delivery for government departments in Dubai. His experience includes roles managing networking, technical support teams, and currently as Head of Section of Administrative Affairs and Technical Support at the Financial Audit Department in Dubai, where he oversees IT services and administration for the department.
Rothke effective data destruction practicesBen Rothke
This document discusses effective practices for ensuring data destruction when decommissioning digital media. It emphasizes the importance of having a formal sanitization process and policy to mitigate risks from failed data removal. The types of media sanitization are described as clearing, purging and destroying data, with purging providing protection against laboratory attacks. Both software and hardware-based methods are outlined, including the benefits of secure erase for purging and degaussing for data destruction. Regulations and standards that inform policies are also referenced.
The document discusses insider threats and cybersecurity. It notes that the biggest threat companies face is from insiders like employees and vendors. While doing nothing on cybersecurity risks costly data breaches and fines, companies should implement regular employee training, vet vendors thoroughly, and create a risk management plan to address vulnerabilities. The presentation provides tools to assess risks like DREAD and STRIDE models and recommends prioritizing the highest impact risks with mitigation strategies and an incident response plan.
How to Protect Your Mainframe from Hackers (v1.0)Rui Miguel Feio
This presentation addresses the requirements to protect the mainframe system from hackers. Common problems that need to be addressed, risks and mentalities that need to adapt to the new security realities.
Skeletons in the Closet: Securing Inherited ApplicationsDenim Group
Many security officers worry less about the security of new applications being built and more about the security of hundreds of applications they inherited. What applications represent the biggest risk? What attributes make them more or less risky? What are the most cost-effective courses of action given budget constraints in today’s business environment? This interactive workshop will help participants understand how to attack this problem and create a risk-based approach to managing the security of an existing application portfolio using tools like the OWASP ASVS model. The session will decompose an example application to determine how to conduct a bottom-up risk profile for future risk comparison against other applications. The audience will also participate in an exercise comparing different applications to better understand the ranking process. The audience will leave with a framework, action plan and basic understanding of the risk-ranking process that they can immediately apply to their work environment.
This presentation focuses on how security officers or development leaders can apply a disciplined approach to building internal consensus to build secure software. A five-step process will be laid out that will enable a manager to characterize the landscape, secure management buy-in, baseline the existing risks, set modest goals and attempt to achieve them, and sustain the initiative. Emphasis will be on actionable steps that successful managers have used to drive the adoption of secure software strategies in large organizations.
Security Audit on the Mainframe (v1.0 - 2016)Rui Miguel Feio
In this session Rui Miguel Feio will draw on his experience as a mainframe security expert to advise on how to perform a security audit on the mainframe. Rui will address what to consider before, during and after a security audit and the value and importance a company can expect from it.
In a digital age of cloud computing and mobile systems; where cyber security, cyber crime and cyber war are part of the day-to-day vocabulary, how secure is the mainframe? Is it safe to assume that the mainframe is secure by default? Can we ignore the fact that the mainframe is just another platform in the great scheme of things? How vital is the mainframe and the data that it stores for you and your company?
A successful Global Procurement Manager & Information Technology professional with experience in all major technology infrastructures. Currently, Senior Vice President of a major global organization responsible for global technology contract negotiations focusing on infrastructure support services, outsourcing, leasing and purchasing of technology and implementing cost management models.Ability to develop strategies, analyze, plan and implement cost effective business solutions. Manage internal client and external vendor relationships and ensuring system service levels, performance objectives and best of class contracts implemented. Extensive technical background in implementing systems, networks, telecommunications, client/server architecture, mainframe and distributed server computing. A proven professional with excellent results and references.
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2Rui Miguel Feio
What tools are out there today?
How do these tool impact us?
What's the state of mainframe security?
How do we keep up to date?
How do we protect ourselves?
What are IBM and the vendors doing to help us?
The document discusses approaches for ensuring IT security for NGOs with global presences and limited resources. It emphasizes managing security through the lens of people, procedures, and tools. The presentation outlines key premises of information security, such as treating it as a lifestyle rather than an event. It provides suggestions for dealing with challenges like maintaining security on a limited budget and in a global setting. It stresses the importance of having the right people, clear and simple procedures, and tools used to implement security policies.
This document summarizes a presentation about assessing and managing school network security. It discusses the results of vulnerability assessments conducted on 50 school websites, which found over 110 critical vulnerabilities. The top issues were SQL injection, cross-site scripting, and outdated components. Managing security is challenging due to increasing systems, data, and user touchpoints. Trends include taking a security-centric approach across the network and adopting comprehensive managed security services. Key aspects of security management are people, technology, process and having a security operations center for monitoring, alerting and incident response.
This document discusses software optimization strategies and services provided by Connection to help organizations improve productivity and save costs. Connection has experts who can assess an organization's current software environment, identify optimization opportunities, and provide solutions such as modernizing infrastructure, supporting new messaging platforms, and optimizing Microsoft software investments. Their services include application migrations, licensing analysis, and helping customers get the best value from their Microsoft software.
Bevan Lane has over 17 years of experience in information security consulting, auditing, and training. He has delivered training to over 50 clients worldwide and has consulted on more than 10 ISO27001 implementation projects. Currently, he is consulting on three ISO27001 and one PCI compliance project. Previously, he led a team conducting ISO 27001 audits across 25 sites for Shell Oil Company over six years while at PricewaterhouseCoopers.
