Professional Experience
Presione Español para leer APTC777.INFO en Español
E-mail: support@aptc777.info
Expert State of the Art Bilingual English and Spanish Services:
· Public Relations (English/Spanish)
· Understanding and knowable:
A+ Certification, Networking (Physical/Wireless)
Network Security (hardware/Software)
· Computer technician with experience in
PC (Microsoft) and Macintosh,
open source operating systems and application programs.
· Multimedia Programs:
Adobe (Photoshop)
Macromedia and web page design.
· Multimedia presentations
· Technological support and training
· Available to adapt to any work setting with knowledge in technology implementations and developments.
· Customer services and enthusiastic team member.
· Dedicated to highest quality of work there fore willing to gain valuable experience.
Non-Profit Sector
Federacion de Camaras Colombhispano Amaricanas USA (FEDECAMARASUSA)
English/Spanish Public Relations and Website Administrator 2014 to present
Technology Support :
November 2006 to present
Southeast Community Development Corporation, California
Technology Instructor:
February 2004 to September 2004
Gateway Cities Partnership, Inc; Paramount, California
Education Sector: K-12 and higher education:
Adult School and higher Education Computer Network/Teacher Assistant:
February 2000 to April 2005
Los Angeles School District, California
-Bell High School: February 2004 to April 2005
-Miles Elementary: February 2000 to February 2004
-Huntington Park Community Adult School: October 2000 to June 2003
Library Assistant:
September 1998 to March 1999
North Orange County Community College:
Cypress College Library, Cypress California
Business Sector:
CPRANGELES.COM Associate
May 2013 to present
American Prestige Technology Consulting:
April 2005 to present
Independent English/Spanish Technology Services, California
SoipTelDSL:
Fall 2007 to present
English and Spanish Technical support
Voice Over TCP Technical Support:
November 2009 to January 2010
SpeechPhone, Lake Forest, California
PC Technician:
November 2006 to January 2010
Kimco Torrence, California
Security Guard:
October 2005 to November 2005
Securitas Commerce, California
Education
Graduated from Huntington Park High School 1992 to 1996
Higher Education:
Cypress College Fall 1996 to 2004: General Education and Computer Science
Occupational Safety and Health Administration10-hour Construction Safety and Health February 2017
Slawson Southeast Occupational Center
Los Angeles Unified School District Division of Adult and Carrer Education
Mobile Electronics Technician 1: June 2017
Electronics 1: July 2017
Qualifications
Community Development of Computer Centers
EmpowerNet California: San Francisco
Office Programs: Cypress College, California
Accessible Computing: Cypress College, California
Public Relations: Cypress College, California
Bureau of Security and Investigative Services:
Security Guard; Consumer Affairs: State of California
First Aid and CPR: Cypress College and Los Angeles School District
Experience providing bilingual and technical services in the Information Security Management ISO17799:2005; 10 major areas, including business continuity planning, physical and environmental security, compliance, personnel security, asset control and security policy at Los Angeles School District, SpeechPhone, SoipTel, Email Inc, and Southeast Community Development Corporation.
SECURITY POLICY
· Information security policy
· Information security policy document
· Review and evaluation
· Organizational
SECURITY
· Information security infrastructure
· Management information security forum Information security coordination
· Allocation of information security responsibilities
· Authorization process for information processing facilities
· Specialist information security advice
· Co-operation between organizations
· Independent review of information security
· Security of third party access
· Identification of risks from third party access
· Security requirements in third party contracts
· Outsourcing
· Security requirements in outsourcing contracts
ASSET CLASSIFICATION AND CONTROL
· Accountability of assets
· Inventory of assets
· Information classification
· Classification guidelines
· Information labelling and handling
PERSONNEL SECURITY
· Security in job definition and Resourcing
· Including security in job responsibilities
· Personnel screening and policy
· Confidentiality agreements
· Terms and conditions of employment
· User training
· Information security education and training
· Responding to security incidents and malfunctions
· Reporting security incident
· Reporting security weaknesses
· Reporting software malfunctions
· Learning from incidents
· Disciplinary process
PHYSICAL AND ENVIRONMENTAL SECURITY
· Secure Area
· Physical Security Perimeter
· Physical entry Controls
· Securing Offices, rooms and facilities
· Working in Secure Areas
· Isolated delivery and loading areas
· Equipment Security
· Equipment siting protection
· Power Supplies
· Cabling Security
· Equipment Maintenance
· Securing of equipment off-premises
· Secure disposal or re-use of equipment
· General Controls
· Clear Desk and clear screen policy
· Removal of property
COMMUNICATIONS AND OPERATIONS MANAGEMENT
· Operational Procedure and responsibilities
· Documented Operating procedures
· Operational Change Control
· Incident management procedures
· Segregation of duties
· Separation of development and operational facilities
· External facilities management System planning and acceptance
Capacity Planning
· System acceptance
· Protection against malicious software
· Control against malicious software
· Housekeeping
· Information back-up
· Operator logs
· Fault Logging
· Network Management
· Network Controls
· Media handling and Security
· Management of removable computer media
· Disposal of Media
· Information handling procedures
· Security of system documentation
· Exchange of Information and software
· Information and software exchange agreement
· Security of Media in transit
· Electronic Commerce security
· Security of Electronic email
· Security of Electronic office systems
· Publicly available systems
· Other forms of information exchange
ACCESS CONTROL
· Business Requirements for Access Control
· Access Control Policy
· User Access Management
· User Registration
· Privilege Management
· User Password Management
· Review of user access rights
· User Responsibilities
· Password use
· Unattended user equipment
· Network Access Control
· Policy on use of network services
· Enforced path
· User authentication for external connections
· Node Authentication
· Remote diagnostic port protection
· Segregation in networks
· Network connection protocols
· Network routing control
· Security of network services
· Operating system access control
· Automatic terminal identification
· Terminal log-on procedures
· User identification and authorization
· Password management system
· Use of system utilities
· Duress alarm to safeguard users
· Terminal time-out
· Limitation of connection time
· Application Access Control
· Information access restriction
· Sensitive system isolation
· Monitoring system access and use
· Event logging
· Monitoring system use
· Clock synchronization
· Mobile computing and teleworking
· Mobile computing
· Teleworking
SYSTEM DEVELOPMENT AND MAINTENANCE
· Security requirements of systems
· Security requirements analysis and specification
· Security in application systems
· Input data validation
· Control of internal processing
· Message authentication
· Output data validation
· Cryptographic
· Policy on use of cryptographic controls
· Encryption
· Digital Signatures
· Non-repudiation services
· Key management
· Security of system files
· Control of operational software
· Protection of system test data
· Access Control to program source library]
· Security in development and support process
· Change control procedures
· Technical review of operating system changes
· Technical review of operating system changes
· Covert channels and Trojan code
· Outsourced software development
BUSINESS CONTINUITY MANAGEMENT
· Aspects of Business Continuity Management
· Business continuity management process
· Business continuity and impact analysis
· Writing and implementing continuity plan
· Business continuity planning framework
· Testing, maintaining and re-assessing business continuity plan
COMPLIANCE
· Compliance with legal requirements
· Identification of applicable legislation.
· Intellectual property rights (IPR)
· Safeguarding of organizational records
· Data protection and privacy of personal information
· Prevention of misuse of information processing facility.
· Regulation of cryptographic controls
· Collection of evidence
· Reviews of Security Policy and technical compliance
· Compliance with security policy
· Technical compliance checking
· System audit considerations
· System audit controls
· Protection of system audit tools
Certificates and Achievements
Professional References: