0% found this document useful (0 votes)
111 views5 pages

Peter Daizy Kyobe, 200 Charlotte Drive Apt T2 Laurel MARYLAND 2072, 443-979-2941

Peter Daizy Kyobe is seeking an IT role and has experience as a Linux administrator and Microsoft MTA security specialist. He has certifications in Server+, CompTIA+, Security+, Microsoft MTA, and Network Security+. Kyobe completed training at My Computer Career Raleigh Campus as an IT Professional. His experience includes providing systems support, installing and configuring hardware and software, and assisting with Amazon AWS infrastructure support.

Uploaded by

meher omer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
111 views5 pages

Peter Daizy Kyobe, 200 Charlotte Drive Apt T2 Laurel MARYLAND 2072, 443-979-2941

Peter Daizy Kyobe is seeking an IT role and has experience as a Linux administrator and Microsoft MTA security specialist. He has certifications in Server+, CompTIA+, Security+, Microsoft MTA, and Network Security+. Kyobe completed training at My Computer Career Raleigh Campus as an IT Professional. His experience includes providing systems support, installing and configuring hardware and software, and assisting with Amazon AWS infrastructure support.

Uploaded by

meher omer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

PETER DAIZY KYOBE, 200 CHARLOTTE DRIVE APT T2 LAUREL

MARYLAND 2072, 443-979-2941, [email protected]

Results-oriented IT service specialist with a proven track record of quickly learning new tools
and technologies. I am looking for an opportunity to fill an information technology role within
your company. Dedicated and confident, I studied at My Computer Career Raleigh Campus and
successfully completed my training with a certificate as an IT Professional. Server+, CompTIA+,
Security+, Microsoft MTA, Network Security+ certified. I work as an IT Specialist in various roles
at Cade Consulting. 

Professional Experience:
Cade Linux administrator October 2020 - Present

 Provided systems support for Internal and External Customers on elements of


new and existing compute, storage, network, and cloud platforms that are used
by transportation and transit agencies.
 Assisted with installing, configuring, and administrating physical compute and
storage nodes.
 Assisted with installing, configuring, and administrating Hypervisors (VMware,
Hyper-V) and guest OSs (Windows and Linux).
 Assisted with middleware application installation, configuration, and
administration – MS IIS, MS SQL, and others.
 Provided support on the Intelligent Transportation System software solution –
training will be provided
 Assisted with Amazon AWS infrastructure support, maintenance, and new
deployments.
 Assisted with VM replication, clones, back-ups, monitoring, and troubleshooting.