Mainframe Security - It's not just about your ESM v2.2Rui Miguel Feio
In this session we will be taking a look at some of the other security controls available to help us protect our mainframe systems. Don’t be fooled by the non-mainframe folk who say the mainframe is fine, because it's behind a firewall.
We will discuss and encourage debate around a number of non ESM related security controls that should/must be used to protect our mainframe systems.
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)Rui Miguel Feio
5 ‘myths’ that can put the future of the mainframe at risk. How can the mainframe survive after 50 years of existence? How bright is the future? How secure is the mainframe?
Heather Davies is seeking a position that utilizes her 10+ years of customer service experience and over eight years of banking experience, including five years in commercial loan accounting. She has worked at Wells Fargo Bank for over seven years in roles of increasing responsibility such as Loan Servicing Specialist 4/5 and 6, where her duties included reviewing and interpreting commercial loan documentation, accounting for loans from $50,000 to over $1 billion, and facilitating training. She also has two years of retail management experience. Currently, she is pursuing a Bachelor's degree in Business with an Accounting major and Management minor from Mary Baldwin College.
Allison B. Devore has over eight years of experience in financial services, providing courteous and professional customer service including account management, tax preparation, insurance, and lending services. She has held several roles with increasing responsibility at State Employees' Credit Union of North Carolina, most recently as a Senior Financial Services Representative. Devore obtained her life insurance license and mortgage lending qualifications to better assist credit union members. She is a dependable leader with strong organizational skills.
The document describes several projects the author worked on involving large scale live events and installations at various Westfield shopping centers in London. They summarize demolishing walls to create a secret pop up club with a gold dance floor and live Grace Jones performance. They also oversaw a futuristic 3D fashion show, the Twilight movie premiere with a 300m carpet, and a Rihanna performance for 10,000 people that included projection and pyrotechnics on a short timeline. Finally, they discuss conceptualizing and executing a soundproof box for immersive band performances over a year and a half.
This document provides a course syllabus for an Insurance Fetac Level 5 lecture. The purpose is to provide learners with knowledge and skills for a career in insurance. The module aims to develop an understanding of the insurance industry structure and the main types of insurance available. It also aims to gain a detailed understanding of insurance principles and how to apply them to real situations. The module consists of 6 units covering insurance and risk, the insurance market, contracts, and principles. Assessments include two assignments worth 20% each and a written exam worth 60%. Grades of pass, merit and distinction are awarded based on percentage scores.
The document discusses a conceptual map technique for oral presentations called a roundtable discussion. A roundtable discussion involves gathering a group of experts on a topic to discuss different perspectives on an issue. Participants in a roundtable take turns briefly presenting their views and answering questions from others in the group and audience. The format allows for an interactive exchange of diverse ideas and insights on a complex subject from people with relevant backgrounds and experience.
Guia clasificación de elementos por similitudAndrea Mesa
Las instrucciones dividen a los animales en dos grupos basados en una característica común de cada grupo y pide al estudiante que observe las imágenes, complete los recuadros para cada animal y escriba o dibuje los animales y su característica distintiva en cada grupo.
Traemos a vuestra consideración un tema que a nuestro juicio resulta importante y que, entendemos, no
debe pasar inadvertido, porque afecta a todos los contribuyentes de la Ciudad Autónoma de Buenos Aires,
sobre todo a quienes se encuentran radicados y establecidos en el interior de nuestro país tributando bajo el
Régimen del Convenio Multilateral.
Andrew Chalmers has over 14 years of experience in IT management and technical support roles. He most recently served as the ICT Manager/Coordinator at Parrs Wood High School & 6th Form, where he managed a team of 4 that provided support to over 2,500 users. In this role, he delivered numerous projects on time and under budget, increased access to technology, and reduced organizational costs by over £300,000 through strategic procurement and implementation of new technologies. He is now seeking a new role where he can continue providing value through his expertise in areas such as project management, strategic planning, support operations, and vendor management.
John Rehmert has over 20 years of experience in information technology with expertise in systems engineering, operations management, and project management. He has held senior roles overseeing IT infrastructure and operations. Currently, he provides engineering consultation for mission-critical systems to the intelligence community.
Mohamed Aman Mohamed Elhelw has over 11 years of experience in ICT service desk management, desktop support, systems and network administration, and information security analysis. He is currently the ICT Service Desk Team Leader at United Gas Derivatives Company in Abu Dhabi, where he manages the help desk function, desktop support, and a team of specialists. Previously he held roles as an Information Security Analyst at Bank of Alexandria and Senior IT Engineer at Suez Canal Container Terminal. He has a B.S. in Communications and Electronics and an M.B.A. in General Management.
John Rehmert is a solutions-driven IT professional with extensive experience in engineering and operations across many IT disciplines. He has successfully driven the planning, architecture, deployment and operations of heterogeneous information systems infrastructure. He provides technical leadership and consultation for global mission-critical systems. He is also skilled at relationship building, communication, and gaining trust with stakeholders.
