Professional Experience: Impact and Contributions
My professional career demonstrates a clear progression of responsibility and technical depth, moving from specialized security systems to comprehensive enterprise IT management.
IT Executive
SKYLINK Innovations LimitedIn my current role, I function as the primary IT resource, overseeing the entire technology stack for SKYLINK Innovations Limited. My responsibilities are broad, encompassing strategic planning, infrastructure maintenance, and critical support functions.
Key Responsibilities and Achievements:
- Infrastructure Management: Managed the full lifecycle of IT assets, including servers, desktops, laptops, and network devices. This involved procurement, deployment, configuration, and eventual decommissioning, ensuring all hardware met organizational standards for performance and security.
- Application and Security Tool Maintenance: Installed, configured, and maintained a diverse portfolio of software applications and security tools (e.g., antivirus, endpoint detection and response systems) across the organization, ensuring all systems were patched and compliant.
- System Optimization and Monitoring: Implemented proactive monitoring strategies to track network performance and system efficiency. Successfully diagnosed and resolved chronic connectivity issues, leading to a measurable improvement in overall system uptime and user productivity.
- End-User Support and Troubleshooting: Provided Tier 1 and Tier 2 technical support, resolving hardware and software problems promptly. My systematic approach to troubleshooting minimized disruption and maintained high levels of user satisfaction.
- Cybersecurity and Data Protection: Implemented and enforced comprehensive data backup strategies and disaster recovery plans. Played a crucial role in defining and enforcing cybersecurity measures, including access controls and security awareness training for staff.
- Vendor Coordination: Managed relationships with third-party vendors for hardware procurement, system upgrades, and maintenance contracts, ensuring cost-effective and timely service delivery.
- Operational Documentation: Developed and maintained detailed IT process documentation and system inventories, creating a knowledge base that facilitated smoother operations and easier onboarding for new IT personnel.
IT Executive
NEXUS Netro LimitedConcurrently, I have applied my expertise to NEXUS Netro Limited, focusing heavily on network stability, server administration, and security infrastructure. This dual role showcases my exceptional time management, organizational skills, and ability to manage complex, parallel IT environments.
Key Responsibilities and Achievements:
- Network Infrastructure Administration: Administered and maintained the company's core network infrastructure, including the configuration and management of routers, switches, and firewalls to ensure secure and high-speed data transmission.
- Windows Server and AD Management: Managed the Windows Server environment and Active Directory, focusing on user access control, group policy implementation, and maintaining the integrity of the domain services. This was critical for ensuring secure system operations and compliance.
- LAN/WAN Performance Optimization: Monitored and optimized the performance of the Local Area Network (LAN) and Wide Area Network (WAN). Responsible for diagnosing and resolving complex connectivity issues, often involving deep-level network analysis.
- Security Implementation: Implemented layered security measures, including data backup solutions, enterprise-grade antivirus protection, and system-wide security policies to protect against internal and external threats.
- Cloud and Web System Efficiency: Configured and maintained the company's email, web, and cloud systems, ensuring high reliability and efficiency for critical business communications and online presence.
- Vendor and Service Provider Coordination: Coordinated with external vendors and service providers for the setup and ongoing maintenance of IT infrastructure components, ensuring projects were delivered on time and within budget.
Executive Software Engineer
Spy Security SystemThis role provided me with specialized, in-depth experience in physical security systems, which is a valuable cross-disciplinary skill set. My focus was on the design, deployment, and maintenance of surveillance and access control systems.
Key Responsibilities and Achievements:
- CCTV/VMS System Configuration: Expertly configured and managed comprehensive CCTV systems, encompassing both IP and analog cameras, Digital Video Recorders (DVRs), Network Video Recorders (NVRs), and Video Management Software (VMS).
- Custom VMS Solution Deployment: Designed and deployed custom VMS solutions tailored to specific client requirements, optimizing camera placement, storage capacity, and remote access capabilities.
- Network Infrastructure for Video Streaming: Set up and optimized network infrastructure, including routing, switching, and Quality of Service (QoS) configurations, specifically to support reliable, high-bandwidth video streaming without impacting the primary data network.
- System Integration: Ensured seamless integration of CCTV/VMS with other security systems, such as access control, to create a unified security platform.
- Preventive Maintenance: Instituted a rigorous preventive maintenance schedule, including regular firmware updates, camera calibration, and system health checks, significantly reducing system failures and ensuring continuous surveillance capability.
- Troubleshooting: Installed, configured, and troubleshooted IP camera systems and server components, resolving complex issues related to network latency, video loss, and storage failure.
Cybersecurity Intern (CEH)
Decodes Lab Ltd.The internship at Decodes Lab Ltd. was a critical period for formalizing my cybersecurity knowledge and providing hands-on experience with ethical hacking methodologies.
Key Contributions:
- CEH Techniques and Fundamentals: Gained practical experience focused on Certified Ethical Hacking techniques, solidifying my understanding of the attack lifecycle.
- Vulnerability Assessment and Penetration Testing: Performed VAPT on both web and network systems, utilizing a professional methodology to identify security weaknesses.
- Tool Proficiency: Developed advanced proficiency with core security tools: Nmap, Wireshark, Metasploit, Burp Suite, and Nessus, using them for threat analysis and exploitation testing in a controlled environment.
- Security Risk Analysis: Analyzed identified vulnerabilities, quantified security risks, and proposed actionable mitigation strategies to enhance the security posture of simulated client environments.
- Security Policy Development: Assisted in the development of foundational security policies and participated in basic incident response procedures, gaining exposure to the defensive side of cybersecurity.
- Simulation and Awareness: Collaborated on simulating attack and defense scenarios, which contributed to the development of real-world security awareness and preparedness.