 Provided troubleshooting of Solaris servers and Linux operating systems to


determine errors and weaknesses in function and resolved all issues.
 Modified the company’s network file system and improved effectiveness by 20%.
 Provided project managers with ROI estimations and cost-saving measures to
assist them in making decisions regarding the implementation of production
servers and other monitoring tools.
Cade Microsoft MTA security specialist June 2021-Present
 confidentiality; integrity; availability; how threat and risk impact principles; principle
of least privilege; social engineering; attack surface analysis; threat modelling
Understand physical security
 site security; computer security; removable devices and drives; access control; mobile
device security; keyloggers Understand Internet security
 browser security settings; secure websites Understand wireless security
 advantages and disadvantages of specific security types; keys; service set identifiers
(SSIDs); MAC filters Understand operating system security (35-40%) Understand user
authentication
 multifactor authentication; physical and virtual smart cards; Remote Authentication
DialIn User Service (RADIUS); biometrics; use Run As to perform administrative tasks
Understand permissions
 file system permissions; share permissions; registry; Active Directory; enable or disable
inheritance; behavior when moving or copying files within the same disk or on another
disk; multiple groups with different permissions; basic permissions and advanced
permissions; take ownership; delegation; inheritance Understand password policies
 password complexity; account lockout; password length; password history; time
between password changes; enforce by using Group Policies; common attack methods;
password reset procedures; protect domain user account passwords Understand audit
policies
 types of auditing; what can be audited; enable auditing; what to audit for specific
purposes; where to save audit information; how to secure audit information Understand
encryption
 Encrypting file system (EFS); how EFS-encrypted folders impact moving/copying files;
BitLocker (To Go); TPM; software-based encryption; MAIL encryption and signing and
other uses; virtual private network (VPN); public key/private key; encryption algorithms;
certificate properties; certificate services; PKI/certificate services infrastructure; token
devices; lock down devices to run only trusted applications Understand malware
 buffer overflow; viruses, polymorphic viruses; worms; Trojan horses; spyware;
ransomware; adware; rootkits; backdoors; zero-day attacks Understand network
security (20–25%) Understand dedicated firewalls
 types of hardware firewalls and their characteristics; when to use a hardware firewall
instead of a software firewall; stateful versus stateless firewall inspection; Security
Compliance Manager; security baselines Understand network isolation
 routing; honeypot; perimeter networks; network address translation (NAT); VPN;
IPsec; server and domain isolation Understand protocol security
 protocol spoofing; IPsec; tunneling; DNSsec; network sniffing; denial-of-service (DoS)
attacks; common attack methods Understand security software (15–20%) Understand
client protection
 antivirus; protect against unwanted software installations; User Account Control
(UAC); keep client operating system and software updated; encrypt offline folders,
software restriction policies; principle of least privilege Understand email protection
 antispam, antivirus, spoofing, phishing, and pharming; client versus server protection;
Sender Policy Framework (SPF) records; PTR records Understand server protection
 separation of services; hardening; keep server updated; secure dynamic Domain Name
System (DNS) updates; disable unsecure authentication protocols; Read-Only Domain
Controllers (RODC)
 Successfully collaborated in integration of a multifaceted network of both Linux
and Windows environments by setting up multi-layered protocols
 Delivered real time troubleshooting consulting services for complex computer
networks at a client’s site
 Install and troubleshoot standard computer networks
 Independently repair individual and isolated PC problems
 Ensure appropriate setting up of compound computer networks by organizing
and coding systems of wires and cables
 Identify computer problems using specific diagnostic and repair tools
 Set up, check and maintain a range of private computing and office network
systems
 Assemble and document all system procedures as guidelines for new employees
and reference materials for computer technicians
 Ensure thorough inventory of computer related supplies is recorded and
maintained
Education:
 Nkumba University Wakiso Bachelor of Education                
 Kampala- Caltec Academy Kampala          
 Uganda Advanced Certificate of Education 

Skills:

 Understand security layers


 Understand operating system security
 Understand network security
 Understand security software
 Familiarity with physical, network, and software security
 Installing firewalls and routers
 Data encryption
 Risk mitigation strategy and threat analysis
 Knowledge of compliance regulations and standards like PCI-DSS, HIPAA, and CCPA
 Ethical hacking and penetration testing
 Administering diverse operating systems like Windows, Linux, or Mac
 Installing and configuring computer hardware and software
 Cloud administration and applications
 Maintaining local area networks (LAN), wide area networks (WAN), storage area
networks (SAN), and virtual private networks (VPNs)
 Troubleshooting
 Helping employees with technical issues
 Administering diverse operating systems like Windows, Linux, or Mac
 Installing and configuring computer hardware and software
 Cloud administration and applications
 Maintaining local area networks (LAN), wide area networks (WAN), storage area
networks (SAN), and virtual private networks (VPNs)
 Troubleshooting
 Configure, install, and upgrade operating systems, including Windows, Apple OS X,
Linux, iOS, Android, and Windows Mobile
 Install and image virtual machines
 Set up and troubleshoot peripheral devices
 Assemble and disassemble computing hardware
 Set up and support basic home and small office networks
 Implement cybersecurity controls appropriate to help desk and technical support
roles
 Troubleshoot and support end-user access to applications and data

Reference: Cade
Sylvie Gatcham : +1 (301) 606 0756

You might also like