Jane Miller is an information technology security specialist with over 20 years of experience in IT security, network design, and systems analysis. She is currently the Information Security Manager at City Power & Light, where she established their enterprise-wide information security program, developed security policies and procedures, and led security compliance audits. Prior to this role, she worked as a QA Manager and Computer Systems Engineer, demonstrating leadership in project management, software development, and customer support. She holds a Bachelor's degree in Computer Science and professional certifications in information security and systems engineering.
Jorge Torres has 18 years of experience in IT operations and project management across various industries. He has expertise in network architecture, security, disaster recovery, and cloud solutions. Currently he is the IT Director for Central Research, where he led projects such as building a new data center, implementing new security and compliance solutions, and redesigning web scrapers to improve efficiency.
John Hornsby is an experienced IT professional with over 15 years of experience in technical support and system administration roles. He has strong skills in IT support, troubleshooting, project management, and training. His background includes roles as an engineer and team leader providing support across various platforms such as Windows, Active Directory, Exchange, and Unix. He is seeking new opportunities where he can utilize his expertise in IT support, stakeholder management, and ensuring business continuity.
Suboor Ali has over 10 years of experience in information security solutions including firewalls, VPNs, SIEM, DLP and other security technologies. He has extensive technical skills and experience designing, implementing and supporting security solutions for enterprises. Some of his project experiences include building security operations centers, implementing data leak prevention, and designing secure network architectures for banks, government organizations and other clients.
This document provides a summary of Tianqiang Yu's work experience and skills. He has over 8 years of experience in IT, networking, customer service, and technical support. Some of his key experiences include routing and switching, security, F5 load balancing, and Palo Alto firewalls. He is proficient in network administration, routing protocols, security technologies, and has experience supporting corporate clients and managing teams. He has certifications in Cisco CCNP, CCNA, and is working towards Cisco CCIE Security. He is currently working as a Security Operations Engineer for Citizens Bank, where he is responsible for network and security operations support.
This document is a resume for Muneer Awadh Balqadi summarizing his career experience and qualifications. It outlines his 14+ years of experience managing IT operations and infrastructure projects for universities and other organizations in Saudi Arabia. Key skills and responsibilities included IT strategy, network management, project management, and leading teams to implement systems like IP telephony, data centers, and security solutions.
Elaine Hutcheson is an experienced IT professional with over 30 years of experience managing IT projects and teams at Perth and Kinross Council. She has held several leadership roles at the Council, currently serving as the IT Coordinator for Customer & Business Services. Elaine has a proven track record of delivering complex IT projects on time and within budget, and has extensive experience implementing ITIL frameworks and digital transformation strategies. She is skilled in areas such as project management, IT asset management, procurement, and relationship management.
Gicel Josephine Ragasa is an IT professional with over 15 years of experience in project planning, implementation, administration, and support of wireless broadband and network systems. She has worked in senior operations and technical roles for various companies in Dubai, UAE, providing presales support, technical training, systems integration, and troubleshooting. Her technical proficiencies include wireless solutions from Motorola, Ubiquiti, Ruckus Wireless, and E-Band, as well as network management and RF planning tools.
3. Technology Assurance
• Manage the use of operational information gathered from IT and NT operations to estimate higher level satisfaction / impacts from what the overall technology organization delivers and achieves
• Assure this information applied in systematic improvement activities beyond / above routine operational performance activities – drive additional activities for Quality in design, build and operate process stages
• Oversee conducting the in-depth quality & performance analysis and generate reports to drive improvement actions in the NT and IT organizations as required
This document contains a current vita for Ibrahim Sulaiman Said Alamri. It includes details of his work experience as an Information Technology Manager for the Ministry of Defiance since 2007 and previously as a Service Center Manager from 2006 to 2007. It also lists his education qualifications and professional certificates. The vita outlines his key responsibilities and activities in areas such as strategy planning and implementation, budgeting, technology assurance, technology operations support, and people management. It provides an objective and lists skills, projects undertaken, and languages spoken.
The document contains a current vita for Ibrahim Sulaiman Said Alamri. It includes details of his work experience as an Information Technology Manager for the Ministry of Defiance since 2007 and previously as a Service Center Manager from 2006 to 2007. It also lists his education qualifications and professional certificates. The vita outlines his key responsibilities and accountabilities including strategy planning and implementation, budgeting, technology assurance, technology operations support, and people management. It provides an objective and lists skills, projects, and languages.
This document provides a summary of Biju C. Alex's professional experience and qualifications. He has nearly 24 years of experience in IT project delivery management, infrastructure management, service management, and other areas. Some of his roles and responsibilities have included pioneering IT infrastructure planning and building, proficiency in ITIL best practices, business continuity planning, and leading major projects such as ERP implementations. He has worked in senior IT roles for several organizations in India.
This document is a resume for Kathryn I. Tetreault, an experienced IT Director with over 20 years of experience leading the implementation of corporate systems and managing IT departments. She has extensive experience in areas such as system development, computer support, database design, networking, and project management. She holds several IT certifications and degrees focused on information technology and project management. The resume provides details on her technical skills, work history managing IT for nonprofit organizations, and accomplishments implementing various software systems and technologies.
