jennifer oliveros

Infrastructure Operations and Security Specialist at CVE Technologies Group, Inc.
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Seattle, Washington, United States, US
Languages
  • English Full professional proficiency
  • Chinese Native or bilingual proficiency

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Experience

    • United States
    • Computer and Network Security
    • 1 - 100 Employee
    • Infrastructure Operations and Security Specialist
      • Apr 2023 - Present

      • Directs the installation and maintenance of hardware, software and telecommunications equipment in the company's data centers. • Maximize the efficiency and effectiveness of technology delivery and support. Identify opportunities to reduce costs and improve service levels. • Analyze, select and modify application software, install network hardware and software, and database management and integrity. • Assist senior management in establishing long-term technology goals and objectives for the company. • Review reports on progress, work trends and issues. • Ensures highly responsive technical support is provided to employees and identifies service gaps. • Reviews reports on progress, work trends, and issues. • Ensures highly responsive technical support is provided to employees and service gaps are identified. Communicate departmental progress and issues to executive level management. • Represents the interests of the company at multiple levels and performs other job duties as assigned. • Maintains network and system security, utilizing monitoring tools and support services. Install, configure and maintain the Fortinet security stack including Fortigate, Forticlient, Fortitoken, Fortisandbox and FortiAuthenticator. • Troubleshoot complex issues with Windows/Mac technologies and servers and systems, perform network address assignment, DHCP configuration and route management. Perform information security risk assessments of projects, new technologies, it assets, applications and vendors, and implement and monitor the effectiveness of it security controls. Prevent leakage of sensitive information to unauthorized individuals. Show less

Education

  • York University
    MSc Cyber Security, Computer science
    2010 - 2011

Community

You need to have a working account to view this content. Click here to join now