•
Developed and maintained build processes for desktops and laptops, aligning with industry best practices
•
Established & enforced specifications for operating systems core applications, ensuring compliance
•
Communicated effectively with clients to identify needs and deliver tailored IT solutions
•
Trained end-users on effective use of hardware and software applications, enhancing productivity
•
Provide daily technical support & Maintained comprehensive documentation of support activities, configurations & procedures
•
Install, configure & maintain desktop systems and applications to meet organizational standards
•
Developed and maintained comprehensive support documentation for troubleshooting processes
•
Performed diagnostics on LAN and WAN systems with expertise in TCP/IP, NAT, and related protocols and Implemented VLANs and inter-VLAN routing to improve network segmentation
•
Maintained Microsoft Windows Server functionality and managed user account creation and modifications
•
Provided comprehensive IT services including virus removal, OS restores, data recovery, and backups for diverse clients
•
Provided first-level support for basic IT issues, enhancing team efficiency
•
Troubleshot and deployed network devices including hubs, switches, and firewalls
•
Provided end-user support via email and phone, resolving technical issues promptly & maintained server health through regular system and software updates and backup verification
•
Monitored network traffic for unusual activity and responded to security breaches effectively & Analyzed security incidents to improve future response strategies
•
Delivered basic technical support for routine security issues, fostering a secure operational environment
•
Utilize SIEM tools for monitering and incident analysis, improving response capabilities
•
Assisted in the installation of firewalls and intrusion detection systems, enhancing network security & Provided technical support for firewalls, routers, and operational systems
•
Deployed and monitored IDS sensors, analyzing alert data for potential threats
•
Conducted forensic analysis on workstations and hard drives to investigate security incidents
•
Monitored operational logs to ensure system integrity and prevent unauthorized access
•
Worked as a part of cyber security under Blue Team to check malware virus & threat emails, collect event logs & create reports, resolve security alerts