Youssef Amr Madkour is seeking an engineering position in telecommunications. He has over 7 years of experience providing customer support and technical expertise to multinational telecom companies including Orange Business Services and ECCO Outsourcing. He has strong technical skills including networking, security, and programming. He is fluent in English and French with technical certifications including CCNA, Security+, ITIL, and Palo Alto Networks.
This document contains Sorabh Mangal's resume. It summarizes his contact information, IT skills and experience. He has over 15 years of experience in IT support roles, including managing infrastructure support for various clients. His technical skills include Windows server, Active Directory, virtualization technologies and networking. He holds a Master's degree in Information Systems.
Hisham El Mourad is a senior T24 consultant with over 10 years of experience working on T24 projects in Lebanon, UAE, and KSA. He has experience with T24 releases G12 through R14 and modules including customer, accounts, loans and deposits, funds transfer, and teller. El Mourad has experience with T24 development, testing, implementation, and support of versions, enquiries, interfaces, and more. He is proficient in T24 programming and testing methodologies.
1. Curriculum Vitae
PERSONAL INFORMATION:
Name: CHAN Chiu Ming (Vincent)
Gender: Male
Nationality: Hong Kong Citizen / Singapore Permanent Resident
Email: receive4me@gmail.com (preferred contact)
Mobile Phone: +65-86708893 (Singapore)
+852-68569181 (Hong Kong)
Home phone: +852-23421986 (Hong Kong)
Languages: English, Mandarin Chinese (Putonghua) and Cantonese
EDUCATION:
• Bachelor of Engineering (Hons) in Computer Systems Engineering – University
of Warwick, UK (July 1993)
• Master of Business Administration in Finance and Investment – University of
Hull, UK (1998)
PROFESSIONAL AFFILIATIONS:
• Passed Chartered Financial Analyst (CFA) Level I exam in 2002
• Passed written exam of Cisco Certified Internetworking Expert (CCIE) for
routing and switching
• Passed ITIL Foundation (2011)
• Microsoft Certified Product Specialist for Windows (MCP ID: 260780)
• Netwise Certified Professional Software Developer for Middleware – Remote
Procedure Call (RPC)
Research and Development:
• Cyber/Internet/Digital bank without branches – Cyber/Internet/Digital banking,
aka, a FinTech company with bank license and banking services
• State of the art Cyber banking system WITHOUT IBM mainframe, Oracle
database and EMC storage, lower IT cost per customer bank account to 1 to 2 USD
• New breed banking system architecture– a distributed approach with massive
scalability, fast deployment and no data center relocation
• Mobile App Architecture
• Next generation datacentre design
PROFILE SUMMARY:
• Entrepreneur and innovation mind-set and founded/ran a start-up Technology
company for 10 years
• Excellent financial and cost analysis/control, and annual/project budget management,
with MBA degree and passed CFA Level 1 exam in 2002
• All-round IT technology profile including Data Center, Network, Voice, Cyber security,
Middleware, Microsoft Windows, Linux and banking application software development
• Sound working knowledge of Cyber security governance/management
framework(Total Visibility and Complete Control together with life cycle :assessment, gap
analysis, remediation planning, implementation roadmap and execution), corporate security
policy, security compliance (IT Security Audit), security technologies (Firewall, WAF,
IDS/IPS, WAF, Sandbox, Proxy, anti-DDOS, anti-virus), security operations: system
hardening, log review, security incident detection/management, mitigation/remediation,
Last Updated on 04/11/16 1/10
2. reporting and vulnerability/threat management (Vulnerability scanning, Penetration testing)
• Proven leader armed with over 20 years of global experience in establishing and
managing Network, Voice and Firewall Security Infrastructure policies/standards/operations
in key global markets, namely China, Hong Kong, Macau, Japan, Korea, Taiwan, Malaysia,
Singapore, Vietnam, Thailand, Indonesia, UAE, New Zealand, Australia, Luxembourg,
Netherland, Switzerland, Italy, Spain, Russia, Germany, UK, South Africa, Canada, USA,
Chile and Brazil – Have led up to 35 staff globally
• Working experience in highly demanded US investment bank and US bank with
diversified cultures, languages and races
• Well exposure to a dynamic working environment with continued corporate mergers
and acquisitions that evolved corporate technology standards/management
practice/roadmap for regional IT consolidation and integration to support business growth
• Tremendous project management experience with full project cycle starting from
business requirements, solution, costing, budgeting, planning, deployment, user acceptance
test, documentation and operation handover.
• Know-how in 3 types of audit and regulatory requirements from US, Singapore and
Hong Kong including risk management/control, data management/protection, security,
business continuity and so on.
