My experience

Carphone WarehouseApril 2019 - July 2019

Carphone Warehouse (GEKKO UK Limited)September 2018 - March 2019

Cut Label Holding LimitedDecember 2015 - December 2017


Clockwork Apparel LimitedJanuary 2014 - December 2015

• Help & Support Co-Workers to install security software’s & understand information system management.
• Handle online advertising projects ranging from SEO to social media marketing.
• Make alterations to the design.
• Develop and/or update content.
• Manage wholesale, retail websites, shop fronts & backend on Magento, Shopfy, WordPress.
• Ensure domain registration and hosting are up-to-date.
• Safeguard website functionality and perform software updates.
• Monitor, assess, and report on website performance.
• Contacting potential clients to establish rapport and arrange meetings.
• Planning and supervising new marketing initiatives.
• Researching organizations and individuals to find new opportunities.
• Increasing the value of current customers while attracting new ones.
• Finding and developing new markets and improving sales.
• Attending conferences, meetings, and industry events.
• Developing quotes and proposals for clients.
• Developing goals for the development team and business growth and ensuring they are met.
• Training personnel and assisting team members develop their skills.

JSG Systems LtdDecember 2012 - January 2014

• Conduction network security checks.
• Performing penetration testing & generating reports.
• Vulnerability assessment.
• Cyber awareness training.
• Raising awareness of security among the businesses.
• Supporting on-going security plans.
• Risk analysis & conducting risk workshops.
• Monitor computer networks for security issues & miss-configurations.
• Investigate security breaches & other cyber security related incidents.
• Install security measures & software to protect systems security including firewalls settings, data encryption.
• Fix detected vulnerabilities to maintain a high security standard.
• Research security enhancements & make recommendations to management.
• Stay updated on information technology, Data Security & security standard news.

JSG Systems LtdApril 2011 - December 2012

• Create new users
• 1st & 2nd line support
• Resetting user passwords
• Lock/unlock user accounts
• Monitor server security & special services, etc.
• User administration (setup & maintaining account)
• Verify that peripherals are working properly
• Quickly arrange repair for hardware in occasion of hardware failure
• Monitor system performance & Monitor network communication
• Creating file systems & Installing software
• Creating a backup and recovery policy
• Update system as soon as new version of OS and application software comes out
• Implement the policies for the use of the computer system and network
• Setup security policies for users. A sysadmin must have a strong grasp of computer security (e.g. firewalls and intrusion detection systems)
• Password and identity management

My stack

WordPress, Wireshark, Time Management, TCP/IP, SQL, Problem Solving, Penetration testing, nmap, Network Security, Network Design, Network administration, Nessus, MAN, Magento, Linux, JavaScript, Java, IT Security, ISO 27001, Information Security, Firewalls & Security, Firewalls, DevOps, Data Security, Cybersecurity, Consulting, Cloud Computing, C++, Business Development, Azure, Amazon Web Services (AWS)