Harry Leach

Cyber Security Administrator at Concero UK
  • Claim this Profile
Contact Information
Location
UK

Topline Score

Bio

Generated by
Topline AI

0

/5.0
/ Based on 0 ratings
  • (0)
  • (0)
  • (0)
  • (0)
  • (0)

Filter reviews by:

No reviews to display There are currently no reviews available.

0

/5.0
/ Based on 0 ratings
  • (0)
  • (0)
  • (0)
  • (0)
  • (0)

Filter reviews by:

No reviews to display There are currently no reviews available.
You need to have a working account to view this content. Click here to join now

Credentials

  • Microsoft 365 Certified: Fundamentals
    Microsoft
    Sep, 2022
    - Sep, 2024
  • Adobe Education Specialist - EMEA
    Adobe
    Jul, 2022
    - Sep, 2024
  • Google for Education Deployment
    Google
    Jun, 2022
    - Sep, 2024
  • Google for Education Sales
    Google
    Jun, 2022
    - Sep, 2024
  • OCR Level 3 Cambridge Technical Diploma in IT (Application Developer)
    Qualifications Wales / Cymwysterau Cymru
    Aug, 2021
    - Sep, 2024
  • Fortinet Network Security Expert Level 3: Certified Associate
    Fortinet
    May, 2022
    - Sep, 2024
  • Licensing Fundamentals
    Microsoft
    Oct, 2022
    - Sep, 2024
  • Acronis Cloud Sales Professional
    Acronis
    May, 2022
    - Sep, 2024
  • Acronis Cloud Tech Professional
    Acronis
    May, 2022
    - Sep, 2024

Experience

    • United Kingdom
    • IT Services and IT Consulting
    • 1 - 100 Employee
    • Cyber Security Administrator
      • Nov 2022 - Present

      • Support the development/update of protocols for business continuity and disaster recovery. • Support to defend network systems from unauthorised access, modification, or destruction. • Increasing other employee’s security awareness and ability to follow procedures. • Scanning a network and assessing it for vulnerabilities or reading the reports from those who do and deciding, with support, on a course of action. • Support putting network security policies in place, which includes application security, access control, and the safeguards for corporate data. • Watching network traffic for unusual activity or reading the reports of those who do. • Supporting configuration and provision of support for security tools: firewalls, patch management systems, and anti-virus software.

Community

You need to have a working account to view this content. Click here to join now