WORK EXPERIENCE:
China Construction Bank, Hong Kong
Head of Network (Network / Voice / Cyber Security) June 2015 - Present
• In charge of network engineers supporting the International/Global network
infrastructure outside China, covering Hong Kong, Macau, Japan, Korea, Taiwan, Malaysia,
Singapore, Vietnam, UAE, New Zealand, Australia, Luxembourg, Netherland, Switzerland,
Italy, Spain, Russia, Germany, UK, South Africa, Canada, USA, Chile and Brazil, in addition
to 2 data centers in Hong Kong as international hub
• In charge of voice engineers supporting the international Cisco voice infrastructure
• In charge of security engineers supporting Cyber security infrastructure including
multiple brands of firewalls, IDS/IPS, Sandbox, Proxy, anti-DDOS, anti-virus and so on
• Manage annual budget of over 50 millions US dollars
• Responsible for Cyber security governance/management framework(Total Visibility
and Complete Control together with life cycle: assessment, gap analysis, remediation
planning, implementation roadmap and execution), corporate security policy, security
compliance (IT Security Audit), security technologies (Firewall, WAF, IDS/IPS, WAF,
Sandbox, Proxy, anti-DDOS, anti-virus), security operations: system hardening, log review,
security incident detection/management, mitigation/remediation, reporting and
vulnerability/threat management (Vulnerability scanning, Penetration testing)
• Govern security matters and safeguard network from intrusions, unauthorized access,
attacks, loopholes, phishing, threats, APT, viruses and malwares through Internet and/or
third party connections such as Bloomberg and Reuters
• Enforce best management and technology practices by focusing on improvement of
people, process and technology and by leveraging from previous international working
experiences
• Ensure all technology setup in compliance with corporate security policy, internal audit
and regulatory requirements from Hong Kong Monetary Authority
• Assume Full responsibilities of the International network, voice and firewall security
infrastructures including new initiatives, engineering design, project implementation and
24x7 operations support including, least but not last, incident/problem management, change
control/management, security management, circuit management,
Last Updated on 04/11/16 2/10
3. capacity/availability/performance/resilience management, disaster recovery/contingency
planning, design and configuration management, patch management, network
management/monitoring, asset management, vendor management, cost/budget
management and staff skill enhancement.
• Making sure that the network performance and reliability meet banking application
requirements including AML, OCBS, ODAS, HKICL, FTS, Risk Manager and so on.
• Responsible for office build-out of new overseas branches around the world
Key accomplishments:
- Proposed a new breed cyber banking system/services with a distributed architecture
but WITHOUT branches, IBM mainframe, Oracle database and EMC storage, for low IT
cost, massive scalability, fast deployment and no data center relocation
- Proposed a new solution to completely revamp the existing security infrastructure in
reacting to the latest development of cyber threats such as APT
- Successfully detected and protected the business from external attacks in South
Africa and Singapore
- Revised operations support framework by enforcing best management and technology
practices
Development Bank of Singapore (DBS), Singapore
Vice President Feb 2013 – May
2015
• In charge of the whole Operations support of both Network and Voice technology
infrastructure in Singapore
• Lead L3 technology support team to review and approve design and change, and to
troubleshoot production problems
• Lead L1 technology support team to provide first line support to production problem
and day to day operation support including circuit outages,auditing and maintenance review
• In charge of Voice Integration team for development of projects and new initiatives
• In charge of Voice Operation team for BAU operation support of a phone user base of
over 15,000, 2 call centers of over 800 agents and around 2000 voice recording channels
• Be a team member of the “Change the Bank” and Service excellence teams
• Manage annual budget of over 12 millions US dollars
• The role to be extended to cover other countries in Asia Pac including Hong Kong,
China, Macau, Taiwan, Vietnam, Malaysia and Indonesia in a 5-year roadmap
• Define 5-year roadmap to take over operation support from IBM after buy-back of
outsourcing contract, and to form a regional support organization
• Focus on continual improvement of process, people and technology with new
initiatives
• Review current operation practice and formulate best industry practice to support the
bank business that never sleeps
• Improve and enhance operation model to guarantee zero problem due to changes
• Oversee Voice Infrastructure of the bank with Avaya IP PABX, Cisco IP PABX, NICE
recording and so on.
• Ensure all technology setup in compliance with corporate security policy, internal audit
and regulatory requirements from Monetary Authority of Singapore
• Provide operations support for all Voice products in the bank
• Provides operational consultancy and advisory services to the business, systems
development and technology production services for system integration, product evaluation,
projects, new business engagements (i.e. acquisitions, integrations, new premises, major
projects etc)
• Develop influential and trustworthy working relationships with other technology and
Last Updated on 04/11/16 3/10
4. business peers to communicate and achieve performance objectives. This is aimed at
reduced decision-making and implementation times and focused on intelligent re-
engineering
• Add value to the organization & other technology streams by timely and proper
engagement and recommending best-fit solutions that meet the bank’s operational support
objectives. e.g. recommends tuning of systems, reduction in latency supporting high
performance communications and cost effectiveness
• Develop, manage and drive strategic relationships with IT Network/Voice vendors and
partners for the benefit of the bank and business where required
• Take ownership of work until resolution or delivery specifically on Severity incidents
• Be responsible for root cause analysis(RCA) process and creation of all technical
incident reports for the bank’s Network/Voice platforms
• Facilitate co-authored and published Network/Voice operational documentation
• Be responsible for maintaining, managing and executing the master services
agreements
• Be the primary contact in Operations for any Severity 1 operational issue for
Network/Voice systems
• Governance of FULL project development cycle and development of best-fit
technology solution to the Bank
• Transition ALL projects to BAU operations team
• Manage and govern financial budgets and spending
Key accomplishments:
• Office relocation from ComTech to Toh Guan including back office and contact center
with more than 200 agents
• Successfully upgraded voice recording system NICE3.2 with over 4700 recording
channels to 4.1
• Proposed new ISDN trunk design to improve diversity and resilience and to enhance
Disaster Recovery and BCP for DBS Asia Hub site with more than 2500 users
• Proposed new Business Continuity Plan for Voice to improve user transparency and
eliminate costly technical operation support, for Marina Bay Headquarter with 4500 users
and for DBS Asia Hub with 2500 users.
