Salmon Mzizi

Network Security Specialist (Project Delivery) at Bayport Financial Services Group | BML
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
City of Johannesburg, Gauteng, South Africa, ZA

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Experience

    • Mauritius
    • Financial Services
    • 100 - 200 Employee
    • Network Security Specialist (Project Delivery)
      • Jul 2018 - Present

      Strategy & Planning  Create and maintain the enterprise’s security architecture design.  Develop, implement, maintain, and oversee enforcement of policies, procedures and associated plans for system security and user system access based on industry-standard best practices.  Design and implement disaster recovery plan for operating systems, databases, networks, servers, and software applications.  Assess need for any security reconfigurations (minor or significant) and execute them if required.  Keep current with emerging security alerts and issues.  Conduct research on emerging products, services, protocols, and standards in support of security enhancement and development efforts. Acquisition & Deployment  Select and acquire additional security solutions or enhancements to existing security solutions to improve overall enterprise security as per the enterprise’s existing procurement processes  Recommend, schedule, and perform security improvements, upgrades, and/or purchases.  Oversee the deployment, integration and initial configuration of all new security solutions and of any enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprise’s security documents specifically. Show less

    • South Africa
    • IT Services and IT Consulting
    • 700 & Above Employee
    • Senior Perimeter Security Engineer
      • May 2016 - Jul 2018

      Duties: - Design, deploy, and support enterprise class Fortinet, Checkpoint, Blucoat, Cisco ASA, Palo Alto and SSL VPN devices. - Design, deploy, and support Fortinet, Checkpoint, Blucoat, Cisco ASA & Palo Alto clients - Complex troubleshooting to include network protocol and log analysis, raw data captures, and the correlation of disparate events spanning multiple devices and platforms. - Windows, UNIX, and Linux system administration and security. - Network security controls such as IDS, IPS, DLP, and WAF - Enterprise network architecture, design, and support to include network hardware, network protocols, and data flows Strategy & Planning - Create and maintain the enterprise’s security architecture design. - Develop, implement, maintain, and oversee enforcement of policies, procedures and associated plans for system security and user system access based on industry-standard best practices. - Design and implement disaster recovery plan for operating systems, databases, networks, servers, and software applications. - Assess need for any security reconfigurations (minor or significant) and execute them if required. - Keep current with emerging security alerts and issues. - Conduct research on emerging products, services, protocols, and standards in support of security enhancement and development efforts. Acquisition & Deployment - Select and acquire additional security solutions or enhancements to existing security solutions to improve overall enterprise security as per the enterprise’s existing procurement processes Recommend, schedule, and perform security improvements, upgrades, and/or purchases. - Oversee the deployment, integration and initial configuration of all new security solutions and of any enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprise’s security documents specifically. Show less

    • Mauritius
    • Financial Services
    • 100 - 200 Employee
    • Security Specialist
      • Nov 2014 - May 2016

      •Create and maintain the enterprise’s security architecture design. •Develop, implement, maintain, and oversee enforcement of policies, procedures and associated plans for system security and user system access based on industry-standard best practices. •Design and implement disaster recovery plan for operating systems, databases, networks, servers, and software applications. •Assess need for any security reconfigurations (minor or significant) and execute them if required. •Keep current with emerging security alerts and issues. Conduct research on emerging products, services, protocols, and standards in support of security enhancement and development efforts. •Select and acquire additional security solutions or enhancements to existing security solutions to improve overall enterprise security as per the enterprise’s existing procurement processes •Recommend, schedule, and perform security improvements, upgrades, and/or purchases. •Oversee the deployment, integration and initial configuration of all new security solutions and of any enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprise’s security documents specifically. Create automated approaches for system administration tasks •Deploy, manage and maintain all security systems and their corresponding or associated software, including firewalls, intrusion detection systems, cryptography systems, and anti-virus software. •Ensure the confidentiality, integrity and availability of the data residing on or transmitted to/from/through enterprise workstations, servers and other systems and in databases and other data repositories •Manage the implementation and execution of Data-Loss strategies. •Ensure the enforcement of enterprise security documents. Manage connection security for local area networks, the company Web site, the company intranet, e-mail communications and the wide area network. Show less

    • South Africa
    • IT Services and IT Consulting
    • 700 & Above Employee
    • Network Security Engineer
      • Nov 2010 - Nov 2014

      • Planning and design o Work with client as well as other process and functional actors to determine and address operational requirements within technology and budget allocation; o Perform auditing of hardware and software before and after the implementation of release package changes. Produce network release documentation and communication; o Ensuring quality components of methodology is followed to achieve all process milestones; o Ensuring that the requirements are documented in technical specifications and topologies. o Planning and design new network security requirements as per client requirement; • Operate and maintain o Perform network support, pre-approved peripheral build and firmware rollouts to all network security devices; o Complete required checklists that defines the completion criteria for each service performed; o Provide informal technical advice and guidance around networking security devices and associated peripherals; o Timely risk escalation and issues to stakeholders; o Monitors networking environment and efficiency and makes recommendations as to improvements, where applicable. o Operate and maintain installed network security infrastructure and hardware; • Service provider management o Where necessary and appropriate, liaise with client with regards to external service providers in the case of an event or incident occurring. • Process compliance o Adhere to applicable processes and standards (ISO, ITIL) and best practice models for relevant Original Equipment Manufacturer (OEM). • Incident resolution o Resolve all security related incidents as per agreed SLA contract; o Proactive escalation of unresolved events, incidents and service request to stakeholders; Show less

    • IT Services and IT Consulting
    • 1 - 100 Employee
    • Network Security Analyst
      • Jul 2008 - Nov 2010

      Delivering effective vulnerability management and offering comprehensive change detection within the network. Assessing and scanning external IP addresses, Highlighting risk, Ensures continual protection against malicious hackers or threats. Analysing traffic traversing from Different customers PIX Firewall, Network visualization, advanced threat identification, External penetration testing, Advanced change detection, Expansion Virus, Corporative nets attack, Security weakness, Network performance, Application and system Failures, System utilization, log collection, File Integrity and Change detection. Configuring and Maintaining Fortinet Products eg: Fortigate, Fortimanager, Fortimail and FortiAnalyzer. Configuring and maintaining IBM IPS Policy’s. Configuring VPN SSL and site to site IPSec tunnels Supporting and maintaining cisco router and switches Compiling weekly summary report and monthly for events triggered on the network, advice clients with solution needed to secure their network and systems. Show less

    • Switzerland
    • IT Services and IT Consulting
    • 700 & Above Employee
    • SYSTEM Support
      • 2008 - 2008

Education

  • AAA
  • TSS

Community

You need to have a working account to view this content. Click here to join now