Jose Raymundo Lopez Arellano
Cyber Security Engineer at Orben Comunicaciones- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
Topline Score
Bio
Credentials
-
Cisco Certified CyberOps Associate 200-201
CiscoJan, 2021- Nov, 2024
Experience
-
-
Cyber Security Engineer
-
Nov 2019 - Present
• Installation and configuration of network security solutions and end equipment such as: Mail security: Cisco ESA, CES and SMA Web security: WSA, SMA DNS Security: Cisco Umbrella. (OpenDNS) Network monitoring: Cisco Stealthwatch and Securonix Perimeter security: Checkpoint, Fortinet, Cisco ASA and Cisco FTD. End Team Security: TrendMicro Apexone, Deep Security,Bitdefender Cisco AMP. • Revision of the Information Security Policy based on ISO 27001:2018 and… • Installation and configuration of network security solutions and end equipment such as: Mail security: Cisco ESA, CES and SMA Web security: WSA, SMA DNS Security: Cisco Umbrella. (OpenDNS) Network monitoring: Cisco Stealthwatch and Securonix Perimeter security: Checkpoint, Fortinet, Cisco ASA and Cisco FTD. End Team Security: TrendMicro Apexone, Deep Security,Bitdefender Cisco AMP. • Revision of the Information Security Policy based on ISO 27001:2018 and 20000-1• Responsible for troubleshooting in case of Incidents/Problems in our security platforms.• Some of the main technologies managed: Vulnerability analysis and management, Data Loss Prevention, Antimalware solutions via centralized console, Application Control, Host IPS, Disk Encryption, Web Filtering Gateways, VPN access, Network Access Control, Firewalls and Network IPS, Software distribution, PKI technology.• Alignment with legal and regulatory requirements (such as ISO27001 and ISO20000-1)• Coordinate periodical assessments on main Information Technologies and lead proper resolution.• Participation and follow-up on internal audits.• Make recommendations for updates on Information Security Policy, according to IT/OT evolution.• Participate in Security awareness campaigns and trainings for end-users.• Participate in Cyber-War-Rooms for relevant Security Incidents.• Coordinate participation of forensic investigation team, if necessary.• Implementation of Security best practices for the principal Cloud Software Suite of our users.• Implementation of Security Information and Event Management (SIEM) platform. Securonix• Enablement of the CyberSecurity Operations Center. Show more Show less
-
-
-
-
Cyber Security Consultant
-
Dec 2017 - Apr 2019
• CyberSecurity Consulting• Implementation of solutions (Mcafee, Fortinet, checkpoint, Comvault, Ips / ids, Forcepoint)• Planting of Cybersecurity solutions projects.• Implement and Operate the CyberSecurity technologies of the company.• Some of the main technologies managed: Vulnerability analysis and management, Data Loss Prevention, Antimalware solutions via centralized console, Application Control, Host IPS, Disk Encryption, Web Filtering Gateways, VPN… • CyberSecurity Consulting• Implementation of solutions (Mcafee, Fortinet, checkpoint, Comvault, Ips / ids, Forcepoint)• Planting of Cybersecurity solutions projects.• Implement and Operate the CyberSecurity technologies of the company.• Some of the main technologies managed: Vulnerability analysis and management, Data Loss Prevention, Antimalware solutions via centralized console, Application Control, Host IPS, Disk Encryption, Web Filtering Gateways, VPN access, Network Access Control, Firewalls and Network IPS, Software distribution, PKI technology.• Responsible for troubleshooting in case of Incidents / Problems in our security platforms. Show more Show less
-
-
-
-
Telecommunications Engineer
-
May 2017 - Dec 2017
• Security operation and deep analysis of Security Incidents on the client’s technology • assets. • Responsible to notify relevant Information Security risks and make recommendations for remediation.• Coordinate the maintenance of the infrastructure.• Incident management and support coordination.• LAN and WLAN network management.• CISCO CUCM and Elastix telephony administration.• Sonicwall and Cisco ASA firewall management.• Creation of diagrams and technical… • Security operation and deep analysis of Security Incidents on the client’s technology • assets. • Responsible to notify relevant Information Security risks and make recommendations for remediation.• Coordinate the maintenance of the infrastructure.• Incident management and support coordination.• LAN and WLAN network management.• CISCO CUCM and Elastix telephony administration.• Sonicwall and Cisco ASA firewall management.• Creation of diagrams and technical sheets.• Creation of reports of Changes and requirements.• Project management and changes in the communication infrastructure.• Configuration of switches and routers.• SSL and IPSEC VPN Configuration• Cisco AP installation and configuration.• Management of virtual and physical servers.• Search for new technologies and applications to improve infrastructure• Administration and configuration checkpoint, sonicwall, Cisco ASA, Fortinet, stonesoft, websense• SOC administration, monitoring reports. Show more Show less
-
-
-
-
Cyber Security Analyst
-
Nov 2016 - Apr 2017
• Installation and configuration of security equipment Fortinet, Cisco Meraki, checkpoint, websense, forcepoint, stonesoft.• Implementation of Network Access Control.• SSL and IPSEC VPN Configuration• Installation and configuration of Meraki, Fortinet, Checkpoint and Cisco Firewalls.• Fortianalyzer and Cisco Stealthwatch data analysis.• Design of Security services.• LAN network design.• CUCM and Unity administration.• Server Management. (DNS, DHCP, DC)• IPS… • Installation and configuration of security equipment Fortinet, Cisco Meraki, checkpoint, websense, forcepoint, stonesoft.• Implementation of Network Access Control.• SSL and IPSEC VPN Configuration• Installation and configuration of Meraki, Fortinet, Checkpoint and Cisco Firewalls.• Fortianalyzer and Cisco Stealthwatch data analysis.• Design of Security services.• LAN network design.• CUCM and Unity administration.• Server Management. (DNS, DHCP, DC)• IPS, IDS, Antivirus settings.• Virtualization in Hyper-V Show more Show less
-
-
-
-
Telecommunications Engineer
-
Mar 2012 - Oct 2016
• Budgeting of the systems area.• Telecommunications equipment quotes.• Server Management (AD, DHCP, DNS, File)• Implementation and configuration of Fortinet and Meraki Firewalls equipment.• Implementation and configuration of IPS and IDS. (Fortigate, Mcafee, Snort)• Implementation and configuration of HIPS and HIDS.• AP configuration (Cisco aironet, TPlink, Linksys, Cisco Meraki)• Structured cabling, and LAN network design.• Installation of voice and data… • Budgeting of the systems area.• Telecommunications equipment quotes.• Server Management (AD, DHCP, DNS, File)• Implementation and configuration of Fortinet and Meraki Firewalls equipment.• Implementation and configuration of IPS and IDS. (Fortigate, Mcafee, Snort)• Implementation and configuration of HIPS and HIDS.• AP configuration (Cisco aironet, TPlink, Linksys, Cisco Meraki)• Structured cabling, and LAN network design.• Installation of voice and data nodes.• Make backups of telecommunication equipment.• Implementation of Communications Rack.• Project planning. (Remodeling of branches)• Search for new IT solutions.• Internal audits in HW and SW.• Deliveries and preparation of computer equipment.• OS and IOS version update.• Configuration and design of security policy processes. Show more Show less
-
-
Education
-
Centro de Estudios Universitarios Monterrey