• Developed a PABX failover test plan to avoid service disruption on 24x7 contact
center operation
• Resolved long outstanding root cause of IMAX6.5 SL2 production problem
• Revised and imposed operation guidelines and rules such as DDI number assignment
• Reviewed pricing of vendor professional services resulted in 68% cut
• Enhanced SLA with a reduction of 1 hour in Mean Time to Problem Solving by revising
operation support model
BroadTel International Limited, Hong Kong & China
Head of Technology Development / Partner Jun 2001 – Jan 2013
• Set up of the new business venture from scratch
• Leading technology team for product development(software and hardware) based on
embedded Linux kernel and Microsoft Windows
• Steering technological direction for the business
• Formulating technological and business strategies for corporate development
• Developing Sales and marketing plan
• Identifying, studying and evaluating innovative technology
• Developing, transforming and consolidating the state of the art technologies into
business solutions/products to meet business needs
Last Updated on 04/11/16 4/10
5. • Managing and monitoring product development cycle
• Establish business relationship and cut deals with various suppliers in supply chain in
China
• Client need analysis
• Improvement of operational and production efficiency and cost control
• Problem management
• Governance of quality of service
• Corporate web site setup, development, management and update
• Office administration and management, cost control
Key accomplishments:
• Developed a USB phone adapter with built-in flash drive and RJ11 port for phone
connection, supporting Windows AutoRun for autoloading of 3rd
party software.
• Developed a SIP soft phone for Microsoft Windows to work seamlessly with the USB
phone adapter.
• Developed a 8-port PCI card with FXS and FXO daughter board for an Open Source
IP PBX running on a Linux PC computer
• Developing an embedded Linux kernel based VOIP telephone adapter supporting
H.323, SIP and IAX2
• Developing an embedded Linux kernel based handheld IP PBX with 4-port FXS/FXO,
4-port ISDN and 1-port T1/E1 for home users and small businesses.
• Leading development of a VoIP system for provisioning of carrier-graded voice, SMS
and video services over broadband Internet connections for residential and small/medium
business customers. This is a single platform that supports H.323, SIP and MGCP protocols,
and integrates with email/web system and PSTN/GSM mobile network. It includes:
A Linux-based VoIP softswitch
SIP proxies for connections from analog phone adapters, softphones and IP phones
PSTN/SS7 gateways for connection to PSTN network
SMS gateways for exchange of SMS messages with GSM mobile networks
A voicemail system
A audio conference server
A proprietary proxy to support NAT traversal over NAT devices
A Radius server for authentication, Authorization and Accounting
A Linux-based billing system with Web interface and MySQL database.
Citigroup, Hong Kong
Vice President Aug 1998 – May 2001
• Assume full responsibilities for Data Center, Voice, Network and Network Security
infrastructures in Asia Pacific region including Hong Kong, Singapore, Taiwan, China,
Korea, Malaysia, Indonesia, Thailand and India.
• Manage network team for technology engineering design, project implementation and
operation support in Asia Pacific
• Manage ALL Network, Voice and Network Security systems including regional data
networks, firewalls, PABX systems and IPC Dealerboard trading systems, voice recorders
and voicemail system in Asia Pacific together with Disaster Recovery and Business
Continuity planning
• Manage annual budget of over 80 millions US dollars
• Budget preparation and financial tracking of projects and BAU spending
• Development of Firewall standard and security management with reference to corporate
security policy, internal audit and regulatory requirements
Last Updated on 04/11/16 5/10
6. • Monitor, review and streamline work process and procedures for management of change,
capacity, performance and security.
• Take ownership of technology architecture design/review
• Review and approve project design and development
• Share other technology streams with the best practice in using network resources
• Explore and develop strategic directions for future business technologies
• Represent Asia Pacific in development and formulation of new global standards and
strategies of Citigroup
• Apply and enforce adoption of global corporate technology standards in Asia Pacific
• Focus on continued improvement of process, people and technology with new initiatives
• Interface business units for new business requirements and define deliverables for team
players
• Management reporting of daily and project updates to senior management and business
units
• Dot-line reporting to New York Headquarter management
Key accomplishments:
• Designed and implemented 2-tier network security infrastructure with Cisco PIX and
Checkpoint firewalls for Internet access and 3-rd party extranets such as Reuters and
Bloomberg, leading to development of network security framework and management
• Developed secure network infrastructure for support of AMS/3 being deployed by
Stock Exchange of Hong Kong.
• Revised the regional firewall deployment strategy and associated security policy in
Asia Pacific including Australia.
• Revised a regional remote access solution and essential security policy for bandwidth-
demanding home users, telecommuters and clients/customers.
• Restructured and built a global corporate backbone and data centers for the group.
• Integrated Shroders’s regional network and PABX after recent acquisition of its
investment banking arm
• Office expansion and restacking in Hong Kong.
• Build-out of a new office in Bombay, India.
• Office relocation to a new building in Seoul, including build-out of a new data center
and trading floors of 100 seats together with a Checkpoint Firewall infrastructure for
connection from KOSPI exchange
• Office build-out in Taipei
• Planning and budgeting for office restructuring and expansion in Taipei.
• Developed an unified trading floor for co-locating trading arms from Salmon Smith
Barney and Citibank. The new trade floor eliminated all legacy delivery mechanisms for
market data services, live video broadcasting like CNN, and so on. The new design aims at
provisioning of a manageable, scaleable, fault tolerant platform that will be more flexible to
support rapid changing business environment. Scope of work included:
Chair the Core Technology Infrastructure Group’s weekly meeting
Liaison with Business Unit Managers
Keep Track of budget spending
Lead in development of the evolving Core Technology Infrastructure Group for
Citigroup in Asia
Define deliverables for each and every team within the group
Coordinate amongst different teams for project implementation
Keep track of project progress in line with project schedule
Interface with NY headquarter and Citibank Singapore for development and
implementation of regional technology solution
Keep the developing regional design/architecture in line with the new global standards and
Last Updated on 04/11/16 6/10
7. solutions
• Worked together with global team including Tokyo and New York to define the new
global standards on LAN, WAN, Voice, Firewall and Dealing systems for the newly formed
financial conglomerate – Citigroup
• Designed and implemented a fault tolerant domestic ATM-based network
interconnecting 3 major buildings in Hong Kong for Salomon Smith Barney and Citibank.
Both companies leverage the network for delivery of mission critical services, remote backup
of business data and support of business continuity while disaster occurred in any of the
buildings.
• Developed and proposed a new strategic solution that can support an integrated
delivery of voice, data and video over the existing WAN backbone infrastructure for
bandwidth efficiency and cost savings.
• Co-located Salomon Smith Barney office in Seoul, Jakarta and Beijing into Citibank
premises
Acquired and developed business requirements
Evaluated the existing technology infrastructure of Citibank for compliance of SSB
technology standards
Liaise between local technical support team of Citibank and local vendors for delivery
of technology solutions which is compliant to global standards
Prepared budget for the co-location
Managed the implementation of the concluded design and solution
• Sourcing and evaluating suitable Call Accounting Systems for a regional deployment
in Asia
• Evaluated the existing technology infrastructure of Citibank for compliance of SSB
technology standards
• Liaised between local technical support team of Citibank and local vendors for delivery
of technology solutions which are compliant to global standards
Citigroup/Salomon Brothers (US investment bank), Hong Kong
Assistant Vice President April 1996 – Jul 1998
• Acted as the team leader of AP Communications department
• Performed the role of a Network Architect for design, engineering, implementation and
support of data centers and the regional corporate infrastructure (LAN + WAN + Voice +
Video + Firewall) spreading over Asia Pacific area including Hong Kong, mainland China,
Singapore, Korea, Thailand, Taiwan, Australia, Malaysia and Indonesia;
Scope of work covered the following:
Firewall standard development and security management
Managing and integrating junior staff to the team
budget preparation and tracking for projects
project management and monitoring
Monitoring & analysing network and PABX capacity & performance;
Isolating & troubleshooting network problems;
Reviewing and setting up network security policy;
Capacity planning for network and PABX growth;
Voice Support including move, add and change of phones and dealerboard and
troubleshooting
Getting involved in budgeting cycle;
Liaising with vendors for price negotiation & project deployment;
Designing wiring closet and structured cabling system
BAU – Day to Day support activities such as trading floor/dealing room support,
and addition & relocation of phones for users.
Key accomplishments:
Last Updated on 04/11/16 7/10
8. • Deployed the first corporate firewall solution/infrastructure for retrieving historical
financial market data of Reuters Session Services and Internet Access with local web server
• Designed and developed firewall network infrastructure for security protection against
external network access from joint ventures’ networks in Korea.
• Deployed Open Bloomberg system in Hong Kong through the existing Cisco PIX
firewall infrastructure and also its delivery to Kuala Lumpur office through intranet.
• Led the development of in-house security system that incorporates state of the art
technology in authentication, authorization and accounting of remote dial-in access by the
use of Ascend MAX4000s and SecureDynamics ACE Server and one-time token password
(SecureID card).
• Designed and proposed for LAN re-engineering with Cisco Catalyst 5500 series
Ethernet Switches in Hong Kong for performance enhancement, ease of management and
additional support of multimedia delivery.
• Migrated analog voice recorder to MERCOM digital voice recorder
• Expanded IPC dealerboard system for accommodation of additional 100 trading desks
• Expanded Lucent PBX
• Developed the regional strategy and network infrastructure for ISDN backup to
international leased circuits connecting to different satellite offices.
• Initiated the restructuring of the existing global DNS system and taking a regional lead
role in its implementation.
• Managed the consolidation and the relocation of disparate networks in 2 branch
offices at 2 Pacific Place in Hong Kong for cost savings:
• Developed a network management system for monitoring of network capacity and
alerting of system failure by customising and integrating a set of public domain network
management software (MRTG) from the Internet.
• Established an inter-office ISDN connection between 2 branch offices in Sydney, Australia.
• Planned for Triarch roll-out in Singapore office for delivery of real time market data,
and deployment of Reuters Session Services for delivery of historical market data.
• Designed for roll-out of remote access services for home users in Singapore and
guided remote technical staff on the project development and deployment including training
on equipment configuration.
• Developed a feasible solution for remote access to the Salomon Network from Hong
Kong Futures Exchange. The whole system has been built with a remote notebook
computer running Windows NT 4.0 connecting to a Cisco router at central site over ISDN.
By using Multilink PPP 2 ISDN B channels are aggregated into a bundle of 128Kbps so as
to provide throughput for bandwidth-intensive X Windows application.
• Migrated from old-fashioned standalone Reuters RT terminals to its networked version
running on Windows NT machines.
• Led the implementation of a network infrastructure for Reuters Select Feed + (RSF+)
services for accessing to real time financial market data.
• Investigated a solution for graceful co-existence of Reuters Select Feed and Reuters
Select Feed Plus financial market data services by distributing UDP broadcasting packets to
different segments.
• Implemented a network management and monitoring system with HP OpenVew and
HP Netmetrix in Hong Kong office.
Macroview Telecom, Hong Kong
Software Engineer/Project Consultant August 1993 - March 1996
• Application software development for banks
• Pre- and Post-“ Sales technical activities, Preparation of tender proposal, Network design,
Products demonstration and presentation
Last Updated on 04/11/16 8/10
9. • network installation and implementation, product evaluation and testing and in-house
Novell LAN and ORACLE database administration
Key Accomplishments:
• COPUT for Standard Chartered Bank
Sole embedded application developer for automatically updating customers’ bank
passbooks by COPUT over a SNA/LU0 session via SDLC multi-drop lines.
.
• COPUT for Thai Farmers’ Bank
Sole embedded application developer for automatically updating customers’ bank
passbooks by COPUT over a SNA/LU0 session via SDLC multi-drop lines.
• COPUT for Bank of East Asia
Sole embedded application developer for automatically updating customers’ passbooks by
COPUT with 3270 terminal emulation on IBM LANDP over Token Ring network.
• Directed the development of in-house inventory control system on ORACLE database
• Designed and implemented a network system for an Internet service provider (ISP),
which is trying to provide Internet access services to the public in mainland China;
• installed and maintained Novell Netware file servers, SUN SPARC servers, ORACLE7
server, and E-mail system for internal and external communication through the Internet
• Worked with a project team from ORACLE to implement a benchmark set-up for
demonstrating how mission critical client/server computing can effectively offload processing
from IBM mainframe using Netwise’s state of the art middleware, Remote Procedure Call.
This was to compete with Sybase & Informix teams for the tender from Hong Kong
Immigration Department.
• Proposed a router based IP network to interconnect around 300 remote branch offices
of Ping An Insurance Company, spreading over the country by using Cisco routers over
public X.25 services, dial-up lines and private leased circuits; Offered a series of tailor-made
training programs to a class of over 50 trainees from the company.
TRAINING PROGRAM ATTENDED:
Cisco Systems
- Cisco SNA configuration for multi-protocol administrators
- IPv6 Fundamentals, Design and Deployment
Checkpoint
- Advanced Firewall-1 4.0 Management (CCSE)
- Advanced Firewall-1 4.0 Management (CCSA)
Microsoft
- Implementing and Administering Microsoft 2000 Directory Services (MS2154)
- Designing Microsoft Windows 2000 Directory Services Infrastructure (MS1561)
- Implementing Microsoft 2000 Network Infrastructure (MS2153)
- Implementing Microsoft 2000 Professional and server (MS2152)
- Programming Microsoft SQL server 2000 Database (MS2073)
- Administering Microsoft SQL Server 2000 Database (MS2072)
NICE – voice recording
- NICE Interaction Management 4.1 – NICE Certified System Administrator
Standard
Algorithmic Research, Israel
- CryptoKit Product Training (Encryption Software and Tools)
Last Updated on 04/11/16 9/10
10. Learning Tree International
- Project Management Skills for Success: Hands-on
Netwise, Inc (US middleware vendor)
- Using Netwise RPC Tool with Windows
- Using Customization with Netwise RPC Tool
- Network Computing using Netwise RPC Tool
- Using Netwise System for Mainframes: MVS/IMS & MVS/CICS
The Hong Kong Polytechnic University
- Video Games Development (Game Programming)
PRODUCT KNOWLEDGE:
Network: Cisco, Juniper, F5, Huawei
Security: Checkpoint, Fortinet, Juniper, Cisco, Bluecoat, Pala Alto, Huawei
Voice: Avaya/Lucent, Asterisk, IPC, NICE, VoIP
Server: Sun Microsystem, Intel X86
Application Server: Oracle, MySQL, SQL server, Active Directory, Apache Tomcat
Market Data: Reuters, Bloomberg
OS: Microsoft Windows, Unix, Linux, Embedded Linux, IBM OS/2
Middleware: Remote Procedure Call, RMI
Programming Language: C, C++, Pascal, Java, HTML
Cloud: Openstack
Last Updated on 04/11/16 10/10